{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T07:10:46Z","timestamp":1750749046447,"version":"3.28.0"},"reference-count":109,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T00:00:00Z","timestamp":1715731200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1007\/s10515-024-00443-y","type":"journal-article","created":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T15:01:42Z","timestamp":1715785302000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A systematic review of refactoring opportunities by software antipattern detection"],"prefix":"10.1007","volume":"31","author":[{"given":"Somayeh","family":"Kalhor","sequence":"first","affiliation":[]},{"given":"Mohammad Reza","family":"Keyvanpour","sequence":"additional","affiliation":[]},{"given":"Afshin","family":"Salajegheh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,5,15]]},"reference":[{"issue":"6","key":"443_CR1","first-page":"299","volume":"8","author":"M Abebe","year":"2014","unstructured":"Abebe, M., Yoo, C.J.: Trends, opportunities and challenges of software refactoring: a systematic literature review. Int. J. Softw. Eng. Its Appl. 8(6), 299\u2013318 (2014)","journal-title":"Int. J. Softw. Eng. Its Appl."},{"key":"443_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10664-023-10312-z","volume":"28","author":"A Alazba","year":"2023","unstructured":"Alazba, A., Aljamaan, H., Alshayeb, M.: Deep learning approaches for bad smell detection: a systematic literature review. Empir. Softw. Eng. 28, 77 (2023). https:\/\/doi.org\/10.1007\/s10664-023-10312-z","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"443_CR3","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1049\/iet-sen.2010.0070","volume":"5","author":"A Alkhalid","year":"2011","unstructured":"Alkhalid, A., Alshayeb, M., Mahmoud, S.A.: Software refactoring at the package level using clustering techniques. IET Softw. 5(3), 276\u2013284 (2011). https:\/\/doi.org\/10.1049\/iet-sen.2010.0070","journal-title":"IET Softw."},{"key":"443_CR4","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1007\/s11219-018-9424-8","volume":"27","author":"K Alkharabsheh","year":"2019","unstructured":"Alkharabsheh, K., Crespo, Y., Manso, E., Taboada, J.A.: Software design smell detection: a systematic mapping study. Softw. Qual. J. 27, 1069\u20131148 (2019). https:\/\/doi.org\/10.1007\/s11219-018-9424-8","journal-title":"Softw. Qual. J."},{"key":"443_CR5","unstructured":"Alon, U., Brody, S., Levy, O., Yahav, E.: code2seq: generating sequences from structured representations of code. In: Proceedings of the Seventh International Conference on Learning Representations (ICLR 2019). arXiv:1808.01400 (2018)"},{"key":"443_CR6","doi-asserted-by":"crossref","unstructured":"Alon, U., Zilberstein, M., Levy, O., Yahav, E.: code2vec: learning distributed representations of code. In: Proceedings of the Symposium on Principles of Programming Languages,Lisbon, Portugal, pp. 1\u201329. arXiv: 1803.09473 (2019)","DOI":"10.1145\/3290353"},{"key":"443_CR7","doi-asserted-by":"publisher","unstructured":"Azadi, U., Fontana, F.A., Taibi, D.: Architectural smells detected by tools: a catalogue proposal. In: Proceedings of the International Conference on Technical Debt. IEEE. https:\/\/doi.org\/10.1109\/TechDebt.2019.00027 (2019)","DOI":"10.1109\/TechDebt.2019.00027"},{"key":"443_CR8","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1016\/j.infsof.2018.12.009","volume":"108","author":"ML Azeem","year":"2019","unstructured":"Azeem, M.L., Palomba, F., Shi, L., Wang, Q.: Machine learning techniques for code smell detection: a systematic literature review and meta-analysis. Inf. Softw. Technol. 108, 115\u2013138 (2019). https:\/\/doi.org\/10.1016\/j.infsof.2018.12.009","journal-title":"Inf. Softw. Technol."},{"issue":"3","key":"443_CR9","doi-asserted-by":"publisher","first-page":"2255","DOI":"10.1002\/smr.2255","volume":"32","author":"B Bafandeh Mayvan","year":"2020","unstructured":"Bafandeh Mayvan, B., Rasoolzadegan, A., Javan Jafari, A.: Bad smell detection using quality metrics and refactoring opportunities. J. Softw. Evol. Process Wiley Online 32(3), 2255 (2020). https:\/\/doi.org\/10.1002\/smr.2255","journal-title":"J. Softw. Evol. Process Wiley Online"},{"key":"443_CR10","doi-asserted-by":"crossref","unstructured":"Baker, B.S.: On finding duplication and near-duplication in large software systems. In: Proceedings of the 2nd Working Conference on Reverse Engineering, pp. 86\u201395. IEEE, Toronto, Ontario, Canada (1995)","DOI":"10.1109\/WCRE.1995.514697"},{"issue":"1","key":"443_CR11","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/32.979986","volume":"28","author":"J Bansiya","year":"2002","unstructured":"Bansiya, J., Davis, C.G.: A hierarchical model for object-oriented design quality assessment. IEEE Trans. Softw. Eng. 28(1), 4\u201317 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"443_CR12","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.infsof.2019.08.005","volume":"115","author":"MAS Bigonha","year":"2019","unstructured":"Bigonha, M.A.S., Ferreira, K., Souza, P., Sousa, B., Janu\u00e1rio, M., Lima, D.: The usefulness of software metric thresholds for detection of bad smells and fault prediction. Inf. Softw. Technol. 