{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:51:36Z","timestamp":1740149496160,"version":"3.37.3"},"reference-count":60,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2021,12,24]],"date-time":"2021-12-24T00:00:00Z","timestamp":1640304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"With the increasing number of mobile devices and IoT devices across a wide range of real-life applications, our mobile cloud computing devices will not cope with this growing number of audiences soon, which implies and demands the need to shift to fog computing. Task scheduling is one of the most demanding scopes after the trust computation inside the trustable nodes. The mobile devices and IoT devices transfer the resource-intensive tasks towards mobile cloud computing. Some tasks are resource-intensive and not trustable to allocate to the mobile cloud computing resources. This consequently gives rise to trust evaluation and data sync-up of devices joining and leaving the network. The resources are more intensive for cloud computing and mobile cloud computing. Time, energy, and resources are wasted due to the nontrustable nodes. This research article proposes a multilevel trust enhancement approach for efficient task scheduling in mobile cloud environments. We first calculate the trustable tasks needed to offload towards the mobile cloud computing. Then, an efficient and dynamic scheduler is added to enhance the task scheduling after trust computation using social and environmental trust computation techniques. To improve the time and energy efficiency of IoT and mobile devices using the proposed technique, the energy computation and time request computation are compared with the existing methods from literature, which identified improvements in the results. Our proposed approach is centralized to tackle constant SyncUPs of incoming devices\u2019 trust values with mobile cloud computing. With the benefits of mobile cloud computing, the centralized data distribution method is a positive approach.<\/jats:p>","DOI":"10.3390\/s22010108","type":"journal-article","created":{"date-parts":[[2021,12,27]],"date-time":"2021-12-27T06:06:54Z","timestamp":1640585214000},"page":"108","source":"Crossref","is-referenced-by-count":21,"title":["Multilevel Central Trust Management Approach for Task Scheduling on IoT-Based Mobile Cloud Computing"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2917-6598","authenticated-orcid":false,"given":"Abid","family":"Ali","sequence":"first","affiliation":[{"name":"Department of Computer Science, The University of Engineering and Technology, Taxila 47080, Pakistan"},{"name":"Department of Computer Science, Govt Akhtar Nawaz Khan (Shaheed) Degree College KTS, Haripur 22620, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7212-1408","authenticated-orcid":false,"given":"Muhammad Munawar","family":"Iqbal","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Engineering and Technology, Taxila 47080, Pakistan"}]},{"given":"Harun","family":"Jamil","sequence":"additional","affiliation":[{"name":"Department of Electronic Engineering, Jeju National University, Jejusi 63243, Jeju-do, Korea"}]},{"given":"Habib","family":"Akbar","sequence":"additional","affiliation":[{"name":"Department of Computer Science, The University of Engineering and Technology, Taxila 47080, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0213-8145","authenticated-orcid":false,"given":"Ammar","family":"Muthanna","sequence":"additional","affiliation":[{"name":"Department of Telecommunication Networks and Data Transmission, The Bonch-Bruevich Saint-Petersburg State University of Telecommunications, 193232 Saint Petersburg, Russia"},{"name":"Department of Computer Science, RUDN University, Peoples\u2019 Friendship University of Russia, 6 Miklukho-Maklaya Str., 117198 Moscow, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6264-3720","authenticated-orcid":false,"given":"Meryem","family":"Ammi","sequence":"additional","affiliation":[{"name":"Department of Computational Sciences, Naif Arab University for Security Sciences, Riyadh 13216, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6322-3963","authenticated-orcid":false,"given":"Maha M.","family":"Althobaiti","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computing and Information Technology, Taif University, P.O. Box 11099, Taif 21944, Saudi Arabia"}]}],"member":"1968","published-online":{"date-parts":[[2021,12,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"31567","DOI":"10.1007\/s11042-020-09516-y","article-title":"A recent review and a taxonomy for multimedia application in Mobile cloud computing based energy efficient transmission","volume":"79","author":"Parajuli","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ali, A., Iqbal, M.M., Jamil, H., Qayyum, F., Jabbar, S., Cheikhrouhou, O., Baz, M., and Faisal, J. (2021). An Efficient Dynamic-Decision Based Task Scheduler for Task Offloading Optimization and Energy Management in Mobile Cloud Computing. Sensors, 21.","DOI":"10.3390\/s21134527"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Huh, S., Cho, S., and Kim, S. (2017, January 19\u201322). Managing IoT devices using blockchain platform. Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), PyeongChang, Korea.","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"8182","DOI":"10.1109\/JIOT.2019.2935189","article-title":"IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices","volume":"6","author":"Meneghello","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/MSP.2018.2825478","article-title":"IoT security techniques based on machine learning: How do IoT devices use AI to enhance security?","volume":"35","author":"Xiao","year":"2018","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Vaiyapuri, T., Parvathy, S.V., Manikandan, V., Krishnaraj, N., Gupta, D., and Shankar, K. (2021). A Novel Hybrid Optimization for Cluster-Based Routing Protocol in Information-Centric Wireless Sensor Networks for IoT Based Mobile Edge Computing. Wirel. Pers. Commun., 1\u201324.","DOI":"10.1007\/s11277-021-08088-w"},{"key":"ref_7","unstructured":"Kumar, D., Shen, K., Case, B., Garg, D., Alperovich, G., Kuznetsov, D., Gupta, R., and Durumeric, Z. (2019, January 14\u201316). All things considered: An analysis of IoT devices on home networks. Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA."},{"key":"ref_8","unstructured":"Meidan, Y., Bohadana, M., Shabtai, A., Ochoa, M., Tippenhauer, N.O., Guarnizo, J.D., and Elovici, Y. (2017). Detection of unauthorized IoT devices using machine learning techniques. arXiv, arXiv:1709.04647."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3432208","article-title":"Handling Missing Sensors in Topology-Aware IoT Applications with Gated Graph Neural Network","volume":"Volume 4","author":"Liu","year":"2020","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Al-Fatlawi, A.H., Fatlawi, H.K., and Ling, S.H. (2017, January 11\u201315). Recognition physical activities with optimal number of wearable sensors using data mining algorithms and deep belief network. Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), Jeju Island, Korea.","DOI":"10.1109\/EMBC.2017.8037456"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"215","DOI":"10.5267\/j.uscm.2018.10.004","article-title":"Radio frequency identification (RFID) technology as a strategic tool towards higher performance of supply chain operations in textile and apparel industry of Malaysia","volume":"7","author":"Ali","year":"2019","journal-title":"Uncertain Supply Chain. Manag."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"012009","DOI":"10.1088\/1742-6596\/954\/1\/012009","article-title":"Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC)","volume":"954","author":"Ratnadewi","year":"2018","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Fong, T. (2017). Wireless sensor networks. Internet of Things and Data Analytics Handbook, Wiley.","DOI":"10.1002\/9781119173601.ch12"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.future.2017.09.020","article-title":"Next generation cloud computing: New trends and research directions","volume":"79","author":"Varghese","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1896","DOI":"10.1002\/spe.2850","article-title":"EFFORT: Energy efficient framework for offload communication in mobile cloud computing","volume":"51","author":"Malik","year":"2021","journal-title":"Softw. Pract. Exp."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"6392","DOI":"10.1109\/JIOT.2020.2974281","article-title":"Deep reinforcement learning for resource protection and real-time detection in IoT environment","volume":"7","author":"Liang","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/s11277-020-07879-x","article-title":"mTrust: Call Behavioral Trust Predictive Analytics Using Unsupervised Learning in Mobile Cloud Computing","volume":"117","author":"Bhowmik","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1016\/j.jnca.2018.10.021","article-title":"Applications Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions","volume":"128","author":"Elazhary","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Dinh, T., Kim, Y., and Lee, H.J.S. (2017). A location-based interactive model of internet of things and cloud (IoT-Cloud) for mobile cloud computing applications. Sensors, 17.","DOI":"10.3390\/s17030489"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"23626","DOI":"10.1109\/ACCESS.2018.2831898","article-title":"A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion","volume":"6","author":"Yuan","year":"2018","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"107318","DOI":"10.1016\/j.comnet.2020.107318","article-title":"TruSD: Trust framework for service discovery among IoT devices","volume":"178","author":"Kalkan","year":"2020","journal-title":"Comput. Netw."