Loading…
Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System
Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an...
Saved in:
Published in: | Computational intelligence and neuroscience 2022-08, Vol.2022, p.1-13 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123 |
---|---|
cites | cdi_FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123 |
container_end_page | 13 |
container_issue | |
container_start_page | 1 |
container_title | Computational intelligence and neuroscience |
container_volume | 2022 |
creator | Geetha, B. T. Mohan, Prakash Mayuri, A. V. R. Jackulin, T. Aldo Stalin, J. L. Anitha, Varagantham |
description | Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques. |
doi_str_mv | 10.1155/2022/2243827 |
format | article |
fullrecord | <record><control><sourceid>gale_pubme</sourceid><recordid>TN_cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_9377849</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><galeid>A714593148</galeid><sourcerecordid>A714593148</sourcerecordid><originalsourceid>FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123</originalsourceid><addsrcrecordid>eNp90ctu1DAUBmALgegFdjxAJDZIdKivsb2p1FZtGamoSIUFK8txTmZcJU5qJ1TTp6_DjIrogtXx5dPvYx2EPhD8hRAhjimm9JhSzhSVr9A-KZVcCCrZ6-d1KfbQQUp3GAspMH2L9pjQUimt9tGv734FfSiWIQ0-Ql3cDKPv_KMdfT598OO6uAguboY_-zObMrkFN0UovkHtnW2LZWdXeWdDLh2EsbjdpBG6d-hNY9sE73f1EP28vPhx_nVxfXO1PD-9Xjgu2LhwSjSClwoDI4LVzpbAFeYVaUpdlg3nTgtVV9ppaqFyzmpccVzTyjWgMaHsEJ1sc4ep6qB2uYNoWzNE39m4Mb315t-b4Ndm1f82mkmpuM4Bn3YBsb-fII2m88lB29oA_ZQMlZhpxSVnmX58Qe_6KYb8vVlxKWb3V61sC8aHps_vujnUnErChWaEq6yOtsrFPqUIzXPLBJt5smaerNlNNvPPW772obYP_v_6CePnoP0</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2704759847</pqid></control><display><type>article</type><title>Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System</title><source>Wiley Online Library Open Access</source><source>ProQuest - Publicly Available Content Database</source><creator>Geetha, B. T. ; Mohan, Prakash ; Mayuri, A. V. R. ; Jackulin, T. ; Aldo Stalin, J. L. ; Anitha, Varagantham</creator><contributor>Kumar, Akshi ; Akshi Kumar</contributor><creatorcontrib>Geetha, B. T. ; Mohan, Prakash ; Mayuri, A. V. R. ; Jackulin, T. ; Aldo Stalin, J. L. ; Anitha, Varagantham ; Kumar, Akshi ; Akshi Kumar</creatorcontrib><description>Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques.</description><identifier>ISSN: 1687-5265</identifier><identifier>EISSN: 1687-5273</identifier><identifier>DOI: 10.1155/2022/2243827</identifier><identifier>PMID: 35978898</identifier><language>eng</language><publisher>New York: Hindawi</publisher><subject>Algorithms ; Birds ; Cloud computing ; Cryptography ; Curves ; Data encryption ; Encryption ; Health care ; Image coding ; Image enhancement ; Image management ; Informatics ; Magnetic fields ; Medical imaging ; Medical imaging equipment ; Medical informatics ; Optimization ; Performance enhancement ; Population ; Security ; Technology application</subject><ispartof>Computational intelligence and neuroscience, 2022-08, Vol.2022, p.1-13</ispartof><rights>Copyright © 2022 B. T. Geetha et al.</rights><rights>COPYRIGHT 2022 John Wiley & Sons, Inc.</rights><rights>Copyright © 2022 B. T. Geetha et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><rights>Copyright © 2022 B. T. Geetha et al. 2022</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123</citedby><cites>FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123</cites><orcidid>0000-0002-7408-5938</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://www.proquest.com/docview/2704759847/fulltextPDF?pq-origsite=primo$$EPDF$$P50$$Gproquest$$Hfree_for_read</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2704759847?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>230,314,780,784,885,25753,27924,27925,37012,37013,44590,75126</link.rule.ids></links><search><contributor>Kumar, Akshi</contributor><contributor>Akshi Kumar</contributor><creatorcontrib>Geetha, B. T.</creatorcontrib><creatorcontrib>Mohan, Prakash</creatorcontrib><creatorcontrib>Mayuri, A. V. R.</creatorcontrib><creatorcontrib>Jackulin, T.</creatorcontrib><creatorcontrib>Aldo Stalin, J. L.</creatorcontrib><creatorcontrib>Anitha, Varagantham</creatorcontrib><title>Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System</title><title>Computational intelligence and neuroscience</title><description>Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques.</description><subject>Algorithms</subject><subject>Birds</subject><subject>Cloud computing</subject><subject>Cryptography</subject><subject>Curves</subject><subject>Data encryption</subject><subject>Encryption</subject><subject>Health care</subject><subject>Image coding</subject><subject>Image enhancement</subject><subject>Image management</subject><subject>Informatics</subject><subject>Magnetic fields</subject><subject>Medical imaging</subject><subject>Medical imaging equipment</subject><subject>Medical informatics</subject><subject>Optimization</subject><subject>Performance enhancement</subject><subject>Population</subject><subject>Security</subject><subject>Technology application</subject><issn>1687-5265</issn><issn>1687-5273</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNp90ctu1DAUBmALgegFdjxAJDZIdKivsb2p1FZtGamoSIUFK8txTmZcJU5qJ1TTp6_DjIrogtXx5dPvYx2EPhD8hRAhjimm9JhSzhSVr9A-KZVcCCrZ6-d1KfbQQUp3GAspMH2L9pjQUimt9tGv734FfSiWIQ0-Ql3cDKPv_KMdfT598OO6uAguboY_-zObMrkFN0UovkHtnW2LZWdXeWdDLh2EsbjdpBG6d-hNY9sE73f1EP28vPhx_nVxfXO1PD-9Xjgu2LhwSjSClwoDI4LVzpbAFeYVaUpdlg3nTgtVV9ppaqFyzmpccVzTyjWgMaHsEJ1sc4ep6qB2uYNoWzNE39m4Mb315t-b4Ndm1f82mkmpuM4Bn3YBsb-fII2m88lB29oA_ZQMlZhpxSVnmX58Qe_6KYb8vVlxKWb3V61sC8aHps_vujnUnErChWaEq6yOtsrFPqUIzXPLBJt5smaerNlNNvPPW772obYP_v_6CePnoP0</recordid><startdate>20220808</startdate><enddate>20220808</enddate><creator>Geetha, B. T.</creator><creator>Mohan, Prakash</creator><creator>Mayuri, A. V. R.</creator><creator>Jackulin, T.</creator><creator>Aldo Stalin, J. L.</creator><creator>Anitha, Varagantham</creator><general>Hindawi</general><general>John Wiley & Sons, Inc</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7QF</scope><scope>7QQ</scope><scope>7SC</scope><scope>7SE</scope><scope>7SP</scope><scope>7SR</scope><scope>7TA</scope><scope>7TB</scope><scope>7TK</scope><scope>7U5</scope><scope>7X7</scope><scope>7XB</scope><scope>8AL</scope><scope>8BQ</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>8FH</scope><scope>8FI</scope><scope>8FJ</scope><scope>8FK</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BBNVY</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BHPHI</scope><scope>CCPQU</scope><scope>CWDGH</scope><scope>DWQXO</scope><scope>F28</scope><scope>FR3</scope><scope>FYUFA</scope><scope>GHDGH</scope><scope>GNUQQ</scope><scope>H8D</scope><scope>H8G</scope><scope>HCIFZ</scope><scope>JG9</scope><scope>JQ2</scope><scope>K7-</scope><scope>K9.</scope><scope>KR7</scope><scope>L6V</scope><scope>L7M</scope><scope>LK8</scope><scope>L~C</scope><scope>L~D</scope><scope>M0N</scope><scope>M0S</scope><scope>M1P</scope><scope>M7P</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PSYQQ</scope><scope>PTHSS</scope><scope>Q9U</scope><scope>7X8</scope><scope>5PM</scope><orcidid>https://orcid.org/0000-0002-7408-5938</orcidid></search><sort><creationdate>20220808</creationdate><title>Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System</title><author>Geetha, B. T. ; Mohan, Prakash ; Mayuri, A. V. R. ; Jackulin, T. ; Aldo Stalin, J. L. ; Anitha, Varagantham</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Birds</topic><topic>Cloud computing</topic><topic>Cryptography</topic><topic>Curves</topic><topic>Data encryption</topic><topic>Encryption</topic><topic>Health care</topic><topic>Image coding</topic><topic>Image enhancement</topic><topic>Image management</topic><topic>Informatics</topic><topic>Magnetic fields</topic><topic>Medical imaging</topic><topic>Medical imaging equipment</topic><topic>Medical informatics</topic><topic>Optimization</topic><topic>Performance enhancement</topic><topic>Population</topic><topic>Security</topic><topic>Technology application</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Geetha, B. T.</creatorcontrib><creatorcontrib>Mohan, Prakash</creatorcontrib><creatorcontrib>Mayuri, A. V. R.</creatorcontrib><creatorcontrib>Jackulin, T.</creatorcontrib><creatorcontrib>Aldo Stalin, J. L.</creatorcontrib><creatorcontrib>Anitha, Varagantham</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>Aluminium Industry Abstracts</collection><collection>Ceramic Abstracts</collection><collection>Computer and Information Systems Abstracts</collection><collection>Corrosion Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Materials Business File</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Neurosciences Abstracts</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Health & Medical Collection</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>Computing Database (Alumni Edition)</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Natural Science Collection</collection><collection>Hospital Premium Collection</collection><collection>Hospital Premium Collection (Alumni Edition)</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>Biological Science Collection</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>Natural Science Collection</collection><collection>ProQuest One Community College</collection><collection>Middle East & Africa Database</collection><collection>ProQuest Central Korea</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Health Research Premium Collection</collection><collection>Health Research Premium Collection (Alumni)</collection><collection>ProQuest Central Student</collection><collection>Aerospace Database</collection><collection>Copper Technical Reference