{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:36:19Z","timestamp":1761989779561,"version":"3.41.2"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T00:00:00Z","timestamp":1717632000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T00:00:00Z","timestamp":1717632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100020595","name":"National Science and Technology Council","doi-asserted-by":"publisher","award":["112-2221-E-011-115","112-2218-E-011-009"],"award-info":[{"award-number":["112-2221-E-011-115","112-2218-E-011-009"]}],"id":[{"id":"10.13039\/100020595","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100017486","name":"Wang Jhan-Yang Charitable Trust Fund","doi-asserted-by":"publisher","award":["WJY 2020-HR -01"],"award-info":[{"award-number":["WJY 2020-HR -01"]}],"id":[{"id":"10.13039\/100017486","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Manuf"],"published-print":{"date-parts":[[2025,8]]},"DOI":"10.1007\/s10845-024-02420-4","type":"journal-article","created":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T23:49:42Z","timestamp":1717631382000},"page":"3801-3815","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Unsupervised exceptional human action detection from repetition of human assembling tasks using entropy signal clustering"],"prefix":"10.1007","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5585-0094","authenticated-orcid":false,"given":"Chao-Lung","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shang-Che","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Yu-Chung","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Jing-Feng","family":"Nian","sequence":"additional","affiliation":[]},{"given":"Andi","family":"Cakravastia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,6]]},"reference":[{"key":"2420_CR1","doi-asserted-by":"publisher","unstructured":"Abbas, Z. K., & Al-Ani, A. A. (2022). A comprehensive review for video anomaly detection on videos. In: International Conference on Computer Science and Software Engineering (CSASE).March 15. Duhok Kurdistan Region, Iraq: IEEE, pp. 1\u20131. https:\/\/doi.org\/10.1109\/CSASE51777.2022.9759598.","DOI":"10.1109\/CSASE51777.2022.9759598"},{"issue":"2","key":"2420_CR2","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s10845-021-01815-x","volume":"34","author":"M Al-Amin","year":"2023","unstructured":"Al-Amin, M., Qin, R., Moniruzzaman, M., Yin, Z., Tao, W., & Leu, M. C. (2023). An individualized system of skeletal data-based CNN classifiers for action recognition in manufacturing assembly. Journal of Intelligent Manufacturing, 34(2), 633\u2013649. https:\/\/doi.org\/10.1007\/s10845-021-01815-x","journal-title":"Journal of Intelligent Manufacturing"},{"key":"2420_CR3","volume-title":"Niebel's methods, standards, and work design","author":"F Andris","year":"2013","unstructured":"Andris, F., & Benjamin, W. N. (2013). Niebel\u2019s methods, standards, and work design (13th ed.). McGraw-Hill Education.","edition":"13"},{"issue":"6","key":"2420_CR4","first-page":"536","volume":"7","author":"S Butterworth","year":"1930","unstructured":"Butterworth, S. (1930). On the theory of filter amplifiers. Wireless Engineer, 7(6), 536\u2013541.","journal-title":"Wireless Engineer"},{"key":"2420_CR5","doi-asserted-by":"publisher","unstructured":"Carreira, J., & Zisserman, A. (2017). Quo vadis, action recognition? a new model and the kinetics dataset. In: IEEE Conference on Computer Vision and Pattern Recognition. Honolulu, HI, USA, pp. 6299\u20136308. https:\/\/doi.org\/10.48550\/arXiv.1705.07750.","DOI":"10.48550\/arXiv.1705.07750"},{"issue":"3","key":"2420_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1\u201358. https:\/\/doi.org\/10.1145\/1541880.1541882","journal-title":"ACM Computing Surveys"},{"key":"2420_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.107969","volume":"116","author":"D Chen","year":"2021","unstructured":"Chen, D., Yue, L., Chang, X., Xu, M., & Jia, T. (2021). NM-GAN: Noise-modulated