{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:02:59Z","timestamp":1765231379035,"version":"3.40.5"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T00:00:00Z","timestamp":1732492800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01809-5","type":"journal-article","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T13:19:10Z","timestamp":1732540750000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["EEPS: Optimizing energy-efficient path selection in the Internet of Battlefield Things (IoBT) utilizing SDN"],"prefix":"10.1007","volume":"18","author":[{"given":"Sumayah A.","family":"Almuntasheri","sequence":"first","affiliation":[]},{"given":"Mohammed J. F.","family":"Alenazi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,25]]},"reference":[{"key":"1809_CR1","doi-asserted-by":"publisher","unstructured":"Feng Y, Li M, Zeng C, Liu H (2020) Robustness of internet of battlefield things (iobt): A directed network perspective. Entropy 22(10). https:\/\/doi.org\/10.3390\/e22101166. https:\/\/www.mdpi.com\/1099-4300\/22\/10\/1166","DOI":"10.3390\/e22101166"},{"issue":"4","key":"1809_CR2","doi-asserted-by":"publisher","first-page":"2618","DOI":"10.1109\/TWC.2018.2799860","volume":"17","author":"MJ Farooq","year":"2018","unstructured":"Farooq MJ, Zhu Q (2018) On the secure and reconfigurable multi-layer network design for critical information dissemination in the internet of battlefield things (iobt). IEEE Trans Wireless Commun 17(4):2618\u20132632. https:\/\/doi.org\/10.1109\/TWC.2018.2799860","journal-title":"IEEE Trans Wireless Commun"},{"key":"1809_CR3","doi-asserted-by":"publisher","unstructured":"Shi H, Zhao H, Liu Y, Gao W, Dou SC (2019) Systematic analysis of a military wearable device based on a multi-level fusion framework: Research directions. Sensors 19(12). https:\/\/doi.org\/10.3390\/s19122651. https:\/\/www.mdpi.com\/1424-8220\/19\/12\/2651","DOI":"10.3390\/s19122651"},{"issue":"2","key":"1809_CR4","doi-asserted-by":"publisher","first-page":"3712","DOI":"10.1109\/JIOT.2018.2890431","volume":"6","author":"Y Hu","year":"2019","unstructured":"Hu Y, Sanjab A, Saad W (2019) Dynamic psychological game theory for secure internet of battlefield things (iobt) systems. IEEE Internet Things J 6(2):3712\u20133726. https:\/\/doi.org\/10.1109\/JIOT.2018.2890431","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"1809_CR5","first-page":"95","volume":"10","author":"P Rutravigneshwaran","year":"2023","unstructured":"Rutravigneshwaran P, Anitha G (2023) Security model to mitigate black hole attack on internet of battlefield things (iobt) using trust and k-means clustering algorithm. Int J Comput Networks Appl 10(1):95","journal-title":"Int J Comput Networks Appl"},{"key":"1809_CR6","doi-asserted-by":"publisher","first-page":"15540","DOI":"10.1109\/ACCESS.2023.3244138","volume":"11","author":"B Alkanjr","year":"2023","unstructured":"Alkanjr B, Mahgoub I (2023) A novel deception-based scheme to secure the location information for iobt entities. IEEE Access 11:15540\u201315554. https:\/\/doi.org\/10.1109\/ACCESS.2023.3244138","journal-title":"IEEE Access"},{"issue":"11","key":"1809_CR7","doi-asserted-by":"publisher","first-page":"2006","DOI":"10.1109\/TPDS.2024.3453607","volume":"35","author":"H Lu","year":"2024","unstructured":"Lu H, Lyu F, Ren J, Wu H, Zhou C, Liu Z, Zhang Y, Shen X (2024) Code$$^{+}$$+: fast and accurate inference for compact distributed