{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T22:40:43Z","timestamp":1774651243875,"version":"3.50.1"},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T00:00:00Z","timestamp":1707091200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T00:00:00Z","timestamp":1707091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100024003","name":"Damanhour University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100024003","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Speaker identification has significant advantages for the field of human\u2013computer interaction. Recently, many scholars have made contributions in this field and successfully created deep learning models for automatic speaker identification systems. However, most of the speech signal processing work is limited to English-only applications, despite numerous challenges with Arabic speech, particularly with the recitation of the Holy Quran, which is the Islamic holy book. In the light of these considerations, this study proposes a model for identifying the reciter of the Holy Quran using a dataset of 11,000 audio samples extracted from 20 Quran reciters. To enable feeding the audio samples' visual representation to the pre-trained models, the audio samples are converted from their original audio representation to visual representation using the Mel-Frequency Cepstrum Coefficients. Six pre-trained deep learning models are evaluated separately in the proposed model. The results from the test dataset reveal that the NASNetLarge model achieved the highest accuracy rate of 98.50% among the pre-trained models used in this study.<\/jats:p>","DOI":"10.1007\/s00521-023-09392-1","type":"journal-article","created":{"date-parts":[[2024,2,5]],"date-time":"2024-02-05T05:02:50Z","timestamp":1707109370000},"page":"6559-6573","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Quran reciter identification using NASNetLarge"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6108-6771","authenticated-orcid":false,"given":"Hebat-Allah","family":"Saber","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"Younes","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Osman","sequence":"additional","affiliation":[]},{"given":"Islam","family":"Elkabani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,5]]},"reference":[{"issue":"2","key":"9392_CR1","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MCAS.2011.941079","volume":"11","author":"R Togneri","year":"2011","unstructured":"Togneri R, Pullella D (2011) An overview of speaker identification: Accuracy and robustness issues. IEEE Circuits Syst Mag 11(2):23\u201361. https:\/\/doi.org\/10.1109\/MCAS.2011.941079","journal-title":"IEEE Circuits Syst Mag"},{"issue":"1","key":"9392_CR2","doi-asserted-by":"publisher","first-page":"504","DOI":"10.3390\/make1010031","volume":"1","author":"P Dhakal","year":"2019","unstructured":"Dhakal P, Damacharla P, Javaid AY, Devabhaktuni V (2019) A near real-time automatic speaker recognition architecture for voice-based user interface. Mach Learn Knowl Extract 1(1):504\u2013520. https:\/\/doi.org\/10.3390\/make1010031","journal-title":"Mach Learn Knowl Extract"},{"key":"9392_CR3","unstructured":"Khan AU, Bhaiya LP, Banchhor SK (2012) Hindi speaking person identification using zero crossing rate.\u00a0Int J Soft Comput Eng,\u00a02(3):101\u2013104"},{"key":"9392_CR4","doi-asserted-by":"publisher","unstructured":"Bharti R, Bansal P (2015) Real time speaker recognition system using MFCC and vector quantization technique. Int J Comput Appl 117(1). https:\/\/doi.org\/10.5120\/20520-2361","DOI":"10.5120\/20520-2361"},{"issue":"4","key":"9392_CR5","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1016\/j.specom.2011.01.005","volume":"53","author":"PN Le","year":"2011","unstructured":"Le PN, Ambikairajah E, Epps J et al (2011) Investigation of spectral centroid features for cognitive load classification. Speech Commun 53(4):540\u2013551. https:\/\/doi.org\/10.1016\/j.specom.2011.01.005","journal-title":"Speech