generative adversarial network for video anomaly detection. Pattern Recognition, 116, 107969. https:\/\/doi.org\/10.1016\/j.patcog.2021.107969","journal-title":"Pattern Recognition"},{"key":"2420_CR8","doi-asserted-by":"publisher","first-page":"120043","DOI":"10.1109\/ACCESS.2021.3107975","volume":"9","author":"K Choi","year":"2021","unstructured":"Choi, K., Yi, J., Park, C., & Yoon, S. (2021). Deep learning for anomaly detection in time-series data: Review, analysis, and guidelines. IEEE Access, 9, 120043\u2013120065. https:\/\/doi.org\/10.1109\/ACCESS.2021.3107975","journal-title":"IEEE Access"},{"key":"2420_CR9","doi-asserted-by":"publisher","unstructured":"Dumoulin, V., & Visin, F. (2016). A guide to convolution arithmetic for deep learning. arXiv preprint arXiv:1603.07285. https:\/\/doi.org\/10.48550\/arXiv.1603.07285.","DOI":"10.48550\/arXiv.1603.07285"},{"key":"2420_CR10","doi-asserted-by":"publisher","unstructured":"Dwibedi, D., Aytar, Y., Tompson, J., Sermanet, P., & Zisserman, A. (2020). Counting out time: Class agnostic video repetition counting in the wild. In: IEEE\/CVF Conference on Computer Vision and Pattern Recognition. Seattle, WA, USA, pp. 10387\u201310396. https:\/\/doi.org\/10.48550\/arXiv.2006.15418.","DOI":"10.48550\/arXiv.2006.15418"},{"key":"2420_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s10845-023-02228-8","author":"C Gkournelos","year":"2023","unstructured":"Gkournelos, C., Konstantinou, C., Angelakis, P., Tzavara, E., & Makris, S. (2023). Praxis: A framework for AI-driven human action recognition in assembly. Journal of Intelligent Manufacturing. https:\/\/doi.org\/10.1007\/s10845-023-02228-8","journal-title":"Journal of Intelligent Manufacturing"},{"key":"2420_CR12","unstructured":"Goldstein, M., & Dengel, A. 9 (2012). Histogram-based outlier score (hbos): A fast unsupervised anomaly detection algorithm. KI-2012: poster and demo track. pp. 59\u201363.  Retrieved May 29, 2024, from https:\/\/api.semanticscholar.org\/CorpusID:3590788"},{"issue":"4","key":"2420_CR13","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12744","volume":"39","author":"D Gonzalez","year":"2022","unstructured":"Gonzalez, D., Patricio, M. A., Berlanga, A., & Molina, J. M. (2022). Variational autoencoders for anomaly detection in the behaviour of the elderly using electricity consumption data. Expert Systems, 39(4), e12744. https:\/\/doi.org\/10.1111\/exsy.12744","journal-title":"Expert Systems"},{"issue":"12","key":"2420_CR14","doi-asserted-by":"publisher","first-page":"18787","DOI":"10.1007\/s11042-021-10667-9","volume":"80","author":"Y Guan","year":"2021","unstructured":"Guan, Y., Hu, W., & Hu, X. (2021). Abnormal behavior recognition using 3D-CNN combined with LSTM. Multimed. Tools. Appl., 80(12), 18787\u201318801. https:\/\/doi.org\/10.1007\/s11042-021-10667-9","journal-title":"Multimed. Tools. Appl."},{"key":"2420_CR15","doi-asserted-by":"publisher","unstructured":"Gudovskiy, D., Ishizaka, S., & Kozuka, K. (2022). Cflow-ad: Real-time unsupervised anomaly detection with localization via conditional normalizing flows. In: Proceedings of the IEEE\/CVF Winter Conference on Applications of Computer Vision.Jan. 3. Waikoloa, HI, USA, pp. 98\u2013107. https:\/\/doi.org\/10.48550\/arXiv.2107.12571.","DOI":"10.48550\/arXiv.2107.12571"},{"key":"2420_CR16","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In: Proceedings of the IEEE conference on computer vision and pattern recognition. pp. 770\u2013778. https:\/\/doi.org\/10.48550\/arXiv.1512.03385.","DOI":"10.48550\/arXiv.1512.03385"},{"key":"2420_CR17","doi-asserted-by":"publisher","unstructured":"Hirschorn, O., & Avidan, S. (2023). Normalizing flows for human pose anomaly detection. In: Proceedings of the IEEE\/CVF International Conference on Computer Vision. pp. 13545\u201313554. https:\/\/doi.org\/10.48550\/arXiv.2211.10946.","DOI":"10.48550\/arXiv.2211.10946"},{"key":"2420_CR18","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.ins.2018.10.047","volume":"477","author":"M