{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T05:21:17Z","timestamp":1771046477826,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T00:00:00Z","timestamp":1556582400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s00500-019-03997-2","type":"journal-article","created":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T13:33:28Z","timestamp":1556631208000},"page":"1683-1705","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["A novel fuzzy mechanism for risk assessment in software projects"],"prefix":"10.1007","volume":"24","author":[{"given":"K.","family":"Suresh","sequence":"first","affiliation":[]},{"given":"R.","family":"Dillibabu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,30]]},"reference":[{"key":"3997_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7242-0_23","volume-title":"Soft computing in data science. SCDS 2017. Communications in computer and information science","author":"S Al-Janabi","year":"2017","unstructured":"Al-Janabi S (2017) Pragmatic miner to risk analysis for intrusion detection (PMRA-ID). In: Mohamed A, Berry M, Yap B (eds) Soft computing in data science. SCDS 2017. Communications in computer and information science, vol 788. Springer, Singapore. \nhttps:\/\/doi.org\/10.1007\/978-981-10-7242-0_23"},{"key":"3997_CR2","doi-asserted-by":"publisher","DOI":"10.1080\/1206212X.2018.1512460","author":"S Al-Janabi","year":"2018","unstructured":"Al-Janabi S (2018) Smart system to create optimal higher education environment using IDA and IOTs. Int J Comput Appl. \nhttps:\/\/doi.org\/10.1080\/1206212X.2018.1512460","journal-title":"Int J Comput Appl"},{"issue":"01","key":"3997_CR3","doi-asserted-by":"publisher","first-page":"1650007","DOI":"10.1142\/S0219649216500076","volume":"15","author":"S Al-Janabi","year":"2016","unstructured":"Al-Janabi S, Al-Shourbaji I (2016) A study of cyber security awareness in educational environment in the middle east. J Inf Knowl Manag 15(01):1650007. \nhttps:\/\/doi.org\/10.1142\/S0219649216500076","journal-title":"J Inf Knowl Manag"},{"key":"3997_CR4","doi-asserted-by":"publisher","unstructured":"Al-Janabi S, Patel A, Fatlawi H, Kalajdzic K, Al Shourbaji I (2014) Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments. In: International congress on technology, communication and knowledge (ICTCK), Mashhad. IEEE, pp 1\u20138. \nhttps:\/\/doi.org\/10.1109\/ICTCK.2014.7033495","DOI":"10.1109\/ICTCK.2014.7033495"},{"key":"3997_CR5","first-page":"10","volume":"2014","author":"A Arshadi Khamseh","year":"2014","unstructured":"Arshadi Khamseh A, Mahmoodi M (2014) A new fuzzy TOPSIS-TODIM hybrid method for green supplier selection using fuzzy time function. Adv Fuzzy Syst 2014:10","journal-title":"Adv Fuzzy Syst"},{"key":"3997_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compstruc.2016.03.001","volume":"169","author":"A Askarzadeh","year":"2016","unstructured":"Askarzadeh A (2016) A novel metaheuristic method for solving constrained engineering optimization problems: crow search algorithm. Comput Struct 169:1\u201312. \nhttps:\/\/doi.org\/10.1016\/j.compstruc.2016.03.001","journal-title":"Comput Struct"},{"key":"3997_CR7","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/S0165-0114(86)80034-3","volume":"20","author":"KT Atanassov","year":"1986","unstructured":"Atanassov KT (1986) Intuitionistic fuzzy sets. Fuzzy Sets Syst 20:87\u201396","journal-title":"Fuzzy Sets Syst"},{"key":"3997_CR8","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1080\/00207720500382365","volume":"36","author":"KT Atanassov","year":"2005","unstructured":"Atanassov KT, Pasi G, Yager R (2005) Intuitionistic fuzzy interpretations of multi criteria multi-person and multi-measurement tool decision making. Int J Syst Sci 36:859\u2013868","journal-title":"Int J Syst Sci"},{"issue":"3","key":"3997_CR9","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1016\/j.eswa.2012.05.046","volume":"40","author":"A Baykaso\u011fLu","year":"2013","unstructured":"Baykaso\u011fLu