115, 79\u201392 (2019). https:\/\/doi.org\/10.1016\/j.infsof.2019.08.005","journal-title":"Inf. Softw. Technol."},{"key":"443_CR13","doi-asserted-by":"publisher","first-page":"114076","DOI":"10.1016\/j.eswa.2020.114076","volume":"166","author":"S Boutaib","year":"2021","unstructured":"Boutaib, S., Bechikh, S., Palomba, F., Elarbi, M., Makhlouf, M., Ben Said, L.: Code smell detection and identification in imbalanced environments. Expert Syst. Appl. 166, 114076 (2021). https:\/\/doi.org\/10.1016\/j.eswa.2020.114076","journal-title":"Expert Syst. Appl."},{"key":"443_CR14","doi-asserted-by":"publisher","unstructured":"Brdar, I., Vlajkov, J., Slivka, J., Grujic, K.G., Kovacevic, A.: Semi-supervised detection of long method and god class code smells. In: 2022 IEEE 20th Jubilee International Symposium on Intelligent Systems and Informatics (SISY), pp. 403\u2013408 (2022). https:\/\/doi.org\/10.1109\/SISY56759.2022.10036248","DOI":"10.1109\/SISY56759.2022.10036248"},{"key":"443_CR15","unstructured":"Brownlee, J.: Immunos 81-the misunderstood artificial immune system. Swinburne University of Technology, technical report 3-01 (2005)"},{"key":"443_CR16","doi-asserted-by":"crossref","unstructured":"Cai, Y., Kazman, R.: Software architecture health monitor. In: Proceedings of the 1st International Workshop on Bringing Architectural Design Thinking into Developers\u2019 Daily Activities, pp. 18\u201321. ACM, New York, USA (2016)","DOI":"10.1145\/2896935.2896940"},{"key":"443_CR17","doi-asserted-by":"crossref","unstructured":"Cai, Y., Wang, H., Wong, S., Wang, L.: Leveraging design rules to improve software architecture recovery. In: Proceedings of the 9th International ACM SIGSOFT Conference on Quality of Software Architectures (2013)","DOI":"10.1145\/2465478.2465480"},{"key":"443_CR18","doi-asserted-by":"crossref","unstructured":"Catal, C., Diri, B.: Software fault prediction with object-oriented metrics based artificial immune recognition system. In: Proceedings of the 8th International Conference on Product-Focused Software Process Improvement (PROFES \u20197), pp. 300\u2013314. Springer, Berlin (2007)","DOI":"10.1007\/978-3-540-73460-4_27"},{"key":"443_CR19","doi-asserted-by":"crossref","unstructured":"Ch\u00e1vez, A., Ferreira, I., Fernandes, E., Cedrim, D., Garcia, A.: How does refactoring affect internal quality attributes?: A multi-project study. In: Proceedings of the 31st Brazilian Symposium on Software Engineering, pp. 74\u201383. ACM (2017)","DOI":"10.1145\/3131151.3131171"},{"key":"443_CR20","doi-asserted-by":"crossref","unstructured":"Chidamber, S.R., Kemerer, C.F.: Towards a metrics suite for object-oriented design. In: Proceedings of the 6th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA\u201991), Phoenix, Arizona, USA, pp. 197\u2013211 (1991)","DOI":"10.1145\/117954.117970"},{"key":"443_CR21","doi-asserted-by":"crossref","unstructured":"Ciupke, O.: Automatic detection of design problems in object-oriented reengineering. In: Proceedings of Technology of Object-Oriented Languages and Systems-TOOLS 30, pp. 18\u201332. IEEE Computer Society Press, Santa Barbara, CA, USA (1999)","DOI":"10.1109\/TOOLS.1999.787532"},{"issue":"5","key":"443_CR22","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/TSE.2010.83","volume":"37","author":"I Crnkovic","year":"2011","unstructured":"Crnkovic, I., Sentilles, S., Vulgarakis, A., Chaudron, M.R.V.: A classification framework for software component models. IEEE Trans. Softw. Eng. 37(5), 593\u2013615 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"443_CR23","doi-asserted-by":"crossref","unstructured":"Cruz, D., Santana, A., Figueiredo, E.: Detecting bad smells with machine learning algorithms: an empirical study. In: Proceedings of the 3rd International Conference on Technical Debt (TechDebt \u201920), pp. 31\u201340 (2020)","DOI":"10.1145\/3387906.3388618"},{"issue":"4","key":"443_CR24","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1007\/s10270-013-0341-9","volume":"13","author":"M Detten","year":"2014","unstructured":"Detten, M., Platenius-Moher, M.C., Becker, S.: Reengineering component-based software systems with archimetrix. Softw. Syst. Model. 13(4), 1239\u20131268 (2014). https:\/\/doi.org\/10.1007\/s10270-013-0341-9","journal-title":"Softw. Syst. Model."