Commun"},{"key":"9392_CR6","doi-asserted-by":"publisher","unstructured":"Ghahremani P, BabaAli B, Povey D, Riedhammer K, Trmal J, Khudanpur S (2014) A pitch extraction algorithm tuned for automatic speech recognition. In:\u00a02014 IEEE international conference on acoustics, speech and signal processing (ICASSP)\u00a0(pp 2494\u20132498). IEEE. https:\/\/doi.org\/10.1109\/ICASSP.2014.6854049","DOI":"10.1109\/ICASSP.2014.6854049"},{"key":"9392_CR7","doi-asserted-by":"publisher","unstructured":"Hossan MA, Memon S, Gregory MA (2010) A novel approach for MFCC feature extraction. In: 2010 4th International conference on signal processing and communication systems, pp 1\u20135. IEEE. https:\/\/doi.org\/10.1109\/ICSPCS.2010.5709752","DOI":"10.1109\/ICSPCS.2010.5709752"},{"issue":"8","key":"9392_CR8","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/TIP.2008.926150","volume":"17","author":"ZZ Wang","year":"2008","unstructured":"Wang ZZ, Yong JH (2008) Texture analysis and classification with linear regression model based on wavelet transform. IEEE Trans Image Process 17(8):1421\u20131430. https:\/\/doi.org\/10.1109\/TIP.2008.926150","journal-title":"IEEE Trans Image Process"},{"issue":"12","key":"9392_CR9","doi-asserted-by":"publisher","first-page":"1565","DOI":"10.1038\/nbt1206-1565","volume":"24","author":"WS Noble","year":"2006","unstructured":"Noble WS (2006) What is a support vector machine? Nat Biotechnol 24(12):1565\u20131567. https:\/\/doi.org\/10.1038\/nbt1206-1565","journal-title":"Nat Biotechnol"},{"issue":"6","key":"9392_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3459665","volume":"54","author":"P Cunningham","year":"2021","unstructured":"Cunningham P, Delany SJ (2021) k-Nearest neighbour classifiers\u2014a tutorial. ACM Comput Surv (CSUR) 54(6):1\u201325. https:\/\/doi.org\/10.1145\/3459665","journal-title":"ACM Comput Surv (CSUR)"},{"key":"9392_CR11","doi-asserted-by":"publisher","unstructured":"Padi S, Sadjadi SO, Manocha D, Sriram RD (2022) Multimodal emotion recognition using transfer learning from speaker recognition and bert-based models.\u00a0arXiv preprint arXiv:2202.08974. https:\/\/doi.org\/10.48550\/arXiv.2202.08974","DOI":"10.48550\/arXiv.2202.08974"},{"key":"9392_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.csl.2020.101077","volume":"63","author":"PG Shivakumar","year":"2020","unstructured":"Shivakumar PG, Georgiou P (2020) Transfer learning from adult to children for speech recognition: evaluation, analysis and recommendations. Comput Speech Lang 63:101077. https:\/\/doi.org\/10.1016\/j.csl.2020.101077","journal-title":"Comput Speech Lang"},{"key":"9392_CR13","doi-asserted-by":"publisher","unstructured":"Beikmohammadi A, Faez K (2018) December. Leaf classification for plant recognition with deep transfer learning. In\u00a02018 4th Iranian Conference on Signal Processing and Intelligent Systems (ICSPIS)\u00a0(pp. 21\u201326). IEEE. https:\/\/doi.org\/10.1109\/ICSPIS.2018.8700547","DOI":"10.1109\/ICSPIS.2018.8700547"},{"key":"9392_CR14","doi-asserted-by":"publisher","first-page":"117271","DOI":"10.1109\/ACCESS.2021.3098415","volume":"9","author":"S Shahriar","year":"2021","unstructured":"Shahriar S, Tariq U (2021) Classifying maqams of qur\u2019anic recitations using deep learning. IEEE Access 9:117271\u2013117281. https:\/\/doi.org\/10.1109\/ACCESS.2021.3098415","journal-title":"IEEE Access"},{"issue":"3A","key":"9392_CR15","first-page":"620","volume":"15","author":"M Al-Ayyoub","year":"2018","unstructured":"Al-Ayyoub M, Damer NA, Hmeidi I (2018) Using deep learning for automatically determining correct application of basic quranic recitation rules. Int Arab J Inf Technol 15(3A):620\u2013625","journal-title":"Int Arab J Inf Technol"},{"key":"9392_CR16","unstructured":"Bradbury J (2000) Linear predictive coding.