{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:31:16Z","timestamp":1776443476769,"version":"3.51.2"},"reference-count":77,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,2,13]],"date-time":"2023-02-13T00:00:00Z","timestamp":1676246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Algorithms have evolved from machine code to low-code-no-code (LCNC) in the past 20 years. Observing the growth of LCNC-based algorithm development, the CEO of GitHub mentioned that the future of coding is no coding at all. This paper systematically reviewed several of the recent studies using mainstream LCNC platforms to understand the area of research, the LCNC platforms used within these studies, and the features of LCNC used for solving individual research questions. We identified 23 research works using LCNC platforms, such as SetXRM, the vf-OS platform, Aure-BPM, CRISP-DM, and Microsoft Power Platform (MPP). About 61% of these existing studies resorted to MPP as their primary choice. The critical research problems solved by these research works were within the area of global news analysis, social media analysis, landslides, tornadoes, COVID-19, digitization of process, manufacturing, logistics, and software\/app development. The main reasons identified for solving research problems with LCNC algorithms were as follows: (1) obtaining research data from multiple sources in complete automation; (2) generating artificial intelligence-driven insights without having to manually code them. In the course of describing this review, this paper also demonstrates a practical approach to implement a cyber-attack monitoring algorithm with the most popular LCNC platform.<\/jats:p>","DOI":"10.3390\/a16020108","type":"journal-article","created":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T01:41:06Z","timestamp":1676338866000},"page":"108","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":67,"title":["Algorithms in Low-Code-No-Code for Research Applications: A Practical Review"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9683-0839","authenticated-orcid":false,"given":"Fahim","family":"Sufi","sequence":"first","affiliation":[{"name":"Monash University, School of Public Health and Preventive Medicine, Melbourne, VIC 3004, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2023,2,13]]},"reference":[{"key":"ref_1","unstructured":"(2022, November 12). Computer History Museum, Birth of Computer\u2014ENIAC, CHM. Available online: https:\/\/www.computerhistory.org\/revolution\/birth-of-the-computer\/4\/78."},{"key":"ref_2","unstructured":"(2022, November 12). HP, Computer History: A Timeline of Computer Programming Languages. Available online: https:\/\/www.hp.com\/us-en\/shop\/tech-takes\/computer-history-programming-languages."},{"key":"ref_3","unstructured":"Rizwan, O. (2022, November 12). A Snapshot of Programming Language History, Increment. Available online: https:\/\/increment.com\/programming-languages\/language-history\/."},{"key":"ref_4","unstructured":"Outsystems (2022, November 09). It Began with a Vision. Available online: https:\/\/www.outsystems.com\/evaluation-guide\/it-began-with-a-vision\/."},{"key":"ref_5","unstructured":"Clay, R., Rymer, J.R., Mines, C., Cullen, A., and Whittaker, D. (2014). New Development Platforms Emerge for Customer-Facing Applications, Forrester."},{"key":"ref_6","unstructured":"Swinhoe (2022, November 03). GitHub CEO: The Future of Coding is No Coding at All. Available online: https:\/\/www.idgconnect.com\/article\/3578431\/github-ceo-the-future-of-coding-is-no-coding-at-all.html."},{"key":"ref_7","unstructured":"Vincent, P., Iijima, K., Driver, M., Jason, W., and Natis, Y. (2016). Magic Quadrant for Enterprise Low-Code Application Platforms. Gart. Rep."},{"key":"ref_8","unstructured":"Microsoft (2022, November 12). Microsoft Power Platform. Available online: https:\/\/powerplatform.microsoft.com\/en-us\/."},{"key":"ref_9","unstructured":"Haan, J.D. (2022, November 03). Introducing AI-Assisted Development to Elevate Low-Code Platforms to the Next Level, Mendix. Available online: https:\/\/www.mendix.com\/blog\/introducing-ai-assisted-development-to-elevate-low-code-platforms-to-the-next-level\/."