Hu","year":"2019","unstructured":"Hu, M., Feng, X., Ji, Z., Yan, K., & Zhou, S. (2019). A novel computational approach for discord search with local recurrence rates in multivariate time series. Information Sciences, 477, 220\u2013233. https:\/\/doi.org\/10.1016\/j.ins.2018.10.047","journal-title":"Information Sciences"},{"issue":"12","key":"2420_CR19","doi-asserted-by":"publisher","first-page":"13834","DOI":"10.1109\/TCYB.2021.3127716","volume":"52","author":"C Huang","year":"2021","unstructured":"Huang, C., Yang, Z., Wen, J., Xu, Y., Jiang, Q., Yang, J., et al. (2021). Self-supervision-augmented deep autoencoder for unsupervised visual anomaly detection. IEEE Transactions on Cybernetics, 52(12), 13834\u201313847. https:\/\/doi.org\/10.1109\/TCYB.2021.3127716","journal-title":"IEEE Transactions on Cybernetics"},{"key":"2420_CR20","volume-title":"Forecasting: principles and practice","author":"RJ Hyndman","year":"2018","unstructured":"Hyndman, R. J., & Athanasopoulos, G. (2018). Forecasting: principles and practice. OTexts."},{"issue":"5","key":"2420_CR21","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1007\/s11263-022-01594-9","volume":"130","author":"Y Kong","year":"2022","unstructured":"Kong, Y., & Fu, Y. (2022). Human action recognition and prediction: A survey. International Journal of Computer Vision, 130(5), 1366\u20131401. https:\/\/doi.org\/10.1007\/s11263-022-01594-9","journal-title":"International Journal of Computer Vision"},{"issue":"19","key":"2420_CR22","doi-asserted-by":"publisher","first-page":"12043","DOI":"10.1007\/s11042-016-3322-5","volume":"75","author":"J Lei","year":"2016","unstructured":"Lei, J., Jiang, T., Wu, K., Du, H., Zhu, G., & Wang, Z. (2016). Robust K-means algorithm with automatically splitting and merging clusters and its applications for surveillance data. Multimedia Tools and Applications, 75(19), 12043\u201312059. https:\/\/doi.org\/10.1007\/s11042-016-3322-5","journal-title":"Multimedia Tools and Applications"},{"key":"2420_CR23","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.patrec.2022.03.004","volume":"156","author":"D Li","year":"2022","unstructured":"Li, D., Nie, X., Li, X., Zhang, Y., & Yin, Y. (2022). Context-related video anomaly detection via generative adversarial network. Pattern Recognition Letters, 156, 183\u2013189. https:\/\/doi.org\/10.1016\/j.patrec.2022.03.004","journal-title":"Pattern Recognition Letters"},{"issue":"10","key":"2420_CR24","doi-asserted-by":"publisher","first-page":"2684","DOI":"10.1109\/TPAMI.2019.2916873","volume":"42","author":"J Liu","year":"2019","unstructured":"Liu, J., Shahroudy, A., Perez, M., Wang, G., Duan, L.-Y., & Kot, A. C. (2019). Ntu rgb+ d 120: A large-scale benchmark for 3d human activity understanding. IEEE Transactions on Pattern Analysis and Machine Intelligence, 42(10), 2684\u20132701. https:\/\/doi.org\/10.1109\/TPAMI.2019.2916873","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"1","key":"2420_CR25","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s00530-022-00979-7","volume":"29","author":"W Liu","year":"2023","unstructured":"Liu, W., Cao, J., Zhu, Y., Liu, B., & Zhu, X. (2023). Real-time anomaly detection on surveillance video with two-stream spatio-temporal generative model. Multimedia Systems, 29(1), 59\u201371. https:\/\/doi.org\/10.1007\/s00530-022-00979-7","journal-title":"Multimedia Systems"},{"key":"2420_CR26","doi-asserted-by":"publisher","unstructured":"Nugroho, L. E., Lazuardi, L., & Prabuwono, A. S. (2018). Detection of anomalous vital sign of elderly using hybrid k-means clustering and isolation forest. In: TENCON 2018\u20132018 IEEE Region 10 Conference. October 28. Jeju Island, Korea: IEEE, pp. 0913\u20130918. https:\/\/doi.org\/10.1109\/TENCON.2018.8650457.","DOI":"10.1109\/TENCON.2018.8650457"},{"issue":"1","key":"2420_CR27","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1186\/s12888-022-03923-1","volume":"22","author":"A