{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T20:12:26Z","timestamp":1769458346890,"version":"3.49.0"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T00:00:00Z","timestamp":1720137600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T00:00:00Z","timestamp":1720137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100019429","name":"University of Mosul","doi-asserted-by":"publisher","award":["University of Mosul"],"award-info":[{"award-number":["University of Mosul"]}],"id":[{"id":"10.13039\/100019429","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Electron Test"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10836-024-06126-6","type":"journal-article","created":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T07:01:46Z","timestamp":1720162906000},"page":"509-523","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Formal Verification of a Dependable State Machine-Based Hardware Architecture for Safety-Critical Cyber-Physical Systems: Analysis, Design, and Implementation"],"prefix":"10.1007","volume":"40","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8142-8815","authenticated-orcid":false,"given":"Shawkat Sabah","family":"Khairullah","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,5]]},"reference":[{"key":"6126_CR1","doi-asserted-by":"publisher","first-page":"103201","DOI":"10.1016\/j.micpro.2020.103201","volume":"77","author":"J-PA Yaacoub","year":"2020","unstructured":"Yaacoub J-PA, Salman O, Noura HN et al (2020) Cyber-physical systems security: limitations, issues and future trends. Microprocess Microsyst 77:103201. https:\/\/doi.org\/10.1016\/j.micpro.2020.103201","journal-title":"Microprocess Microsyst"},{"key":"6126_CR2","volume-title":"Fundamentals of dependable computing for software engineers","author":"J Knight","year":"2012","unstructured":"Knight J (2012) Fundamentals of dependable computing for software engineers. CRC, Boca Raton"},{"key":"6126_CR3","doi-asserted-by":"crossref","unstructured":"Khan AH, Khan ZH, Weiguo Z (2014) Model-Based Verification and Validation of Safety-Critical Embedded Real-Time Systems: Formation and Tools. In: Proc. Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles. Springer, Berlin, Heidelberg, pp 153\u2013183","DOI":"10.1007\/978-3-642-40888-5_6"},{"key":"6126_CR4","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1049\/iet-cps.2019.0022","volume":"5","author":"SS Khairullah","year":"2020","unstructured":"Khairullah SS, Elks CR (2020) Self-repairing hardware architecture for safety-critical cyber-physical-systems. IET Cyber-Physical Systems: Theory Appl 5:92\u201399. https:\/\/doi.org\/10.1049\/iet-cps.2019.0022","journal-title":"IET Cyber-Physical Systems: Theory Appl"},{"key":"6126_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1080\/00295450.2018.1450014","volume":"202","author":"SS Khairullah","year":"2018","unstructured":"Khairullah SS, Elks CR (2018) A Bio-inspired, Self-Healing, resilient Architecture for Digital Instrumentation and Control Systems and embedded devices. Nucl Technol 202:141\u2013152. https:\/\/doi.org\/10.1080\/00295450.2018.1450014","journal-title":"Nucl Technol"},{"key":"6126_CR6","doi-asserted-by":"crossref","unstructured":"Mallavalli S, Fekih A (2017) A fault tolerant control approach for a quadrotor UAV subject to time varying disturbances and actuator faults. In: Proc. 2017 IEEE Conference on Control Technology and Applications (CCTA). pp 596\u2013601","DOI":"10.1109\/CCTA.2017.8062527"},{"key":"6126_CR7","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/s10836-020-05898-x","volume":"36","author":"S Cai","year":"2020","unstructured":"Cai S, He B, Wang W et al (2020) Soft Error Reliability Evaluation of Nanoscale Logic Circuits in the Presence of multiple transient faults. J Electron Test 36:469\u2013483. https:\/\/doi.org\/10.1007\/s10836-020-05898-x","journal-title":"J Electron Test"},{"key":"6126_CR8","doi-asserted-by":"publisher","unstructured":"Ali AT, Alneema DAF (2020) Design