{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T15:47:09Z","timestamp":1762530429794,"version":"build-2065373602"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T00:00:00Z","timestamp":1759276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10489-025-06820-8","type":"journal-article","created":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T10:24:09Z","timestamp":1759919049000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A comprehensive approach to enhance fault prediction through code-comment analysis with CodeBERT"],"prefix":"10.1007","volume":"55","author":[{"given":"Monika","family":"Yadav","sequence":"first","affiliation":[]},{"given":"Lov","family":"Kumar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9921-0993","authenticated-orcid":false,"given":"Vishal","family":"Passricha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,8]]},"reference":[{"key":"6820_CR1","doi-asserted-by":"publisher","unstructured":"Suryn W (2013) Software quality engineering: a practitioner\u2019s approach, vol 9781118592. John Wiley & Sons.\u00a0https:\/\/doi.org\/10.1002\/9781118830208","DOI":"10.1002\/9781118830208"},{"key":"6820_CR2","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s10462-017-9563-5","volume":"51","author":"SS Rathore","year":"2019","unstructured":"Rathore SS, Kumar S (2019) A study on software fault prediction techniques. Artif Intell Rev 51:255\u2013327. https:\/\/doi.org\/10.1007\/s10462-017-9563-5","journal-title":"Artif Intell Rev"},{"issue":"4","key":"6820_CR3","doi-asserted-by":"publisher","first-page":"7346","DOI":"10.1016\/j.eswa.2008.10.027","volume":"36","author":"C Catal","year":"2009","unstructured":"Catal C, Diri B (2009) A systematic review of software fault prediction studies. Expert Syst Appl 36(4):7346\u20137354. https:\/\/doi.org\/10.1016\/j.eswa.2008.10.027","journal-title":"Expert Syst Appl"},{"issue":"8","key":"6820_CR4","doi-asserted-by":"publisher","first-page":"1040","DOI":"10.1016\/j.ins.2008.12.001","volume":"179","author":"C Catal","year":"2009","unstructured":"Catal C, Diri B (2009) Investigating the effect of dataset size, metrics sets, and feature selection techniques on software fault prediction problem. Inf Sci 179(8):1040\u20131058. https:\/\/doi.org\/10.1016\/j.ins.2008.12.001","journal-title":"Inf Sci"},{"key":"6820_CR5","doi-asserted-by":"publisher","unstructured":"Malhotra R, Raje R (2014) An empirical comparison of machine learning techniques for software defect prediction. In: Proceedings of the 8th international conference on bioinspired information and communications technologies, pp 320\u2013327.\u00a0https:\/\/doi.org\/10.4108\/icst.bict.2014.257871","DOI":"10.4108\/icst.bict.2014.257871"},{"key":"6820_CR6","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10586-018-1730-1","volume":"22","author":"R Jayanthi","year":"2019","unstructured":"Jayanthi R, Florence L (2019) Software defect prediction techniques using metrics based on neural network classifier. Clust Comput 22:77\u201388. https:\/\/doi.org\/10.1007\/s10586-018-1730-1","journal-title":"Clust Comput"},{"key":"6820_CR7","doi-asserted-by":"publisher","unstructured":"Santhosh S, Khatter K, Relan D (2023) Software fault prediction using particle swarm optimization and random forest. In: Proceedings of international conference on data science and applications: ICDSA 2022, vol 1. Springer, pp 843\u2013851.