\u00a0Mc G. Hill"},{"key":"9392_CR17","doi-asserted-by":"publisher","unstructured":"Schuller B, Rigoll G, Lang M (2003) Hidden Markov model-based speech emotion recognition. In:\u00a02003 IEEE international conference on acoustics, speech, and signal processing, 2003. Proceedings. (ICASSP'03). IEEE. (vol 2, pp II-1). https:\/\/doi.org\/10.1109\/ICASSP.2003.1202279","DOI":"10.1109\/ICASSP.2003.1202279"},{"issue":"6","key":"9392_CR18","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.measurement.2007.07.007","volume":"41","author":"W Ting","year":"2008","unstructured":"Ting W, Guo-Zheng Y, Bang-Hua Y et al (2008) Eeg feature extraction based on wavelet packet decomposition for brain computer interface. Measurement 41(6):618\u2013625. https:\/\/doi.org\/10.1016\/j.measurement.2007.07.007","journal-title":"Measurement"},{"key":"9392_CR19","doi-asserted-by":"publisher","unstructured":"Lee H, Grosse R, Ranganath R, Ng AY (2009) Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations. In: Proceedings of the 26th annual international conference on machine learning\u00a0(pp 609\u2013616). https:\/\/doi.org\/10.1145\/1553374.1553453","DOI":"10.1145\/1553374.1553453"},{"key":"9392_CR20","doi-asserted-by":"publisher","unstructured":"Alagrami AM, Eljazzar MM (2020) Smartajweed automatic recognition of Arabic quranic recitation rules.\u00a0arXiv preprint arXiv:2101.04200. https:\/\/doi.org\/10.48550\/arXiv.2101.04200","DOI":"10.48550\/arXiv.2101.04200"},{"issue":"1","key":"9392_CR21","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/5.52200","volume":"78","author":"PP Vaidyanathan","year":"1990","unstructured":"Vaidyanathan PP (1990) Multirate digital filters, filter banks, polyphase networks, and applications: a tutorial. Proc IEEE 78(1):56\u201393. https:\/\/doi.org\/10.1109\/5.52200","journal-title":"Proc IEEE"},{"key":"9392_CR22","doi-asserted-by":"publisher","unstructured":"Marlina L, Wardoyo C, Sanjaya WM, Anggraeni D, Dewi SF, Roziqin A, Maryanti S (2018) Makhraj recognition of Hijaiyah letter for children based on mel-frequency cepstrum coefficients (MFCC) and support vector machines (SVM) method. In:\u00a02018 International conference on information and communications technology (ICOIACT)\u00a0(pp 935\u2013940). IEEE. https:\/\/doi.org\/10.1109\/ICOIACT.2018.8350684","DOI":"10.1109\/ICOIACT.2018.8350684"},{"key":"9392_CR23","doi-asserted-by":"publisher","unstructured":"Hamid R, Naim F, Naharuddin NZA (2013) Makhraj recognition for al-quran recitation using mfcc. Int J Intell Inf Process 4(2):45\u201353. https:\/\/doi.org\/10.4156\/ijiip.vol4.issue2.5","DOI":"10.4156\/ijiip.vol4.issue2.5"},{"key":"9392_CR24","doi-asserted-by":"publisher","unstructured":"Alkhateeb JH (2020) A machine learning approach for recognizing the holy quran reciter. Int J Adv Comput Sci Appl 11(7). https:\/\/doi.org\/10.14569\/ijacsa.2020.0110735","DOI":"10.14569\/ijacsa.2020.0110735"},{"issue":"4","key":"9392_CR25","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.18576\/isl\/110410","volume":"11","author":"M Anazi","year":"2022","unstructured":"Anazi M, Shahin OR (2022) A machine learning model for the identification of the holy quran reciter utilizing k-nearest neighbor and artificial neural networks. Inf Sci Lett 11(4):1093\u20131102.","journal-title":"Inf Sci Lett"},{"issue":"4","key":"9392_CR26","doi-asserted-by":"publisher","first-page":"458","DOI":"10.18178\/ijmlc.2019.9.4.826","volume":"9","author":"KM Nahar","year":"2019","unstructured":"Nahar KM, Al-Shannaq M, Manasrah A et al (2019) A holy quran reader\/reciter identification system using support vector machine. Int J Mach Learn Comput 9(4):458\u2013464.","journal-title":"Int J Mach Learn Comput"},{"key":"9392_CR27","doi-asserted-by":"publisher","unstructured":"Shah SM, Ahsan SN (2014) Arabic speaker identification system using combination of DWT and LPC features. In:\u00a02014 International conference on open source systems and technologies. IEEE. (pp 176\u2013181). https:\/\/doi.org\/10.1109\/ICOSST.2014.7029340","DOI":"10.1109\/ICOSST.2014.7029340"},{"issue":"10","key":"9392_CR28","doi-asserted-by":"publisher","first-page":"2464","DOI":"10.1109\/78.157290","volume":"40","author":"MJ Shensa","year":"1992","unstructured":"Shensa MJ et al (1992) The discrete wavelet transform: wedding