},{"key":"443_CR25","doi-asserted-by":"publisher","first-page":"162869","DOI":"10.1109\/ACCESS.2021.3133810","volume":"9","author":"S Dewangan","year":"2021","unstructured":"Dewangan, S., Rao, R.S., Mishra, A., Gupta, M.: A novel approach for code smell detection: an empirical study. IEEE Access 9, 162869\u2013162883 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3133810","journal-title":"IEEE Access"},{"key":"443_CR26","doi-asserted-by":"crossref","unstructured":"Dhambri, K., Sahraoui, H.A., Poulin, P.: Visual detection of design anomalies. In: Proceedings of the 12th European Conference on Software Maintenance and Reengineering, Athens, Greece, pp. 279\u2013283 (2008)","DOI":"10.1109\/CSMR.2008.4493326"},{"key":"443_CR27","doi-asserted-by":"crossref","unstructured":"D\u00edaz-Pace, J.A., Tommasel, A., Godoy, D.: Towards anticipation of architectural smells using link prediction techniques. In: Proceedings of the 18th International Working Conference on Source Code Analysis and Manipulation, pp. 62\u201371. IEEE (2018)","DOI":"10.1109\/SCAM.2018.00015"},{"key":"443_CR28","doi-asserted-by":"crossref","unstructured":"Ducasse, S., Rieger, M., Demeyer, S.: A language-independent approach for detecting duplicated code. In: Proceedings of the IEEE International Conference on Software Maintenance, Software Maintenance for Business Change\u2019 (Cat. No.99CB36360), Oxford, England, pp. 109\u2013118 (1999)","DOI":"10.1109\/ICSM.1999.792593"},{"key":"443_CR29","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-1-84800-044-5_11","volume-title":"Guide to Advanced Empirical Software Engineering","author":"S Easterbrook","year":"2008","unstructured":"Easterbrook, S., Singer, J., Storey, M.A., Damian, D.: Selecting empirical methods for software engineering research. In: Shull, F., Singer, J., Sj\u00f8berg, D.I.K. (eds.) Guide to Advanced Empirical Software Engineering, vol. 94, pp. 285\u2013311. Springer, London (2008)"},{"key":"443_CR30","doi-asserted-by":"crossref","unstructured":"Erni, K., Lewerentz, C.: Applying design metrics to object-oriented frameworks. In: Proceedings of the 3rd International Software Metrics Symposium, pp. 64\u201374. IEEE Computer Society Press, Berlin, Germany (1996)","DOI":"10.1109\/METRIC.1996.492444"},{"key":"443_CR31","volume-title":"Refactoring-Improving the Design of Existing Code","author":"M Fowler","year":"1999","unstructured":"Fowler, M., Beck, K., Brant, J., Opdyke, W., Roberts, D.: Refactoring-Improving the Design of Existing Code. Addison-Wesley, Westford, MA (1999)"},{"key":"443_CR32","doi-asserted-by":"crossref","unstructured":"Gaffney, J.E.: Metrics in software quality assurance. In: Proceedings of the ACM \u201981 Conference, New York , pp. 126\u2013130 (1981)","DOI":"10.1145\/800175.809854"},{"key":"443_CR33","volume-title":"Design Patterns: Elements of Reusable Object-Oriented Software","author":"E Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, F., Vlissides, J.: Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley Professional, New York (1994)"},{"key":"443_CR34","doi-asserted-by":"crossref","unstructured":"Garcia, J., Daniel, P., Edwards, G., Medvidovic, N.: Toward a catalogue of architectural bad smells. In: Proceedings of 5th International Conference on the Quality of Software Architectures: Architectures for Adaptive Software Systems, pp. 146\u2013162. Springer (2009)","DOI":"10.1007\/978-3-642-02351-4_10"},{"key":"443_CR35","first-page":"1","volume-title":"Duplication, Redundancy, and Similarity in Software","author":"S Giesecke","year":"2007","unstructured":"Giesecke, S.: Generic modelling of code clones. In: Koschke, R., Merlo, E., Walenstein, A. (eds.) Duplication, Redundancy, and Similarity in Software, vol. 6301, pp. 1\u201323. Schloss Dagstuhl, Dagstuhl (2007)"},{"key":"443_CR36","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning","author":"DE Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Longman Publishing Co, New York (1989)"},{"key":"443_CR37","doi-asserted-by":"publisher","unstructured":"Goldstein, M., Segall, I.: Automatic and continuous software architecture validation. In: Proceedings of the 37th IEEE International Conference on Software Engineering, vol. 2, pp. 59\u201368. IEEE. https:\/\/doi.org\/10.1109\/ICSE.2015.135(2015)","DOI":"10.1109\/ICSE.2015.135"},{"key":"443_CR38","doi-asserted-by":"crossref","unstructured":"Griffith, I., Wahl, S., Izurieta, C.: Evolution of legacy system comprehensibility through automated refactoring. In: Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering (MALETS \u201911), pp. 35\u201342 (2011)","DOI":"10.1145\/2070821.2070826"},{"key":"443_CR39","doi-asserted-by":"publisher","unstructured":"Gupta, A., Suri, B., Misra, S.: A systematic literature review: code bad smells in java source code. In: Proceedings of the 17th Computational Science and Its Applications (ICCSA 2017), Trieste, Italy (2017). https:\/\/doi.org\/10.1007\/978-3-319-62404-4-49","DOI":"10.1007\/978-3-319-62404-4-49"},{"key":"443_CR40","doi-asserted-by":"crossref","unstructured":"Hadj-Kacem, M., Bouassida, N.: Towards a taxonomy of bad smells detection approaches. In: Proceedings of the 13th International Conference on Software Technologies (ICSOFT), pp. 164\u2013175 (2018)","DOI":"10.5220\/0006869201640175"},{"key":"443_CR41","volume-title":"Elements of Software Science","author":"MH Halstead","year":"1977","unstructured":"Halstead, M.H.: Elements of Software Science. Elsevier Science, Amsterdam (1977)"},{"issue":"6","key":"443_CR42","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/32.689404","volume":"24","author":"R Harrison","year":"1998","unstructured":"Harrison, R., Counsell, S.J., Nithi, R.V.: An evaluation of the mood set of object-oriented software metricse. IEEE Trans. Softw. Eng. 24(6), 491\u2013496 (1998). https:\/\/doi.org\/10.1109\/32.689404","journal-title":"IEEE Trans. Softw. Eng."