A, Kaplano\u011fLu V, Durmu\u015fO\u011fLu ZD, \u015eAhin C (2013) Integrating fuzzy DEMATEL and fuzzy hierarchical TOPSIS methods for truck selection. Expert Syst Appl 40(3):899\u2013907","journal-title":"Expert Syst Appl"},{"key":"3997_CR10","doi-asserted-by":"publisher","first-page":"11363","DOI":"10.1016\/j.eswa.2009.03.039","volume":"36","author":"FE Boran","year":"2009","unstructured":"Boran FE, Kurt M, Akay D (2009) A multi-criteria intuitionistic fuzzy group decision making for selection of supplier with TOPSIS method. Expert Syst Appl 36:11363\u201311368","journal-title":"Expert Syst Appl"},{"key":"3997_CR11","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.scient.2011.03.022","volume":"18","author":"Y Chen","year":"2011","unstructured":"Chen Y, Li B (2011) Dynamic multi-attribute decision making model based on triangular intuitionistic fuzzy numbers. Sci Iran 18:268\u2013274","journal-title":"Sci Iran"},{"key":"3997_CR12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.compeleceng.2018.02.043","volume":"67","author":"GR Choudhary","year":"2018","unstructured":"Choudhary GR, Kumar S, Kumar K, Mishra A, Catal C (2018) Empirical analysis of change metrics for software fault prediction. Comput Electr Eng 67:15\u201324","journal-title":"Comput Electr Eng"},{"key":"3997_CR13","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.knosys.2012.12.014","volume":"42","author":"ZP Fan","year":"2013","unstructured":"Fan ZP, Zhang X, Chen FD, Liu Y (2013) Extended TODIM method for hybrid multiple attribute decision making problems. Knowl Based Syst 42:40\u201348","journal-title":"Knowl Based Syst"},{"key":"3997_CR14","doi-asserted-by":"publisher","first-page":"4831","DOI":"10.1016\/j.cnsns.2012.05.010","volume":"17","author":"AH Gandomi","year":"2012","unstructured":"Gandomi AH, Alavi AH (2012) Krill herd: a new bio-inspired optimization algorithm. Commun Nonlinear Sci Numer Simul 17:4831\u20134845","journal-title":"Commun Nonlinear Sci Numer Simul"},{"issue":"1","key":"3997_CR15","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.ejor.2007.10.046","volume":"193","author":"LFAM Gomes","year":"2009","unstructured":"Gomes LFAM (2009) An application of the TODIM method to the multicriteria rental evaluation of residential properties. Eur J Oper Res 193(1):204\u2013211","journal-title":"Eur J Oper Res"},{"issue":"40","key":"3997_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.csi.2015.01.001","volume":"2015","author":"WM Han","year":"2015","unstructured":"Han WM (2015) Discriminating risky software project using neural networks. Comput Stand Interfaces 2015(40):15\u201322","journal-title":"Comput Stand Interfaces"},{"key":"3997_CR17","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/21.256541","volume":"23","author":"JSR Jang","year":"1993","unstructured":"Jang JSR (1993) ANFIS: adaptive-network-based fuzzy inference system. IEEE Trans Syst Man Cybern 23:665\u2013685","journal-title":"IEEE Trans Syst Man Cybern"},{"key":"3997_CR18","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s10898-007-9149-x","volume":"39","author":"D Karaboga","year":"2007","unstructured":"Karaboga D, Basturk B (2007) A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm. J Glob Optim 39:459\u2013471","journal-title":"J Glob Optim"},{"key":"3997_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.advengsoft.2013.03.004","volume":"59","author":"A Kaveh","year":"2013","unstructured":"Kaveh A, Farhoudi N (2013) A new optimization method: dolphin echolocation. Adv Eng Softw 59:53\u201370","journal-title":"Adv Eng Softw"},{"key":"3997_CR20","first-page":"97","volume":"57","author":"A Kaveh","year":"2013","unstructured":"Kaveh A, Ghazaan MI, Bakhshpoori T (2013) An improved ray optimization algorithm for design of truss structures. Civ Eng 57:97\u2013112","journal-title":"Civ Eng"},{"issue":"6","key":"3997_CR21","doi-asserted-by":"publisher","first-page":"650","DOI":"10.1057\/ejis.2012.42","volume":"22","author":"M