Energy-Efficient Computational Offloading for Secure NOMA-Enabled Mobile Edge Computing Networks

Computational offloading and nonorthogonal multiple access (NOMA) are two promising technologies for alleviating the problems of limited battery capacity, insufficient computational capability, and massive deployment of terminal equipment in the Internet of Things (IoT) era. However, offloading data...

Full description

Saved in:
Bibliographic Details
Published inWireless communications and mobile computing Vol. 2022; pp. 1 - 11
Main Author Wang, Haiping
Format Journal Article
LanguageEnglish
Published Oxford Hindawi 27.04.2022
John Wiley & Sons, Inc
Subjects
Online AccessGet full text
ISSN1530-8669
1530-8677
DOI10.1155/2022/5230594

Cover

Abstract Computational offloading and nonorthogonal multiple access (NOMA) are two promising technologies for alleviating the problems of limited battery capacity, insufficient computational capability, and massive deployment of terminal equipment in the Internet of Things (IoT) era. However, offloading data may be threatened by malicious eavesdroppers, which leads to more energy consumptions to avoid being eavesdropped. In this work, we study the energy-efficient way of computational offloading under the condition of certain security requirement in a secure NOMA-enabled mobile-edge computing (MEC) networks, where K end users are intended to offload their data to the N-antenna access point (AP) through the same resource block under the threat of an eavesdropper. We first address energy-efficient local resource allocation by minimizing sum-energy consumption of end users, subject to CPU frequencies, offloading bits, secrecy offloading rate, and transmit power. We then optimize the local resources to obtain the minimum computation latency of task for each end user, with the constraint of certain energy budget. The solutions to the above two optimization problems are given and demonstrated numerically by a 3-user scenario.
AbstractList Computational offloading and nonorthogonal multiple access (NOMA) are two promising technologies for alleviating the problems of limited battery capacity, insufficient computational capability, and massive deployment of terminal equipment in the Internet of Things (IoT) era. However, offloading data may be threatened by malicious eavesdroppers, which leads to more energy consumptions to avoid being eavesdropped. In this work, we study the energy-efficient way of computational offloading under the condition of certain security requirement in a secure NOMA-enabled mobile-edge computing (MEC) networks, where K end users are intended to offload their data to the N-antenna access point (AP) through the same resource block under the threat of an eavesdropper. We first address energy-efficient local resource allocation by minimizing sum-energy consumption of end users, subject to CPU frequencies, offloading bits, secrecy offloading rate, and transmit power. We then optimize the local resources to obtain the minimum computation latency of task for each end user, with the constraint of certain energy budget. The solutions to the above two optimization problems are given and demonstrated numerically by a 3-user scenario.
Computational offloading and nonorthogonal multiple access (NOMA) are two promising technologies for alleviating the problems of limited battery capacity, insufficient computational capability, and massive deployment of terminal equipment in the Internet of Things (IoT) era. However, offloading data may be threatened by malicious eavesdroppers, which leads to more energy consumptions to avoid being eavesdropped. In this work, we study the energy-efficient way of computational offloading under the condition of certain security requirement in a secure NOMA-enabled mobile-edge computing (MEC) networks, where K end users are intended to offload their data to the N -antenna access point (AP) through the same resource block under the threat of an eavesdropper. We first address energy-efficient local resource allocation by minimizing sum-energy consumption of end users, subject to CPU frequencies, offloading bits, secrecy offloading rate, and transmit power. We then optimize the local resources to obtain the minimum computation latency of task for each end user, with the constraint of certain energy budget. The solutions to the above two optimization problems are given and demonstrated numerically by a 3-user scenario.