},{"key":"443_CR43","doi-asserted-by":"crossref","unstructured":"Hassaine, S., Khomh, F., Gu\u00e9h\u00e9neuc, Y.-G., Hame, S.: IDS: an immune-inspired approach for the detection of software design smells. In: Proceedings of the 7th International Conference on the Quality of Information and Communications Technology (QUATIC), Porto, Portugal, pp. 343\u2013348 (2010)","DOI":"10.1109\/QUATIC.2010.61"},{"key":"443_CR44","doi-asserted-by":"crossref","unstructured":"Hemati\u00a0Moghadam, I., \u00d3\u00a0Cinn\u00e9ide, M.: Code-Imp: a tool for automated search-based refactoring. In: Proceedings of the 4th Workshop on Refactoring Tools (WRT \u201911), pp. 41\u201344 (2011)","DOI":"10.1145\/1984732.1984742"},{"key":"443_CR45","doi-asserted-by":"crossref","unstructured":"H\u00fcbener, T., Chaudron, M.R.V., Luo, Y., Vallen, P., Kogel, J., Liefheid, T.: Automatic anti-pattern detection in microservice architectures based on distributed tracing. In: Proceedings of the IEEE\/ACM 44th International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), Pittsburgh, PA, USA, pp. 75\u201376 (2022)","DOI":"10.1145\/3510457.3513066"},{"key":"443_CR46","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1017\/CBO9780511921803.004","volume-title":"Evaluating Learning Algorithms: A Classification Perspective","author":"N Japkowicz","year":"2011","unstructured":"Japkowicz, N., Shah, M.: Performance measures I. In: El Naqa, I., et al. (eds.) Evaluating Learning Algorithms: A Classification Perspective, vol. 2, pp. 74\u2013109. Cambridge University Press, New York (2011)"},{"key":"443_CR47","doi-asserted-by":"publisher","first-page":"2973250","DOI":"10.1155\/2023\/2973250","volume":"2023","author":"D Juliet Thessalonica","year":"2023","unstructured":"Juliet Thessalonica, D., Khanna Nehemiah, H., Sreejith, S., Kannan, A.: Intelligent mining of association rules based on nanopatterns for code smells detection. Hindawi Sci. Program. 2023, 2973250 (2023). https:\/\/doi.org\/10.1155\/2023\/2973250","journal-title":"Hindawi Sci. Program."},{"key":"443_CR48","doi-asserted-by":"crossref","unstructured":"Kalhor, S., Keyvanpour, M.R., Salajegheh, A.: Experimental evaluation and comparison of anti-pattern detection tools by the gold standard. In: Proceedings of the 12th International Conference on Computer and Knowledge Engineering (ICCKE 2022), Ferdowsi University of Mashhad, Mashhad, Iran (2022)","DOI":"10.1109\/ICCKE57176.2022.9960137"},{"key":"443_CR49","unstructured":"Kanade, A., Maniatis, P., Balakrishnan, G., Shi, K.: Learning and evaluating contextual embedding of source code. In: Proceedings of the 37th International Conference on Machine Learning, Vienna, Austria, pp. 5110\u20135121 (2020)"},{"issue":"6","key":"443_CR50","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1007\/s10664-008-9076-6","volume":"13","author":"CJ Kasper","year":"2008","unstructured":"Kasper, C.J., Godfrey, M.W.: Cloning considered harmful: considered harmful patterns of cloning in software. Empir. Softw. Eng. 13(6), 645\u2013692 (2008)","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"443_CR51","doi-asserted-by":"publisher","first-page":"290","DOI":"10.2174\/2352096513999200922125839","volume":"14","author":"A Kaur","year":"2020","unstructured":"Kaur, A., Jain, S., Goel, S., Dhiman, G.: A review on machine-learning based code smell detection techniques in object-oriented software system(s). Recent Adv. Electr. Electron. Eng. 14(3), 290\u2013303 (2020). https:\/\/doi.org\/10.2174\/2352096513999200922125839","journal-title":"Recent Adv. Electr. Electron. Eng."},{"key":"443_CR52","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.infsof.2017.03.009","volume":"88","author":"S Kebir","year":"2017","unstructured":"Kebir, S., Borne, I., Meslati, D.: A genetic algorithm-based approach for automated refactoring of component-based software. Inf. Softw. Technol. 88, 17\u201336 (2017). https:\/\/doi.org\/10.1016\/j.infsof.2017.03.009","journal-title":"Inf. Softw. Technol."},{"key":"443_CR53","doi-asserted-by":"crossref","unstructured":"Kessentini, M., Vaucher, S., Sahraoui, H.: Deviance from perfection is a better criterion than closeness to evil when identifying risky code. In: Proceedings of the 25th IEEE\/ACM International Conference on Automated Software Engineering (ASE), Antwerp, Belgium, pp. 113\u2013122 (2010)","DOI":"10.1145\/1858996.1859015"},{"key":"443_CR54","doi-asserted-by":"crossref","unstructured":"Kessentini, M., Kessentini, W., Sahraoui, H., Boukadoum, M., Ouni, A.: Design defects detection and correction by example. In: Proceedings of the 19th International Conference on Program Comprehension (ICPC), Kingston, Canada, pp. 81\u201390 (2011)","DOI":"10.1109\/ICPC.2011.22"},{"key":"443_CR55","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/s11219-012-9187-6","volume":"21","author":"M Kessentini","year":"2013","unstructured":"Kessentini, M., Mahaouachi, R., Ghedira, K.: What you like in design use to correct bad-smells. Softw. Qual. J. 21, 551\u2013571 (2013). https:\/\/doi.org\/10.1007\/s11219-012-9187-6","journal-title":"Softw. Qual. J."