iot data collection. IEEE Trans Parallel Distrib Syst 35(11):2006\u20132022. https:\/\/doi.org\/10.1109\/TPDS.2024.3453607","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"3","key":"1809_CR8","doi-asserted-by":"publisher","first-page":"5184","DOI":"10.1109\/JIOT.2019.2899022","volume":"6","author":"Q Ju","year":"2019","unstructured":"Ju Q, Sun G, Li H, Zhang Y (2019) Collaborative in-network processing for internet of battery-less things. IEEE Internet Things J 6(3):5184\u20135195. https:\/\/doi.org\/10.1109\/JIOT.2019.2899022","journal-title":"IEEE Internet Things J"},{"issue":"12","key":"1809_CR9","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MC.2016.355","volume":"49","author":"A Kott","year":"2016","unstructured":"Kott A, Swami A, West BJ (2016) The internet of battle things. Computer 49(12):70\u201375. https:\/\/doi.org\/10.1109\/MC.2016.355","journal-title":"Computer"},{"issue":"1","key":"1809_CR10","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1109\/TMC.2022.3220720","volume":"23","author":"S Duan","year":"2024","unstructured":"Duan S, Lyu F, Wu H, Chen W, Lu H, Dong Z, Shen X (2024) Moto: Mobility-aware online task offloading with adaptive load balancing in small-cell mec. IEEE Trans Mob Comput 23(1):645\u2013659. https:\/\/doi.org\/10.1109\/TMC.2022.3220720","journal-title":"IEEE Trans Mob Comput"},{"key":"1809_CR11","doi-asserted-by":"crossref","unstructured":"Rajabhushanam C, Kathirvel A (2011) Survey of wireless manet application in battlefield operations. Int J Adv Comput Sci Appl 2(1)","DOI":"10.14569\/IJACSA.2011.020108"},{"issue":"2","key":"1809_CR12","doi-asserted-by":"publisher","first-page":"1739","DOI":"10.17762\/turcomat.v12i2.1510","volume":"12","author":"U Srilakshmi","year":"2021","unstructured":"Srilakshmi U et al (2021) Modified energy efficient with aco routing protocol for manet. Turk J Comput Math Educ (TURCOMAT) 12(2):1739\u20131745","journal-title":"Turk J Comput Math Educ (TURCOMAT)"},{"key":"1809_CR13","doi-asserted-by":"crossref","unstructured":"Nuiaa RR, Alsaeedi AH, Alkafagi SS, Alfoudi ASD (2022) A critical review of optimization manet routing protocols. Wasit J Comput Math Sci 1(4)","DOI":"10.31185\/wjcm.94"},{"issue":"10","key":"1809_CR14","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/MCOM.2016.7588285","volume":"54","author":"J Nobre","year":"2016","unstructured":"Nobre J, Rosario D, Both C, Cerqueira E, Gerla M (2016) Toward software-defined battlefield networking. IEEE Commun Mag 54(10):152\u2013157. https:\/\/doi.org\/10.1109\/MCOM.2016.7588285","journal-title":"IEEE Commun Mag"},{"key":"1809_CR15","doi-asserted-by":"crossref","unstructured":"Yoon S, Cho JH, Dixit G, Chen R (2021) Resource-aware intrusion response based on deep reinforcement learning for software-defined internet-of-battle-things. Game Theory and Machine Learning for Cyber Security","DOI":"10.1002\/9781119723950.ch20"},{"key":"1809_CR16","doi-asserted-by":"publisher","unstructured":"Deb R, Roy S (2022) A comprehensive survey of vulnerability and information security in sdn. Comput Netw 206:108802. https:\/\/doi.org\/10.1016\/j.comnet.2022.108802. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128622000299","DOI":"10.1016\/j.comnet.2022.108802"},{"issue":"2","key":"1809_CR17","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s40860-022-00171-8","volume":"9","author":"Y Maleh","year":"2023","unstructured":"Maleh Y, Qasmaoui Y, El Gholami K, Sadqi Y, Mounir S (2023) A comprehensive survey on sdn security: Threats, mitigations, and future directions. J Reliab Intell Environ 9(2):201\u2013239","journal-title":"J Reliab Intell Environ"},{"key":"1809_CR18","doi-asserted-by":"publisher","unstructured":"Gkioulos V, Gunleifsen H, Weldehawaryat GK (2018) A systematic literature review on military software defined networks. Future Internet 10(9). https:\/\/doi.org\/10.3390\/fi10090088. https:\/\/www.mdpi.com\/1999-5903\/10\/9\/88","DOI":"10.3390\/fi10090088"},{"issue":"7","key":"1809_CR19","doi-asserted-by":"publisher","first-page":"3239","DOI":"10.1007\/s11276-023-03367-9","volume":"29","author":"A Nazari","year":"2023","unstructured":"Nazari A, Kordabadi M, Mohammadi R, Lal C (2023) Eqrsrl: An energy-aware and qos-based routing schema using reinforcement learning in iomt. Wireless Netw 29(7):3239\u20133253","journal-title":"Wireless Netw"},{"issue":"2","key":"1809_CR20","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11235-021-00812-y","volume":"78","author":"R Mohammadi","year":"2021","unstructured":"Mohammadi R, Nazari A, Nassiri M, Conti M (2021) An sdn-based framework for qos routing in internet of underwater things. Telecommun Syst 78(2):253\u2013266","journal-title":"Telecommun Syst"},{"key":"1809_CR21","doi-asserted-by":"publisher","unstructured":"Abbas T, Qamar F, Hindia MN, Hassan R, Ahmed I, Aslam MI (2020) In: 2020 IEEE Student Conference on Research and Development (SCOReD), pp 194\u2013199. https:\/\/doi.org\/10.1109\/SCOReD50371.2020.9250989","DOI":"10.1109\/SCOReD50371.2020.9250989"},{"key":"1809_CR22","doi-asserted-by":"publisher","unstructured":"Shafi S, Mounika S, Velliangiri S (2023) Machine learning and trust based aodv routing protocol to mitigate flooding and blackhole attacks in manet. Procedia Comput Sci 218:2309\u20132318. https:\/\/doi.org\/10.1016\/j.procs.2023.01.206. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050923002065. International Conference on Machine Learning and Data Engineering","DOI":"10.1016\/j.procs.2023.01.206"},{"issue":"12","key":"1809_CR23","doi-asserted-by":"publisher","first-page":"11725","DOI":"10.1109\/JIOT.2020.2999542","volume":"7","author":"NB Gaikwad","year":"2020","unstructured":"Gaikwad NB, Ugale H, Keskar A, Shivaprakash NC (2020) The internet-of-battlefield-things (iobt)-based enemy localization using soldiers location and gunshot direction. IEEE Internet Things J 7(12):11725\u201311734. https:\/\/doi.org\/10.1109\/JIOT.2020.2999542","journal-title":"IEEE Internet Things J"},{"key":"1809_CR24","doi-asserted-by":"publisher","unstructured":"Alkanjr B, Alshammari T (2023) In: 2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC), pp 0886\u20130892. https:\/\/doi.org\/10.1109\/CCWC57344.2023.10099340","DOI":"10.1109\/CCWC57344.2023.10099340"},{"key":"1809_CR25","unstructured":"Bhatnagar G, G N, Aqeel H, Solanki BS (2023) Sparrow-based differential evolutionary search algorithm for mobility aware energy efficient clustering in manet network. Int J Intell Syst Appl Eng 11(8s):135-142 . https:\/\/ijisae.org\/index.php\/IJISAE\/article\/view\/3032"},{"key":"1809_CR26","doi-asserted-by":"publisher","unstructured":"Eltahlawy AM, Aslan AM, Abdallah EG, Elsayed MS, Jurcut AD, Azer MA (2023) A survey on parameters affecting manet performance. Electronics 