\u00a0https:\/\/doi.org\/10.1007\/978-981-19-6631-6_58","DOI":"10.1007\/978-981-19-6631-6_58"},{"issue":"5","key":"6820_CR8","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TSMC.2016.2521840","volume":"47","author":"P Singh","year":"2016","unstructured":"Singh P, Pal NR, Verma S, Vyas OP (2016) Fuzzy rule-based approach for software fault prediction. IEEE Trans Syst Man Cybern Syst 47(5):826\u2013837. https:\/\/doi.org\/10.1109\/TSMC.2016.2521840","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"key":"6820_CR9","doi-asserted-by":"publisher","first-page":"7417","DOI":"10.1007\/s00500-016-2284-x","volume":"21","author":"SS Rathore","year":"2017","unstructured":"Rathore SS, Kumar S (2017) An empirical study of some software fault prediction techniques for the number of faults prediction. Soft Comput 21:7417\u20137434.\u00a0https:\/\/doi.org\/10.1007\/s00500-016-2284-x","journal-title":"Soft Comput"},{"issue":"7","key":"6820_CR10","first-page":"199","volume":"8","author":"M Park","year":"2014","unstructured":"Park M, Hong E (2014) Software fault prediction model using clustering algorithms determining the number of clusters automatically. Int J Softw Eng Appl 8(7):199\u2013204","journal-title":"Int J Softw Eng Appl"},{"key":"6820_CR11","doi-asserted-by":"publisher","unstructured":"Grishma B, Anjali C (2015) Software root cause prediction using clustering techniques: a review. In 2015 Global conference on communication technologies (GCCT), IEEE, pp 511\u2013515.\u00a0https:\/\/doi.org\/10.1109\/GCCT.2015.7342714","DOI":"10.1109\/GCCT.2015.7342714"},{"key":"6820_CR12","doi-asserted-by":"publisher","unstructured":"Singh M, Salaria DS (2013) Software defect prediction tool based on neural network. Int J Comput Appl 70(22).\u00a0https:\/\/doi.org\/10.5120\/12200-8368","DOI":"10.5120\/12200-8368"},{"issue":"1","key":"6820_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2853073.2853083","volume":"41","author":"SS Rathore","year":"2016","unstructured":"Rathore SS, Kumar S (2016) A decision tree regression-based approach for the number of software faults prediction. ACM SIGSOFT Softw Eng Notes 41(1):1\u20136.\u00a0https:\/\/doi.org\/10.1145\/2853073.2853083","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"key":"6820_CR14","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/j.jss.2017.03.044","volume":"128","author":"AS Nu\u00f1ez-Varela","year":"2017","unstructured":"Nu\u00f1ez-Varela AS, P\u00e9rez-Gonzalez HG, Mart\u00ednez-Perez FE, Soubervielle-Montalvo C (2017) Source code metrics: a systematic mapping study. J Syst Softw 128:164\u2013197.\u00a0https:\/\/doi.org\/10.1016\/j.jss.2017.03.044","journal-title":"J Syst Softw"},{"key":"6820_CR15","doi-asserted-by":"publisher","unstructured":"Feng Z, Guo D, Tang D, Duan N, Feng X, Gong M, Shou L, Qin B, Liu T, Jiang D et al (2020) CodeBERT: a pre-trained model for programming and natural languages.\u00a0In: Findings of the Associa\u00adtion for Computational Linguistics: EMNLP 2020. Association for Computational Linguistics, pp 1536\u20131547. Online https:\/\/doi.org\/10.18653\/v1\/2020.findings-emnlp.139","DOI":"10.18653\/v1\/2020.findings-emnlp.139"},{"issue":"6","key":"6820_CR16","doi-asserted-by":"publisher","first-page":"757","DOI":"10.17706\/jsw.10.6.757-766","volume":"10","author":"E Erturk","year":"2015","unstructured":"Erturk E, Sezer EA (2015) Software fault inference based on expert opinion. J Softw 10(6):757\u2013766.