Author Wang, Haiping
Author_xml – sequence: 1
  givenname: Haiping
  orcidid: 0000-0002-2949-170X
  surname: Wang
  fullname: Wang, Haiping
  organization: School of Mechatronics and Mould Engineering Taizhou Vocational College of Science and Technology Zhejiang 318020 China
BookMark eNp90DtPwzAQB3ALFYm2sPEBIjFCqB917IxVFR5S2wzAHBw_iktqFztR1W9PqlaMLHc3_O6k-4_AwHmnAbhF8BEhSicYYjyhmECaTy_AEFECU54xNvibs_wKjGLcQAgJxGgIPgunw_qQFsZYabVrk7nf7rpWtNY70SSlMY0Xyrp1YnxI3rTsgk5W5XKWFk7UjVbJ0te20Umh1vq8fNQr3e59-I7X4NKIJuqbcx-Dj6fiff6SLsrn1_lskUqcT9u-GiQ548pgWEtoOIeUM5JLkxshmayJpkapzDClsOGIC054pjiumeQEITIGd6e7u-B_Oh3bauO70L8QK5xlkE05ZbRXDyclg48xaFPtgt2KcKgQrI4ZVscMq3OGPb8_8S_rlNjb__Uvfbhyrg
Cites_doi 10.1109/ACCESS.2019.2925808
10.1109/COMST.2017.2745201
10.1109/JIOT.2017.2750180
10.1109/2.708447
10.1007/BF01130406
10.1109/TVT.2019.2917890
10.1109/TCOMM.2021.3070620
10.1109/ACCESS.2020.3015786
10.1109/ACCESS.2020.3011694
10.1109/ACCESS.2017.2696032
10.1109/JSYST.2020.3009723
10.1109/LCOMM.2021.3114772
10.1002/j.1538-7305.1975.tb02040.x
10.1109/ACCESS.2020.2969214
10.1109/TCOMM.2019.2949994
10.1109/TNSM.2020.3020249
10.1109/JIOT.2019.2904741
10.1109/TVT.2020.2996254
10.1109/ACCESS.2020.2975310
10.1109/JSAC.2018.2864426
10.23919/JCC.2020.10.005
10.1109/TVT.2019.2912227
10.1109/JSAC.2017.2760478
10.1109/JIOT.2021.3103391
10.1109/TCOMM.2020.3038875
10.1109/TWC.2020.2979456
ContentType Journal Article
Copyright Copyright © 2022 Haiping Wang.
Copyright © 2022 Haiping Wang. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: Copyright © 2022 Haiping Wang.
– notice: Copyright © 2022 Haiping Wang. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID RHU
RHW
RHX
AAYXX
CITATION
7SC
7SP
7XB
8FD
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1155/2022/5230594
DatabaseName Hindawi Publishing Complete
Hindawi Publishing Subscription Journals
Hindawi Publishing Open Access
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
ProQuest Central (purchase pre-March 2016)
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials Local Electronic Collection Information
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
Publicly Available Content Database
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Central Basic
ProQuest One Academic Eastern Edition
Electronics & Communications Abstracts
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database

CrossRef
Database_xml – sequence: 1
  dbid: RHX
  name: Hindawi Publishing Open Access
  url: http://www.hindawi.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1530-8677
Editor Huo, Yan
Editor_xml – sequence: 1
  givenname: Yan
  surname: Huo
  fullname: Huo, Yan
EndPage 11
ExternalDocumentID 10_1155_2022_5230594
GrantInformation_xml – fundername: Zhejiang Education Department
  grantid: Y202147949
GroupedDBID .3N
.DC
.GA
05W
0R~
123
1L6
24P
3SF
3WU
4.4
4ZD
50Y
50Z
52M
52O
52T
52U
52W
66C
6OB