analysis of turbo decoder based on one MAP decoder using high level synthesis tool. Al-Rafidain Eng J (AREJ) 25:70\u201377. https:\/\/doi.org\/10.33899\/rengj.2020.126801.1022","DOI":"10.33899\/rengj.2020.126801.1022"},{"key":"6126_CR9","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10836-024-06100-2","volume":"40","author":"H Ibrahim","year":"2024","unstructured":"Ibrahim H, Azmi H, El-Kharashi MW, Safar M (2024) Non-invasive hardware trojans modeling and insertion: a formal Verification Approach. J Electron Test 40:117\u2013135. https:\/\/doi.org\/10.1007\/s10836-024-06100-2","journal-title":"J Electron Test"},{"key":"6126_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10703-017-0281-z","volume":"52","author":"B Luteberget","year":"2018","unstructured":"Luteberget B, Johansen C (2018) Efficient verification of railway infrastructure designs against standard regulations. Formal Methods Syst Des 52:1\u201332. https:\/\/doi.org\/10.1007\/s10703-017-0281-z","journal-title":"Formal Methods Syst Des"},{"key":"6126_CR11","unstructured":"Edward A, Lee (2017) Introduction to embedded systems: a cyber-physical systems approach, Second edition. The MIT Press, Cambridge, Massachusetts"},{"key":"6126_CR12","doi-asserted-by":"crossref","unstructured":"Kumar P, Singh LK, Kumar C (2021) Model Based Verification of Safety-Critical Systems. In: Proc. 2021 2nd International Conference for Emerging Technology (INCET). IEEE, Belagavi, India, pp 1\u20139","DOI":"10.1109\/INCET51464.2021.9456353"},{"key":"6126_CR13","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.ress.2018.09.004","volume":"182","author":"V Bolbot","year":"2019","unstructured":"Bolbot V, Theotokatos G, Bujorianu LM et al (2019) Vulnerabilities and safety assurance methods in Cyber-physical systems: a comprehensive review. Reliab Eng Syst Saf 182:179\u2013193. https:\/\/doi.org\/10.1016\/j.ress.2018.09.004","journal-title":"Reliab Eng Syst Saf"},{"key":"6126_CR14","doi-asserted-by":"crossref","unstructured":"Bartocci E, Falcone Y, Francalanza A, Reger G (2018) Introduction to Runtime Verification. In: Proc. Lectures on Runtime Verification. Springer International Publishing, Cham, pp 1\u201333","DOI":"10.1007\/978-3-319-75632-5_1"},{"key":"6126_CR15","doi-asserted-by":"publisher","first-page":"5154","DOI":"10.3390\/s20185154","volume":"20","author":"I Grobelna","year":"2020","unstructured":"Grobelna I (2020) Formal Verification of Control Modules in Cyber-physical systems. Sensors 20:5154. https:\/\/doi.org\/10.3390\/s20185154","journal-title":"Sensors"},{"key":"6126_CR16","doi-asserted-by":"publisher","first-page":"164","DOI":"10.33899\/rengj.2020.127782.1051","volume":"25","author":"MA Alobaidy","year":"2020","unstructured":"Alobaidy A, Abdul-Jabbar MA, Al-khayyt DJM SZ (2020) Faults diagnosis in robot systems: a review. Al-Rafidain Eng J (AREJ) 25:164\u2013175. https:\/\/doi.org\/10.33899\/rengj.2020.127782.1051","journal-title":"Al-Rafidain Engineering Journal (AREJ)"},{"key":"6126_CR17","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.scico.2016.09.007","volume":"133","author":"C Seceleanu","year":"2017","unstructured":"Seceleanu C, Johansson M, Suryadevara J et al (2017) Analyzing a wind turbine system: from simulation to formal verification. Sci Comput Program 133:216\u2013242. https:\/\/doi.org\/10.1016\/j.scico.2016.09.007","journal-title":"Sci Comput Program"},{"key":"6126_CR18","doi-asserted-by":"crossref","unstructured":"Bennion M, Habli I (2014) A candid industrial evaluation of formal software verification using model checking. In: Proc. Companion Proceedings of the 36th International Conference on Software Engineering. ACM, pp 175\u2013184","DOI":"10.1145\/2591062.2591184"},{"key":"6126_CR19","doi-asserted-by":"publisher","first-page":"538","DOI":"10.1109\/TASE.2009.2031095","volume":"7","author":"O Ljungkrantz","year":"2010","unstructured":"Ljungkrantz O, Akesson K, Fabian M, Chengyin Y (2010) Formal specification and Verification of Industrial