},{"key":"443_CR56","doi-asserted-by":"crossref","unstructured":"Khomh, F., Vaucher, S., Gu\u00e9h\u00e9neuc, Y.-G., Sahraoui, H.: A Bayesian approach for the detection of code and design smells. In: Proceedings of the Ninth International Conference on Quality Software, Jeju, Korea (South), pp. 305\u2013314 (2009)","DOI":"10.1109\/QSIC.2009.47"},{"key":"443_CR57","unstructured":"Kitchenham, B.: Procedures for performing systematic reviews. Keele University. Ttechnical report tr\/se-0401, Department of Computer Science, Keele University, UK (2004)"},{"key":"443_CR58","doi-asserted-by":"crossref","unstructured":"Koru, A.G., Liu, H.: An investigation of the effect of module size on defect prediction using static measures. In: Proceedings of the Workshop on Predictor Models in Software Engineering, St. Louis, Missouri, pp. 1\u20135 (2005)","DOI":"10.1145\/1083165.1083172"},{"issue":"2","key":"443_CR59","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1023\/B:SQJO.0000024058.90885.6a","volume":"12","author":"S Kothari","year":"2004","unstructured":"Kothari, S., Bishop, L., Sauceda, J., Daugherty, G.: A pattern-based framework for software anomaly detection. Softw. Qual. Control 12(2), 99\u2013120 (2004)","journal-title":"Softw. Qual. Control"},{"issue":"C","key":"443_CR60","doi-asserted-by":"publisher","first-page":"117607","DOI":"10.1016\/j.eswa.2022.117607","volume":"204","author":"A Kovacevic","year":"2022","unstructured":"Kovacevic, A., Slivka, J., Vidakovic, D., Grujic, K.G., Luburic, N., Proki\u0107, S., Sladic, G.: Automatic detection of long method and god class code smells through neural source code embeddings. Expert Syst. Appl. 204(C), 117607 (2022). https:\/\/doi.org\/10.1016\/j.eswa.2022.117607","journal-title":"Expert Syst. Appl."},{"key":"443_CR61","doi-asserted-by":"publisher","first-page":"110610","DOI":"10.1016\/j.jss.2020.110610","volume":"167","author":"G Lacerda","year":"2020","unstructured":"Lacerda, G., Petrillo, F., Pimenta, M., Gu\u00e9h\u00e9neuc, Y.G.: Code smells and refactoring: a tertiary systematic review of challenges and observations. J. Syst. Softw. 167, 110610 (2020)","journal-title":"J. Syst. Softw."},{"key":"443_CR62","doi-asserted-by":"publisher","unstructured":"Le, D.M., Link, D., Shahbazian, A., Medvidovic, N.: An empirical study of architectural decay in open-source software. In: Proceedings of the IEEE International Conference on Software Architecture (ICSA), Seattle, WA, USA, pp. 176\u2013185. https:\/\/doi.org\/10.1109\/ICSA.2018.00027 (2018)","DOI":"10.1109\/ICSA.2018.00027"},{"issue":"5","key":"443_CR63","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1002\/spe.1031","volume":"41","author":"S Lee","year":"2011","unstructured":"Lee, S., Bae, G., Chae, H.S., Bae, D.H., Kwon, Y.R.: Automated scheduling for clone-based refactoring using a component GA. Softw. Pract. Exp. 41(5), 521\u2013550 (2011). https:\/\/doi.org\/10.1002\/spe.1031","journal-title":"Softw. Pract. Exp."},{"key":"443_CR64","first-page":"237","volume-title":"Advances in Machine Learning Application in Software Engineering","author":"Y Ma","year":"2006","unstructured":"Ma, Y., Guo, L., Cukic, B.: A statistical framework for the prediction of fault-proneness. In: Zhang, D., Tsai, J. (eds.) Advances in Machine Learning Application in Software Engineering, vol. 94, pp. 237\u2013265. Idea Group Inc, Hershey (2006)"},{"key":"443_CR65","doi-asserted-by":"crossref","unstructured":"Macia, I., Garcia, A., Chavez, C., Staa, A.: Enhancing the detection of code anomalies with architecture-sensitive strategies. In: Proceedings of 17th European Conference on Software Maintenance and Reengineering (CSMR), pp. 177\u2013186. IEEE (2013)","DOI":"10.1109\/CSMR.2013.27"},{"key":"443_CR66","doi-asserted-by":"publisher","first-page":"107112","DOI":"10.1016\/j.infsof.2022.107112","volume":"155","author":"L Madeyski","year":"2023","unstructured":"Madeyski, L., Lewowski, T.: Detecting code smells using industry-relevant data. Inf. Softw. Technol. 155, 107112 (2023). https:\/\/doi.org\/10.1016\/j.infsof.2022.107112","journal-title":"Inf. Softw. Technol."},{"key":"443_CR67","volume-title":"Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis","author":"RC Malveau","year":"1998","unstructured":"Malveau, R.C., Brown, W.J., MCCormick, H.W., Mowbray, T.J.: Anti Patterns: Refactoring Software, Architectures, and Projects in Crisis. Wiley, New York (1998)"},{"key":"443_CR68","doi-asserted-by":"crossref","unstructured":"Marinescu, R.: Detection strategies: metrics-based rules for detecting design flaws. In: Proceedings of the 20th IEEE International Conference on Software Maintenance, Chicago, Illinois, USA, pp. 350\u2013359 (2004)","DOI":"10.1109\/ICSM.2004.1357820"},{"issue":"4","key":"443_CR69","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TSE.1976.233837","volume":"SE-2","author":"TJ McCabe","year":"1976","unstructured":"McCabe, T.J.: A complexity measure. IEEE Trans. Softw. Eng. SE-2(4), 308\u2013320 (1976). https:\/\/doi.org\/10.1109\/TSE.1976.233837","journal-title":"IEEE Trans. Softw. Eng."