{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T04:38:39Z","timestamp":1768711119625,"version":"3.49.0"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T00:00:00Z","timestamp":1737417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10586-024-04745-4","type":"journal-article","created":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T06:23:11Z","timestamp":1737440591000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt"],"prefix":"10.1007","volume":"28","author":[{"given":"Maryam","family":"Shahzeidi","sequence":"first","affiliation":[]},{"given":"Mohammadreza","family":"Mollahoseini Ardakani","sequence":"additional","affiliation":[]},{"given":"Taghi","family":"Javdani Gandomani","sequence":"additional","affiliation":[]},{"given":"Kamal","family":"Mirzaie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,21]]},"reference":[{"key":"4745_CR1","unstructured":"Kruchten, P., Nord, R., Ozkaya, I.: Managing Technical Debt. Addison-Wesley Professional (2019)"},{"issue":"5","key":"4745_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/2160718.2160733","volume":"55","author":"E Allman","year":"2012","unstructured":"Allman, E.: Managing technical debt. Commun. ACM. 55(5), 50\u201355 (2012)","journal-title":"Commun. ACM"},{"key":"4745_CR3","doi-asserted-by":"crossref","unstructured":"Santos, R.M., Santos, I.M., J\u00fanior, M.C.R., de Neto, M.G.: Long Term-short Memory Neural Networks and Word2vec for Self-admitted Technical Debt Detection, in 22nd International Conference on Enterprise Information Systems (ICEIS), pp. 157\u2013165. (2020)","DOI":"10.5220\/0009796001570165"},{"issue":"6","key":"4745_CR4","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MS.2012.156","volume":"29","author":"B Curtis","year":"2012","unstructured":"Curtis, B., Sappidi, J., Szynkarski, A.: Estimating the principal of an application\u2019s technical debt. IEEE Softw. 29(6), 34\u201342 (2012)","journal-title":"IEEE Softw."},{"key":"4745_CR5","doi-asserted-by":"crossref","unstructured":"Saarim\u00e4ki, N., Lenarduzzi, V., Taibi, D.: On the diffuseness of code technical debt in Java projects of the apache ecosystem, in Proceedings of the Second International Conference on Technical Debt, pp. 98\u2013107: IEEE Press. (2019)","DOI":"10.1109\/TechDebt.2019.00028"},{"issue":"11","key":"4745_CR6","doi-asserted-by":"publisher","first-page":"1063","DOI":"10.1109\/TSE.2017.2653105","volume":"43","author":"M Tufano","year":"2017","unstructured":"Tufano, M., et al.: When and why your code starts to smell bad (and whether the smells go away). IEEE Trans. Software Eng. 43(11), 1063\u20131088 (2017)","journal-title":"IEEE Trans. Software Eng."},{"key":"4745_CR7","doi-asserted-by":"crossref","unstructured":"Potdar, A., Shihab, E.: An exploratory study on self-admitted technical debt, in IEEE International Conference on Software Maintenance and Evolution, 2014, pp. 91\u2013100: IEEE. (2014)","DOI":"10.1109\/ICSME.2014.31"},{"key":"4745_CR8","doi-asserted-by":"crossref","unstructured":"Zhao, X., Wang, C., Yang, Z., Zhang, Y., Yuan, X.: Online news emotion prediction with bidirectional LSTM, in Web-Age Information Management: 17th International Conference, WAIM Nanchang, China, June 3\u20135, 2016, Proceedings, Part II 17, 2016, pp. 238\u2013250: Springer. (2016)","DOI":"10.1007\/978-3-319-39958-4_19"},{"key":"4745_CR9","doi-asserted-by":"publisher","first-page":"100863","DOI":"10.1016\/j.swevo.2021.100863","volume":"63","author":"P Singh","year":"2021","unstructured":"Singh, P., Chaudhury, S., Panigrahi, B.K., Hybrid, M.P.S.O.-C.N.N.: Multi-level particle swarm optimized hyperparameters of convolutional neural network. Swarm Evol. Comput. 63, 100863 (2021)","journal-title":"Swarm Evol. Comput."