{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:26:09Z","timestamp":1772119569890,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T00:00:00Z","timestamp":1647561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T00:00:00Z","timestamp":1647561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s10586-022-03574-7","type":"journal-article","created":{"date-parts":[[2022,3,18]],"date-time":"2022-03-18T07:09:43Z","timestamp":1647587383000},"page":"3459-3480","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Chromosomes identification based differential evolution (CIDE): a new bio-inspired variant for network intrusion detection"],"prefix":"10.1007","volume":"25","author":[{"given":"Md.","family":"Nayer","sequence":"first","affiliation":[]},{"given":"Subhash Chandra","family":"Pandey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,18]]},"reference":[{"key":"3574_CR1","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/j.swevo.2018.02.014","volume":"42","author":"H Fang","year":"2018","unstructured":"Fang, H., Zhou, A., Zhang, H.: Information fusion in offspring generation: a case study in DE and EDA. Swarm Evol. Comput. 42, 99\u2013108 (2018)","journal-title":"Swarm Evol. Comput."},{"key":"3574_CR2","doi-asserted-by":"crossref","first-page":"107250","DOI":"10.1016\/j.cie.2021.107250","volume":"157","author":"L Abualigah","year":"2021","unstructured":"Abualigah, L., Yousri, D., Elaziz, M.A., Ewees, A.A., Al-qaness, M.A.A., Gandomi, A.H.: Aquila optimizer: a novel meta-heuristic optimization algorithm. Comput. Ind. Eng. 157, 107250 (2021)","journal-title":"Comput. Ind. Eng."},{"key":"3574_CR3","volume-title":"The Origin of Species by Means of Natural Selection","author":"C Darwin","year":"2001","unstructured":"Darwin, C.: The Origin of Species by Means of Natural Selection. Adamant media Corp., Tampa (2001)"},{"key":"3574_CR4","volume-title":"Evolutionary computation: a unified approach","author":"K De Jong","year":"2006","unstructured":"De Jong, K.: Evolutionary computation: a unified approach. MIT Press, Cambridge (2006)"},{"key":"3574_CR5","volume-title":"Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering","author":"L Abualigah","year":"2018","unstructured":"Abualigah, L.: Feature Selection and Enhanced Krill Herd Algorithm for Text Document Clustering. Springer, Cham (2018)"},{"issue":"3","key":"3574_CR6","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1023\/A:1007626913721","volume":"38","author":"DR Wilson","year":"2000","unstructured":"Wilson, D.R., Martinez, T.R.: Reduction techniques for instance-based learning algorithms. Mach. Learn. 38(3), 257\u2013286 (2000)","journal-title":"Mach. Learn."},{"issue":"5","key":"3574_CR7","doi-asserted-by":"crossref","first-page":"1498","DOI":"10.1016\/j.patcog.2006.10.018","volume":"40","author":"HA Fayed","year":"2007","unstructured":"Fayed, H.A., Hashem, S.R., Atiya, A.F.: Self-generating prototypes for pattern classification. Pattern Recogn. 40(5), 1498\u20131509 (2007)","journal-title":"Pattern Recogn."},{"issue":"1","key":"3574_CR8","first-page":"37","volume":"6","author":"DW Aha","year":"1991","unstructured":"Aha, D.W., Kibler, D., Albert, M.K.: Instance-based learning algorithms. Mach. Learn. 6(1), 37\u201366 (1991)","journal-title":"Mach. Learn."},{"key":"3574_CR9","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.jocs.2013.11.005","volume":"5","author":"SC Pandey","year":"2014","unstructured":"Pandey, S.C., Nandi, G.C.: TSD based framework for mining the induction rules. J. Comput. Sci. 5, 184\u2013195 (2014)","journal-title":"J. Comput. Sci."},{"issue":"8","key":"3574_CR10","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/TPAMI.2002.1023804","volume":"14","author":"W Lam","year":"2002","unstructured":"Lam, W., Keung, C.K., Liu, D.: Discovering useful concept prototypes for classification based on filtering and abstraction. IEEE Trans. Pattern Anal. Mach. Intell. 