{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T20:34:23Z","timestamp":1773866063364,"version":"3.50.1"},"reference-count":164,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61300174"],"award-info":[{"award-number":["61300174"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572330"],"award-info":[{"award-number":["61572330"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602319"],"award-info":[{"award-number":["61602319"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of SZU","award":["2016048"],"award-info":[{"award-number":["2016048"]}]},{"name":"Technology Planning Project from Guangdong Province, China","award":["2014B010118005"],"award-info":[{"award-number":["2014B010118005"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/comst.2017.2691349","type":"journal-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T18:43:29Z","timestamp":1491417809000},"page":"1504-1526","source":"Crossref","is-referenced-by-count":416,"title":["Industrial Internet: A Survey on the Enabling Technologies, Applications, and Challenges"],"prefix":"10.1109","volume":"19","author":[{"given":"Jian-Qiang","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1006-7594","authenticated-orcid":false,"given":"F. Richard","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Genqiang","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Chengwen","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[]},{"given":"Qiao","family":"Yan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"NB-IoT system for M2M communication","author":"ratasuk","year":"2016","journal-title":"Proc IEEE Wireless Commun Netw Conf Workshops"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ITST.2015.7377400"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2010.41"},{"key":"ref32","year":"2017","journal-title":"Part 15 4 Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2008.15"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2008.4638746"},{"key":"ref37","first-page":"1","article-title":"Analysis of capacity and scalability of the LoRA low power wide area network technology","author":"mikhaylov","year":"2016","journal-title":"Proc Eur Wireless Conf"},{"key":"ref36","first-page":"1","article-title":"A comparison of wirelessHART and ISA100. 11a","author":"nixon","year":"2012"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2011.943023"},{"key":"ref34","year":"2009","journal-title":"Wireless Systems for Industrial Automation Process Control and Related Applications"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2006.12.020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2008.4638503"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/35.968817"},{"key":"ref20","author":"viktor","year":"2016","journal-title":"The Common Industrial Protocol (CIP) and the Family of CIP Networks"},{"key":"ref22","first-page":"1","article-title":"The summary of the LonWorks fieldbus technology","volume":"5","author":"gao","year":"2006","journal-title":"Computer Study"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/37.898793"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1325890"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6047-4_15"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2424677"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.250676"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CSQRWC.2011.6037079"},{"key":"ref25","first-page":"518","article-title":"Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks","author":"yu","year":"2001","journal-title":"Proc IEEE InfoCom"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICUWB.2015.7324414"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2612733.2612788"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ISCE.2012.6241720"},{"key":"ref153","first-page":"1","article-title":"Virtualization technologies in embedded real-time systems","volume":"30","author":"sandstrom","year":"2007","journal-title":"Diabetes Care"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.68"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"ref150","year":"2017","journal-title":"Transportation"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2359894"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/DSDIS.2015.11"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/TRANSDUCERS.2015.7180952"},{"key":"ref147","year":"2016","journal-title":"ITS Handbook"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/CECNet.2012.6201865"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2012.6220735"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2550452"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1016\/j.jnca.2015.12.008","article-title":"Accuracy-aware wireless indoor localization: Feasibility and applications","volume":"62","author":"luo","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3233\/JIFS-169109"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2014.2364800"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2012.2194175"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM.2014.7058728"},{"key":"ref53","first-page":"1","article-title":"A new approach to increasing energy efficiency by utilizing cyber-physical energy systems","author":"bornschlegl","year":"2013","journal-title":"Proc Workshop Intell Solutions in Embedded Syst"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/09537287.2011.591619"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7306369"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2013.6513420"},{"key":"ref163","first-page":"51","article-title":"Cyber security: A survey on issues and solutions","volume":"6","author":"verma","year":"2015","journal-title":"Impact