Keil","year":"2013","unstructured":"Keil M, Rai A, Liu S (2013) How user risk and requirements risk moderate the effects of formal and informal control on the process performance of IT projects. Eur J Inf Syst 22(6):650\u2013672","journal-title":"Eur J Inf Syst"},{"key":"3997_CR22","doi-asserted-by":"publisher","first-page":"11487","DOI":"10.1016\/j.eswa.2012.04.006","volume":"39","author":"RA Krohling","year":"2012","unstructured":"Krohling RA, de Souza TTM (2012) Combining prospect theory and fuzzy numbers to multi-criteria decision making. Expert Syst Appl 39:11487\u201311493","journal-title":"Expert Syst Appl"},{"issue":"5","key":"3997_CR23","first-page":"19","volume":"3","author":"S Kumar","year":"2013","unstructured":"Kumar S, Chopra V (2013) Neural network and fuzzy logic based framework for software development effort estimation. Int J Adv Res Comput Sci Softw Eng 3(5):19\u201324","journal-title":"Int J Adv Res Comput Sci Softw Eng"},{"issue":"6","key":"3997_CR24","doi-asserted-by":"publisher","first-page":"1940","DOI":"10.1007\/s40815-016-0276-8","volume":"19","author":"Z Lin","year":"2017","unstructured":"Lin Z, Liu X, Li Y (2017) Adaptive fuzzy control for nonlinear pure-feedback systems with external disturbance and unknown dead zone output. Int J Fuzzy Syst 19(6):1940\u20131949","journal-title":"Int J Fuzzy Syst"},{"key":"3997_CR25","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.ejor.2006.04.009","volume":"179","author":"HW Liu","year":"2007","unstructured":"Liu HW, Wang GJ (2007) Multi-criteria decision-making methods based on intuitionistic fuzzy sets. Eur J Oper Res 179:220\u2013233","journal-title":"Eur J Oper Res"},{"issue":"9","key":"3997_CR26","doi-asserted-by":"publisher","first-page":"4414","DOI":"10.1016\/j.eswa.2014.01.015","volume":"41","author":"R Lourenzutti","year":"2014","unstructured":"Lourenzutti R, Krohling RA (2014) The Hellinger distance in multicriteria decision making: an illustration to the TOPSIS and TODIM methods. Expert Syst Appl 41(9):4414\u20134421","journal-title":"Expert Syst Appl"},{"key":"3997_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2755377","author":"S Lu","year":"2017","unstructured":"Lu S, Li D, Liu Y (2017) Adaptive neural network control for uncertain time-varying state constrained robotics systems. IEEE Trans Syst Man Cybern Syst. \nhttps:\/\/doi.org\/10.1109\/TSMC.2017.2755377","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"3997_CR28","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1016\/j.infsof.2018.02.003","volume":"99","author":"Z Mahmood","year":"2018","unstructured":"Mahmood Z, Bowes D, Hall T, Lane PC, Petri\u0107 J (2018) Reproducibility and replicability of software defect prediction studies. Inf Softw Technol 99:148\u2013163","journal-title":"Inf Softw Technol"},{"issue":"2","key":"3997_CR29","doi-asserted-by":"publisher","first-page":"29","DOI":"10.5121\/ijmvsc.2014.5204","volume":"5","author":"M Mahmoodi","year":"2014","unstructured":"Mahmoodi M, Gelayol SF (2014) A new fuzzy DEMATEL-TODIM hybrid method for evaluation criteria of knowledge management in supply chain. Int J Manag Value Supply Chains 5(2):29\u201342","journal-title":"Int J Manag Value Supply Chains"},{"key":"3997_CR30","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.neucom.2018.04.090","volume":"343","author":"R Malhotra","year":"2019","unstructured":"Malhotra R, Kamal S (2019) An empirical study to investigate oversampling methods for improving software defect prediction using imbalanced data. Neurocomputing 343:120\u2013140","journal-title":"Neurocomputing"},{"key":"3997_CR31","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili S, Mirjalili SM, Lewis A (2014) Grey wolf optimizer. Adv Eng Softw 69:46\u201361","journal-title":"Adv Eng Softw"},{"issue":"4","key":"3997_CR32","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.jss.2006.06.018","volume":"80","author":"KS Na","year":"2007","unstructured":"Na KS, Simpson JT, Li