},{"key":"443_CR70","doi-asserted-by":"crossref","unstructured":"Menshawy, R.S., Yousef, A.H., Salem, A.: Code smells and detection techniques: a survey. In: Proceedings of the International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC), pp. 78\u201383 (2021)","DOI":"10.1109\/MIUCC52538.2021.9447669"},{"issue":"1","key":"443_CR71","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"33","author":"T Menzies","year":"2007","unstructured":"Menzies, T., Greenwald, J., Frank, A.: Data mining static code attributes to learn defect predictors. IEEE Trans. Softw. Eng. 33(1), 2\u201313 (2007). https:\/\/doi.org\/10.1109\/TSE.2007.256941","journal-title":"IEEE Trans. Softw. Eng."},{"key":"443_CR72","volume-title":"Design Patterns in Java","author":"SJ Metsker","year":"2006","unstructured":"Metsker, S.J., Wake, W.C.: Design Patterns in Java. Addison-Wesley, New York (2006)"},{"issue":"6","key":"443_CR73","doi-asserted-by":"publisher","first-page":"1428","DOI":"10.1007\/s11390-020-0323-7","volume":"35","author":"MY Mhawish","year":"2020","unstructured":"Mhawish, M.Y., Gupta, M.: Predicting code smells and analysis of predictions: using machine learning techniques and software metrics. J. Comput. Sci. Technol. 35(6), 1428\u20131445 (2020). https:\/\/doi.org\/10.1007\/s11390-020-0323-7","journal-title":"J. Comput. Sci. Technol."},{"issue":"3","key":"443_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2729974","volume":"24","author":"W Mkaouer","year":"2015","unstructured":"Mkaouer, W., Kessentini, M., Shaout, A., Kontchou, P., Bechikh, S., Deb, K., Ouni, A.: Many-objective software remodularization using NSGA-III. ACM Trans. Softw. Eng. Methodol. 24(3), 1\u201345 (2015). https:\/\/doi.org\/10.1145\/2729974","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"443_CR75","doi-asserted-by":"publisher","unstructured":"Mo, R., Cai, Y., Kazman, R., Xiao, L.: Hotspot patterns: the formal definition and automatic detection of architecture smells. In: Proceedings of the 12th Working IEEE\/IFIP Conference on Software Architecture, pp. 51\u201360. IEEE. https:\/\/doi.org\/10.1109\/WICSA.2015.12 (2015)","DOI":"10.1109\/WICSA.2015.12"},{"issue":"5","key":"443_CR76","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/TSE.2019.2910856","volume":"47","author":"R Mo","year":"2019","unstructured":"Mo, R., Cai, Y., Kazman, R., Xiao, L., Feng, Q.: Architecture antipatterns: automatically detectable violations of design principles. IEEE Trans. Softw. Eng. 47(5), 1008\u20131028 (2019)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"443_CR77","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TSE.2009.50","volume":"36","author":"N Moha","year":"2010","unstructured":"Moha, N., Gu\u00e9h\u00e9neuc, Y.-G., Duchien, L., Le Meur, A.-F.: Decor: a method for the specification and detection of code and design smells. IEEE Trans. Softw. Eng. 36(1), 20\u201336 (2010). https:\/\/doi.org\/10.1109\/TSE.2009.50","journal-title":"IEEE Trans. Softw. Eng."},{"key":"443_CR78","doi-asserted-by":"publisher","first-page":"110885","DOI":"10.1016\/j.jss.2020.110885","volume":"173","author":"H Mumtaz","year":"2021","unstructured":"Mumtaz, H., Singh, P., Blincoe, K.: A systematic mapping study on architectural smells detection. J. Syst. Softw. 173, 110885 (2021). https:\/\/doi.org\/10.1016\/j.jss.2020.110885","journal-title":"J. Syst. Softw."},{"key":"443_CR79","doi-asserted-by":"crossref","unstructured":"Munro, M.J.: Product metrics for automatic identification of \u201cbad smell\u201d design problems in java source-code. In: Proceedings of the 11th IEEE International Software Metrics Symposium (METRICS\u201905), Como, Italy, pp. 15\u201315 (2005)","DOI":"10.1109\/METRICS.2005.38"},{"key":"443_CR80","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE69.026113","author":"MEJ Newman","year":"2004","unstructured":"Newman, M.E.J., Girvan, M.: Finding and evaluating community structure in networks. Phys. Rev. E (2004). https:\/\/doi.org\/10.1103\/PhysRevE69.026113","journal-title":"Phys. Rev. E"},{"key":"443_CR81","doi-asserted-by":"crossref","unstructured":"\u00d3\u00a0Cinn\u00e9ide, M., Yamashita, A., Counsell, S.: Measuring refactoring benefits: a survey of the evidence. In: Proceedings of the 1st International Workshop on Software Refactoring, pp. 9\u201312. ACM, Chicago (2016)","DOI":"10.1145\/2975945.2975948"},{"key":"443_CR82","doi-asserted-by":"publisher","unstructured":"Oizumi, W.N., Garcia, A.F., Colanzi, T.E., Ferreira, M., Staa, A.V.: When code-anomaly agglomerations represent architectural problems? An exploratory study. In: Proceedings of the Brazilian Symposium on Software Engineering, pp. 91\u2013100. IEEE. https:\/\/doi.org\/10.1109\/SBES.2014.18 (2014)","DOI":"10.1109\/SBES.2014.18"},{"issue":"1","key":"443_CR83","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1186\/s40411-015-0025-y","volume":"3","author":"WN Oizumi","year":"2015","unstructured":"Oizumi, W.N., Garcia, A.F., Colanzi, T.E., Ferreira, M., Staa, A.V.: On the relationship of code-anomaly agglomerations and architectural problems. J. Softw. Eng. Res. Dev. 3(1), 11 (2015). https:\/\/doi.org\/10.1186\/s40411-015-0025-y","journal-title":"J. Softw. Eng. Res. Dev."