12(9). https:\/\/doi.org\/10.3390\/electronics12091956. https:\/\/www.mdpi.com\/2079-9292\/12\/9\/1956","DOI":"10.3390\/electronics12091956"},{"key":"1809_CR27","doi-asserted-by":"crossref","unstructured":"Vuyyuru VA, Alotaibi Y, Veeraiah N, Alghamdi S, Sirisha K (2023) Esecc_sdn: Attack detection and classification model for manet. Computers, Materials & Continua 74(3)","DOI":"10.32604\/cmc.2023.032140"},{"key":"1809_CR28","doi-asserted-by":"publisher","unstructured":"Agrawal R, Faujdar N, Romero CAT, Sharma O, Abdulsahib GM, Khalaf OI, Mansoor RF, Ghoneim OA (2023) Classification and comparison of ad hoc networks: A review. Egypt Inform J 24(1):1\u201325. https:\/\/doi.org\/10.1016\/j.eij.2022.10.004. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1110866522000652","DOI":"10.1016\/j.eij.2022.10.004"},{"key":"1809_CR29","doi-asserted-by":"publisher","unstructured":"Pasandideh F, da\u00a0Costa JPJ, Kunst R, Islam N, Hardjawana W, Pignaton\u00a0de Freitas E (2022) A review of flying ad hoc networks: Key characteristics, applications, and wireless technologies. Remote Sens 14(18). https:\/\/doi.org\/10.3390\/rs14184459. https:\/\/www.mdpi.com\/2072-4292\/14\/18\/4459","DOI":"10.3390\/rs14184459"},{"key":"1809_CR30","doi-asserted-by":"publisher","unstructured":"Sang Q, Wu H, Xing L, Xie P (2020) Review and comparison of emerging routing protocols in flying ad hoc networks. Symmetry 12(6). https:\/\/doi.org\/10.3390\/sym12060971. https:\/\/www.mdpi.com\/2073-8994\/12\/6\/971","DOI":"10.3390\/sym12060971"},{"issue":"2","key":"1809_CR31","doi-asserted-by":"publisher","first-page":"1071","DOI":"10.1109\/COMST.2020.2982452","volume":"22","author":"DS Lakew","year":"2020","unstructured":"Lakew DS, Sa\u2019ad U, Dao NN, Na W, Cho S (2020) Routing in flying ad hoc networks: A comprehensive survey. IEEE Commun Surv Tutor 22(2):1071\u20131120. https:\/\/doi.org\/10.1109\/COMST.2020.2982452","journal-title":"IEEE Commun Surv Tutor"},{"key":"1809_CR32","unstructured":"Alhaj AN, Dutta N (2022) In: Sarma HKD, Balas VE, Bhuyan B, Dutta N (eds) Contemporary issues in communication, cloud and big data analytics. Singapore, Springer Singapore, pp 27\u201337"},{"issue":"1","key":"1809_CR33","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11277-021-08920-3","volume":"122","author":"S Bhardwaj","year":"2022","unstructured":"Bhardwaj S, Panda SN (2022) Performance evaluation using ryu sdn controller in software-defined networking environment. Wireless Pers Commun 122(1):701\u2013723","journal-title":"Wireless Pers Commun"},{"key":"1809_CR34","doi-asserted-by":"publisher","unstructured":"Douha NYR, Bhuyan M, Kashihara S, Fall D, Taenaka Y, Kadobayashi Y (2022) A survey on blockchain, sdn and nfv for the smart-home security. Internet of Things 20:100588. https:\/\/doi.org\/10.1016\/j.iot.2022.100588. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2542660522000750","DOI":"10.1016\/j.iot.2022.100588"},{"key":"1809_CR35","doi-asserted-by":"publisher","unstructured":"Rahouti M, Xiong K, Xin Y, Jagatheesaperumal SK, Ayyash M, Shaheed M (2022) Sdn security review: Threat taxonomy, implications, and open challenges. IEEE Access 10:45820\u201345854. https:\/\/doi.org\/10.1109\/ACCESS.2022.3168972","DOI":"10.1109\/ACCESS.2022.3168972"},{"issue":"4","key":"1809_CR36","doi-asserted-by":"publisher","first-page":"2093","DOI":"10.1109\/TGCN.2023.3296272","volume":"7","author":"R Samadi","year":"2023","unstructured":"Samadi R, Nazari A, Seitz J (2023) Intelligent energy-aware routing