},{"key":"ref_10","unstructured":"Zavery, A. (2022, November 03). Google Acquires AppSheet to Help Businesses Create and Extend Applications\u2014Without Coding. Available online: https:\/\/workspace.google.com\/blog\/product-announcements\/helping-businesses-create-and-extend-applications-without-coding."},{"key":"ref_11","unstructured":"Frank, U., Maier, P., and Bock, A. (2021). Low code platforms: Promises, concepts and prospects. A comparative study of ten systems. ICB Res. Rep."},{"key":"ref_12","unstructured":"Wilhelm, A. (2023, February 06). COVID-19 is Driving Demand for Low-Code Apps, Techcrunch. Available online: https:\/\/techcrunch.com\/2020\/08\/27\/covid-19-is-driving-demand-for-low-code-apps\/."},{"key":"ref_13","unstructured":"Gartner (2023, February 06). Gartner Forecasts Worldwide Low-Code Development Technologies Market to Grow 20% in 2023, Gartner. Available online: https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2022-12-13-gartner-forecasts-worldwide-low-code-development-technologies-market-to-grow-20-percent-in-2023#:~:text=Business%20Technologists%2C%20Hyperautomation%20and%20Composability,latest%20forecast%20f."},{"key":"ref_14","unstructured":"Sahinaslan, E., Sahinaslan, O., and Sabanc\u0131oglu, M. (2021). Fourth International Conference of Mathematical Sciences (ICMS 2020), AIP Conference Proceedings, AIP Publishing LLC."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"101960","DOI":"10.1016\/j.mex.2022.101960","article-title":"Automatic identification and explanation of root causes on COVID-19 index anomalies","volume":"10","author":"Sufi","year":"2023","journal-title":"MethodsX"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Sanchis, R., Garc\u00eda-Perales, \u00d3., Fraile, F., and Poler, R. (2020). Low-Code as Enabler of Digital Transformation in Manufacturing Industry. Appl. Sci., 10.","DOI":"10.3390\/app10010012"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.ifacol.2019.10.060","article-title":"Low-code platform for automating business processes in manufacturing","volume":"52","author":"Waszkowsk","year":"2019","journal-title":"IFAC-PapersOnLine"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Sufi, F., and Khalil, I. (2022). Automated Disaster Monitoring from Social Media Posts using AI based Location Intelligence and Sentiment Analysis. IEEE Trans. Comput. Soc. Syst., 1\u201311. in press.","DOI":"10.1109\/TCSS.2022.3157142"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"100130","DOI":"10.1016\/j.dajour.2022.100130","article-title":"A decision support system for extracting artificial intelligence-driven insights from live twitter feeds on natural disasters","volume":"5","author":"Sufi","year":"2022","journal-title":"Decis. Anal. J."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"152449","DOI":"10.1109\/ACCESS.2021.3127571","article-title":"Automated Multidimensional Analysis of Global Events With Entity Detection, Sentiment Analysis and Anomaly Detection","volume":"9","author":"Sufi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_21","first-page":"100074","article-title":"Identifying the drivers of negative news with sentiment, entity and regression analysis","volume":"2","author":"Sufi","year":"2022","journal-title":"Int. J. Inf. Manag. Data Insights"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"2455","DOI":"10.1007\/s13369-022-07250-1","article-title":"Automating Global Threat-Maps Generation via Advancements of News Sensors and AI","volume":"48","author":"Sufi","year":"2022","journal-title":"Arab. J. Sci. Eng."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1109\/TTS.2022.3192757","article-title":"Tracking Anti-Vax Social Movement Using AI based Social Media Monitoring","volume":"3","author":"Sufi","year":"2022","journal-title":"IEEE Trans. Technol. Soc."