Lei Lin , Yihua Du , Shibo Zhao , Wenkang Jiang , Qirui Tang , Li Xu
{"title":"Maximizing the spread of information through content optimization","authors":"Lei Lin , Yihua Du , Shibo Zhao , Wenkang Jiang , Qirui Tang , Li Xu","doi":"10.1016/j.iswa.2024.200448","DOIUrl":"10.1016/j.iswa.2024.200448","url":null,"abstract":"<div><div>As data-driven prediction models advance, an increasing number of people are enjoying news personalized to their interests. The primary problem such recommendation models solve is to precisely match information with users and, in so doing, ensure that news spreads with greater efficiency. However, these techniques only help the media platform; they do not help those who produce the news. Hence, we devised a propagation framework based on a human-in-the-loop simulation that helps content authors maximize the spread of their messages through social networks. The framework works by acting on feedback provided by the simulation model. Additionally, the spread of information is formulated as a multi-objective optimization problem in which propagation is data-driven and simulated with machine learning techniques that leverage data on the historical behaviors of users. We additionally describe an implementation for this framework as an example of how the framework might be used in real life. On the practical side, the implementation uses text data from a blog to simulate the message's propagation, while, from a technical point of view, the multi-objective optimization problem is divided into an information retrieval problem and an integer programming problem, the results of which are fed back into the content editor as content operation strategies. A case study with the Sina Weibo microblog site not only validates the framework but also provides practitioners with insights into how to maximize the spread of information through social networking platforms. The results show that the proposed propagation framework is capable of increasing retweets by 7.9575 %. As an interesting aside, our experiments also show that the Weibo retweet lottery is both popular and a highly effective mechanism for increasing reposts.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200448"},"PeriodicalIF":0.0,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142526532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nada AbdElFattah Ibrahim , Ehab R. Mohamed , Hanaa M. Hamza , Yousef S. Alsahafi , Khalid M. Hosny
{"title":"Masked face image segmentation using a multilevel threshold with a hybrid fitness function","authors":"Nada AbdElFattah Ibrahim , Ehab R. Mohamed , Hanaa M. Hamza , Yousef S. Alsahafi , Khalid M. Hosny","doi":"10.1016/j.iswa.2024.200445","DOIUrl":"10.1016/j.iswa.2024.200445","url":null,"abstract":"<div><div>Masked face segmentation tasks have become significantly more difficult due to the increasing use of face masks. On the other hand, the forehead, eyebrows, and eye regions are usually visible and reveal vital information. This exposed area of the face has been segmented and trusted to be used in real life for various applications, such as security, healthcare education, and projects in smart cities. The field of image segmentation has seen a significant increase in study in recent years, leading to the development of multi-level thresholding algorithms that have proven to be very successful compared to other approaches. Traditional statical techniques such as Otsu and Kapur are benchmark algorithms for image thresholding automation. The two techniques widely used, Otsu's and Kapur's entropy, are combined to create a hybrid fitness function to identify the ideal threshold values. In this study, we effectively reduce the computational time demonstrated by the high convergence curve while maintaining optimal outcomes by integrating the hybrid fitness function with multi-level thresholding using the Electric Eel Foraging Optimization (EEFO) approach to segment the uncovered region of masked face images. EEFO is a bio-inspired metaheuristic algorithm that simulates how electric EEL forages in nature. This algorithm achieved promising results in several optimization tasks, such as masked face segmentation. The proposed method is compared with ten cutting-edge algorithms focusing on recently developed metaheuristic techniques and outperforms them. Five metrics were used to evaluate the algorithm's performance: MSE, PSNR, SSIM, FSIM, and image quality index. The proposed method achieved superior results of 101.79, 26.83, 0.8058, 0.9339, and 0.9553 for average MSE, average PSNR, average SSIM, average FSIM, and average image quality index, respectively. Its superiority is verified by using the suggested approach on six benchmark images. The results demonstrate how effectively the proposed algorithm outperforms reliable metaheuristic approaches for solving masked face segmentation challenges.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200445"},"PeriodicalIF":0.0,"publicationDate":"2024-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142425941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wasiu Yusuf , Hafiz Alaka , Mubashir Ahmad , Wusu Godoyon , Saheed Ajayi , Luqman Olalekan Toriola-Coker , Abdullahi Ahmed