14(8), 1075\u20131090 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"4\u20136","key":"3574_CR11","first-page":"1092","volume":"72","author":"L Nannin","year":"2008","unstructured":"Nannin, L., Lumini, A.: Particle swarm optimization for prototype reduction. Neurocomputing 72(4\u20136), 1092\u20131097 (2008)","journal-title":"Neurocomputing"},{"issue":"5","key":"3574_CR12","doi-asserted-by":"crossref","first-page":"1082","DOI":"10.1109\/TSMCB.2008.2011816","volume":"39","author":"A Cervantes","year":"2009","unstructured":"Cervantes, A., Galvan, I.M., Isasi, P.: AMPSO: a new particle swarm method for nearest neighbourhood classification. IEEE Trans. Syst. Man Cybern. Part B Cybern. 39(5), 1082\u20131091 (2009)","journal-title":"IEEE Trans. Syst. Man Cybern. Part B Cybern."},{"key":"3574_CR13","volume-title":"Differential Evolution\u2014A Simple and Efficient Adaptive Scheme for Global Optimization Over Continuous Spaces","author":"R Storn","year":"1995","unstructured":"Storn, R., Price, K.: Differential Evolution\u2014A Simple and Efficient Adaptive Scheme for Global Optimization Over Continuous Spaces. Tech. Rep.TR-95-012, Berkeley (1995)"},{"key":"3574_CR14","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1023\/A:1008202821328","volume":"11","author":"R Storn","year":"1997","unstructured":"Storn, R., Price, K.: Differential evolution\u2014a simple and efficient heuristic for global optimization over continuous spaces. J. Global Optim. 11, 341\u2013359 (1997)","journal-title":"J. Global Optim."},{"key":"3574_CR15","unstructured":"Liu, J., Lampinen, J.: On setting the control parameter of the differential evolution method. In: Proceedings of the Eighth International Conference on Soft Computing (MENDEL2002), pp. 11\u201318 (2002)"},{"key":"3574_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.swevo.2016.01.004","volume":"27","author":"S Das","year":"2016","unstructured":"Das, S., Mullick, S.S., Suganthan, P.N.: Recent advances in differential evolution\u2014an updated survey. Swarm Evol Comput. 27, 1\u201330 (2016)","journal-title":"Swarm Evol Comput."},{"key":"3574_CR17","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1109\/TEVC.2008.927706","volume":"13","author":"AK Qin","year":"2009","unstructured":"Qin, A.K., Huang, V.L., Suganthan, P.N.: Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Trans. Evol. Comput. 13, 398\u2013417 (2009)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"1","key":"3574_CR18","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/TEVC.2007.894200","volume":"12","author":"S Rahnamayan","year":"2008","unstructured":"Rahnamayan, S., Tizhoosh, H.R., Salama, M.M.A.: Opposition based differential evolution. IEEE Trans. Evol. Comput. 12(1), 64\u201379 (2008)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"3574_CR19","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1109\/CEC.2005.1554725","volume-title":"Proceedings of IEEE Congress on Evolutionary Computation (CEC-2005)","author":"J Ronkkonen","year":"2005","unstructured":"Ronkkonen, J., Kukkonen, J.S., Price, K.V.: Real parameter optimization with differential evolution. In: Proceedings of IEEE Congress on Evolutionary Computation (CEC-2005), pp. 506\u2013513. IEEE Press, Piscataway (2005)"},{"key":"3574_CR20","doi-asserted-by":"crossref","first-page":"646","DOI":"10.1109\/TEVC.2006.872133","volume":"10","author":"J Brest","year":"2006","unstructured":"Brest, J., Greiner, S., Boskovic, B., Mernik, M., Zumor, V.: Self-adapting control parameter in differential evolution: a comparative study on numerical benchmark problems. IEEE Trans. Evol. Comput. 10, 646\u2013657 (2006)","journal-title":"IEEE Trans. Evol. Comput."