},{"key":"ref_24","first-page":"3631","article-title":"AI-based Automated Extraction of Location-Oriented COVID-19 Sentiments","volume":"72","author":"Sufi","year":"2022","journal-title":"Comput. Mater. Contin. (CMC)"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"131400","DOI":"10.1109\/ACCESS.2021.3115043","article-title":"Knowledge Discovery of Global Landslides Using Automated Machine Learning Algorithms","volume":"9","author":"Sufi","year":"2021","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Sufi, F., Alam, E., and Alsulami, M. (2022). A new interactive system for analyzing historical records of tornedoes in Bangladesh. Sustainability, 14.","DOI":"10.3390\/su14106303"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Sufi, F., Alam, E., and Alsulami, M. (2022). Automated Analysis of Australian Tropical Cyclones with Regression, Clustering and Convolutional Neural Network. Sustainability, 14.","DOI":"10.3390\/su14169830"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1016\/j.procir.2022.04.042","article-title":"Rule-based Decision Support for No-Code Digitalized Processes","volume":"107","author":"Chhor","year":"2022","journal-title":"Procedia CIRP"},{"key":"ref_29","unstructured":"Adrian, B., Hinrichsen, S., and Nikolenko, A. (2020). Advances in Human Factors and Systems Interaction, Springer International Publishing."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Bhattacharyya, S.S., and Kumar, S. (2021). Study of deployment of \u201clow code no code\u201d applications toward improving digitization of supply chain management. J. Sci. Technol. Policy Manag., 1\u201317. in press.","DOI":"10.1108\/JSTPM-06-2021-0084"},{"key":"ref_31","first-page":"1","article-title":"Investigating a visual interface for elementary students to formulate AI planning tasks","volume":"73","author":"Park","year":"2022","journal-title":"J. Comput. Lang."},{"key":"ref_32","unstructured":"McKendrick, J. (2022, November 06). Low-Code No-Code Market Keeps Growing, and that Means Sifts in Technology Roles. ZDNET. Available online: https:\/\/www.zdnet.com\/article\/low-code-no-code-market-keeps-growing-portending-shifts-in-technology-roles\/."},{"key":"ref_33","first-page":"1","article-title":"Software development trends 2021","volume":"16","author":"McLean","year":"2021","journal-title":"Can. J. Nurs. Inform."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Sangaiah, A.K., Javadpour, A., Ja\u2019fari, F., Pinto, P., Zhang, W., and Balasubramanian, S. (2022). A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things. Clust. Comput., 1\u201314. in press.","DOI":"10.1007\/s10586-022-03629-9"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Luo, Y., Liang, P., Wang, C., Shahin, M., and Zhan, J. (2021, January 26\u201327). Characteristics and Challenges of Low-Code Development: The Practitioners\u2019 Perspective. Proceedings of the 15th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), New Orleans, LA, USA.","DOI":"10.1145\/3475716.3475782"},{"key":"ref_36","unstructured":"Outsystems (2022, November 09). The State of Application Development. Available online: https:\/\/www.outsystems.com\/local-gov\/-\/media\/053D5BCC32364C2993C8D0BAFA880DB1.ashx."},{"key":"ref_37","unstructured":"Baalbergen, F. (2022, November 03). Low-Code Security by Design with Mendix\u2019s Low-Code Platform, Mendix. Available online: https:\/\/www.mendix.com\/blog\/security-by-design-with-mendixs-low-code-platform\/."},{"key":"ref_38","unstructured":"Tandy, N. (2022, November 03). Microsoft Power Platform and Dataverse: Skill up on security by design, Microsoft. Available online: https:\/\/techcommunity.microsoft.com\/t5\/microsoft-learn-blog\/microsoft-power-platform-and-dataverse-skill-up-on-security-by\/ba-p\/3250818."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s10270-022-01038-5","article-title":"Low-code development and model-driven engineering: Two sides of the same coin?","volume":"21","author":"Ruscio","year":"2022","journal-title":"Softw. Syst. Model."},{"key":"ref_40","unstructured":"Salesforce (2022, November 09). 12 Benefits of Cloud Computing. Available online: https:\/\/www.salesforce.com\/products\/platform\/best-practices\/benefits-of-cloud-computing\/."},{"key":"ref_41","first-page":"123","article-title":"Factors that affect the utilization of low-code development platforms: Survey study","volume":"31","author":"Alsaadi","year":"2021","journal-title":"Rom. J. Inf. Technol. Autom. Control."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1016\/j.gsf.2020.02.012","article-title":"Landslide identification using machine learning","volume":"12","author":"Wang","year":"2021","journal-title":"Geosci. Front."