\u00a0https:\/\/doi.org\/10.17706\/jsw.10.6.757-766","journal-title":"J Softw"},{"key":"6820_CR17","unstructured":"Murillo-Morera J, Quesada-L\u00f3pez C, Jenkins M (2015) Software fault prediction: a systematic mapping study. CIbSE, 446"},{"issue":"6","key":"6820_CR18","doi-asserted-by":"publisher","first-page":"1276","DOI":"10.1109\/TSE.2011.103","volume":"38","author":"T Hall","year":"2011","unstructured":"Hall T, Beecham S, Bowes D, Gray D, Counsell S (2011) A systematic literature review on fault prediction performance in software engineering.\u00a0In: IEEE Transactions on software engineering, vol 38. IEEE, pp 1276\u20131304.\u00a0https:\/\/doi.org\/10.1109\/TSE.2011.103","journal-title":"IEEE Trans Softw Eng"},{"key":"6820_CR19","doi-asserted-by":"publisher","unstructured":"Ostrand TJ, Weyuker EJ (2010) Software fault prediction tool. In: Proceedings of the 19th international symposium on software testing and analysis, pp 275\u2013278.\u00a0https:\/\/doi.org\/10.1145\/1831708.1831743","DOI":"10.1145\/1831708.1831743"},{"key":"6820_CR20","unstructured":"Guo D, Ren S, Lu S, Feng Z, Tang D, Liu S, Zhou L, Duan N, Svyatkovskiy A, Fu S et al (2020) Graphcodebert: pre-training code representations with data flow. arXiv preprint arXiv:2009.08366"},{"key":"6820_CR21","unstructured":"Ishtiaq AA, Hasan M, Haque MMA, Mehrab KS, Muttaqueen T, Hasan T, Iqbal A, Shahriyar R (2021) Bert2code: can pre-trained language models be leveraged for code search? arXiv preprint arXiv:2104.08017"},{"key":"6820_CR22","doi-asserted-by":"publisher","unstructured":"Tan SH, Marinov D, Tan L, Leavens GT (2012) @tcomment: testing javadoc comments to detect comment-code inconsistencies. In: 2012 IEEE 5th international conference on software testing, verification and validation. IEEE, pp 260\u2013269.\u00a0https:\/\/doi.org\/10.1109\/ICST.2012.106","DOI":"10.1109\/ICST.2012.106"},{"key":"6820_CR23","doi-asserted-by":"publisher","unstructured":"Liu Z, Chen H, Chen X, Luo X, Zhou F (2018) Automatic detection of outdated comments during code changes. In: 2018 IEEE 42nd annual computer software and applications conference (COMPSAC), vol 1. IEEE, pp 154\u2013163.\u00a0https:\/\/doi.org\/10.1109\/COMPSAC.2018.00028","DOI":"10.1109\/COMPSAC.2018.00028"},{"issue":"16","key":"6820_CR24","doi-asserted-by":"publisher","first-page":"7877","DOI":"10.1007\/s00500-022-06830-5","volume":"26","author":"MN Uddin","year":"2022","unstructured":"Uddin MN, Li B, Ali Z, Kefalas P, Khan I, Zada I (2022) Software defect prediction employing bilstm and bert-based semantic feature. Soft Comput 26(16):7877\u20137891.\u00a0https:\/\/doi.org\/10.1007\/s00500-022-06830-5","journal-title":"Soft Comput"},{"key":"6820_CR25","unstructured":"Steiner T, Zhang R (2022) Code comment inconsistency detection with bert and longformer. arXiv preprint arXiv:2207.14444"},{"key":"6820_CR26","doi-asserted-by":"publisher","unstructured":"Huo X, Yang Y, Li M, Zhan DC (2018) Learning semantic features for software defect prediction by code comments embedding. In: 2018 IEEE international conference on data mining (ICDM). pp 1049\u20131054.\u00a0https:\/\/doi.org\/10.1109\/ICDM.2018.00133","DOI":"10.1109\/ICDM.2018.00133"},{"key":"6820_CR27","doi-asserted-by":"publisher","unstructured":"Kang H., Bissyand\u00e9 TF, Lo D (2019) Assessing the generalizability of code2vec token embeddings. In: 2019 34th IEEE\/ACM international conference on automated software engineering (ASE). IEEE, pp 1\u201312.\u00a0https:\/\/doi.org\/10.1109\/ASE.2019.00011","DOI":"10.1109\/ASE.2019.00011"},{"key":"6820_CR28","unstructured":"Karampatsis RM, Sutton C (2020) Scelmo: Source code embeddings from language models. arXiv preprint arXiv:2004.13214"},{"key":"6820_CR29","doi-asserted-by":"publisher","unstructured":"Pour M.V, Li Z, Ma L, Hemmati H (2021) A search-based testing framework for deep neural networks of source code embedding. In: 2021 14th IEEE conference on software testing, verification and validation (ICST). IEEE, pp 36\u201346.