Control Logic Components. IEEE Trans Autom Sci Eng 7:538\u2013548. https:\/\/doi.org\/10.1109\/TASE.2009.2031095","journal-title":"IEEE Trans Autom Sci Eng"},{"key":"6126_CR20","doi-asserted-by":"crossref","unstructured":"Pace GJ (2012) Classifying Relations. In: Proc. Pace GJ (ed) Mathematics of Discrete Structures for Computer Science. Springer, Berlin, Heidelberg, pp 141\u2013155","DOI":"10.1007\/978-3-642-29840-0_6"},{"key":"6126_CR21","doi-asserted-by":"crossref","unstructured":"Kang E-Y, Mu D, Huang L, Lan Q (2017) Verification and Validation of a Cyber-Physical System in the Automotive Domain. In: Proc. 2017 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, Prague, Czech Republic, pp 326\u2013333","DOI":"10.1109\/QRS-C.2017.62"},{"key":"6126_CR22","unstructured":"Model-driven architecture based security analysis - Mili \u2013\u20092021 - Systems Engineering - Wiley Online Library. https:\/\/incose.onlinelibrary.wiley.com\/doi\/abs\/10.1002\/sys.21581. Accessed 20 Jan 2024"},{"key":"6126_CR23","doi-asserted-by":"crossref","unstructured":"Haqiq A, Bounabat B (2013) Verification of multi decisional reactive agent using SMV model checker. In: Proc. 2013 8th IEEE Design and Test Symposium. pp 1\u20136","DOI":"10.1109\/IDT.2013.6727075"},{"key":"6126_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/S0004-3702(02)00374-0","volume":"147","author":"A Cimatti","year":"2003","unstructured":"Cimatti A, Pistore M, Roveri M, Traverso P (2003) Weak, strong, and strong cyclic planning via symbolic model checking. Artif Intell 147:35\u201384. https:\/\/doi.org\/10.1016\/S0004-3702(02)00374-0","journal-title":"Artif Intell"},{"key":"6126_CR25","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/TCST.2017.2669147","volume":"26","author":"LK Singh","year":"2018","unstructured":"Singh LK, Rajput H (2018) Dependability analysis of Safety critical real-Time systems by using Petri nets. IEEE Trans Control Syst Technol 26:415\u2013426. https:\/\/doi.org\/10.1109\/TCST.2017.2669147","journal-title":"IEEE Trans Control Syst Technol"},{"key":"6126_CR26","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1002\/stvr.456","volume":"22","author":"M Utting","year":"2012","unstructured":"Utting M, Pretschner A, Legeard B (2012) A taxonomy of model-based testing approaches. Softw Test Verification Reliab 22:297\u2013312. https:\/\/doi.org\/10.1002\/stvr.456","journal-title":"Softw Test Verification Reliab"},{"key":"6126_CR27","doi-asserted-by":"publisher","first-page":"17688","DOI":"10.1109\/JIOT.2024.3361036","volume":"11","author":"Z Li","year":"2024","unstructured":"Li Z, Wang Y, Huang Z et al (2024) Ada-FA: a Comprehensive Framework for Adaptive Fault Tolerance and Ageing Mitigation in FPGAs. IEEE Internet Things J 11:17688\u201317699. https:\/\/doi.org\/10.1109\/JIOT.2024.3361036","journal-title":"IEEE Internet Things J"},{"key":"6126_CR28","doi-asserted-by":"crossref","unstructured":"Suryadevara J, Sapienza G, Seceleanu C et al (2014) Wind Turbine System: An Industrial Case Study in Formal Modeling and Verification. In: Proc. Artho C, \u00d6lveczky PC (eds) Formal Techniques for Safety-Critical Systems. Springer International Publishing, Cham, pp 229\u2013245","DOI":"10.1007\/978-3-319-05416-2_15"},{"key":"6126_CR29","volume-title":"Fault-tolerance techniques for SRAM-based FPGAs","author":"FL Kastensmidt","year":"2006","unstructured":"Kastensmidt FL (2006) Fault-tolerance techniques for SRAM-based FPGAs. Springer, Dordrecht"},{"key":"6126_CR30","doi-asserted-by":"crossref","unstructured":"Wilkening M, Sridharan V, Li S et al (2014) Calculating Architectural Vulnerability Factors for Spatial Multi-Bit Transient Faults. In: Proc. 2014 47th Annual IEEE\/ACM International Symposium on Microarchitecture. pp 293\u2013305","DOI":"10.1109\/MICRO.2014.15"},{"key":"6126_CR31","doi-asserted-by":"crossref","unstructured":"Pakonen A, Buzhinsky I (2019) Verification of fault-tolerant safety I&C systems using model checking. In: Proc. 2019 