},{"key":"4745_CR10","doi-asserted-by":"crossref","unstructured":"Bacanin, N., Bezdan, T., Tuba, E., Strumberger, I., Tuba, M.: Optimizing convolutional neural network hyperparameters by enhanced swarm intelligence metaheuristics, Algorithms, vol. 13, no. 3, p. 67, (2020)","DOI":"10.3390\/a13030067"},{"key":"4745_CR11","doi-asserted-by":"publisher","first-page":"109076","DOI":"10.1016\/j.cie.2023.109076","volume":"177","author":"W-C Yeh","year":"2023","unstructured":"Yeh, W.-C., Lin, Y.-P., Liang, Y.-C., Lai, C.-M., Huang, C.-L.: Simplified swarm optimization for hyperparameters of convolutional neural networks. Comput. Ind. Eng. 177, 109076 (2023)","journal-title":"Comput. Ind. Eng."},{"key":"4745_CR12","doi-asserted-by":"crossref","unstructured":"Apa, C., Solari, M., Vallespir, D., Travassos, G.H.: A Taste of the Software Industry Perception of Technical Debt and its Management in Uruguay: A survey in software industry, in Proceedings of the 14th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 1\u20139. (2020)","DOI":"10.1145\/3382494.3421463"},{"key":"4745_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-021-10031-3","volume":"26","author":"F Zampetti","year":"2021","unstructured":"Zampetti, F., Fucci, G., Serebrenik, A., Di Penta, M.: Self-admitted technical debt practices: A comparison between industry and open-source. Empir. Softw. Eng. 26, 1\u201332 (2021)","journal-title":"Empir. Softw. Eng."},{"key":"4745_CR14","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jss.2014.12.027","volume":"101","author":"Z Li","year":"2015","unstructured":"Li, Z., Avgeriou, P., Liang, P.: A systematic mapping study on technical debt and its management. J. Syst. Softw. 101, 193\u2013220 (2015)","journal-title":"J. Syst. Softw."},{"key":"4745_CR15","doi-asserted-by":"crossref","unstructured":"Ribeiro, L.F., de Freitas Farias, M.A., Mendon\u00e7a, M.G., Sp\u00ednola, R.O.: Decision Criteria for the Payment of Technical Debt in Software Projects: A Systematic Mapping Study, 18th International Conference on Enterprise Information Systems (ICEIS), pp. 572\u2013579, (2016)","DOI":"10.5220\/0005914605720579"},{"key":"4745_CR16","doi-asserted-by":"publisher","first-page":"107376","DOI":"10.1016\/j.infsof.2023.107376","volume":"167","author":"A Alhefdhi","year":"2024","unstructured":"Alhefdhi, A., Dam, H.K., Ghose, A.: Towards automating self-admitted technical debt repayment. \u200eInf. Softw. Technol. 167, 107376 (2024)","journal-title":"\u200eInf. Softw. Technol."},{"issue":"2","key":"4745_CR17","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/157710.157715","volume":"4","author":"W Cunningham","year":"1992","unstructured":"Cunningham, W.: The WyCash portfolio management system. ACM Sigplan Oops Messenger. 4(2), 29\u201330 (1992)","journal-title":"ACM Sigplan Oops Messenger"},{"key":"4745_CR18","unstructured":"McConnell, S.: Managing Technical debt\u2013white Paper. Construx Software Bellevue, WA (2008)"},{"issue":"6","key":"4745_CR19","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.1016\/j.jss.2012.12.052","volume":"86","author":"E Tom","year":"2013","unstructured":"Tom, E., Aurum, A., Vidgen, R.: An exploration of technical debt. J. Syst. Softw. 86(6), 1498\u20131516 (2013)","journal-title":"J. Syst. Softw."},{"key":"4745_CR20","unstructured":"Beck, K., Fowler, M., Beck, G.: Bad smells in code, Refactoring: Improving the design of existing code, vol. 1, no. pp. 75\u201388, 1999. (1999)"},{"key":"4745_CR21","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.infsof.2015.10.008","volume":"70","author":"NS Alves","year":"2016","unstructured":"Alves, N.S., Mendes, T.S., de Mendon\u00e7a, M.G., Sp\u00ednola, R.O., Shull, F., Seaman, C.: Identification and management of technical debt: A systematic mapping study. \u200eInf. Softw. Technol. 70, 100\u2013121 (2016)","journal-title":"\u200eInf. Softw. Technol."