\u00a0https:\/\/doi.org\/10.1109\/ICST49551.2021.00016","DOI":"10.1109\/ICST49551.2021.00016"},{"key":"6820_CR30","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.asoc.2015.04.045","volume":"33","author":"\u00d6F Arar","year":"2015","unstructured":"Arar \u00d6F, Ayan K (2015) Software defect prediction using cost-sensitive neural network. Appl Soft Comput 33:263\u2013277.\u00a0https:\/\/doi.org\/10.1016\/j.asoc.2015.04.045","journal-title":"Appl Soft Comput"},{"key":"6820_CR31","doi-asserted-by":"publisher","first-page":"1020","DOI":"10.1016\/j.asoc.2016.08.025","volume":"49","author":"E Erturk","year":"2016","unstructured":"Erturk E, Sezer EA (2016) Iterative software fault prediction with a hybrid approach. Appl Soft Comput 49:1020\u20131033. https:\/\/doi.org\/10.1016\/j.asoc.2016.08.025","journal-title":"Appl Soft Comput"},{"key":"6820_CR32","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s00500-016-2316-6","volume":"21","author":"R Chinna Gounder Dhanajayan","year":"2017","unstructured":"Chinna Gounder Dhanajayan R, Appavu Pillai S (2017) Slmbc: spiral life cycle model-based bayesian classification technique for efficient software fault prediction and classification. Soft Comput 21:403\u2013415.\u00a0https:\/\/doi.org\/10.1007\/s00500-016-2316-6","journal-title":"Soft Comput"},{"key":"6820_CR33","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.eswa.2018.12.033","volume":"122","author":"H Turabieh","year":"2019","unstructured":"Turabieh H, Mafarja M, Li X (2019) Iterated feature selection algorithms with layered recurrent neural network for software fault prediction. Expert Syst Appl 122:27\u201342.\u00a0https:\/\/doi.org\/10.1016\/j.eswa.2018.12.033","journal-title":"Expert Syst Appl"},{"key":"6820_CR34","doi-asserted-by":"publisher","unstructured":"Elahi E, Kanwal S, Asif AN (2020) A new ensemble approach for software fault prediction. In: 2020 17th international bhurban conference on applied sciences and technology (IBCAST). IEEE, pp 407\u2013412.\u00a0https:\/\/doi.org\/10.1109\/IBCAST47879.2020.9044596","DOI":"10.1109\/IBCAST47879.2020.9044596"},{"key":"6820_CR35","doi-asserted-by":"publisher","first-page":"98754","DOI":"10.1109\/ACCESS.2021.3095559","volume":"9","author":"F Matloob","year":"2021","unstructured":"Matloob F, Ghazal TM, Taleb N, Aftab S, Ahmad M, Khan MA, Abbas S, Soomro TR (2021) Software defect prediction using ensemble learning: a systematic literature review. In: IEEE Access, vol 9. IEEE, pp 98754\u201398771.\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2021.3095559","journal-title":"IEEE Access"},{"key":"6820_CR36","doi-asserted-by":"publisher","first-page":"10402","DOI":"10.1109\/ACCESS.2022.3144598","volume":"10","author":"L \u0160iki\u0107","year":"2022","unstructured":"\u0160iki\u0107 L, Kurdija AS, Vladimir K, \u0160ili\u0107 M (2022) Graph neural network for source code defect prediction. In: IEEE Access, vol 10. IEEE, pp 10402\u201310415.\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2022.3144598","journal-title":"IEEE Access"},{"issue":"6","key":"6820_CR37","doi-asserted-by":"publisher","first-page":"3365","DOI":"10.1016\/j.jksuci.2021.01.015","volume":"34","author":"S Kassaymeh","year":"2022","unstructured":"Kassaymeh S, Abdullah S, Al-Betar MA, Alweshah M (2022) Salp swarm optimizer for modeling the software fault prediction problem. J King Saud Univ-Comp Inf Sci 34(6):3365\u20133378.