{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T08:18:58Z","timestamp":1772093938192,"version":"3.50.1"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s00500-023-09054-3","type":"journal-article","created":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T13:01:22Z","timestamp":1691240482000},"page":"1145-1170","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Exploring and mining rationale information for low-rating software applications"],"prefix":"10.1007","volume":"30","author":[{"given":"Tahir","family":"Ullah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3306-1195","authenticated-orcid":false,"given":"Javed Ali","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Nek Dil","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Affan","family":"Yasin","sequence":"additional","affiliation":[]},{"given":"Hasna","family":"Arshad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,5]]},"reference":[{"key":"9054_CR1","doi-asserted-by":"crossref","unstructured":"Alkadhi R, Lata T, Guzmany E, Bruegge B (2017a) Rationale in development chat messages: an exploratory study. In: 2017a IEEE\/ACM 14th International conference on mining software repositories (MSR). IEEE, pp 436\u2013446","DOI":"10.1109\/MSR.2017.43"},{"key":"9054_CR2","doi-asserted-by":"crossref","unstructured":"Alkadhi R, Johanssen JO, Guzman E, Bruegge B (2017b) REACT: an approach for capturing rationale in chat messages. In: 2017b ACM\/IEEE international symposium on empirical software engineering and measurement (ESEM). IEEE, pp 175\u2013180","DOI":"10.1109\/ESEM.2017.26"},{"key":"9054_CR3","doi-asserted-by":"crossref","unstructured":"Alkadhi R, Nonnenmacher M, Guzman E, Bruegge B (2018) How do developers discuss rationale?. In: 2018 IEEE 25th International conference on software analysis, evolution and reengineering (SANER). IEEE, pp 357\u2013369","DOI":"10.1109\/SANER.2018.8330223"},{"key":"9054_CR4","doi-asserted-by":"crossref","unstructured":"Bakiu E, Guzman E (2017) Which feature is unusable? Detecting usability and user experience issues from user reviews. In: 2017 IEEE 25th international requirements engineering conference workshops (REW). IEEE, pp 182\u2013187","DOI":"10.1109\/REW.2017.76"},{"key":"9054_CR5","first-page":"21","volume":"2016","author":"T Bosc","year":"2016","unstructured":"Bosc T, Cabrio E, Villata S (2016) Tweeties squabbling: positive and negative results in applying argument mining on social media. COMMA 2016:21\u201332","journal-title":"COMMA"},{"key":"9054_CR6","volume-title":"Object-oriented software engineering; conquering complex and changing systems","author":"B Bruegge","year":"1999","unstructured":"Bruegge B, Dutoit AA (1999) Object-oriented software engineering; conquering complex and changing systems. Prentice Hall PTR, Englewood Cliffs"},{"key":"9054_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77583-6","volume-title":"Rationale-based software engineering","author":"JE Burge","year":"2008","unstructured":"Burge JE, Carroll JM, McCall R, Mistrik I (2008) Rationale-based software engineering. Springer, Berlin"},{"issue":"3","key":"9054_CR8","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1080\/19462166.2013.862303","volume":"4","author":"E Cabrio","year":"2013","unstructured":"Cabrio E, Villata S (2013) A natural language bipolar argumentation approach to support users in online debate interactions. Argum Comput 4(3):209\u2013230","journal-title":"Argum Comput"},{"key":"9054_CR9","doi-asserted-by":"crossref","unstructured":"Carreno LVG, Winbladh K (2013) Analysis of user comments: an approach for software requirements evolution. In: 2013 35th international conference on software engineering (ICSE). IEEE, pp 582\u2013591","DOI":"10.1109\/ICSE.2013.6606604"},{"key":"9054_CR10","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"Chawla NV, Bowyer KW, Hall LO, Kegelmeyer WP (2002) SMOTE: synthetic minority over-sampling technique. J Artif Intell Res 16:321\u2013357","journal-title":"J Artif Intell Res"},{"issue":"1","key":"9054_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1007730.1007733","volume":"6","author":"NV Chawla","year":"2004","unstructured":"Chawla NV, Japkowicz N, Kotcz A (2004) Special issue on learning from imbalanced data sets. ACM SIGKDD Explorations Newsl 6(1):1\u20136","journal-title":"ACM SIGKDD