{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:50:08Z","timestamp":1775620208297,"version":"3.50.1"},"reference-count":151,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"17","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["L192031"],"award-info":[{"award-number":["L192031"]}],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61901051"],"award-info":[{"award-number":["61901051"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Young Elite Scientists Sponsorship Program by CAST","award":["YESS20200283"],"award-info":[{"award-number":["YESS20200283"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program","doi-asserted-by":"publisher","award":["2020YFA0711303"],"award-info":[{"award-number":["2020YFA0711303"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,9,1]]},"DOI":"10.1109\/jiot.2022.3176903","type":"journal-article","created":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T20:55:45Z","timestamp":1653339345000},"page":"15460-15483","source":"Crossref","is-referenced-by-count":334,"title":["UAV-Assisted Data Collection for Internet of Things: A Survey"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7940-2739","authenticated-orcid":false,"given":"Zhiqing","family":"Wei","sequence":"first","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7568-5142","authenticated-orcid":false,"given":"Mingyue","family":"Zhu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9518-1622","authenticated-orcid":false,"given":"Ning","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9373-764X","authenticated-orcid":false,"given":"Lin","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6249-3694","authenticated-orcid":false,"given":"Yingying","family":"Zou","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Zeyang","family":"Meng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7689-482X","authenticated-orcid":false,"given":"Huici","family":"Wu","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5322-222X","authenticated-orcid":false,"given":"Zhiyong","family":"Feng","sequence":"additional","affiliation":[{"name":"Key Laboratory of Universal Wireless Communications, Ministry of Education, School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.9774\/GLEAF.2350.2015.de.00007"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2018.8417673"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871024"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7036813"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICUAS.2013.6564695"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2783439"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/i-Society.2016.7854203"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647220"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756665"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2019.8877250"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871132"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917948"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2954530"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2671861"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2887086"},{"issue":"1","key":"ref16","first-page":"23","article-title":"UAVs for data collection-plugging the gap","volume":"62","author":"Heaphy","year":"2017","journal-title":"New Zealand J. Forestry"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0802-8_178"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s19214690"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00079"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICECS46596.2019.8965135"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA40945.2020.9196869"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982086"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ISSSR51244.2020.00023"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800214"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2882161"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2893374"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014306"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2018.8502536"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2514\/4.478390"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2875493"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3011022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2930190"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8756751"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2864420"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3086556"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2017.2776922"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3065072"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3049239"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2022.3143252"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2925796"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195689"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2016.2533395"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2019.8927929"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647924"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SysCon.2013.6549957"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106927"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/UCET.2019.8881889"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2726014"},{"issue":"14","key":"ref49","first-page":"2826","article-title":"Survey of clustering algorithms for wireless sensor networks","volume":"30","author":"Xiao-Yu","year":"2017","journal-title":"Comput. Knowl. Technol."},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2666082"},{"issue":"3","key":"ref51","first-page":"15","article-title":"Leach and its descendant protocols: A survey","volume":"1","author":"Gnanambigai","year":"2012","journal-title":"Int. J. Commun. Comput. Technol."},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.5120\/20369-2576"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SmartTechCon.2017.8358338"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCE50968.2020.00450"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/FiCloud.2018.00046"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2921955"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2018.8377357"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013148"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644379"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2959808"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC45663.2020.9120646"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2019.2923949"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2962323"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2010.5514816"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983516"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2829726"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2014.6852323"},{"issue":"2","key":"ref68","first-page":"159","article-title":"Voronoi diagram-based path planning for UAVs","volume":"18","author":"Zhao","year":"2006","journal-title":"J. Syst. Simulat."},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.10.016"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1137\/s0036144599352836"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ISVD.2007.17"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77974-2"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.2514\/1.38510"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.ast.2011.02.006"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916633"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-48113-3_8"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45058-0_4"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3043333"},{"issue":"3","key":"ref79","first-page":"741","article-title":"Four alternative patterns of the Hilbert curve","volume":"147","author":"Xian","year":"2004","journal-title":"Appl. Math. Comput."},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3012835"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3041750"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2940447"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2019.8757098"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2916549"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3041303"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3018855"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2950463"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3003662"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3017556"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/B0-12-227410-5\/00187-3"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ICEE49691.2020.9249903"},{"key":"ref92","article-title":"Branch-and-bound methods","volume-title":"Handbook of Applied Optimization","author":"Lee","year":"2002"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICRA.2012.6224902"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2016.2601299"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6363727"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.23919\/JCIN.2020.9055113"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988035"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2489212"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.12.016"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108213"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2955732"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019080"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3001752"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/LNET.2020.2989130"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3003639"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC48278.2020.9217347"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops49005.2020.9145249"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162896"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148316"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3110138"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3148364"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3023861"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3002538"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/ICCC49849.2020.9238897"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3078701"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155535"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2010.5642228"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.23919\/USNC\/URSI49741.2020.9321625"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3089476"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2894257"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148990"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC46108.2020.9045416"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3027840"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3010281"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2952364"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC2T48082.2020.9071449"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2018.00033"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1016\/S0303-2647(97)01708-5"},{"key":"ref129","first-page":"142","article-title":"Particle swarm optimization","volume-title":"Proc. Int. Conf. Neural Netw. (ICNN)","author":"Kennedy"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2059031"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1080\/03052150500384759"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3005271"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063642"},{"issue":"15","key":"ref134","first-page":"38","article-title":"Overview of wireless sensor network: A survey","volume":"3","author":"Gupta","year":"2014","journal-title":"Telos"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2017.03.004"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402263"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162401"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2011.5779106"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2724478"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1800196"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3106134"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3088679"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700269"},{"issue":"5","key":"ref144","first-page":"1115","article-title":"Small UAV passive target localization approach and accuracy analysis","volume":"36","author":"Xu","year":"2015","journal-title":"Chin. J. Sci. Instrum."},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1007\/s12555-010-0518-8"},{"issue":"3","key":"ref146","first-page":"575","article-title":"Node localization of wireless sensor networks based on SR-CKF assisted by unmanned aerial vehicles","volume":"14","author":"Xu","year":"2019","journal-title":"CAAI Trans. Intell. Syst."},{"issue":"9","key":"ref147","first-page":"15","article-title":"Adaptive area location algorithm combining with packet lost rate and RSSI in wireless sensor networks","volume":"30","author":"Li","year":"2009","journal-title":"J. Commun."},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2911939"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3051361"},{"issue":"12","key":"ref150","first-page":"2849","article-title":"Moving horizon estimation of UAV with random parameter ncertainty and data missing","volume":"41","author":"Zaho","year":"2019","journal-title":"Syst. Eng. Electron."},{"key":"ref151","first-page":"254","article-title":"Distributed UAV formation cooperative control with measurement noise and data packet loss","volume-title":"Proc. 4th China Conf. Command Control","author":"Wang"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9866069\/09779853.pdf?arnumber=9779853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T22:33:32Z","timestamp":1705962812000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9779853\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":151,"journal-issue":{"issue":"17"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3176903","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]}}}