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAFWJ
AAJEY
AAONW
ABIJN
ABPVW
ACCMX
ACGFO
ADBBV
ADIZJ
AENEX
AFBPY
AFKRA
AIAGR
AJXKR
ALAGY
ALMA_UNASSIGNED_HOLDINGS
AMBMR
ARAPS
ASPBG
ATUGU
AVWKF
AZBYB
AZQEC
AZVAB
BAFTC
BCNDV
BENPR
BGLVJ
BHBCM
BNHUX
BROTX
BRXPI
CCPQU
CS3
D-E
D-F
DPXWK
DR2
DU5
DWQXO
EBS
F00
F01
F04
F21
G-S
G.N
GNP
GNUQQ
GODZA
H.T
H.X
H13
HCIFZ
HZ~
ITG
ITH
IX1
JPC
K7-
KQQ
LAW
LITHE
LP6
LP7
MK4
MY~
N04
N05
NF~
O9-
OIG
OK1
P2P
P2X
P4D
PHGZT
PIMPY
Q.N
QB0
QRW
R.K
RHU
RHW
RHX
RX1
RYL
SUPJJ
UB1
W8V
W99
WBKPD
XPP
XV2
~IA
~WT
AAYXX
CITATION
PHGZM
7SC
7SP
7XB
8FD
8FE
8FG
AAMMB
ABUWG
AEFGJ
AGXDD
AIDQK
AIDYY
JQ2
L7M
L~C
L~D
M0N
P62
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c294t-c2f1c878df20bc0f88058739cf9fac7cb3e5fdd6f7dd2f818a8386d82b7c83113
IEDL.DBID RHX
ISSN 1530-8669
IngestDate Fri Jul 25 09:29:23 EDT 2025
Tue Jul 01 00:39:33 EDT 2025
Wed Apr 16 06:26:45 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c294t-c2f1c878df20bc0f88058739cf9fac7cb3e5fdd6f7dd2f818a8386d82b7c83113
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-2949-170X
OpenAccessLink https://dx.doi.org/10.1155/2022/5230594
PQID 2660748575
PQPubID 2034344
PageCount 11
ParticipantIDs proquest_journals_2660748575
crossref_primary_10_1155_2022_5230594
hindawi_primary_10_1155_2022_5230594
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-04-27
PublicationDateYYYYMMDD 2022-04-27
PublicationDate_xml – month: 04
  year: 2022
  text: 2022-04-27
  day: 27
PublicationDecade 2020
PublicationPlace Oxford
PublicationPlace_xml – name: Oxford
PublicationTitle Wireless communications and mobile computing
PublicationYear 2022
Publisher Hindawi
John Wiley & Sons, Inc
Publisher_xml – name: Hindawi
– name: John Wiley & Sons, Inc
References 22
23
24
25
27
28
29
L. Tang (16)
J. Xu (15)
I. S. Gradshteyn (38) 2007
Y. Shuai (13)
R. M. Shukla (10)
30
31
32
U. A. Khan (18)
33
12
Y. Zhang (6)
35
14
Y. Li (26)
37
S. Chouhan (7)
17
19
K. Jiang (36)
1
2
3
4
5
8
9
R. M. Shukla (11)
F. Fang (34)
20
21
References_xml – ident: 31
  doi: 10.1109/ACCESS.2019.2925808
– volume-title: Table of Integrals, Series and Products
  year: 2007
  ident: 38
– ident: 1
  doi: 10.1109/COMST.2017.2745201
– start-page: 1
  ident: 34
  article-title: Optimal task assignment and power allocation for downlink Noma mec networks
– ident: 3
  doi: 10.1109/JIOT.2017.2750180
– ident: 19
  doi: 10.1109/2.708447
– ident: 2
  doi: 10.1007/BF01130406
– ident: 14
  doi: 10.1109/TVT.2019.2917890
– ident: 23
  doi: 10.1109/TCOMM.2021.3070620
– ident: 21
  doi: 10.1109/ACCESS.2020.3015786
– ident: 29
  doi: 10.1109/ACCESS.2020.3011694
– start-page: 1
  ident: 6
  article-title: Energy-efficient dynamic task offloading for energy harvesting mobile cloud computing
– ident: 37
  doi: 10.1109/ACCESS.2017.2696032
– ident: 24
  doi: 10.1109/JSYST.2020.3009723
– ident: 35
  doi: 10.1109/LCOMM.2021.3114772
– start-page: 1
  ident: 15