Explorations Newsl"},{"key":"9054_CR12","doi-asserted-by":"crossref","unstructured":"Cocarascu O, Toni F (2016) Detecting deceptive reviews using argumentation. In: Proceedings of the 1st international workshop on AI for privacy and security, pp 1\u20138","DOI":"10.1145\/2970030.2970031"},{"key":"9054_CR13","unstructured":"Cocarascu O, Toni F (2017) Mining bipolar argumentation frameworks from natural language text"},{"issue":"4","key":"9054_CR14","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1037\/h0026256","volume":"70","author":"J Cohen","year":"1968","unstructured":"Cohen J (1968) Weighted kappa: nominal scale agreement provision for scaled disagreement or partial credit. Psychol Bull 70(4):213","journal-title":"Psychol Bull"},{"key":"9054_CR15","unstructured":"Corbin J, Strauss A (2014) Basics of qualitative research: techniques and procedures for developing grounded theory. Sage publications"},{"issue":"2","key":"9054_CR16","first-page":"1","volume":"27","author":"J D\u0105browski","year":"2022","unstructured":"D\u0105browski J, Letier E, Perini A et al (2022) Analysing app reviews for software engineering: a systematic literature review. Empir Softw Eng 27(2):1\u201363","journal-title":"Empir Softw Eng"},{"key":"9054_CR17","doi-asserted-by":"crossref","unstructured":"Dhinakaran VT, Pulle R, Ajmeri N, Murukannaiah PK (2018) App review analysis via active learning: reducing supervision effort without compromising classification accuracy. In: 2018 IEEE 26th international requirements engineering conference (RE). IEEE, pp 170\u2013181","DOI":"10.1109\/RE.2018.00026"},{"key":"9054_CR18","volume-title":"Rationale management in software engineering","author":"AH Dutoit","year":"2007","unstructured":"Dutoit AH, McCall R, Mistr\u00edk I, Paech B (2007) Rationale management in software engineering. Springer, Berlin"},{"key":"9054_CR19","volume-title":"A guide to chi-squared testing","author":"PE Greenwood","year":"1996","unstructured":"Greenwood PE, Nikulin MS (1996) A guide to chi-squared testing. John Wiley & Sons, Hoboken"},{"key":"9054_CR20","first-page":"1157","volume":"3","author":"I Guyon","year":"2003","unstructured":"Guyon I, Elisseeff A (2003) An introduction to variable and feature selection. J Mach Learn Res 3:1157\u20131182","journal-title":"J Mach Learn Res"},{"key":"9054_CR21","doi-asserted-by":"crossref","unstructured":"Guzman E, Maalej W (2014) How do users like this feature? A fine-grained sentiment analysis of app reviews. In\u201d: 2014 IEEE 22nd international requirements engineering conference (RE). IEEE, pp 153\u2013162","DOI":"10.1109\/RE.2014.6912257"},{"key":"9054_CR22","doi-asserted-by":"crossref","unstructured":"Guzman E, Ibrahim M, Glinz M (2017) A little bird told me: Mining tweets for requirements and software evolution. In: 2017 IEEE 25th international requirements engineering conference (RE). IEEE, pp 11\u201320","DOI":"10.1109\/RE.2017.88"},{"issue":"1","key":"9054_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1148\/radiology.143.1.7063747","volume":"143","author":"JA Hanley","year":"1982","unstructured":"Hanley JA, McNeil BJ (1982) The meaning and use of the area under a receiver operating characteristic (ROC) curve. Radiology 143(1):29\u201336","journal-title":"Radiology"},{"key":"9054_CR24","doi-asserted-by":"crossref","unstructured":"Iacob C, Harrison R (2013) Retrieving and analyzing mobile apps feature requests from online reviews. In: 2013 10th working conference on mining software repositories (MSR). IEEE, pp 41\u201344","DOI":"10.1109\/MSR.2013.6624001"},{"key":"9054_CR25","doi-asserted-by":"crossref","unstructured":"Jarczyk AP, L\u00f6ffler P, Shipman FM (1992) Design rationale for software engineering: a survey. In: Proceedings of the Hawaii international conference on system sciences, vol 25. Citeseer, pp 577\u2013577","DOI":"10.1109\/HICSS.1992.183309"},{"issue":"3","key":"9054_CR26","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0092209","volume":"9","author":"J Keilwagen","year":"2014","unstructured":"Keilwagen J, Grosse I, Grau J (2014) Area under precision-recall curves for weighted and unweighted data. PLoS ONE 9(3):e92209","journal-title":"PLoS ONE"},{"key":"9054_CR27","doi-asserted-by":"crossref","unstructured":"Khan JA, Rehman IU, Khan YH, Khan IJ, Rashid S (2015) Comparison of requirement