X, Singh T, Kim KY (2007) Software development risk and project performance measurement: evidence in Korea. J Syst Softw 80(4):596\u2013605","journal-title":"J Syst Softw"},{"key":"3997_CR33","unstructured":"NASA93 COCOMO data set. \nhttp:\/\/promise.site.uottawa.ca\/SERepository\/datasets-page.html"},{"issue":"5","key":"3997_CR34","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1142\/S0218488503002387","volume":"11","author":"S Opricovic","year":"2003","unstructured":"Opricovic S, Tzeng GH (2003) Defuzzification within a multicriteria decision model. Int J Uncertain Fuzziness Knowl Based Syst 11(5):635\u2013652","journal-title":"Int J Uncertain Fuzziness Knowl Based Syst"},{"key":"3997_CR35","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.cose.2014.10.009","volume":"49","author":"A Patel","year":"2015","unstructured":"Patel A, Al-Janabi S, AlShourbaji I, Pedersen J (2015) A novel methodology towards a trusted environment in mashup web applications. Comput Secur 49:107\u2013122. \nhttps:\/\/doi.org\/10.1016\/j.cose.2014.10.009","journal-title":"Comput Secur"},{"key":"3997_CR36","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.asoc.2014.01.027","volume":"18","author":"SK Patil","year":"2014","unstructured":"Patil SK, Kant R (2014) A hybrid approach based on fuzzy DEMATEL and FMCDM to predict success of knowledge management adoption in supply chain. Appl Soft Comput 18:126\u2013135","journal-title":"Appl Soft Comput"},{"key":"3997_CR37","volume-title":"A guide to the project management body of knowledge: PMBOK guide","author":"PMI","year":"2004","unstructured":"PMI (2004) A guide to the project management body of knowledge: PMBOK guide, 3rd edn. Project Management Institute Inc, Newtown Square","edition":"3"},{"issue":"3","key":"3997_CR38","first-page":"419","volume":"3","author":"AK Sangaiah","year":"2013","unstructured":"Sangaiah AK, Thangavelu AK (2013) An exploration of FMCDM approach for evaluating the outcome\/success of GSD projects. Cent Eur J Eng 3(3):419\u2013435","journal-title":"Cent Eur J Eng"},{"issue":"5","key":"3997_CR39","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1007\/s00521-014-1771-1","volume":"26","author":"AK Sangaiah","year":"2014","unstructured":"Sangaiah AK, Subramaniam PR, Zheng XA (2014) Combined fuzzy DEMATEL and fuzzy TOPSIS approach for evaluating GSD project outcome factors. Neural Comput Appl 26(5):1025\u20131040. \nhttps:\/\/doi.org\/10.1007\/s00521-014-1771-1","journal-title":"Neural Comput Appl"},{"key":"3997_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2018.07.003","volume":"71","author":"AK Sangaiah","year":"2017","unstructured":"Sangaiah AK, Samuel OW, Li X, Abdel-Basset M, Wang H (2017) Towards an efficient risk assessment in software projects\u2013fuzzy reinforcement paradigm. Comput Electr Eng 71:1\u201314","journal-title":"Comput Electr Eng"},{"issue":"1","key":"3997_CR41","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1080\/17517575.2014.906047","volume":"10","author":"AC Scanavachi Moreira Campos","year":"2016","unstructured":"Scanavachi Moreira Campos AC, de Almeida AT (2016) Multicriteria framework for selecting a process modelling language. Enterp Inf Syst 10(1):17\u201332","journal-title":"Enterp Inf Syst"},{"key":"3997_CR42","unstructured":"Shen L, Wang H, Feng X (2011) Some arithmetic aggregation operators within intuitionistic trapezoidal fuzzy setting and their application to group decision making. In: MSIE, pp 1053\u20131059"},{"issue":"1","key":"3997_CR43","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11277-018-6014-9","volume":"104","author":"V Sundararaj","year":"2019","unstructured":"Sundararaj V (2019) Optimal task assignment in mobile cloud computing by queue based ant-bee algorithm. Wirel Pers Commun 104(1):173\u2013197","journal-title":"Wirel Pers Commun"},{"key":"3997_CR44","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/j.cose.2018.04.009","volume":"77","author":"V Sundararaj","year":"2018","unstructured":"Sundararaj