Ortiz","year":"2022","unstructured":"Ortiz, A., Hintze, A., Burnett, R., Gonzalez-Torres, C., Unger, S., Yang, D., et al. (2022). Identifying patient-specific behaviors to understand illness trajectories and predict relapses in bipolar disorder using passive sensing and deep anomaly detection: Protocol for a contactless cohort study. BMC Psychiatry, 22(1), 288. https:\/\/doi.org\/10.1186\/s12888-022-03923-1","journal-title":"BMC Psychiatry"},{"issue":"2","key":"2420_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439950","volume":"54","author":"G Pang","year":"2021","unstructured":"Pang, G., Shen, C., Cao, L., & Hengel, A. V. D. (2021). Deep learning for anomaly detection: A review. ACM Computing Surveys, 54(2), 1\u201338. https:\/\/doi.org\/10.1145\/3439950","journal-title":"ACM Computing Surveys"},{"issue":"3","key":"2420_CR29","doi-asserted-by":"publisher","first-page":"2259","DOI":"10.1007\/s10462-020-09904-8","volume":"54","author":"P Pareek","year":"2021","unstructured":"Pareek, P., & Thakkar, A. (2021). A survey on video-based Human Action Recognition: Recent updates, datasets, challenges, and applications. Artificial Intelligence Review, 54(3), 2259\u20132322. https:\/\/doi.org\/10.1007\/s10462-020-09904-8","journal-title":"Artificial Intelligence Review"},{"issue":"5","key":"2420_CR30","doi-asserted-by":"publisher","first-page":"561","DOI":"10.3233\/IDA-2007-11508","volume":"11","author":"S Salvador","year":"2007","unstructured":"Salvador, S., & Chan, P. (2007). Toward accurate dynamic time warping in linear time and space. Intell. Data Anal., 11(5), 561\u2013580. https:\/\/doi.org\/10.3233\/IDA-2007-11508","journal-title":"Intell. Data Anal."},{"key":"2420_CR31","doi-asserted-by":"publisher","unstructured":"Schuldt, C., Laptev, I., & Caputo, B. 3 (2004). Recognizing human actions: a local SVM approach. In: Proceedings of the 17th International Conference on Pattern Recognition. IEEE, pp. 32\u201336. https:\/\/doi.org\/10.1109\/ICPR.2004.1334462.","DOI":"10.1109\/ICPR.2004.1334462"},{"key":"2420_CR32","doi-asserted-by":"publisher","unstructured":"Shahroudy, A., Liu, J., Ng, T.-T., & Wang, G. (2016). Ntu rgb+ d: A large scale dataset for 3d human activity analysis. In: Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., pp. 1010\u20131019. https:\/\/doi.org\/10.1109\/CVPR.2016.115.","DOI":"10.1109\/CVPR.2016.115"},{"key":"2420_CR33","unstructured":"Sutrisno, H., & Yang, C.-L. (2021). Discovering defective products based on multivariate sensors data using local recurrence rate and robust k-means clustering. In: The 26th International Conference on Production Research (ICPR-26)."},{"key":"2420_CR34","doi-asserted-by":"publisher","first-page":"44278","DOI":"10.1109\/ACCESS.2022.3165977","volume":"10","author":"L Wang","year":"2022","unstructured":"Wang, L., Tan, H., Zhou, F., Zuo, W., & Sun, P. (2022). Unsupervised anomaly video detection via a double-flow ConvLSTM variational autoencoder. IEEE Access, 10, 44278\u201344289. https:\/\/doi.org\/10.1109\/ACCESS.2022.3165977","journal-title":"IEEE Access"},{"issue":"6","key":"2420_CR35","doi-asserted-by":"publisher","first-page":"1806","DOI":"10.1007\/s10618-018-0569-7","volume":"32","author":"X Wang","year":"2018","unstructured":"Wang, X., Lin, J., Patel, N., & Braun, M. (2018). Exact variable-length anomaly detection algorithm for univariate and multivariate time series. Data Min Knowl Discov, 32(6), 1806\u20131844. https:\/\/doi.org\/10.1007\/s10618-018-0569-7","journal-title":"Data Min Knowl Discov"},{"issue":"2","key":"2420_CR36","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1103\/RevModPhys.50.221","volume":"50","author":"A Wehrl","year":"1978","unstructured":"Wehrl, A. (1978). General properties of entropy. Reviews of Modern Physics, 50(2), 221. https:\/\/doi.org\/10.1103\/RevModPhys.50.221","journal-title":"Reviews of Modern Physics"},{"key":"2420_CR37","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1016\/j.neucom.2021.12.093","volume":"493","author":"X