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1016\/j.jnca.2017.02.001","article-title":"Security and privacy challenges in mobile cloud computing: Survey and way ahead","volume":"84","author":"Mollah","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1016\/j.emj.2018.04.004","article-title":"The role of social capital and culture on social decision-making constraints: A multilevel investigation","volume":"37","author":"Wang","year":"2019","journal-title":"Eur. Manag. J."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.jnca.2018.04.018","article-title":"Mobile cloud computing: Challenges and future research directions","volume":"115","author":"Noor","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1020","DOI":"10.1016\/j.future.2016.12.027","article-title":"Secure and fine-grained access control on e-healthcare records in mobile cloud computing","volume":"78","author":"Liu","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/s11277-018-6014-9","article-title":"Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm","volume":"104","author":"Sundararaj","year":"2019","journal-title":"Wirel. Pers. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1007\/s11277-019-06872-3","article-title":"Comprehensive review: Privacy protection of user in location-aware services of mobile cloud computing","volume":"111","author":"Almusaylim","year":"2020","journal-title":"Wirel. Pers. Commun."},{"key":"ref_28","first-page":"277","article-title":"Security Vulnerability in Mobile Cloud Computing (MCC)","volume":"8","author":"Walia","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref_29","first-page":"36","article-title":"Trust delegation-based secure mobile cloud computing framework","volume":"9","author":"Tawalbeh","year":"2017","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Surridge, M., Correndo, G., Meacham, K., Papay, J., Phillips, S.C., Wiegand, S., and Wilkinson, T. (2018, January 24). Trust Modelling in 5G mobile networks. Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, Budapest, Hungary.","DOI":"10.1145\/3229616.3229621"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"34207","DOI":"10.1109\/ACCESS.2019.2904081","article-title":"A trust-based agent learning model for service composition in mobile cloud computing environments","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1109\/TNSM.2018.2886379","article-title":"Trust-based service management for mobile cloud IoT systems","volume":"16","author":"Chen","year":"2018","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","article-title":"Secure integration of IoT and cloud computing","volume":"78","author":"Stergiou","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1016\/j.compeleceng.2018.06.006","article-title":"Recent security challenges in cloud computing","volume":"71","author":"Subramanian","year":"2018","journal-title":"Comput. Electr. Eng."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Sunyaev, A. (2020). Cloud computing. Internet Computing, Springer.","DOI":"10.1007\/978-3-030-34957-8"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"150936","DOI":"10.1109\/ACCESS.2019.2947652","article-title":"Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog","volume":"7","author":"Tange","year":"2019","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Fulmer, A., and Dirks, K. (2018). Multilevel Trust: A Theoretical and Practical Imperative, Taylor & Francis.","DOI":"10.1080\/21515581.2018.1531657"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/s10551-016-3341-1","article-title":"A multilevel trust-based model of ethical public leadership","volume":"153","author":"Mozumder","year":"2018","journal-title":"J. Bus. Ethics"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1016\/j.ijproman.2018.08.002","article-title":"Examining the interdependencies among emotional intelligence, trust, and performance in infrastructure projects: A multilevel study","volume":"36","author":"Rezvani","year":"2018","journal-title":"Int. J. Proj. Manag."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.tourman.2016.08.006","article-title":"Multilevel model of management support and casino employee turnover intention","volume":"59","author":"Li","year":"2017","journal-title":"Tour. Manag."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jbusres.2017.09.048","article-title":"Propensity to trust salespeople: A contingent multilevel-multisource examination","volume":"83","author":"Friend","year":"2018","journal-title":"J. Bus. Res."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1002\/job.2213","article-title":"Trust in work teams: An integrative review, multilevel model, and future directions","volume":"39","author":"Costa","year":"2018","journal-title":"J. Organ. Behav."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1016\/j.ijinfomgt.2013.05.005","article-title":"A multilevel model for effects of social capital and knowledge sharing in knowledge-intensive work teams","volume":"33","author":"Yu","year":"2013","journal-title":"Int. J. Inf. Manag."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1016\/j.sbspro.2014.03.693","article-title":"A multilevel trust management framework for service oriented environment","volume":"129","author":"Chong","year":"2014","journal-title":"Procedia Soc. Behav. Sci."