},{"key":"4745_CR22","doi-asserted-by":"crossref","unstructured":"Verdecchia, R.: Architectural technical debt identification: Moving forward, in IEEE International Conference on Software Architecture Companion (ICSA-C), 2018, pp. 43\u201344: IEEE. (2018)","DOI":"10.1109\/ICSA-C.2018.00018"},{"key":"4745_CR23","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jss.2016.10.018","volume":"124","author":"C Fern\u00e1ndez-S\u00e1nchez","year":"2017","unstructured":"Fern\u00e1ndez-S\u00e1nchez, C., Garbajosa, J., Yag\u00fce, A., Perez, J.: Identification and analysis of the elements required to manage technical debt by means of a systematic mapping study. J. Syst. Softw. 124, 22\u201338 (2017)","journal-title":"J. Syst. Softw."},{"key":"4745_CR24","unstructured":"Aniket Potdar, E.: 01\/12\/2018). Satd Patterns Available: (2015). http:\/\/users.encs.concordia.ca\/%7Eeshihab\/data\/ICSME2014\/satd.html"},{"key":"4745_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10664-020-09917-5","volume":"26","author":"J Liu","year":"2021","unstructured":"Liu, J., Huang, Q., Xia, X., Shihab, E., Lo, D., Li, S.: An exploratory study on the introduction and removal of different types of technical debt in deep learning frameworks. Empir. Softw. Eng. 26, 1\u201336 (2021)","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"4745_CR26","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s10664-023-10297-9","volume":"28","author":"Y Li","year":"2023","unstructured":"Li, Y., Soliman, M., Avgeriou, P.: Automatic identification of self-admitted technical debt from four different sources. Empir. Softw. Eng. 28(3), 65 (2023)","journal-title":"Empir. Softw. Eng."},{"issue":"11","key":"4745_CR27","doi-asserted-by":"publisher","first-page":"1044","DOI":"10.1109\/TSE.2017.2654244","volume":"43","author":"E da Silva Maldonado","year":"2017","unstructured":"da Silva Maldonado, E., Shihab, E., Tsantalis, N.: Using natural language processing to automatically detect self-admitted technical debt. IEEE Trans. Software Eng. 43(11), 1044\u20131062 (2017)","journal-title":"IEEE Trans. Software Eng."},{"issue":"1","key":"4745_CR28","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1007\/s10664-017-9522-4","volume":"23","author":"Q Huang","year":"2018","unstructured":"Huang, Q., Shihab, E., Xia, X., Lo, D., Li, S.: Identifying self-admitted technical debt in open source projects using text mining. Empir. Softw. Eng. 23(1), 418\u2013451 (2018)","journal-title":"Empir. Softw. Eng."},{"key":"4745_CR29","doi-asserted-by":"crossref","unstructured":"Yu, Z., Fahid, F.M., Tu, H., Menzies, T.: Identifying self-admitted technical debts with jitterbug: A two-step approach. IEEE Trans. Software Eng. 48(5), 1676\u20131691 (2020)","DOI":"10.1109\/TSE.2020.3031401"},{"issue":"3","key":"4745_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3324916","volume":"28","author":"X Ren","year":"2019","unstructured":"Ren, X., Xing, Z., Xia, X., Lo, D., Wang, X., Grundy, J.: Neural network-based detection of self-admitted technical debt: From performance to explainability. ACM Trans. Softw. Eng. Methodol. 28(3), 1\u201345 (2019)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"4745_CR31","doi-asserted-by":"crossref","unstructured":"Gong, A., Fukumoto, F., Muangkammuen, P., Li, J., Yu, D.: Identifying Self-admitted Technical Debt with Context-Based Ladder Network, in International Conference on Neural Information Processing, pp. 84\u201397: Springer. (2023)","DOI":"10.1007\/978-981-99-8184-7_7"},{"key":"4745_CR32","doi-asserted-by":"publisher","first-page":"132306","DOI":"10.1016\/j.physd.2019.132306","volume":"404","author":"A Sherstinsky","year":"2020","unstructured":"Sherstinsky, A.: Fundamentals of recurrent neural network (RNN) and long short-term memory (LSTM) network. Phys. D: Nonlinear Phenom. 