Xia","year":"2022","unstructured":"Xia, X., Pan, X., Li, N., He, X., Ma, L., Zhang, X., et al. (2022). GAN-based anomaly detection: A review. Neurocomputing, 493, 497\u2013535. https:\/\/doi.org\/10.1016\/j.neucom.2021.12.093","journal-title":"Neurocomputing"},{"key":"2420_CR38","doi-asserted-by":"publisher","unstructured":"Yang, C. L., Hsu, S. C., Hsu, Y. W., & Kang, Y. C. (2021). Human action recognition on exceptional movement of worker operation. In: AHFE. Springer, pp. 376\u2013383. https:\/\/doi.org\/10.1007\/978-3-030-80462-6_46.","DOI":"10.1007\/978-3-030-80462-6_46"},{"issue":"12","key":"2420_CR39","doi-asserted-by":"publisher","first-page":"4812","DOI":"10.1109\/TCSVT.2021.3055220","volume":"31","author":"J Yin","year":"2021","unstructured":"Yin, J., Wu, Y., Zhu, C., Yin, Z., Liu, H., Dang, Y., et al. (2021). Energy-based periodicity mining with deep features for action repetition counting in unconstrained videos. IEEE Transactions on Circuits and Systems for Video Technology, 31(12), 4812\u20134825. https:\/\/doi.org\/10.1109\/TCSVT.2021.3055220","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"2420_CR40","doi-asserted-by":"publisher","unstructured":"Yu, J., Zheng, Y., Wang, X., Li, W., Wu, Y., Zhao, R., et al. (2021). Fastflow: Unsupervised anomaly detection and localization via 2d normalizing flows. arXiv preprint arXiv:.07677. https:\/\/doi.org\/10.48550\/arXiv.2111.07677.","DOI":"10.48550\/arXiv.2111.07677"},{"key":"2420_CR41","doi-asserted-by":"publisher","unstructured":"Zhang, Y., Shao, L., & Snoek, C. G. (2021). Repetitive activity counting by sight and sound. In: Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., pp. 14070\u201314079. https:\/\/doi.org\/10.1109\/CVPR46437.2021.01385","DOI":"10.1109\/CVPR46437.2021.01385"},{"key":"2420_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2021.104120","volume":"108","author":"K Zhou","year":"2021","unstructured":"Zhou, K., Hui, B., Wang, J., Wang, C., & Wu, T. (2021). A study on attention-based LSTM for abnormal behavior recognition with variable pooling. Image and Vision Computing, 108, 104120. https:\/\/doi.org\/10.1016\/j.imavis.2021.104120","journal-title":"Image and Vision Computing"},{"key":"2420_CR43","doi-asserted-by":"publisher","unstructured":"Zhu, Y., Yeh, C.-C. M., Zimmerman, Z., Kamgar, K., & Keogh, E. (2018). Matrix profile XI: SCRIMP++: Time series motif discovery at interactive speeds. In: ICDM. IEEE, pp. 837\u2013846. https:\/\/doi.org\/10.1109\/ICDM.2018.00099.","DOI":"10.1109\/ICDM.2018.00099"}],"container-title":["Journal of Intelligent Manufacturing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10845-024-02420-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10845-024-02420-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10845-024-02420-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T14:44:55Z","timestamp":1752590695000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10845-024-02420-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,6]]},"references-count":43,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["2420"],"URL":"https:\/\/doi.org\/10.1007\/s10845-024-02420-4","relation":{},"ISSN":["0956-5515","1572-8145"],"issn-type":[{"type":"print","value":"0956-5515"},{"type":"electronic","value":"1572-8145"}],"subject":[],"published":{"date-parts":[[2024,6,6]]},"assertion":[{"value":"27 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 June 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"None.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The ethical review of this research has been approved by Research Ethics Committee of National Taiwan University under case number: 202106EM042 and has been classified as expedited on August 02, 2021. The committee is organized under, and operates in accordance with, Social and Behavioral Research Ethical Principles and Regulations of National Taiwan University and governmental laws and regulations.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}