Factor"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2208211"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2358296"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2003.1203555"},{"key":"ref4","article-title":"Above the clouds: A Berkeley view of cloud computing","author":"armbrust","year":"2009"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2016.7474872"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/COMSWA.2008.4554519"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2015.1569"},{"key":"ref49","year":"2016","journal-title":"Industrial Internet reference architecture"},{"key":"ref7","author":"russell","year":"2009","journal-title":"Artificial Intelligence A Modern Approach"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2014.83"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.116"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2007.012981"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062233"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2015.48"},{"key":"ref47","first-page":"16","article-title":"Industry 4.0&#x2013;potentials for creating smart products: Empirical research results","author":"schmidt","year":"2015","journal-title":"Proc Int Conf Bus Inf Syst Lecture Notes Bus Inf Process (Bis)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113228"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736748"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1007\/11599463_70","article-title":"On coverage problems of directional sensor networks","author":"ma","year":"2005","journal-title":"Proc of the Int'l Conf on Mobile Ad-Hoc and Sensor Networks"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.2328098"},{"key":"ref127","year":"2016","journal-title":"How the Internet of Things Will Revolutionise Medicine"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1097\/MLR.0b013e3181cad65c"},{"key":"ref125","author":"krutz","year":"2013","journal-title":"Industrial Automation and Control System Security Principles"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/EUROCON.2013.6625060"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.procir.2014.02.001"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2011.07.002"},{"key":"ref129","first-page":"92","article-title":"A doctor recommendation algorithm based on doctor performances and patient preferences","author":"huang","year":"2012","journal-title":"Proc Int Conf Wavelet Active Media Technol Inf Process"},{"key":"ref71","author":"mell","year":"2017","journal-title":"The NIST Definition of Cloud Computing"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/SUTC.2008.85"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2409857"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389832"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/CICARE.2014.7007848"},{"key":"ref77","first-page":"2014","article-title":"The importance of &#x2018;big data&#x2019;: A definition","volume":"2012","author":"beyer","year":"2012","journal-title":"Gartner"},{"key":"ref74","first-page":"1","article-title":"&#x2018;Big data&#x2019;: Big gaps of knowledge in the field of Internet science","volume":"7","author":"snijders","year":"2012","journal-title":"International Journal of Internet Science"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2540520"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2008.111"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2389854"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2015.7301441"},{"key":"ref78","year":"2016","journal-title":"What is Big Data?"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/CPSNA.2015.17"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2013.09.005"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/INTECH.2013.6653688"},{"key":"ref135","year":"2016","journal-title":"Public Sector"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSS.2010.5576574"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2009.2024703"},{"key":"ref60","year":"2017","journal-title":"Productivity and the Industrial Internet"},{"key":"ref139","first-page":"648","article-title":"Creating a Web 2.0 government: Views and perspectives","author":"tsui","year":"2010","journal-title":"Proc Int Conf Netw Digit Soc (ICNDS)"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s40436-013-0014-5"},{"key":"ref61","year":"2017","journal-title":"Securing the future of German manufacturing industry Recommendations for implementing the strategic initiative INDUSTRIE 4 0"},{"key":"ref63","article-title":"Method and system for robot localization and confinement","author":"joseph","year":"2004"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1177\/0954405411405575"},{"key":"ref140","first-page":"411","article-title":"Bio sensing technology for environmental monitoring","volume":"23","author":"gong","year":"2010","journal-title":"Spectrosc Spectral Anal"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1370\/afm.1474"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/2809563.2809602"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/S0007-8506(07)63214-4"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/ICSEA.2009.33"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/S0007-8506(07)61548-0"},{"key":"ref143","first-page":"987","article-title":"Correlation based video processing in video sensor networks","volume":"2","author":"ma","year":"2005","journal-title":"Proc Int Conf Wireless Netw Commun Mobile Comput"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1243\/0954405011518647"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2014.2346080"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2016.488"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2651880"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.229"},{"key":"ref1","first-page":"1","article-title":"Industrial