},{"issue":"1","key":"443_CR84","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10515-011-0098-8","volume":"20","author":"A Ouni","year":"2012","unstructured":"Ouni, A., Kessentini, M., Sahraoui, H., Boukadoum, M.: Maintainability defects detection and correction: a multi-objective approach. J. Autom. Softw. Eng. 20(1), 47\u201379 (2012). https:\/\/doi.org\/10.1007\/s10515-011-0098-8","journal-title":"J. Autom. Softw. Eng."},{"key":"443_CR85","first-page":"103","volume-title":"Advances in computers","author":"A Ouni","year":"2014","unstructured":"Ouni, A., Kessentini, M., Sahraoui, H.: Chapter four\u2014multiobjective optimization for software refactoring and evolution. In: Hurson, A. (ed.) Advances in computers, vol. 94, pp. 103\u2013167. Elsevier, Amsterdam (2014)"},{"key":"443_CR86","first-page":"1","volume":"47","author":"EV Paulo Sobrinho","year":"2018","unstructured":"Paulo Sobrinho, E.V., De Lucia, A., Almeida Maia, M.: A systematic literature review on bad smells 5w\u2019s: which, when, what, who, where. IEEE Trans. Softw. Eng. 47, 1\u20131 (2018)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"7","key":"443_CR87","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1016\/j.infsof.2013.01.008","volume":"55","author":"D Rattan","year":"2013","unstructured":"Rattan, D., Bhatia, R., Singh, M.: Software clone detection: a systematic review. Inf. Softw. Technol. 55(7), 1165\u20131199 (2013). https:\/\/doi.org\/10.1016\/j.infsof.2013.01.008","journal-title":"Inf. Softw. Technol."},{"key":"443_CR88","doi-asserted-by":"crossref","unstructured":"Razani, Z., Keyvanpour, M.R.: SBSR solution evaluation: methods and challenges classification. In: Proceedings of the 5th Conference on Knowledge Based Engineering and Innovation (KBEI), Tehran, Iran, pp. 181\u2013188 (2019)","DOI":"10.1109\/KBEI.2019.8734937"},{"key":"443_CR89","volume-title":"Object-Oriented Design Heuristics","author":"AJ Riel","year":"1996","unstructured":"Riel, A.J.: Object-Oriented Design Heuristics. Addison-Wesley, New York (1996)"},{"key":"443_CR90","doi-asserted-by":"crossref","unstructured":"Rysselberghe, F.V., Demeyer, S.: Evaluating clone detection techniques from a refactoring perspective. In: Proceedings of the19th International Conference on Automated Software Engineering, Linz, Austria, 2004, pp. 336\u2013339 (2004)","DOI":"10.1109\/ASE.2004.1342759"},{"key":"443_CR91","doi-asserted-by":"crossref","unstructured":"Salehie, M., Li, S., L., T.: A metric-based heuristic framework to detect object-oriented design flaws. In: Proceedings of the 14th IEEE International Conference on Program Comprehension (ICPC\u201906), Athens, Greece, pp. 159\u2013168 (2006)","DOI":"10.1109\/ICPC.2006.6"},{"key":"443_CR92","doi-asserted-by":"crossref","unstructured":"Shafiei, N., Keyvanpour, M.R.: Challenges classification in search-based refactoring. In: Proceedings of the 6th International Conference on Web Research (ICWR), Tehran, Iran, pp. 106\u2013112 (2020)","DOI":"10.1109\/ICWR49608.2020.9122271"},{"key":"443_CR93","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.jss.2017.12.034","volume":"138","author":"T Sharma","year":"2018","unstructured":"Sharma, T., Spinellis, D.: A survey on software smells. J. Syst. Softw. 138, 158\u2013173 (2018)","journal-title":"J. Syst. Softw."},{"issue":"4","key":"443_CR94","first-page":"127","volume":"5","author":"R Shatnawi","year":"2011","unstructured":"Shatnawi, R., Li, W.: An empirical assessment of refactoring impact on software quality using a hierarchical quality model. Int. J. Softw. Eng. Its Appl. 5(4), 127\u2013149 (2011)","journal-title":"Int. J. Softw. Eng. Its Appl."},{"key":"443_CR95","doi-asserted-by":"crossref","unstructured":"Shimomura, T., Ikeda, K., Takahashi, M.: An approach to GA-driven automatic refactoring based on design patterns. In: Proceedings of the Fifth International Conference on Software Engineering Advances, Nice, France, pp. 213\u2013218 (2010)","DOI":"10.1109\/ICSEA.2010.39"},{"key":"443_CR96","volume-title":"The Art of Prolog","author":"L Sterling","year":"1986","unstructured":"Sterling, L., Shapiro, E.: The Art of Prolog. MIT Press, Cambridge, MA (1986)"},{"issue":"6, Part A","key":"443_CR97","doi-asserted-by":"publisher","first-page":"2621","DOI":"10.1016\/j.jksuci.2022.03.028","volume":"34","author":"A Tareq Imam","year":"2022","unstructured":"Tareq Imam, A., Al-Srour, B.R., Alhroob, A.: The automation of the detection of large class bad smell by using genetic algorithm and deep learning. J. King Saud Univ. Comput. Inf. Sci. 34(6, Part A), 2621\u20132636 