prioritization techniques to find best prioritization technique. Int J Mod Educ Comput Sci 7(11).","DOI":"10.5815\/ijmecs.2015.11.06"},{"key":"9054_CR28","unstructured":"Khan JA, Rehman IU, Ali L, Khan S, Khan IJ (2016) Requirements prioritization using analytic network process (ANP). Int J Sci Eng Res 7(11)"},{"key":"9054_CR29","doi-asserted-by":"crossref","unstructured":"Khan JA, Liu L, Jia Y, Wen L (2018) Linguistic analysis of crowd requirements: an experimental study. In: 2018 IEEE 7th international workshop on empirical requirements engineering (EmpiRE). IEEE, pp 24\u201331","DOI":"10.1109\/EmpiRE.2018.00010"},{"key":"9054_CR30","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-030-15538-4_18","volume-title":"International working conference on requirements engineering: Foundation for software quality","author":"JA Khan","year":"2019","unstructured":"Khan JA, Liu L, Wen L, Ali R (2019a) Crowd intelligence in requirements engineering: Current status and future directions. International working conference on requirements engineering: Foundation for software quality. Springer, Berlin, pp 245\u2013261"},{"key":"9054_CR31","doi-asserted-by":"crossref","unstructured":"Khan JA, Xie Y, Liu L, Wen L (2019b) Analysis of requirements-related arguments in user forums. In: 2019b IEEE 27th International requirements engineering conference (RE). IEEE, pp 63\u201374","DOI":"10.1109\/RE.2019.00018"},{"issue":"3","key":"9054_CR32","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1049\/iet-sen.2019.0262","volume":"14","author":"JA Khan","year":"2020","unstructured":"Khan JA, Liu L, Wen L (2020a) Requirements knowledge acquisition from online user forums. IET Softw 14(3):242\u2013253","journal-title":"IET Softw"},{"issue":"12","key":"9054_CR33","doi-asserted-by":"publisher","first-page":"e2309","DOI":"10.1002\/smr.2309","volume":"32","author":"JA Khan","year":"2020","unstructured":"Khan JA, Liu L, Wen L, Ali R (2020b) Conceptualising, extracting and analysing requirements arguments in users\u2019 forums: the CrowdRE-Arg framework. J Softw Evol Process 32(12):e2309","journal-title":"J Softw Evol Process"},{"issue":"4","key":"9054_CR34","doi-asserted-by":"publisher","first-page":"15","DOI":"10.33411\/IJIST\/2021030502","volume":"3","author":"JA Khan","year":"2021","unstructured":"Khan JA, Yasin A, Assam M et al (2021) Requirements decision-making as a process of argumentation: a Google maps case study with goal model. Int J Innov Sci Technol 3(4):15\u201333","journal-title":"Int J Innov Sci Technol"},{"key":"9054_CR35","doi-asserted-by":"publisher","first-page":"30982","DOI":"10.1109\/ACCESS.2022.3152073","volume":"10","author":"FM Khan","year":"2022","unstructured":"Khan FM, Khan JA, Assam M, Almasoud AS, Abdelmaboud A, Hamza MAM (2022a) A comparative systematic analysis of stakeholder\u2019s identification methods in requirements elicitation. IEEE Access 10:30982\u201331011","journal-title":"IEEE Access"},{"key":"9054_CR36","doi-asserted-by":"crossref","unstructured":"Khan JA, Yasin A, Fatima R, Vasan D, Khan AA, Khan AW (2022b) Valuating requirements arguments in the online user's forum for requirements decision\u2010making: the CrowdRE\u2010VArg framework. Softw Pract Exp","DOI":"10.1002\/spe.3137"},{"issue":"3","key":"9054_CR37","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1007\/s00500-020-05290-z","volume":"25","author":"A Khattak","year":"2021","unstructured":"Khattak A, Habib A, Asghar MZ et al (2021) Applying deep neural networks for user intention identification. Soft Comput 25(3):2191\u20132220","journal-title":"Soft Comput"},{"key":"9054_CR38","unstructured":"Kohavi R (1995) A study of cross-validation and bootstrap for accuracy estimation and model selection. In: IJCAI, vol 14, no 2. Montreal, Canada, pp 1137\u20131145"},{"issue":"1","key":"9054_CR39","first-page":"25","volume":"30","author":"S Kotsiantis","year":"2006","unstructured":"Kotsiantis S, Kanellopoulos D, Pintelas P (2006) Handling imbalanced datasets: a review. GESTS Int Trans Comput Sci Eng 30(1):25\u201336","journal-title":"GESTS Int Trans Comput Sci Eng"},{"key":"9054_CR40","doi-asserted-by":"crossref","unstructured":"Kurtanovi\u0107 Z, Maalej W (2017) Mining user rationale from software reviews. In: 2017 IEEE 25th International requirements engineering conference (RE). IEEE, pp 