},{"key":"3574_CR21","first-page":"1","volume":"2018","author":"B Mao","year":"2018","unstructured":"Mao, B., Xie, Z., Wang, Y., Handroos, H.: A hybrid strategy of differential evolution and modified particle swarm optimization for the numerical solution of a parallel manipulator, mathematical problems in engineering. Math. Prob. Eng. 2018, 1\u20139 (2018)","journal-title":"Math. Prob. Eng."},{"key":"3574_CR22","first-page":"322","volume":"10","author":"Denver study group","year":"1960","unstructured":"Denver study group: A proposed standard system of nomenclature of human mitotic chromosomes. Acta Gery 10, 322\u2013328 (1960)","journal-title":"Acta Gery"},{"key":"3574_CR23","unstructured":"Murphy, P.M., Aha, D. W.: UCI repository of machine learning databases, http:\/\/www.ics.uci.edu\/~learn\/MLRepository.html (for information contact ml-repository@ics.uci.edu) (1995)"},{"issue":"2","key":"3574_CR24","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/4235.918435","volume":"15","author":"F Herrera","year":"2001","unstructured":"Herrera, F., Lozano, M.: Adaptive genetic operators based on coevolution with fuzzy behaviors. IEEE Trans. Evol. Comput. 15(2), 149\u2013165 (2001)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"10","key":"3574_CR25","doi-asserted-by":"crossref","first-page":"1703","DOI":"10.1016\/S0305-0548(03)00116-3","volume":"31","author":"MM Alc","year":"2004","unstructured":"Alc, M.M., Torn, A.: Population set based global optimization algorithms: some modifications and numerical studies. Comput. Oper. Res. 31(10), 1703\u20131725 (2004)","journal-title":"Comput. Oper. Res."},{"issue":"5","key":"3574_CR26","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/TEVC.2004.831258","volume":"8","author":"Z Tu","year":"2004","unstructured":"Tu, Z., Lu, Y.: A robust stochastic genetic algorithm (StGa) for global numerical optimization. IEEE Trans. Evol. Comput. 8(5), 456\u2013470 (2004)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"6","key":"3574_CR27","doi-asserted-by":"crossref","first-page":"448","DOI":"10.1007\/s00500-004-0363-x","volume":"9","author":"J Liu","year":"2005","unstructured":"Liu, J., Lampinen, J.: A fuzzy adaptive differential evolution algorithm. Soft Comput. 9(6), 448\u2013462 (2005)","journal-title":"Soft Comput."},{"key":"3574_CR28","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.ins.2004.06.009","volume":"169","author":"J Sun","year":"2005","unstructured":"Sun, J., Zhang, Q., Tsang, E.: DE\/EDA: a new evolutionary algorithm for global numerical optimization. Info. SCO. 169, 249\u2013262 (2005)","journal-title":"Info. SCO."},{"issue":"5","key":"3574_CR29","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1109\/TEVC.2009.2014613","volume":"13","author":"J Zhang","year":"2009","unstructured":"Zhang, J., Sanderson, A.C.: JADE: adaptive differential evolution with the optional external archive. IEEE Trans. Evolut. Comput. 13(5), 945\u2013958 (2009)","journal-title":"IEEE Trans. Evolut. Comput."},{"issue":"3","key":"3574_CR30","first-page":"5216","volume":"13","author":"S Das","year":"2009","unstructured":"Das, S., Abraham, A., Chakraborty, U.K., Konar, A.: Differential evolution using a neighbourhood-based mutation operator. IEEE Trans. Evol. Comput. 13(3), 5216\u20135553 (2009)","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"2","key":"3574_CR31","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/s12293-009-0008-9","volume":"1","author":"F Neri","year":"2009","unstructured":"Neri, F., Tirronen, V.: Scale factor local search in differential evolution. Memet. Comput. 1(2), 153\u2013171 (2009)","journal-title":"Memet. Comput."},{"issue":"2","key":"3574_CR32","doi-asserted-by":"crossref","first-page":"1679","DOI":"10.1016\/j.asoc.2010.04.024","volume":"11","author":"R Mallipeddi","year":"2011","unstructured":"Mallipeddi, R., Suganthan, P.N., Pan, Q.K., Tasgetiren, M.F.: Differential evolution algorithm with ensemble of parameters and mutation strategies. Appl. Soft Comput. 