{"title":"Deep learning for automated encrustation detection in sewer inspection","authors":"Wasiu Yusuf , Hafiz Alaka , Mubashir Ahmad , Wusu Godoyon , Saheed Ajayi , Luqman Olalekan Toriola-Coker , Abdullahi Ahmed","doi":"10.1016/j.iswa.2024.200433","DOIUrl":"10.1016/j.iswa.2024.200433","url":null,"abstract":"<div><div>Rapid urbanization and population growth in recent decades have placed significant pressure on urban cities to rely heavily on underground infrastructure, such as sewers and tunnels, to maintain the provision of essential services. These sewers, typically having a limited lifespan of 50 to 100 years, are prone to various forms of defects. While prior research has primarily addressed common sewer defect like crack, root intrusion, and infiltration among others, the challenge of encrustation—the formation of hard deposits within sewer systems—has received less attention. This study presents a pioneering deep-learning approach to detect encrustation in sewers by leveraging survey videos from 14 different sewers in the United Kingdom. Our work marks the first effort to develop models specifically for detecting encrustation using deep learning techniques, as previous studies have focused on other types of deposits such as settled and attached deposits. By converting the videos into sequential image frames, we subjected them to thorough analysis and several image pre-processing techniques. Our contributions include the development and comparison of different classification models using backbone CNN networks such as AlexNet, VGG16, EfficientNet, and VGG19 to classify encrustation. Notably, this study provides the first metric-based comparison of these backbone networks to identify the most effective model for encrustation detection. The results demonstrate an impressive 96 % accuracy using the deep architecture of VGG19. Beyond accuracy, this research explores the impact of data augmentation and network dropout on reducing overfitting and enhancing model performance. Additionally, we analyze the time complexities associated with training models with and without data augmentation, providing valuable insights into the efficiency of our approach.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200433"},"PeriodicalIF":0.0,"publicationDate":"2024-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142525833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing feature extraction and fusion for high-resolution defect detection in solar cells","authors":"Hoanh Nguyen, Tuan Anh Nguyen, Nguyen Duc Toan","doi":"10.1016/j.iswa.2024.200443","DOIUrl":"10.1016/j.iswa.2024.200443","url":null,"abstract":"<div><div>In this paper, we propose a novel architecture for defect detection in electroluminescent images of polycrystalline silicon solar cells, addressing the challenges posed by subtle and dispersed defects. Our model, based on a modified Swin Transformer, incorporates key innovations that enhance feature extraction and fusion. We replace the conventional self-attention mechanism with a novel group self-attention mechanism, increasing the mAP50:5:95 score from 50.12 % to 52.98 % while reducing inference time from 74 ms to 62 ms. We also introduce a spatial displacement with shift convolution module, replacing the traditional Multi-Layer Perceptron, which further enhances the model's receptive field and improves precision and recall. Additionally, our fast multi-scale feature fusion mechanism effectively combines high-resolution details with high-level semantic features from different network layers, optimizing defect detection accuracy. Experimental results on the PVEL-AD dataset demonstrate that our model achieves the highest mAP50 score of 83.11 % and an F1-Score of 84.33 %, surpassing state-of-the-art models while maintaining a competitive inference time of 66.3 ms. These findings highlight the effectiveness of our innovations in improving defect detection accuracy and computational efficiency, making our model a robust solution for quality assurance in solar cell manufacturing.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200443"},"PeriodicalIF":0.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142425938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shuangwei Li, Yang Xie, Mingming Shi, Xian Zheng, Yongling Lu
{"title":"Hybrid intelligent algorithm aided energy consumption optimization in smart grid systems with edge computing","authors":"Shuangwei Li, Yang Xie, Mingming Shi, Xian Zheng, Yongling Lu","doi":"10.1016/j.iswa.2024.200444","DOIUrl":"10.1016/j.iswa.2024.200444","url":null,"abstract":"<div><div>The rapid proliferation of smart grid systems necessitates efficient management of energy resources, particularly in the context of mobile edge computing (MEC) networks. This paper presents a novel approach to optimize the energy consumption in smart grid systems with the integration of edge computing, employing a hybrid intelligent algorithm (HIA) empowered by particle swarm optimization (PSO). The primary objective is to enhance the sustainability and operational efficiency of smart grid infrastructures by minimizing the energy consumption in the MEC networks. The proposed HIA utilizes PSO to dynamically allocate computational tasks and manage resources among edge devices based on real-time demand fluctuations. This adaptive approach aims to achieve the optimal load balancing and energy efficiency across the smart grid ecosystem. By leveraging the PSO’s ability to iteratively refine solutions and adapt to changing environmental conditions, the algorithm optimizes the energy consumption while maintaining requisite service levels and reliability. Simulation experiments and case studies validate the effectiveness of the proposed PSO-based HIA in reducing the energy consumption without compromising system other performances. The results demonstrate substantial improvements in the energy efficiency, illustrating the feasibility and benefits of employing intelligent algorithms tailored for edge computing environments within smart grid systems. This research contributes to advancing sustainable smart grid technologies by introducing a robust framework for energy optimization through hybrid intelligent algorithms.