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1015","DOI":"10.1007\/s10346-018-1022-0","article-title":"Displacement prediction of step-like landslide by applying a novel kernel extreme learning machine method","volume":"15","author":"Zhou","year":"2018","journal-title":"Landslides"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"2231","DOI":"10.1007\/s10346-020-01453-z","article-title":"Enhancing the reliability of landslide early warning systems by machine learning","volume":"17","author":"Thirugnanam","year":"2020","journal-title":"Landslides"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"10881","DOI":"10.1007\/s00521-020-05529-8","article-title":"Machine learning for landslides prevention: A survey","volume":"33","author":"Ma","year":"2020","journal-title":"Neural Comput. Appl."},{"key":"ref_46","unstructured":"Microsoft (2022, November 12). Power BI Pricing. Available online: https:\/\/powerbi.microsoft.com\/en-us\/pricing\/."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"104504","DOI":"10.1016\/j.micpro.2022.104504","article-title":"CL-MLSP: The design of a detection mechanism for sinkhole attacks in smart cities","volume":"90","author":"Sangaiah","year":"2022","journal-title":"Microprocess. Microsyst."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1016\/j.eng.2020.07.007","article-title":"The Rise of No\/Low Code Software Development-No Experience Needed?","volume":"6","author":"Woo","year":"2020","journal-title":"Engineering"},{"key":"ref_49","unstructured":"Microsoft (2022, March 21). Microsoft Power BI Documentation. Available online: https:\/\/docs.microsoft.com\/en-us\/power-bi\/."},{"key":"ref_50","first-page":"1","article-title":"Large Linear Classification When Data Cannot Fit in Memory","volume":"5","author":"Yu","year":"2010","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1002\/nme.1620141104","article-title":"The solution of non linear finite element equations","volume":"14","author":"Matthies","year":"1979","journal-title":"Int. J. Numer. Methods Eng."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1090\/S0025-5718-1980-0572855-7","article-title":"Updating Quasi-Newton Matrices with Limited Storage","volume":"35","author":"Nocedal","year":"1980","journal-title":"Math. Comput."},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Ren, H., Xu, B., Wang, Y., Yi, C., Huang, C., Kou, X., Xing, T., Yang, M., Tong, J., and Zhang, Q. (2019, January 25). Time-Series Anomaly Detection Service at Microsoft. Proceedings of the 25th ACM SIGKDD international conference on knowledge discovery & data mining, New York, NY, USA.","DOI":"10.1145\/3292500.3330680"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Zhao, R., Ouyang, W., Li, H., and Wang, X. (2015, January 7\u201312). Saliency detection by multi-context deep learning. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA.","DOI":"10.1109\/CVPR.2015.7298731"},{"key":"ref_55","unstructured":"(2020, February 25). Microsoft Documentation, Choosing a Natural Language Processing Technology in Azure. Available online: https:\/\/docs.microsoft.com\/en-us\/azure\/architecture\/data-guide\/technology-choices\/natural-language-processing."},{"key":"ref_56","unstructured":"(2021, June 10). Microsoft Documentation, Decomposition Tree Visual: AI Split. Available online: https:\/\/docs.microsoft.com\/en-us\/power-bi\/visuals\/power-bi-visualization-decomposition-tree#ai-splits."},{"key":"ref_57","unstructured":"(2021, August 29). Microsoft Documentation, Microsoft Power Automate. Available online: https:\/\/docs.microsoft.com\/en-us\/power-automate\/."},{"key":"ref_58","unstructured":"Documentation, M. (2021, October 01). Category Classification Model. Available online: https:\/\/docs.microsoft.com\/en-us\/ai-builder\/prebuilt-category-classification."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Hong, T., Choi, J.-A., Lim, K., and Kim, P. (2021). Enhancing Personalized Ads Using Interest Category Classification of SNS Users Based on Deep Neural Networks. Sensors, 21.","DOI":"10.3390\/s21010199"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Pang, B., Lee, L., and Vaithyanathan, S. (2002). Thumbs up?: Sentiment classification using machine learning techniques. arXiv.","DOI":"10.3115\/1118693.1118704"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Turney, P.D. (2002). Thumbs up or thumbs down?: Semantic orientation applied. arXiv.","DOI":"10.3115\/1073083.1073153"},{"key":"ref_62","first-page":"4","article-title":"Public Perception of the COVID-19 Pandemic on Twitter: Sentiment Analysis and Topic Modeling Study","volume":"6","author":"Skunkan","year":"2020","journal-title":"JMIR Public Health Surveill"},{"key":"ref_63","first-page":"1","article-title":"Social media sentiment analysis based on COVID-19","volume":"5","author":"Nemes","year":"2020","journal-title":"J. Inf. Telecommun."