Library</collection><collection>SciTech Premium Collection</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Health & Medical Complete (Alumni)</collection><collection>Civil Engineering Abstracts</collection><collection>ProQuest Engineering Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>ProQuest Biological Science Collection</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Computing Database</collection><collection>Health & Medical Collection (Alumni Edition)</collection><collection>Medical Database</collection><collection>Biological Science Database</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest - Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest One Psychology</collection><collection>Engineering Collection</collection><collection>ProQuest Central Basic</collection><collection>MEDLINE - Academic</collection><collection>PubMed Central (Full Participant titles)</collection><jtitle>Computational intelligence and neuroscience</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Geetha, B. T.</au><au>Mohan, Prakash</au><au>Mayuri, A. V. R.</au><au>Jackulin, T.</au><au>Aldo Stalin, J. L.</au><au>Anitha, Varagantham</au><au>Kumar, Akshi</au><au>Akshi Kumar</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System</atitle><jtitle>Computational intelligence and neuroscience</jtitle><date>2022-08-08</date><risdate>2022</risdate><volume>2022</volume><spage>1</spage><epage>13</epage><pages>1-13</pages><issn>1687-5265</issn><eissn>1687-5273</eissn><abstract>Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health-related applications. Medical images can be considered significant and sensitive data in the medical informatics system. In order to transmit medical images in an open medium, the design of secure encryption algorithms becomes essential. Encryption can be considered one of the effective solutions for accomplishing security. Although numerous models have existed in the literature, they could not adaptable to the rising number of medicinal images in the health sector. At the same time, the optimal key generation process acts as a vital part in defining the performance of the encryption techniques. Therefore, this article presents a Pigeon Inspired Optimization with Encryption-based Secure Medical Image Management (PIOE-SMIM) technique. The proposed PIOE-SMIM approach majorly concentrates on the development of secret share creation (SSC) and the encryption process. At the initial stage, the medical images are converted into a collection of 12 shares using the SSC approach. In addition, an elliptic curve cryptography (ECC) scheme is employed for the encryption process. In order to optimum key creation procedure in the ECC model, the PIO technique is exploited with the aim of maximizing PSNR. Finally, on the receiver side, the decryption and share reconstruction processes are performed to construct the original images. The PIOE-SMIM model displayed an enhanced PSNR of 59.37 dB in image 1. Improved PSNR of 59.53 dB is given for image 5 using the PIOE-SMIM model. For demonstrating an enhanced performance of the PIOE-SMIM method, a widespread experimental study is made and the results highlighted the supremacy of the PIOE-SMIM model over other techniques.</abstract><cop>New York</cop><pub>Hindawi</pub><pmid>35978898</pmid><doi>10.1155/2022/2243827</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-7408-5938</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1687-5265 |
ispartof | Computational intelligence and neuroscience, 2022-08, Vol.2022, p.1-13 |
issn | 1687-5265 1687-5273 |
language | eng |
recordid | cdi_pubmedcentral_primary_oai_pubmedcentral_nih_gov_9377849 |
source | Wiley Online Library Open Access; ProQuest - Publicly Available Content Database |
subjects | Algorithms Birds Cloud computing Cryptography Curves Data encryption Encryption Health care Image coding Image enhancement Image management Informatics Magnetic fields Medical imaging Medical imaging equipment Medical informatics Optimization Performance enhancement Population Security Technology application |
title | Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T12%3A31%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-gale_pubme&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Pigeon%20Inspired%20Optimization%20with%20Encryption%20Based%20Secure%20Medical%20Image%20Management%20System&rft.jtitle=Computational%20intelligence%20and%20neuroscience&rft.au=Geetha,%20B.%20T.&rft.date=2022-08-08&rft.volume=2022&rft.spage=1&rft.epage=13&rft.pages=1-13&rft.issn=1687-5265&rft.eissn=1687-5273&rft_id=info:doi/10.1155/2022/2243827&rft_dat=%3Cgale_pubme%3EA714593148%3C/gale_pubme%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c453t-c85f54680e3153dca6e4804b1f6966f44c958db9c92aebcca90b40d2bcfe90123%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2704759847&rft_id=info:pmid/35978898&rft_galeid=A714593148&rfr_iscdi=true |