404, 132306 (2020)","journal-title":"Phys. D: Nonlinear Phenom."},{"key":"4745_CR33","doi-asserted-by":"crossref","unstructured":"Gers, F.A., Schmidhuber, J., Cummins, F.: Learning to forget: Continual prediction with LSTM, Neural computation, vol. 12, no. 10, pp. 2451\u20132471, (2000)","DOI":"10.1162\/089976600300015015"},{"key":"4745_CR34","unstructured":"Sun, J., Feng, B., Xu, W.: Particle swarm optimization with particles having quantum behavior, in Proceedings of the congress on evolutionary computation (IEEE Cat. No. 04TH8753), 2004, vol. 1, pp. 325\u2013331: IEEE. (2004)"},{"key":"4745_CR35","doi-asserted-by":"publisher","first-page":"4651","DOI":"10.1007\/s00366-021-01497-2","volume":"38","author":"X Liu","year":"2022","unstructured":"Liu, X., Wang, G.-G., Wang, L.: LSFQPSO: Quantum particle swarm optimization with optimal guided L\u00e9vy flight and straight flight for solving optimization problems. Eng. Comput. 38, 4651\u20134682 (2022)","journal-title":"Eng. Comput."},{"key":"4745_CR36","doi-asserted-by":"crossref","unstructured":"Papazoglou, G., Biskas, P.: Review and comparison of genetic algorithm and particle swarm optimization in the optimal power flow problem, Energies, vol. 16, no. 3, p. 1152, (2023)","DOI":"10.3390\/en16031152"},{"key":"4745_CR37","doi-asserted-by":"publisher","first-page":"108955","DOI":"10.1016\/j.cpc.2023.108955","volume":"294","author":"L Tani","year":"2024","unstructured":"Tani, L., Veelken, C.: Comparison of bayesian and particle swarm algorithms for hyperparameter optimisation in machine learning applications in high energy physics. Comput. Phys. Commun. 294, 108955 (2024)","journal-title":"Comput. Phys. Commun."},{"key":"4745_CR38","doi-asserted-by":"crossref","unstructured":"Tsantalis, N., Chaikalis, T., Chatzigeorgiou, A.: JDeodorant: Identification and removal of type-checking bad smells, in 12th European conference on software maintenance and reengineering, pp. 329\u2013331: IEEE. (2008)","DOI":"10.1109\/CSMR.2008.4493342"}],"updated-by":[{"DOI":"10.1007\/s10586-025-05193-4","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T00:00:00Z","timestamp":1742515200000}}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04745-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-04745-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-04745-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T21:51:58Z","timestamp":1747777918000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-04745-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,21]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["4745"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-04745-4","relation":{"correction":[{"id-type":"doi","id":"10.1007\/s10586-025-05193-4","asserted-by":"object"}]},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,21]]},"assertion":[{"value":"19 April 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 February 2025","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Update","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The original online version of this article was revised: The author name Mohammadreza Mollahoseini Ardakani has been set twice in the author group. The abbreviated name \u201cM. M. Ardakani\u201d appears as a duplicate name as fifth author in the author group.","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2025","order":8,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":9,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":10,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s10586-025-05193-4","URL":"https:\/\/doi.org\/10.1007\/s10586-025-05193-4","order":11,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical and informed consent for data used"}},{"value":"The authors declare no competing interests.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"152"}}