V, Muthukumar S, Kumar RS (2018) An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. Comput Secur 77:277\u2013288","journal-title":"Comput Secur"},{"issue":"1","key":"3997_CR45","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/TSMC.1985.6313399","volume":"15","author":"T Takagi","year":"1985","unstructured":"Takagi T, Sugeno M (1985) Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man Cybern 15(1):116\u2013132","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"4","key":"3997_CR46","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s10664-005-3864-z","volume":"10","author":"Y Takagi","year":"2005","unstructured":"Takagi Y, Mizuno O, Kikuno T (2005) An empirical approach to characterizing risky software projects based on logistic regression analysis. Emp Softw Eng 10(4):495\u2013515","journal-title":"Emp Softw Eng"},{"issue":"2","key":"3997_CR47","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1109\/TFUZZ.2017.2686373","volume":"26","author":"S Tong","year":"2018","unstructured":"Tong S, Sun K, Sui S (2018) Observer-based adaptive fuzzy decentralized optimal control design for strict-feedback nonlinear large-scale systems. IEEE Trans Fuzzy Syst 26(2):569\u2013584","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"3","key":"3997_CR48","first-page":"117","volume":"9","author":"S Vinu","year":"2016","unstructured":"Vinu S (2016) An efficient threshold prediction scheme for wavelet based ECG signal noise reduction using variable step size firefly algorithm. Int J Intell Eng Syst 9(3):117\u2013126","journal-title":"Int J Intell Eng Syst"},{"key":"3997_CR49","first-page":"321","volume":"20","author":"JQ Wang","year":"2009","unstructured":"Wang JQ, Zhang Z (2009a) Aggregation operators on intuitionistic trapezoidal fuzzy number and its application to multi-criteria decision making problems. J Syst Eng Electron 20:321\u2013326","journal-title":"J Syst Eng Electron"},{"key":"3997_CR50","first-page":"226","volume":"24","author":"JQ Wang","year":"2009","unstructured":"Wang JQ, Zhang Z (2009b) Multi-criteria decision-making method with incomplete certain information based on intuitionistic fuzzy number. Control Decis 24:226\u2013230","journal-title":"Control Decis"},{"key":"3997_CR51","doi-asserted-by":"publisher","first-page":"345","DOI":"10.4304\/jcp.5.3.345-351","volume":"5","author":"GW Wei","year":"2010","unstructured":"Wei GW (2010) Some arithmetic aggregation operators with intuitionistic trapezoidal fuzzy numbers and their application to group decision making. J Comput 5:345\u2013351","journal-title":"J Comput"},{"key":"3997_CR52","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.ins.2018.10.056","volume":"477","author":"H Wei","year":"2019","unstructured":"Wei H, Hu C, Chen S, Xue Y, Zhang Q (2019) Establishing a software defect prediction model via effective dimension reduction. Inf Sci 477:399\u2013409","journal-title":"Inf Sci"},{"key":"3997_CR53","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s10700-007-9004-z","volume":"6","author":"Z Xu","year":"2007","unstructured":"Xu Z (2007) Some similarity measures of intuitionistic fuzzy sets and their applications to multiple attribute decision making. Fuzzy Optim Decis Mak 6:109\u2013121","journal-title":"Fuzzy Optim Decis Mak"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03997-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-03997-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-03997-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,28]],"date-time":"2020-04-28T23:16:09Z","timestamp":1588115769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-03997-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,30]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["3997"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-03997-2","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,30]]},"assertion":[{"value":"30 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical standard"}}]}}