\u00a0https:\/\/doi.org\/10.1016\/j.jksuci.2021.01.015","journal-title":"J King Saud Univ-Comp Inf Sci"},{"issue":"4","key":"6820_CR38","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1016\/j.jer.2023.10.038","volume":"11","author":"X Dong","year":"2023","unstructured":"Dong X, Liang Y, Miyamoto S, Yamaguchi S (2023) Ensemble learning based software defect prediction. J Eng Res 11(4):377\u2013391.\u00a0https:\/\/doi.org\/10.1016\/j.jer.2023.10.038","journal-title":"J Eng Res"},{"issue":"3","key":"6820_CR39","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.3390\/app13031639","volume":"13","author":"E Borandag","year":"2023","unstructured":"Borandag E (2023) Software fault prediction using an rnn-based deep learning approach and ensemble machine learning techniques. Appl Sci 13(3):1639. https:\/\/doi.org\/10.3390\/app13031639","journal-title":"Appl Sci"},{"key":"6820_CR40","doi-asserted-by":"publisher","first-page":"2959582","DOI":"10.1155\/2024\/2959582","volume":"1","author":"HS Alsorory","year":"2024","unstructured":"Alsorory HS (2024) Alshraideh M (2024) Boosting software fault prediction: addressing class imbalance with enhanced ensemble learning. Appl Comput Intell Soft Comput 1:2959582.\u00a0https:\/\/doi.org\/10.1155\/2024\/2959582","journal-title":"Appl Comput Intell Soft Comput"},{"key":"6820_CR41","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.7717\/peerj-cs.2270","volume":"10","author":"MM Jouybari","year":"2024","unstructured":"Jouybari MM, Tajary A, Fateh M, Abolghasemi V (2024) A novel deep neural network structure for software fault prediction. PeerJ Comput Sci 10:2270.\u00a0https:\/\/doi.org\/10.7717\/peerj-cs.2270","journal-title":"PeerJ Comput Sci"},{"issue":"2","key":"6820_CR42","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/s10515-024-00467-4","volume":"31","author":"S Kaliraj","year":"2024","unstructured":"Kaliraj S, Sahasranth VGP, Sivakumar V (2024) A holistic approach to software fault prediction with dynamic classification. Autom Softw Eng 31(2):70.\u00a0https:\/\/doi.org\/10.1007\/s10515-024-00467-4","journal-title":"Autom Softw Eng"},{"key":"6820_CR43","doi-asserted-by":"publisher","first-page":"22582","DOI":"10.1109\/ACCESS.2024.3362896","volume":"12","author":"S Sahar","year":"2024","unstructured":"Sahar S, Younas M, Khan MM, Sarwar MU (2024) Dp-ccl: a supervised contrastive learning approach using codebert model in software defect prediction.\u00a0In: IEEE Access, vol 12. IEEE, pp 22582\u201322594.\u00a0https:\/\/doi.org\/10.1109\/ACCESS.2024.3362896","journal-title":"IEEE Access"},{"issue":"11","key":"6820_CR44","doi-asserted-by":"publisher","first-page":"4793","DOI":"10.3390\/app11114793","volume":"11","author":"C Pan","year":"2021","unstructured":"Pan C, Lu M, Xu B (2021) An empirical study on software defect prediction using codebert model. Appl Sci 11(11):4793.\u00a0https:\/\/doi.org\/10.3390\/app11114793","journal-title":"Appl Sci"},{"issue":"2","key":"6820_CR45","doi-asserted-by":"publisher","first-page":"28","DOI":"10.21608\/ijicis.2023.189934.1251","volume":"23","author":"AM Ibrahim","year":"2023","unstructured":"Ibrahim AM, Abdelsalam H, Taj-Eddin IA (2023) Software defects prediction at method level using ensemble learning techniques. Int J Intell Comput Inf Sci 23(2):28\u201349.