11(2), 1679\u20131696 (2011)","journal-title":"Appl. Soft Comput."},{"key":"3574_CR33","doi-asserted-by":"crossref","first-page":"9699","DOI":"10.1109\/ACCESS.2017.2705019","volume":"5","author":"Y-X Lei","year":"2017","unstructured":"Lei, Y.-X., Gou, J., Wang, C., Luo, W., Cai, Y.-Q.: Improved differential evolution with a modified orthogonal learning strategy. IEEE Access 5, 9699\u20139716 (2017)","journal-title":"IEEE Access"},{"key":"3574_CR34","volume-title":"Differential Evolution\u2014A Practical Approach to Global Optimization","author":"K Price","year":"2005","unstructured":"Price, K., Storn, R., Lampinen, J.: Differential Evolution\u2014A Practical Approach to Global Optimization. Springer, Berlin (2005)"},{"key":"3574_CR35","unstructured":"Lampinen, J., Zelinka, I.: On stagnation of the differential evolution algorithm. In: Osmera, P. (ed.) Proceedings of 6th International Mendel Conference on Soft Computing, pp. 76\u201383 (2002)"},{"issue":"1","key":"3574_CR36","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1023\/A:1024653025686","volume":"27","author":"HY Fan","year":"2003","unstructured":"Fan, H.Y., Lampinen, J.: A trigonometric mutation operator to differential evolution. J. Global Optim. 27(1), 105\u2013129 (2003)","journal-title":"J. Global Optim."},{"key":"3574_CR37","first-page":"79","volume-title":"New Ideas in Optimization","author":"KV Price","year":"1999","unstructured":"Price, K.V.: An introduction to the differential equation. In: Corne, D., Dorigo, M., Glover, F. (eds.) New Ideas in Optimization, pp. 79\u2013108. McGraw-Hill, London (1999)"},{"key":"3574_CR38","first-page":"293","volume-title":"Advances in Intelligent Systems, Fuzzy Systems, Evolutionary Computation","author":"R Gamperle","year":"2002","unstructured":"Gamperle, R., Muller, S.D., Koumoutsakos, P.: A parameter study for differential evolution. In: Grmela, A., Mastorakis, N.E. (eds.) Advances in Intelligent Systems, Fuzzy Systems, Evolutionary Computation, pp. 293\u2013298. WSEAS Press, Interlaken (2002)"},{"key":"3574_CR39","first-page":"506","volume-title":"Proceedings of IEEE Congress on Evolutionary Computation","author":"J Ronkkonen","year":"2005","unstructured":"Ronkkonen, J., Kukkonen, S., Price, K.V.: Real-parameter optimization with differential evolution. In: Proceedings of IEEE Congress on Evolutionary Computation, pp. 506\u2013513. IEEE, Edinburgh (2005)"},{"issue":"1\u20132","key":"3574_CR40","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/S0304-3975(99)00089-4","volume":"229","author":"AE Eiben","year":"1999","unstructured":"Eiben, A.E., Rudolph, G.: Theory of evolutionary algorithms: a bird\u2019s eye view. Theoret. Comput. Sci. 229(1\u20132), 3\u20139 (1999)","journal-title":"Theoret. Comput. Sci."},{"key":"3574_CR41","first-page":"1","volume":"2013","author":"Z Hu","year":"2013","unstructured":"Hu, Z., Xiong, S., Su, Q., Zhang, X.: Sufficient conditions for global convergence of differential evolution algorithm. J. Appl. Math. 2013, 1\u201314 (2013)","journal-title":"J. Appl. Math."},{"key":"3574_CR42","unstructured":"Lampinen, J., Elinka, I.: On stagnation of the differential evolution algorithm. In: Proceedings of 6th International Mendel Conference on Soft Computing, Brno, Czech Republic, Jun, pp. 76\u201383 (2000)"},{"key":"3574_CR43","unstructured":"Zielinski, K., Peters, D., Laur, R.: Run time analysis regarding stopping criteria for differential evolution and particle swarm optimization. In: Proceedings of the 1st International Conference on Experiments\/Processes\/System Modelling\/Simulation\/Optimization, Athens, Greece (2005)"},{"key":"3574_CR44","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1016\/j.patcog.2010.10.020","volume":"44","author":"T Isaac","year":"2011","unstructured":"Isaac, T., Salvador, G., Francisco, H.: Differential evolution for optimizing the positioning of prototypes in nearest neighbour classification. Pattern Recogn. 