Internet: Pushing the boundaries of minds and machines","volume":"26","author":"evans","year":"2012","journal-title":"Gen Electr"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2009.01.003"},{"key":"ref95","author":"william","year":"2015","journal-title":"Programmable Logic Controllers"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2062473"},{"key":"ref94","article-title":"Distributed control system","author":"george","year":"1979"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/IC3I.2014.7019732"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1109\/PROC.1987.13932","article-title":"supervisory control and data acquisition","volume":"75","author":"gaushell","year":"1987","journal-title":"Proceedings of the IEEE"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2664043"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ISRCS.2010.5603480"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/AQTR.2014.6857843"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2623666"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/CIACS.2015.7395571"},{"key":"ref90","first-page":"1","article-title":"A quick view on current techniques and machine learning algorithms for big data analytics","author":"berral-garc\u00eda","year":"2016","journal-title":"Proc IEEE 18th Int Conf Transparent Opt Netw (ICTON)"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.165"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1985.10014"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2009.5402550"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref110","year":"2017","journal-title":"IEEE 802 3 [TM] ?Standard for Ethernet&#x0160; Marks 30 Years of Innovation and Global Market Growth"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.36"},{"key":"ref99","first-page":"358","article-title":"Evaluation of popular application sandboxing","author":"ameiri","year":"2011","journal-title":"Internet Technology and Secured Transactions"},{"key":"ref96","first-page":"1","article-title":"Reference architectures for industrial automation and control systems","author":"paul","year":"2012","journal-title":"Proc 15th Annu Meeting ODVA Ind Conf"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2015.45"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2011.03.003"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICTSS.2014.7013187"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SSIC.2015.7245330"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2015.7389155"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2014.2312079"},{"key":"ref15","year":"2017","journal-title":"U S Consortium on Industrial Internet"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.092112.111510"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.mfglet.2014.12.001"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.05.045"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/JETCAS.2013.2243032"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/960173"},{"key":"ref81","author":"lee","year":"2015","journal-title":"Industrial Big Data"},{"key":"ref18","author":"verhappen","year":"2012","journal-title":"FOUNDATION Fieldbus"},{"key":"ref84","first-page":"1","article-title":"Kerberos authentication and authorization system","author":"miller","year":"1987","journal-title":"Proc Project Athena Tech Plan"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2012.052512.111766"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/41.605633"},{"key":"ref83","author":"obitko","year":"2013","journal-title":"Big Data Challenges in Industrial Automation"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/CC.2014.7004528"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2015.7282550"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2010.159"},{"key":"ref80","year":"2016","journal-title":"Bringing the Industrial Internet to the Marine Industry and Ships Into the Cloud"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.74"},{"key":"ref120","first-page":"1","article-title":"From offline toward real-time: A hybrid systems model checking and CPS co-design approach for medical device plug-and-play collaborations","volume":"25","author":"li","year":"2013","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ICMIRA.2013.45"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.6033032"},{"key":"ref122","doi-asserted-by":"crossref","first-page":"1286","DOI":"10.1109\/TC.2006.157","article-title":"Adaptive data fusion for energy efficient routing in wireless sensor networks","volume":"55","author":"luo","year":"2006","journal-title":"IEEE Trans Comput"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2006.171"},{"key":"ref85","first-page":"847","article-title":"Direct attached storage","author":"kazuo","year":"2009","journal-title":"Encyclopedia of Database Systems"},{"key":"ref86","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/353360.353362","article-title":"Network attached storage architecture","volume":"43","author":"garth","year":"2000","journal-title":"Commun ACM"},{"key":"ref87","article-title":"Method of enabling heterogeneous platforms to utilize a universal file system in a storage area network","author":"michael","year":"2003"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2010.5496972"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8013866\/07892976.pdf?arnumber=7892976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T17:03:08Z","timestamp":1642006988000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7892976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":164,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2017.2691349","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}