  article-title: Secure computation offloading for multi-user multi-server mec-enabled iot
– start-page: 689
  ident: 13
  article-title: Collaborative computation offloading for multi-access edge computing
– ident: 20
  doi: 10.1002/j.1538-7305.1975.tb02040.x
– ident: 8
  doi: 10.1109/ACCESS.2020.2969214
– start-page: 1
  ident: 26
  article-title: Joint computation offloading and communication design for secure uav-enabled mec systems
– ident: 30
  doi: 10.1109/TCOMM.2019.2949994
– ident: 17
  doi: 10.1109/TNSM.2020.3020249
– ident: 33
  doi: 10.1109/JIOT.2019.2904741
– start-page: 1
  ident: 16
  article-title: Energy and time optimization for wireless computation offloading
– ident: 32
  doi: 10.1109/TVT.2020.2996254
– start-page: 1
  ident: 36
  article-title: Analysis of secrecy performance in fading multiple access wiretap channel with sic receiver
– ident: 9
  doi: 10.1109/ACCESS.2020.2975310
– start-page: 1
  ident: 7
  article-title: Energy optimal partial computation offloading framework for mobile devices in multi-access edge computing
– ident: 12
  doi: 10.1109/JSAC.2018.2864426
– ident: 25
  doi: 10.23919/JCC.2020.10.005
– ident: 28
  doi: 10.1109/TVT.2019.2912227
– start-page: 208
  ident: 10
  article-title: A computation offloading scheme leveraging parameter tuning for real-time iot devices
– ident: 5
  doi: 10.1109/JSAC.2017.2760478
– ident: 27
  doi: 10.1109/JIOT.2021.3103391
– start-page: 58
  ident: 18
  article-title: Energy efficient resource allocation and computation offloading strategy in a uav-enabled secure edge-cloud computing system
– ident: 4
  doi: 10.1109/TCOMM.2020.3038875
– start-page: 728
  ident: 11
  article-title: An efficient computation offloading architecture for the internet of things (iot) devices
– ident: 22
  doi: 10.1109/TWC.2020.2979456
SSID ssj0003021
Score 2.3109887
Snippet Computational offloading and nonorthogonal multiple access (NOMA) are two promising technologies for alleviating the problems of limited battery capacity,...
SourceID proquest
crossref
hindawi
SourceType Aggregation Database
Index Database
Publisher
StartPage 1
SubjectTerms Computation offloading
Computational efficiency
Cryptography
Eavesdropping
Edge computing
End users
Energy budget
Energy consumption
Energy efficiency
Internet of Things
Mobile computing
Network latency
Nonorthogonal multiple access
Optimization
Resource allocation
Servers
Unmanned aerial vehicles
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV07T8MwELagCAkGxFMUCvJQRgsnjhNnQhVKqZDaLlTqFuLHARJqCi3i72M7Lg8hwZIllwxn-757fL5DqJuqSElglIDUCUkiFZFcCEUgl5TFVQrQsC1G6WCS3E75NCTcFoFWubKJ3lDrWrkc-aUFEot2bp7k1fyFuKlRrroaRmiso43ICrh9Lvo3n5aY0Tj0S6VEpGm-Ir5z7mL--NJlRHme_ICkzUcXC78__bLNHnD6u2gneIq41yztHlozs320_a1_4AG6L_zNPVL4PhAWPnAzpCEk-PAY4Ln2JHlsfVPsc-sGj8bDHin8nSmNh7W0dgEX-sGEj530qCGHLw7RpF_cXQ9IGJlAVJwnS_uESIlMaIipVBTs6eQiY7mCHCqVKckMB61TyLSOwYJ1JZhItYhlpgSLInaEWrN6Zo4RZomqmHF1wQwSzUBKVrHIgDQ2BlOUttHFSmvlvOmMUfqIgvPSabcM2m2jblDpP2Kdlb7LcIwW5dein_z9-hRtuZ-5Mk-cdVBr-fpmzqy3sJTnfkt8AFoqvEY