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200444"},"PeriodicalIF":0.0,"publicationDate":"2024-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142425939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power quality disturbances categorization using Identity Feature Vector and Extreme Learning Machine","authors":"Shen Wei , Du Wenjuan , Chen Xia","doi":"10.1016/j.iswa.2024.200446","DOIUrl":"10.1016/j.iswa.2024.200446","url":null,"abstract":"<div><div>Power quality disturbances are variations or anomalies in the voltage, current, or frequency of electrical power that can affect the proper operation of electrical equipment. These disturbances are usually classified into different categories based on their attributes and effects. This article presents an intelligent technique based on an Identity Feature Vector and an Extreme Learning Machine (ELM). This study first derives a constant length vector for each disturbance signal. A wavelet transform is applied to derive attributes from the input disturbance signal, and the identity vector is formed using the approximation coefficients. After the required normalization procedures, the normalized identity vector is classified using an ELM. To assess the productivity of the suggested approach, 12 types of disturbances, single and combined, are generated, and the system's efficiency is studied. The results indicate that ten out of 12 combinations, including Harmonic, Sag, and Flicker, were detected with 100 % accuracy. Additionally, the combination \"Harmonic + Swell\" exhibited the lowest accuracy, identified with 98 % accuracy. The total average accuracy of this method is 99.75 %. The outcomes demonstrate the highly favorable performance of this approach. This study evaluated the analyzed algorithm under noisy conditions with three different noise levels: 30 dB, 40 dB, and 50 dB, respectively. The average prediction accuracy for these three noise levels is 99.16 %, 99.25 %, and 98.91 %. The outcomes demonstrate that the evaluated algorithm accurately detects power quality disturbances across various noisy conditions.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200446"},"PeriodicalIF":0.0,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142525803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ayuba John , Ismail Fauzi Bin Isnin , Syed Hamid Hussain Madni , Farkhana Binti Muchtar
{"title":"Enhanced intrusion detection model based on principal component analysis and variable ensemble machine learning algorithm","authors":"Ayuba John , Ismail Fauzi Bin Isnin , Syed Hamid Hussain Madni , Farkhana Binti Muchtar","doi":"10.1016/j.iswa.2024.200442","DOIUrl":"10.1016/j.iswa.2024.200442","url":null,"abstract":"<div><div>The intrusion detection system (IDS) model, which can identify the presence of intruders in the network and take some predefined action for safe data transit across the network, is advantageous in achieving security in both simple and advanced network systems. Several IDS models have various security problems, such as low detection accuracy and high false alarms, which can be caused by the network traffic dataset's excessive dimensionality and class imbalance in the creation of IDS models. Principal Component Analysis (PCA) has proven to be a helpful feature selection technique for dimensionality reduction. As a result, because it is a linear transformation, it has challenges capturing non-linear relationships between feature properties in the network traffic datasets. This paper proposes a variable ensemble machine learning method to solve the problem and achieve a low variance model with high accuracy and low false alarm. First, PCA is combined with the AdaBoost ensemble machine learning algorithm, which acts as stagewise additive modelling to compensate for PCA's deficiency in feature selection in network traffic by minimizing the exponential loss function. Secondly, PCA is used for feature selection, and a LogitBoost classifier algorithm can be used for multiclass classification and acts as an additive tree regression to compensate for the PCA's weakness by minimizing the Logistic Loss to provide an optimal classifier output. Finally, the low variance ability of RandomForest, which employs the bagging approach, is applied to eliminate overfittings. The experiments of the IDS model developed from the proposed methods were evaluated on the WSN-DS, NSL-KDD, and UNSW-N15 datasets. The performance of the methods, PCA with AdaBoost, on the WSN-DS dataset has an accuracy score of 92.3 %, an 89.0 % accuracy score on the NSL-KDD dataset, and a 67.9 % accuracy score on UNSW-N15, which is the least accurate score. PCA and RandomForest surpassed them by scoring 100 % accuracy on all three datasets. PCA and Bagging have an accuracy score of 99.8 % on the WSN-DS dataset, 100 % on the NSL-KDD dataset, and 93.4 % on the UNSW-N15 dataset. In comparison, PCA and LogitBoost have an accuracy score of 98.9 % on the WSN-DS dataset, 100 % on the NSL-KDD dataset, and 88.7 % on the UNSW-N15 dataset.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200442"},"PeriodicalIF":0.0,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142324052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samuel-Soma M. Ajibade , Gloria Nnadwa Alhassan , Abdelhamid Zaidi , Olukayode Ayodele Oki , Joseph Bamidele Awotunde , Emeka Ogbuju , Kayode A. Akintoye