IEEE International Conference on Industrial Technology (ICIT). IEEE, Melbourne, Australia, pp 969\u2013974","DOI":"10.1109\/ICIT.2019.8755014"},{"key":"6126_CR32","doi-asserted-by":"publisher","first-page":"219","DOI":"10.33899\/rengj.2022.130477.1108","volume":"27","author":"HA Saleh","year":"2022","unstructured":"Saleh HA, Salim TM (2022) Design and implementation of model predictive controller. Al-Rafidain Eng J (AREJ) 27:219\u2013230. https:\/\/doi.org\/10.33899\/rengj.2022.130477.1108","journal-title":"Al-Rafidain Engineering Journal (AREJ)"},{"key":"#cr-split#-6126_CR33.1","doi-asserted-by":"crossref","unstructured":"Hsiung P-A, Lin Y-H (2005) Modeling and Verification of Safety-Critical Systems Using Safecharts. In: Proc. Wang F","DOI":"10.1007\/11562436_22"},{"key":"#cr-split#-6126_CR33.2","unstructured":"(ed) Formal Techniques for Networked and Distributed Systems - FORTE 2005. Springer, Berlin, Heidelberg, pp 290-304"},{"key":"6126_CR34","doi-asserted-by":"crossref","unstructured":"Cimatti A, Corvino R, Lazzaro A et al (2012) Formal Verification and Validation of ERTMS Industrial Railway Train Spacing System. In: Proc. Madhusudan P, Seshia SA (eds) Computer Aided Verification. Springer, Berlin, Heidelberg, pp 378\u2013393","DOI":"10.1007\/978-3-642-31424-7_29"},{"key":"6126_CR35","unstructured":"(2019) Protecting Against Common Cause Failures in Digital I&C Systems of Nuclear Power Plants. https:\/\/www.iaea.org\/publications\/8151\/protecting-against-common-cause-failures-in-digital-ic-systems-of-nuclear-power-plants. Accessed 10 Sep 2019"},{"key":"6126_CR36","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/TDSC.2004.2","volume":"1","author":"A Avizienis","year":"2004","unstructured":"Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Dependable Secur Comput 1:11\u201333. https:\/\/doi.org\/10.1109\/TDSC.2004.2","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"6126_CR37","doi-asserted-by":"publisher","first-page":"413","DOI":"10.11591\/eei.v13i1.5713","volume":"13","author":"SS Khairullah","year":"2024","unstructured":"Khairullah SS, Qassabbashi FN, Kareem JA (2024) Design and analysis of fault-tolerant sequential logic circuits for safety-critical applications. Bull Electr Eng Inf 13:413\u2013421. https:\/\/doi.org\/10.11591\/eei.v13i1.5713","journal-title":"Bull Electr Eng Inf"},{"key":"6126_CR38","doi-asserted-by":"publisher","first-page":"6936","DOI":"10.3390\/s22186936","volume":"22","author":"I Grobelna","year":"2022","unstructured":"Grobelna I, Szcze\u015bniak P (2022) Model checking Autonomous components within Electric Power Systems specified by Interpreted Petri Nets. Sensors 22:6936. https:\/\/doi.org\/10.3390\/s22186936","journal-title":"Sensors"},{"key":"6126_CR39","doi-asserted-by":"crossref","unstructured":"Murugesan A, Heimdahl MPE, Whalen MW et al (2017) From Requirements to Code: Model Based Development of a Medical Cyber Physical System. In: Proc. Huhn M, Williams L (eds) Software Engineering in Health Care. Springer International Publishing, Cham, pp 96\u2013112","DOI":"10.1007\/978-3-319-63194-3_7"},{"key":"6126_CR40","doi-asserted-by":"publisher","first-page":"134","DOI":"10.3182\/20120523-3-CZ-3015.00028","volume":"45","author":"M Grobelny","year":"2012","unstructured":"Grobelny M, Grobelna I, Adamski M (2012) Hardware behavioural modelling, Verification and Synthesis with UML 2.x activity diagrams. IFAC Proc Vol 45:134\u2013139. https:\/\/doi.org\/10.3182\/20120523-3-CZ-3015.00028","journal-title":"IFAC Proc Vol"},{"key":"6126_CR41","doi-asserted-by":"crossref","unstructured":"Askari Hemmat MH, Mohamed OA, Boukadoum M (2015) Formal modeling, verification and implementation of a train control system. In: Proc. 2015 27th International Conference on Microelectronics (ICM). IEEE, Casablanca, Morocco, pp 134\u2013137","DOI":"10.1109\/ICM.2015.7438006"},{"key":"6126_CR42","doi-asserted-by":"publisher","first-page":"614","DOI":"10.18196\/jrc.v3i5.15972","volume":"3","author":"SS