the a trous and mallat algorithms. IEEE Trans Signal Process 40(10):2464\u20132482. https:\/\/doi.org\/10.1109\/78.157290","journal-title":"IEEE Trans Signal Process"},{"issue":"3","key":"9392_CR29","first-page":"6","volume":"40","author":"SV Chapaneri","year":"2012","unstructured":"Chapaneri SV (2012) Spoken digits recognition using weighted MFCC and improved features for dynamic time warping. Int J Comput Appl 40(3):6\u201312.","journal-title":"Int J Comput Appl"},{"key":"9392_CR30","doi-asserted-by":"publisher","unstructured":"Han W, Chan CF, Choy CS, Pun KP (2006). An efficient MFCC extraction method in speech recognition. In:\u00a02006 IEEE international symposium on circuits and systems (ISCAS), IEEE.\u00a0(pp 4). https:\/\/doi.org\/10.1109\/ISCAS.2006.1692543","DOI":"10.1109\/ISCAS.2006.1692543"},{"key":"9392_CR31","doi-asserted-by":"publisher","first-page":"20547","DOI":"10.1007\/s11042-021-10753-y","volume":"80","author":"S Chakraborty","year":"2021","unstructured":"Chakraborty S, Mondal R, Singh PK et al (2021) Transfer learning with fine tuning for human action recognition from still images. Multimedia Tools Appl 80:20547\u201320578. https:\/\/doi.org\/10.1007\/s11042-021-10753-y","journal-title":"Multimedia Tools Appl"},{"key":"9392_CR32","doi-asserted-by":"publisher","unstructured":"Deng J, Dong W, Socher R et al (2009) Imagenet: a large-scale hierarchical image database. In: 2009 IEEE conference on computer vision and pattern recognition, IEEE, pp 248\u2013255. https:\/\/doi.org\/10.1109\/CVPR.2009.5206848","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"9392_CR33","doi-asserted-by":"publisher","unstructured":"Zoph B, Vasudevan V, Shlens J, Le QV (2018) Learning transferable architectures for scalable image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition\u00a0(pp 8697\u20138710). https:\/\/doi.org\/10.1109\/CVPR.2018.00907","DOI":"10.1109\/CVPR.2018.00907"},{"key":"9392_CR34","unstructured":"Tan M, Le Q (2019) Efficientnet: rethinking model scaling for convolutional neural networks. In: International conference on machine learning, PMLR, pp 6105\u20136114."},{"key":"9392_CR35","unstructured":"Tan M, Le Q (2021) Efficientnetv2: Smaller models and faster training. In: International conference on machine learning, PMLR, pp 10096\u201310106"},{"key":"9392_CR36","doi-asserted-by":"publisher","first-page":"196197","DOI":"10.1109\/ACCESS.2020.3034343","volume":"8","author":"G Vrban\u02c7ci\u02c7c","year":"2020","unstructured":"Vrban\u02c7ci\u02c7c G, Podgorelec V (2020) Transfer learning with adaptive fine-tuning. IEEE Access 8:196197\u2013196211. https:\/\/doi.org\/10.1109\/ACCESS.2020.3034343","journal-title":"IEEE Access"},{"key":"9392_CR37","doi-asserted-by":"publisher","unstructured":"Zoph B, Le QV (2016) Neural architecture search with reinforcement learning.\u00a0arXiv preprint arXiv:1611.01578. https:\/\/doi.org\/10.48550\/arXiv.1611.01578","DOI":"10.48550\/arXiv.1611.01578"},{"key":"9392_CR38","doi-asserted-by":"publisher","unstructured":"Albawi S, Mohammed TA, Al-Zawi S (2017) Understanding of a convolutional neural network. In:\u00a02017 International conference on engineering and technology (ICET)\u00a0(pp 1\u20136). IEEE. https:\/\/doi.org\/10.1109\/ICEngTechnol.2017.8308186","DOI":"10.1109\/ICEngTechnol.2017.8308186"},{"key":"9392_CR39","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1613\/jair.301","volume":"4","author":"LP Kaelbling","year":"1996","unstructured":"Kaelbling LP, Littman ML, Moore AW (1996) Reinforcement learning: a survey. J Artif Intell Res 4:237\u2013285. https:\/\/doi.org\/10.1613\/jair.301","journal-title":"J Artif Intell Res"},{"issue":"11","key":"9392_CR40","doi-asserted-by":"publisher","first-page":"1958","DOI":"10.1109\/TPAMI.2008.128","volume":"30","author":"A Torralba","year":"2008","unstructured":"Torralba A, Fergus R, Freeman WT (2008) 80 million tiny images: A large data set for nonparametric object and scene recognition. IEEE Trans Pattern Anal Mach Intell 