61\u201370","DOI":"10.1109\/RE.2017.86"},{"issue":"3","key":"9054_CR41","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s00766-018-0293-2","volume":"23","author":"Z Kurtanovi\u0107","year":"2018","unstructured":"Kurtanovi\u0107 Z, Maalej W (2018) On user rationale in software engineering. Requir Eng 23(3):357\u2013379","journal-title":"Requir Eng"},{"issue":"3","key":"9054_CR42","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/64.592267","volume":"12","author":"J Lee","year":"1997","unstructured":"Lee J (1997) Design rationale systems: understanding the issues. IEEE Expert 12(3):78\u201385","journal-title":"IEEE Expert"},{"issue":"2","key":"9054_CR43","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s00766-022-00372-w","volume":"27","author":"Y Levy","year":"2022","unstructured":"Levy Y, Stern R, Sturm A et al (2022) An impact-driven approach to predict user stories instability. Requir Eng 27(2):231\u2013248","journal-title":"Requir Eng"},{"issue":"10","key":"9054_CR44","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1016\/j.cad.2011.08.002","volume":"44","author":"Y Liang","year":"2012","unstructured":"Liang Y, Liu Y, Kwong CK, Lee WB (2012) Learning the \u201cWhys\u201d: Discovering design rationale using text mining\u2014an algorithm perspective. Comput Aided Des 44(10):916\u2013930","journal-title":"Comput Aided Des"},{"issue":"1","key":"9054_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-020-00416-4","volume":"2","author":"S Lim","year":"2021","unstructured":"Lim S, Henriksson A, Zdravkovic J (2021) Data-driven requirements elicitation: A systematic literature review. SN Comput Sci 2(1):1\u201335","journal-title":"SN Comput Sci"},{"issue":"2","key":"9054_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2850417","volume":"16","author":"M Lippi","year":"2016","unstructured":"Lippi M, Torroni P (2016) Argumentation mining: State of the art and emerging trends. ACM Transa Internet Technol (TOIT) 16(2):1\u201325","journal-title":"ACM Transa Internet Technol (TOIT)"},{"issue":"9","key":"9054_CR47","doi-asserted-by":"publisher","first-page":"1264","DOI":"10.1109\/TSE.2013.12","volume":"39","author":"W Maalej","year":"2013","unstructured":"Maalej W, Robillard MP (2013) Patterns of knowledge in API reference documentation. IEEE Trans Softw Eng 39(9):1264\u20131282","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"9054_CR48","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MS.2015.153","volume":"33","author":"W Maalej","year":"2015","unstructured":"Maalej W, Nayebi M, Johann T, Ruhe G (2015) Toward data-driven requirements engineering. IEEE Softw 33(1):48\u201354","journal-title":"IEEE Softw"},{"issue":"18","key":"9054_CR49","doi-asserted-by":"publisher","first-page":"13913","DOI":"10.1007\/s00500-020-04767-1","volume":"24","author":"MSI Malik","year":"2020","unstructured":"Malik MSI (2020) Predicting users\u2019 review helpfulness: the role of significant review and reviewer characteristics. Soft Comput 24(18):13913\u201313928","journal-title":"Soft Comput"},{"issue":"6","key":"9054_CR50","doi-asserted-by":"publisher","first-page":"3316","DOI":"10.1007\/s10664-019-09706-9","volume":"24","author":"D Martens","year":"2019","unstructured":"Martens D, Maalej W (2019) Towards understanding and detecting fake reviews in app stores. Empir Softw Eng 24(6):3316\u20133355","journal-title":"Empir Softw Eng"},{"issue":"3","key":"9054_CR51","first-page":"830","volume":"16","author":"MI Marwat","year":"2022","unstructured":"Marwat MI, Khan JA, Alshehri DMD, Ali MA, Ali H, Assam M (2022) Sentiment analysis of product reviews to identify deceptive rating information in social media: a SentiDeceptive approach. KSII Trans Internet Inf Syst (TIIS) 16(3):830\u2013860","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"key":"9054_CR52","first-page":"159","volume-title":"International conference on advanced information systems engineering","author":"I Morales-Ramirez","year":"2017","unstructured":"Morales-Ramirez I, Kifetew FM, Perini A (2017) Analysis of online discussions in support of requirements discovery. International conference on advanced information systems engineering. Springer, Berlin, pp 159\u2013174"},{"key":"9054_CR53","volume-title":"The content analysis guidebook","author":"KA Neuendorf","year":"2002","unstructured":"Neuendorf