Khairullah","year":"2022","unstructured":"Khairullah SS, Sharkawy A-N (2022) Design and implementation of a Reliable and Secure Controller for Smart Home Applications based on PLC. J Rob Control JRC 3:614\u2013621. https:\/\/doi.org\/10.18196\/jrc.v3i5.15972","journal-title":"J Rob Control JRC"},{"key":"6126_CR43","doi-asserted-by":"crossref","unstructured":"Ma W, Hei X (2012) An research for formal Verification of Safety-critical Software. Atlantis, pp 836\u2013839","DOI":"10.2991\/iccasm.2012.212"},{"key":"6126_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sysarc.2018.06.005","volume":"89","author":"I Grobelna","year":"2018","unstructured":"Grobelna I (2018) Model checking of reconfigurable FPGA modules specified by Petri nets. J Syst Architect 89:1\u20139. https:\/\/doi.org\/10.1016\/j.sysarc.2018.06.005","journal-title":"J Syst Architect"},{"key":"6126_CR45","doi-asserted-by":"crossref","unstructured":"Shreya V, Nanda M (2016) Analysing MTL properties using NuSMV model checker. In: Proc. 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, Bangalore, India, pp 817\u2013820","DOI":"10.1109\/RTEICT.2016.7807940"},{"key":"6126_CR46","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4204\/EPTCS.184.2","volume":"184","author":"S Busard","year":"2015","unstructured":"Busard S, Cappart Q, Limbr\u00e9e C et al (2015) Verification of railway interlocking systems. Electron Proc Theoretical Comput Sci 184:19\u201331. https:\/\/doi.org\/10.4204\/EPTCS.184.2","journal-title":"Electron Proc Theoretical Comput Sci"},{"key":"6126_CR47","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s10270-016-0523-3","volume":"17","author":"G Liebel","year":"2018","unstructured":"Liebel G, Marko N, Tichy M et al (2018) Model-based engineering in the embedded systems domain: an industrial survey on the state-of-practice. Softw Syst Model 17:91\u2013113. https:\/\/doi.org\/10.1007\/s10270-016-0523-3","journal-title":"Softw Syst Model"},{"key":"6126_CR48","unstructured":"Khairullah SS, Mostafa AA (2020) Reliability and safety modeling of a digital feed-water control system. J Univ Babylon Pure Appl Sci 28"},{"key":"6126_CR49","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1016\/j.engfailanal.2017.06.034","volume":"82","author":"L Chen","year":"2017","unstructured":"Chen L, Jiao J, Wei Q, Zhao T (2017) An improved formal failure analysis approach for safety-critical system based on MBSA. Eng Fail Anal 82:713\u2013725. https:\/\/doi.org\/10.1016\/j.engfailanal.2017.06.034","journal-title":"Eng Fail Anal"},{"key":"6126_CR50","doi-asserted-by":"publisher","first-page":"18290","DOI":"10.1109\/ACCESS.2018.2812819","volume":"6","author":"Y Zhou","year":"2018","unstructured":"Zhou Y, Lin C, Liu Y, Xu H (2018) Analytical Study on the reliability of Redundancy Architecture for Flight Control Computer based on homogeneous Markov process. IEEE Access 6:18290\u201318298. https:\/\/doi.org\/10.1109\/ACCESS.2018.2812819","journal-title":"IEEE Access"}],"container-title":["Journal of Electronic Testing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06126-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10836-024-06126-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10836-024-06126-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T06:06:54Z","timestamp":1728886014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10836-024-06126-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,5]]},"references-count":51,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["6126"],"URL":"https:\/\/doi.org\/10.1007\/s10836-024-06126-6","relation":{},"ISSN":["0923-8174","1573-0727"],"issn-type":[{"value":"0923-8174","type":"print"},{"value":"1573-0727","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,5]]},"assertion":[{"value":"24 March 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares that he neither has competing interests nor relevant financial or non-financial conflict interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}]}}