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1587","DOI":"10.1002\/wcm.1203","article-title":"A survey of mobile cloud computing: Architecture, applications, and approaches","volume":"13","author":"Dinh","year":"2013","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_46","first-page":"134","article-title":"Mobile cloud computing: The future of cloud","volume":"1","author":"Gupta","year":"2012","journal-title":"Int. J. Adv. Res. Electr. Electron. Instrum. Eng."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Liu, Q., Jian, X., Hu, J., Zhao, H., and Zhang, S. (2009, January 24\u201326). An optimized solution for mobile environment using mobile cloud computing. Proceedings of the 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, China.","DOI":"10.1109\/WICOM.2009.5302240"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1109\/TMC.2018.2831230","article-title":"Energy-efficient dynamic computation offloading and cooperative task scheduling in mobile cloud computing","volume":"18","author":"Guo","year":"2018","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Tang, C., Xiao, S., Wei, X., Hao, M., and Chen, W. (2018, January 15\u201317). Energy efficient and deadline satisfied task scheduling in mobile cloud computing. Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing (BigComp), Shanghai, China.","DOI":"10.1109\/BigComp.2018.00037"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"4472","DOI":"10.1007\/s11227-019-02745-5","article-title":"Adaptive fault-tolerant scheduling strategies for mobile cloud computing","volume":"75","author":"Lee","year":"2019","journal-title":"J. Supercomput."},{"key":"ref_51","first-page":"112","article-title":"Architecture for fault tolerance in mobile cloud computing using disease resistance approach","volume":"8","author":"Raju","year":"2016","journal-title":"Int. J. Commun. Netw. Inf. Secur."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Abd, S.K., Al-Haddad, S.A.R., Hashim, F., Abdullah, A.B., and Yussof, S. (2017, January 6\u20138). Energy-aware fault tolerant task offloading of mobile cloud computing. Proceedings of the 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), San Francisco, CA, USA.","DOI":"10.1109\/MobileCloud.2017.26"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"2756","DOI":"10.1002\/cpe.3205","article-title":"Dynamic group-based fault tolerance technique for reliable resource management in mobile cloud computing","volume":"28","author":"Park","year":"2016","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.jpdc.2016.04.012","article-title":"Prediction mechanisms for monitoring state of cloud resources using Markov chain model","volume":"96","author":"Khattab","year":"2016","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jss.2016.07.006","article-title":"An improved genetic algorithm for task scheduling in the cloud environments using the priority queues: Formal verification, simulation, and statistical testing","volume":"124","author":"Keshanchi","year":"2017","journal-title":"J. Syst. Softw."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/j.asoc.2019.04.027","article-title":"Joint optimization method for task scheduling time and energy consumption in mobile cloud computing environment","volume":"80","author":"Peng","year":"2019","journal-title":"Appl. Soft Comput."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1007\/s10619-018-7231-7","article-title":"Energy-aware task scheduling in mobile cloud computing","volume":"36","author":"Tang","year":"2018","journal-title":"Distrib. Parallel Databases"},{"key":"ref_58","doi-asserted-by":"crossref","unstructured":"Lin, X., Wang, Y., Xie, Q., and Pedram, M. (July, January 27). Energy and performance-aware task scheduling in a mobile cloud computing environment. Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA.","DOI":"10.1109\/CLOUD.2014.35"},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Guo, S., Xiao, B., Yang, Y., and Yang, Y. (2016, January 10\u201314). Energy-efficient dynamic offloading and resource scheduling in mobile cloud computing. Proceedings of the IEEE INFOCOM 2016\u2014The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA.","DOI":"10.1109\/INFOCOM.2016.7524497"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"409539","DOI":"10.1155\/2013\/409539","article-title":"Application scheduling in mobile cloud computing with load balancing","volume":"2013","author":"Wei","year":"2013","journal-title":"J. Appl. Math."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/1\/108\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,23]],"date-time":"2024-07-23T16:07:39Z","timestamp":1721750859000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/1\/108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,24]]},"references-count":60,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,1]]}},"alternative-id":["s22010108"],"URL":"https:\/\/doi.org\/10.3390\/s22010108","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2021,12,24]]}}}