KA (2002) The content analysis guidebook. Sage Publications, Inc., Thousand Oaks"},{"key":"9054_CR54","volume-title":"The content analysis guidebook","author":"KA Neuendorf","year":"2021","unstructured":"Neuendorf KA (2021) The content analysis guidebook, 1st edn. Sage, Thousand Oaks","edition":"1"},{"key":"9054_CR55","doi-asserted-by":"crossref","unstructured":"Pagano D, Bruegge B (2013) User involvement in software evolution practice: a case study. In: 2013 35th International conference on software engineering (ICSE). IEEE, pp 953\u2013962","DOI":"10.1109\/ICSE.2013.6606645"},{"key":"9054_CR56","doi-asserted-by":"crossref","unstructured":"Palau RM, Moens M-F (2009) Argumentation mining: the detection, classification and structure of arguments in text. In: Proceedings of the 12th international conference on artificial intelligence and law, pp 98\u2013107","DOI":"10.1145\/1568234.1568246"},{"key":"9054_CR57","doi-asserted-by":"crossref","unstructured":"Panichella S, Di Sorbo A, Guzman E, Visaggio CA, Canfora G, Gall HC (2015) How can I improve my app? Classifying user reviews for software maintenance and evolution. In: 2015 IEEE international conference on software maintenance and evolution (ICSME). IEEE, pp 281\u2013290","DOI":"10.1109\/ICSM.2015.7332474"},{"issue":"1","key":"9054_CR58","first-page":"1","volume":"7","author":"A Peldszus","year":"2013","unstructured":"Peldszus A, Stede M (2013) From argument diagrams to argumentation mining in texts: a survey. Int J Cogn Inform Nat Intell (IJCINI) 7(1):1\u201331","journal-title":"Int J Cogn Inform Nat Intell (IJCINI)"},{"key":"9054_CR59","doi-asserted-by":"crossref","unstructured":"Rogers B, Gung J, Qiao Y, Burge JE (2012) Exploring techniques for rationale extraction from existing documents. In: 2012 34th International conference on software engineering (ICSE). IEEE, pp 1313\u20131316","DOI":"10.1109\/ICSE.2012.6227091"},{"key":"9054_CR60","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-319-14956-1_26","volume-title":"Design computing and cognition\u201914","author":"B Rogers","year":"2015","unstructured":"Rogers B, Qiao Y, Gung J, Mathur T, Burge JE (2015) Using text mining techniques to extract rationale from existing documentation. Design computing and cognition\u201914. Springer, Berlin, pp 457\u2013474"},{"key":"9054_CR61","unstructured":"Santos R, Groen EC, Villela K (2019) An overview of user feedback classification approaches. In: REFSQ workshops"},{"key":"9054_CR62","doi-asserted-by":"crossref","unstructured":"Sarro F, Harman M, Jia Y, Zhang Y (2018) Customer rating reactions can be predicted purely using app features. In: 2018 IEEE 26th international requirements engineering conference (RE). IEEE, pp 76\u201387","DOI":"10.1109\/RE.2018.00018"},{"key":"9054_CR63","doi-asserted-by":"crossref","unstructured":"Tizard J, Wang H, Yohannes L, Blincoe K (2019) Can a conversation paint a picture? Mining requirements in software forums. In: 2019 IEEE 27th International requirements engineering conference (RE). IEEE, pp 17\u201327","DOI":"10.1109\/RE.2019.00014"},{"issue":"3","key":"9054_CR64","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3444689","volume":"54","author":"L Zhao","year":"2021","unstructured":"Zhao L, Alhoshan W, Ferrari A et al (2021) Natural language processing for requirements engineering: a systematic mapping study. ACM Comput Surv (CSUR) 54(3):1\u201341","journal-title":"ACM Comput Surv (CSUR)"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09054-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-023-09054-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-023-09054-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T07:30:04Z","timestamp":1772091004000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-023-09054-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,5]]},"references-count":64,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["9054"],"URL":"https:\/\/doi.org\/10.1007\/s00500-023-09054-3","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,5]]},"assertion":[{"value":"20 July 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors would like to announce that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any examinations with human members or creatures performed by any of the others.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}