\u00a0https:\/\/doi.org\/10.21608\/ijicis.2023.189934.1251","journal-title":"Int J Intell Comput Inf Sci"},{"key":"6820_CR46","doi-asserted-by":"publisher","unstructured":"Samantaray R, Das H (2023) Performance analysis of machine learning algorithms using bagging ensemble technique for software fault prediction. In: 2023 6th international conference on information systems and computer networks (ISCON). IEEE, pp 1\u20137.\u00a0https:\/\/doi.org\/10.1109\/ISCON57294.2023.10111952","DOI":"10.1109\/ISCON57294.2023.10111952"},{"issue":"1","key":"6820_CR47","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.jksuci.2016.04.002","volume":"30","author":"A Kaur","year":"2018","unstructured":"Kaur A, Kaur I (2018) An empirical evaluation of classification algorithms for fault prediction in open source projects. J King Saud Univ-Comput Inf Sci 30(1):2\u201317. https:\/\/doi.org\/10.1016\/j.jksuci.2016.04.002","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"6820_CR48","doi-asserted-by":"publisher","unstructured":"Rathi SC, Misra S, Colomo-Palacios R, Adarsh R, Neti LBM, Kumar L (2023) Empirical evaluation of the performance of data sampling and feature selection techniques for software fault prediction. Expert Syst Appl 223. https:\/\/doi.org\/10.1016\/j.eswa.2023.119806","DOI":"10.1016\/j.eswa.2023.119806"},{"key":"6820_CR49","doi-asserted-by":"publisher","unstructured":"Wagner S (2006) A literature survey of the quality economics of defect-detection techniques. In: Proceedings of the 2006 ACM\/IEEE international symposium on empirical software engineering. pp 194\u2013203.\u00a0https:\/\/doi.org\/10.1145\/1159733.1159763","DOI":"10.1145\/1159733.1159763"},{"key":"6820_CR50","unstructured":"Jones C (201) Software quality in 2012: a survey of the state of the art. Nancook Analytics LLC (May 2012). http:\/\/sqgne.org\/presentations\/2012-13\/Jones-Sep-2012. pdf"},{"issue":"12","key":"6820_CR51","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1109\/TSE.1992.1263033","volume":"18","author":"N Wilde","year":"1992","unstructured":"Wilde N, Huitt R (1992) Maintenance support for object-oriented programs.\u00a0In: IEEE Transactions on software engineering, vol 18. IEEE, pp 1038\u20131044.\u00a0https:\/\/doi.org\/10.1109\/TSE.1992.1263033","journal-title":"IEEE Trans Softw Eng"},{"key":"6820_CR52","doi-asserted-by":"publisher","unstructured":"Hosmer\u00a0Jr DW, Lemeshow S, Sturdivant R (2013)\u00a0Applied logistic regression. John Wiley & Sons.\u00a0https:\/\/doi.org\/10.1002\/9781118548387","DOI":"10.1002\/9781118548387"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06820-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-025-06820-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-025-06820-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T15:41:53Z","timestamp":1762530113000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-025-06820-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10]]},"references-count":52,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["6820"],"URL":"https:\/\/doi.org\/10.1007\/s10489-025-06820-8","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2025,10]]},"assertion":[{"value":"25 July 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 October 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Ethical and informed consent for data use involves ensuring that participants fully know how their data will be collected, used, and shared.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The source is available at the link given below, and access will be provided on request:","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}],"article-number":"1010"}}