44, 901\u2013916 (2011)","journal-title":"Pattern Recogn."},{"issue":"1","key":"3574_CR45","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.swevo.2011.02.002","volume":"1","author":"J Derrac","year":"2011","unstructured":"Derrac, J., Garcia, S., Molina, D., Herrera, F.: A practical tutorial on the use of nonparametric statistical tests as a methodology for comparing evolutionary and swarm intelligence algorithms. Swarm Evol. Comput. 1(1), 3\u201318 (2011)","journal-title":"Swarm Evol. Comput."},{"issue":"6","key":"3574_CR46","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1080\/03610928008827904","volume":"A9","author":"RL Iman","year":"1980","unstructured":"Iman, R.L., Davenport, J.M.: Approximations of the critical region of the Friedman statistic. Commun. Stat. A9(6), 571\u2013595 (1980)","journal-title":"Commun. Stat."},{"key":"3574_CR47","first-page":"1","volume":"7","author":"J Demsar","year":"2006","unstructured":"Demsar, J.: Statistical comparison of classifiers over multiple data sets. J. Mach. Learn. Res. 7, 1\u201330 (2006)","journal-title":"J. Mach. Learn. Res."},{"key":"3574_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2019.100631","author":"A Thakkar","year":"2020","unstructured":"Thakkar, A., Lohiya, R.: Role of the swarm and evolutionary algorithms for intrusion detection system: a survey. Swarm Evol. Comput. (2020). https:\/\/doi.org\/10.1016\/j.swevo.2019.100631","journal-title":"Swarm Evol. Comput."},{"key":"3574_CR49","unstructured":"KDDCup 1999 data. http:\/\/kdd.ics.uci.edu\/Databases\/kddcup99\/10percent.gz"},{"key":"3574_CR50","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1007\/s12083-019-00822-3","volume":"13","author":"S Sandosh","year":"2020","unstructured":"Sandosh, S., Govindasamy, V., Akila, G.: Enhanced intrusion detection system via agent clustering and classification based on outlier detection. Peer-to-Peer Netw. Appl. 13, 1038\u20131045 (2020)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"3574_CR51","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CCCS.2018.8586840","volume-title":"2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS)","author":"A Divekar","year":"2018","unstructured":"Divekar, A., Parekh, M., Savla, V., Mishra, R., Shirole, M.: Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives. In: 2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS), pp. 1\u20138. IEEE, Kathmandu (2018). https:\/\/doi.org\/10.1109\/CCCS.2018.8586840"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03574-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03574-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03574-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T14:26:47Z","timestamp":1662128807000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03574-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,18]]},"references-count":51,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["3574"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03574-7","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-372822\/v2","asserted-by":"object"},{"id-type":"doi","id":"10.21203\/rs.3.rs-372822\/v1","asserted-by":"object"}]},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,18]]},"assertion":[{"value":"17 August 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No human or animal is involved in experimentation.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not Applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The authors are giving full consent for the publication of the manuscript.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}