  priority: 102
  providerName: ProQuest
Title Energy-Efficient Computational Offloading for Secure NOMA-Enabled Mobile Edge Computing Networks
URI https://dx.doi.org/10.1155/2022/5230594
https://www.proquest.com/docview/2660748575
Volume 2022
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5aEfQgPrFaSw71GMwm-8geq24tQrdSLPS2bh6jgrRiK_59k91U1B70EggkOUxm8s0rMwh1YhUoCZwSkDokYaACkgqhCKSSclbGAHW2RR73x-HtJJr4Iknz1RC-RTtnnrML57yM0nAdrYvYMe-oP_l6cDllviwqJSKO02V--6-9P5Bn88mZvB_PK09whSu9XbTjFULcrW9wD62Z6T7a_lYm8AA9ZNUHPZJV5R4sSuC6F4P34-EhwMusyoXHVgXFlQvd4Hw46JKs-hql8WAmrfjjTD8av9mtzusc8PkhGvey-6s-8Z0RiGJpuLAjBEokQgOjUlGwQhiJhKcKUihVoiQ3EWgdQ6I1A4vJpeAi1oLJRAkeBPwINaazqTlGmIeq5MaF_xIINQcpeckDA9JYU0tR2kTnS6oVr3UBjKIyHKKocNQtPHWbqONJ-sey1pLehZeWeWGVBKvJuF6hJ_875RRtuamL6rCkhRqLt3dzZpWDhWxbBundtNHGZZbfjezsesTaFbt8Al9BtWE
linkProvider Hindawi Publishing
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB7BoopyQOWlLizFBzhaJHYezgGhBYKWx4YKgcQtxI-BStUusItQ_1R_I3bi9KFK9MQllzg-TD7PNzOeB8B2okIlkQcUpY5oFKqQZkIoipkMOKsSxCbbokgG19HpTXwzAz_bWhiXVtnqxFpR67FyMfJdSySW7dw8yf2HR-qmRrnb1XaERgOLM_Pjxbpsk72TI_t_dxg7zq8OB9RPFaCKZdHUPjFUIhUaWSBVgBbAsUh5pjDDSqVKchOj1gmmWjO0fFYJLhItmEyV4GHI7b6zMBe5itYOzB3kxdfLX7qfB8x3aA2oSJKsTbWPYxdlYLsuBhtn0V8k-OHeed8v3_5hg5rijj_BordNSb8B0xLMmNEyLPzRsXAFbvO6VpDmdecJS1ikGQvhQ4rkAvH7uE7LJ9YaJnU035DiYtineV2lpclwLK0mIrm-M_5jt7po0tEnq3D9LuJcg85oPDKfgfBIVdy4m8gUI81RSl7x0KA01utTQdCFnVZq5UPTi6OsfZg4Lp10Sy_dLmx7kf5nWa-Vd-kP7qT8DbP1t19vwfzganhenp8UZxvw0W3sLplY2oPO9OnZbFpbZSq_eIAQuH1vTL4Cn2z7xQ
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB5RUKtyqGgB8Sr1AY7WJnYSOweEViULlLL0UCRuIX4MIKFd2t1qxV_j12E7Dm1VqZy45BLHh8nn-WbG8wDYKXSqFfKEojIZzVKd0lJKTbFUCWdNgdhmWwyLo_Psy0V-MQcPXS2MT6vsdGJQ1GasfYy854jEsZ2fJ9nDmBbx7WCwf_eD-glS_qa1G6fRQuTE3s-c-zbZOz5w_3qXsUH1_fMRjRMGqGZlNnVPTLUU0iBLlE7QgTmXgpcaS2y00IrbHI0pUBjD0HFbI7ksjGRKaMnTlLt9X8GC4KL0jp8cHD6xAE9Y7NWaUFkUZZd0n-c-3sB6Phqbl9lfdPj62vvhs5t_eCGQ3WAJ3kUrlfRbWL2HOTv6AIt_9C5chssqVA3SKvSgcNRF2gERMbhIzhBvxyFBnzi7mIS4viXDs9M-rUK9liGnY-V0EqnMlY0f-9XDNjF9sgLnLyLMVZgfjUd2DQjPdMOtv5MUmBmOSvGGpxaVdf6fTpJ12O2kVt-1XTnq4M3kee2lW0fprsNOFOkzy7Y6edfxCE_q34Db-P_rT_DGIbH-ejw82YS3fl9_28TEFsxPf_6yH53RMlXbAR0ELl8ajo-8IP6V
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Energy-Efficient+Computational+Offloading+for+Secure+NOMA-Enabled+Mobile+Edge+Computing+Networks&rft.jtitle=Wireless+communications+and+mobile+computing&rft.au=Wang%2C+Haiping&rft.date=2022-04-27&rft.pub=Hindawi&rft.issn=1530-8669&rft.eissn=1530-8677&rft.volume=2022&rft_id=info:doi/10.1155%2F2022%2F5230594&rft.externalDocID=10_1155_2022_5230594
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1530-8669&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1530-8669&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1530-8669&client=summon