{"title":"Evolution of machine learning applications in medical and healthcare analytics research: A bibliometric analysis","authors":"Samuel-Soma M. Ajibade , Gloria Nnadwa Alhassan , Abdelhamid Zaidi , Olukayode Ayodele Oki , Joseph Bamidele Awotunde , Emeka Ogbuju , Kayode A. Akintoye","doi":"10.1016/j.iswa.2024.200441","DOIUrl":"10.1016/j.iswa.2024.200441","url":null,"abstract":"<div><div>This bibliometric research explores the global evolution of machine learning applications in medical and healthcare research for 3 decades (1994 to 2023). The study applies data mining techniques to a comprehensive dataset of published articles related to machine learning applications in the medical and healthcare sectors. The data extraction process includes the retrieval of relevant information from the source sources such as journals, books, and conference proceedings. An analysis of the extracted data is then conducted to identify the trends in the machine learning applications in medical and healthcare research. The Results revealed the publications published and indexed in the Scopus and PubMed database over the last 30 years. Bibliometric Analysis revealed that funding played a more significant role in publication productivity compared to collaboration (co-authorships), particularly at the country level. Hotspots analysis revealed three core research themes on MLHC research hence demonstrating the importance of machine learning applications to medical and healthcare research. Further, the study showed that the MLHC research landscape has largely focused on ML applications to tackle various issues ranging from chronic medical challenges (e.g., cardiological diseases) to patient data security. The findings of this research may be useful to policy makers and practitioners in the medical and healthcare sectors and to global research endeavours in the field. Future studies could include addressing issues such as growing ethical considerations, integration, and practical applications in wearable technology, IoT, and smart healthcare systems.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200441"},"PeriodicalIF":0.0,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142326554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
William Villegas-Ch , Alexandra Maldonado Navarro , Santiago Sanchez-Viteri
{"title":"Optimization of inventory management through computer vision and machine learning technologies","authors":"William Villegas-Ch , Alexandra Maldonado Navarro , Santiago Sanchez-Viteri","doi":"10.1016/j.iswa.2024.200438","DOIUrl":"10.1016/j.iswa.2024.200438","url":null,"abstract":"<div><p>This study presents implementing and evaluating a computer vision platform to optimize warehouse inventory management. Integrating machine learning and computer vision technologies, this solution addresses critical challenges in inventory accuracy and operational efficiency, overcoming the limitations of traditional methods and pre-existing automated systems. The platform uses convolutional neural networks and open-source libraries such as TensorFlow and PyTorch to recognize and accurately classify products from images captured in real time. Practical implementation in a natural warehouse environment allowed the proposed platform to be compared with traditional systems, highlighting significant improvements, such as a 45% reduction in the time required for inventory counting and a 9% increase in inventory accuracy. Despite facing challenges such as staff resistance to change and technical limitations on image quality, these difficulties were overcome through effective change management strategies and algorithm improvements. The findings of this study identify the potential for computer vision technology to transform warehouse operations, offering a practical and adaptable solution for inventory management.</p></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200438"},"PeriodicalIF":0.0,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324001121/pdfft?md5=fddb74ba205cf2dbd45a73920fc45d01&pid=1-s2.0-S2667305324001121-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142272161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DeepInvesting: Stock market predictions with a sequence-oriented BiLSTM stacked model – A dataset case study of AMZN","authors":"Ashkan Safari, Mohammad Ali Badamchizadeh","doi":"10.1016/j.iswa.2024.200439","DOIUrl":"10.1016/j.iswa.2024.200439","url":null,"abstract":"<div><div>Intelligent forecasters are now being considered in the stock market, providing essential insights and strategic guidance to investors and traders by presenting analytical tools and predictive models, thus enabling informed decision-making and mitigating financial risks in this dynamic market. The importance of intelligent analyzers in stock trading routines is considered in this work, where DeepInvesting, a multimodal deep learning model tailored for stock price prediction, is introduced. Employing a Sequence-Oriented, Long-Term Dependent (SoLTD) architecture featuring Bidirectional Long Short-Term Memory (BiLSTM) networks, DeepInvesting is applied to essential features of the Amazon Corp. (AMZN) market dataset, gathered from Yahoo Finance, including Closing, Opening, High, Low, Volume, and Adj Close prices. Exceptional performance in forecasting Closing, Opening, High, Low, and Adj Close prices is demonstrated, with minimal Mean Absolute Percentage Error (MAPE) and Root Mean Squared Percentage Error (RMSPE) scores, coupled with high R-squared (R<sup>2</sup>) values, manifesting a robust fit to the data, as well as computational complexity, and Rates Per Second (RPS) metrics in comparison to other models of KNN, LSTM, RNN, CNN, and ANN. Finally, challenges in the accurate prediction of trading volumes are identified, highlighting an area for future enhancement.</div></div>","PeriodicalId":100684,"journal":{"name":"Intelligent Systems with Applications","volume":"24 ","pages":"Article 200439"},"PeriodicalIF":0.0,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667305324001133/pdfft?md5=7fc986df27640d36742f23b85b7b526b&pid=1-s2.0-S2667305324001133-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142315171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}