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"54","DOI":"10.24017\/covid.8","article-title":"Twitter Sentiment Analysis on Worldwide COVID-19 Outbreaks","volume":"5","author":"Manguri","year":"2020","journal-title":"Kurd. J. Appl. Res. (KJAR)"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"2158184","DOI":"10.1155\/2021\/2158184","article-title":"Deep Learning-Based Methods for Sentiment Analysis on Nepali COVID-19-Related Tweets","volume":"2021","author":"Sitaula","year":"2021","journal-title":"Comput. Intell. Neurosci."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Chan, B., Lopez, A., and Sarkar, U. (2015). The Canary in the Coal Mine Tweets: Social Media Reveals Public Perceptions of Non-Medical Use of Opioids. PLoS ONE, 10.","DOI":"10.1371\/journal.pone.0135072"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"1003","DOI":"10.1109\/TCSS.2021.3051189","article-title":"COVIDSenti: A large-scale benchmark Twitter data set for COVID-19 sentiment analysis","volume":"8","author":"Naseem","year":"2020","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1109\/TCSS.2020.2980007","article-title":"Characterizing the Propagation of Situational Information in Social Media During COVID-19 Epidemic: A Case Study on Weibo","volume":"7","author":"Li","year":"2020","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.jbi.2013.07.007","article-title":"PREDOSE: A Semantic Web Platform for Drug Abuse Epidemiology using Social Media","volume":"46","author":"Cameron","year":"2013","journal-title":"J. Biomed. Inform."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"541","DOI":"10.3389\/fphar.2018.00541","article-title":"Mining Patients\u2019 Narratives in Social Media for Pharmacovigilance: Adverse Effects and Misuse of Methylphenidate","volume":"9","author":"Chen","year":"2018","journal-title":"Front. Pharmacol."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1002\/pds.3307","article-title":"Measuring online endorsement of prescription opioids abuse: An integrative methodology","volume":"21","author":"McNaughton","year":"2012","journal-title":"Pharmacoepidemiol. Drug Saf."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"84122","DOI":"10.1109\/ACCESS.2019.2924314","article-title":"Surface and Deep Features Ensemble for Sentiment Analysis of Arabic Tweets","volume":"7","year":"2019","journal-title":"IEEE Access"},{"key":"ref_73","first-page":"1555","article-title":"Sentimental study of CAA by location-based tweets","volume":"13","author":"Vashisht","year":"2021","journal-title":"Int. J. Inf. Technol."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1109\/MIS.2017.3711649","article-title":"Challenges of Sentiment Analysis for Dynamic Events","volume":"32","author":"Ebrahimi","year":"2017","journal-title":"IEEE Intell. Syst."},{"key":"ref_75","unstructured":"(2021, August 03). Microsoft Documentation, Text Analytics API Documentation. Available online: https:\/\/docs.microsoft.com\/en-us\/azure\/cognitive-services\/text-analytics\/."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Batbaatar, E., and Ryu, K.H. (2019). Ontology-Based Healthcare Named Entity Recognition from Twitter Messages Using a Recurrent Neural Network Approach. Int. J. Environ. Res. Public Health, 16.","DOI":"10.3390\/ijerph16193628"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1007\/s12599-021-00726-8","article-title":"Low-Code Platform","volume":"63","author":"Bock","year":"2021","journal-title":"Bus. Inf. Syst. Eng."}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/2\/108\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:33:52Z","timestamp":1760121232000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/2\/108"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,13]]},"references-count":77,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,2]]}},"alternative-id":["a16020108"],"URL":"https:\/\/doi.org\/10.3390\/a16020108","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,13]]}}}