30(11):1958\u20131970. https:\/\/doi.org\/10.1109\/TPAMI.2008.128","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"9392_CR41","doi-asserted-by":"publisher","unstructured":"Henderson P, Ferrari V (2017) End-to-end training of object class detectors for mean average precision. In:\u00a0Computer vision\u2013ACCV 2016: 13th Asian conference on computer vision, Taipei, Taiwan, November 20\u201324, 2016, Revised Selected Papers, Part V 13\u00a0(pp 198\u2013213). Springer International Publishing. https:\/\/doi.org\/10.48550\/arXiv.1607.03476","DOI":"10.48550\/arXiv.1607.03476"},{"key":"9392_CR42","doi-asserted-by":"publisher","unstructured":"Baheti B, Innani S, Gajre S, Talbar S (2020) Eff-unet: A novel architecture for semantic segmentation in unstructured environment. In:\u00a0Proceedings of the IEEE\/CVF conference on computer vision and pattern recognition workshops\u00a0(pp 358\u2013359). https:\/\/doi.org\/10.1109\/CVPRW50498.2020.00187","DOI":"10.1109\/CVPRW50498.2020.00187"},{"key":"9392_CR43","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/ACCESS.2021.3138920","volume":"10","author":"CK Sunil","year":"2021","unstructured":"Sunil CK, Jaidhar CD, Patil N (2021) Cardamom plant disease detection approach using EfficientNetV2. IEEE Access 10:789\u2013804. https:\/\/doi.org\/10.1109\/ACCESS.2021.3138920","journal-title":"IEEE Access"},{"issue":"4","key":"9392_CR44","doi-asserted-by":"publisher","first-page":"101","DOI":"10.5121\/sipij.2013.4408","volume":"4","author":"S Gupta","year":"2013","unstructured":"Gupta S, Jaafar J, Ahmad WW et al (2013) Feature extraction using mfcc. Signal Image Process Int J 4(4):101\u2013108. https:\/\/doi.org\/10.5121\/sipij.2013.4408","journal-title":"Signal Image Process Int J"},{"key":"9392_CR45","doi-asserted-by":"crossref","unstructured":"Briggs WL, Henson VE (1995) The DFT: an owner\u2019s manual for the discrete Fourier transform. Soc Ind Appl Math","DOI":"10.1137\/1.9781611971514"},{"key":"9392_CR46","unstructured":"Ioffe S, Szegedy C (2015) Batch normalization: accelerating deep network training by reducing internal covariate shift. In: International conference on machine learning, pp 448\u2013456. pmlr"},{"key":"9392_CR47","doi-asserted-by":"publisher","unstructured":"Agarap AF (2018) Deep learning using rectified linear units (relu).\u00a0arXiv preprint arXiv:1803.08375. https:\/\/doi.org\/10.48550\/arXiv.1803.08375","DOI":"10.48550\/arXiv.1803.08375"},{"issue":"3","key":"9392_CR48","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1145\/212094.212114","volume":"27","author":"T Dietterich","year":"1995","unstructured":"Dietterich T (1995) Overfitting and undercomputing in machine learning. ACM Comput Surv (CSUR) 27(3):326\u2013327","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"12","key":"9392_CR49","first-page":"310","volume":"6","author":"S Sharma","year":"2017","unstructured":"Sharma S, Sharma S, Athaiya A (2017) Activation functions in neural networks. Towards Data Sci 6(12):310\u2013316","journal-title":"Towards Data Sci"},{"key":"9392_CR50","doi-asserted-by":"publisher","unstructured":"Berrar D (2019) Cross-validation. Encyclopedia Bioin Comput Biol, pp 542\u2013545. https:\/\/doi.org\/10.1016\/B978-0-12-809633-8.20349-X","DOI":"10.1016\/B978-0-12-809633-8.20349-X"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09392-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-023-09392-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-023-09392-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,19]],"date-time":"2024-03-19T21:29:58Z","timestamp":1710883798000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-023-09392-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,5]]},"references-count":50,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["9392"],"URL":"https:\/\/doi.org\/10.1007\/s00521-023-09392-1","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,5]]},"assertion":[{"value":"26 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Authors declare that there is neither funding nor conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}