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.03.028","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"443_CR98","unstructured":"Terra, R., Brunet, J., Miranda, L., Valente, M.T., Serey, D., Castilho, D., Bigonha, R.: Measuring the structural similarity between source code entities. In: Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering (SEKE), pp. 753\u2013758 (2013)"},{"key":"443_CR99","doi-asserted-by":"crossref","unstructured":"Tommasel, A.: Applying social network analysis techniques to architectural smell prediction. In: Proceedings of the International Conference on Software Architecture Companion, pp. 254\u2013261. IEEE (2019)","DOI":"10.1109\/ICSA-C.2019.00053"},{"key":"443_CR100","doi-asserted-by":"crossref","unstructured":"Travassos, G.H., Shull, F., Fredericks, M., Basili, V.R.: Detecting defects in object-oriented designs: using reading techniques to increase software quality. In: Proceedings of the 14th Conference on Object-Oriented Programming, Systems, Languages, and Applications. ACM Press, Denver, USA, pp. 47\u201356 (1999)","DOI":"10.1145\/320384.320389"},{"key":"443_CR101","doi-asserted-by":"crossref","unstructured":"Vale, G., Figueiredo, E., Abilio, R., Costa, H.: Bad smells in software product lines: a systematic review. In: Proceedings of the Eighth Brazilian Symposium on Software Components, Architectures and Reuse, pp. 84\u201394. IEEE Computer Society Press, Maceio, Brazil (2014)","DOI":"10.1109\/SBCARS.2014.21"},{"key":"443_CR102","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jss.2015.09.019","volume":"111","author":"T Vale","year":"2016","unstructured":"Vale, T., Crnkovic, I., Almeida, E.S., Da Mota Silveira Neto, P.A., Cavalcanti, Y.C., Lemos Meira, S.R.: Twenty-eight years of component-based software engineering. J. Syst. Softw. 111, 128\u2013148 (2016). https:\/\/doi.org\/10.1016\/j.jss.2015.09.019","journal-title":"J. Syst. Softw."},{"issue":"3","key":"443_CR103","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/s10515-014-0175-x","volume":"23","author":"SA Vidal","year":"2016","unstructured":"Vidal, S.A., Marcos, C., Diaz-Pace, J.A.: An approach to prioritize code smells for refactoring. Autom. Softw. Eng. 23(3), 501\u2013532 (2016). https:\/\/doi.org\/10.1007\/s10515-014-0175-x","journal-title":"Autom. Softw. Eng."},{"key":"443_CR104","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.scico.2019.07.003","volume":"182","author":"S Vidal","year":"2019","unstructured":"Vidal, S., Oizumi, W., Garcia, A., Pace, A.D., Marcos, C.: Ranking architecturally critical agglomerations of code smells. Sci. Comput. Program. 182, 64\u201385 (2019)","journal-title":"Sci. Comput. Program."},{"key":"443_CR105","doi-asserted-by":"crossref","unstructured":"Vimaladevi, M., Zayaraz, G.: Stability aware software refactoring using hybrid search-based techniques. In: Proceedings of International Conference on Technical Advancements in Computers and Communications (ICTACC), pp. 32\u201335. IEEE (2017)","DOI":"10.1109\/ICTACC.2017.18"},{"key":"443_CR106","doi-asserted-by":"publisher","unstructured":"Wohlin, C.: Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, Citeseer, Article No.: 38, pp. 1\u201310. https:\/\/doi.org\/10.1145\/2601248.2601268(2014)","DOI":"10.1145\/2601248.2601268"},{"key":"443_CR107","doi-asserted-by":"crossref","unstructured":"Xiao, L., Cai, Y., Kazman, R., Mo, R., Feng, Q.: Identifying and quantifying architectural debt. In: Proceedings of the 38th IEEE\/ACM International Conference on Software Engineering, pp. 488\u2013498. ACM (2016)","DOI":"10.1145\/2884781.2884822"},{"key":"443_CR108","doi-asserted-by":"crossref","unstructured":"Zanetti, M.S., Tessone, C.J., Scholtes, I., Schweitzer, F.: Automated software remodularization based on move refactoring: a complex systems approach. In: Proceedings of the 13th International Conference on Modularity (MODULARITY \u201914), pp. 73\u201384 (2014)","DOI":"10.1145\/2577080.2577097"},{"issue":"3","key":"443_CR109","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1002\/smr.521","volume":"23","author":"M Zhang","year":"2011","unstructured":"Zhang, M., Hall, T., Baddoo, N.: Code bad smells: a review of current knowledge. J. Softw. Maint. Eval. 23(3), 179\u2013202 (2011)","journal-title":"J. Softw. Maint. Eval."}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-024-00443-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-024-00443-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-024-00443-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T02:55:43Z","timestamp":1731984943000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-024-00443-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,15]]},"references-count":109,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["443"],"URL":"https:\/\/doi.org\/10.1007\/s10515-024-00443-y","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"type":"print","value":"0928-8910"},{"type":"electronic","value":"1573-7535"}],"subject":[],"published":{"date-parts":[[2024,5,15]]},"assertion":[{"value":"28 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"42"}}