protocol in mobile iot networks based on sdn. IEEE Trans Green Commun Netw 7(4):2093\u20132103. https:\/\/doi.org\/10.1109\/TGCN.2023.3296272","journal-title":"IEEE Trans Green Commun Netw"},{"issue":"3","key":"1809_CR37","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1504\/IJSNET.2023.132543","volume":"42","author":"A Nazari","year":"2023","unstructured":"Nazari A, Mohammadi R, Niknami N, Jazaeri SS, Wu J (2023) The fuzzy-iavoa energy-aware routing algorithm for sdn-based iot networks. Int J Sens Netw 42(3):156\u2013169","journal-title":"Int J Sens Netw"},{"key":"1809_CR38","doi-asserted-by":"publisher","DOI":"10.1515\/joc-2022-0204","author":"V Tyagi","year":"2022","unstructured":"Tyagi V, Singh S (2022) A novel energy efficient routing technique for sdn-enabled underwater wsns using free-space optical communication. J Opt Commun. https:\/\/doi.org\/10.1515\/joc-2022-0204","journal-title":"J Opt Commun"},{"key":"1809_CR39","doi-asserted-by":"publisher","unstructured":"Cicio\u011flu M, \u00c7alhan A (2020) Energy-efficient and sdn-enabled routing algorithm for wireless body area networks. Comput Commun 160:228\u2013239. https:\/\/doi.org\/10.1016\/j.comcom.2020.06.003. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S014036641931984X","DOI":"10.1016\/j.comcom.2020.06.003"},{"key":"1809_CR40","doi-asserted-by":"publisher","unstructured":"Ouhab A, Abreu T, Slimani H, Mellouk A (2020) In: ICC 2020 - 2020 IEEE International Conference on Communications (ICC), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICC40277.2020.9148659","DOI":"10.1109\/ICC40277.2020.9148659"},{"key":"1809_CR41","doi-asserted-by":"publisher","unstructured":"Abbad L, Nacer A, Abbad H, Taieb Brahim M, Zioui N (2022) A weighted markov-clustering routing protocol for optimizing energy use in wireless sensor networks. Egypt Inform J 23(3):483\u2013497. https:\/\/doi.org\/10.1016\/j.eij.2022.05.001. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1110866522000299","DOI":"10.1016\/j.eij.2022.05.001"},{"key":"1809_CR42","unstructured":"Tan ND, Hoang HN (2022) In: Proceedings of the the Seventh International Conference on Research in Intelligent and Computing in Engineering, Hung Yen, Vietnam, pp 11\u201312"},{"key":"1809_CR43","doi-asserted-by":"crossref","unstructured":"Sennan S, Alotaibi Y, Pandey D, Alghamdi S et\u00a0al (2022) Eacr-leach: Energy-aware cluster-based routing protocol for wsn based iot. Computers, Materials & Continua 72(2)","DOI":"10.32604\/cmc.2022.025773"},{"issue":"12","key":"1809_CR44","doi-asserted-by":"publisher","first-page":"2558","DOI":"10.1002\/spe.2797","volume":"51","author":"C Iwendi","year":"2021","unstructured":"Iwendi C, Maddikunta PKR, Gadekallu TR, Lakshmanna K, Bashir AK, Piran MJ (2021) A metaheuristic optimization approach for energy efficiency in the iot networks. Softw Pract Exper 51(12):2558\u20132571","journal-title":"Softw Pract Exper"},{"key":"1809_CR45","doi-asserted-by":"publisher","first-page":"200500","DOI":"10.1109\/ACCESS.2020.3035624","volume":"8","author":"AAH Hassan","year":"2020","unstructured":"Hassan AAH, Shah WM, Habeb AHH, Othman MFI, Al-Mhiqani MN (2020) An improved energy-efficient clustering protocol to prolong the lifetime of the wsn-based iot. IEEE Access 8:200500\u2013200517. https:\/\/doi.org\/10.1109\/ACCESS.2020.3035624","journal-title":"IEEE Access"},{"key":"1809_CR46","doi-asserted-by":"publisher","unstructured":"Fontes RR, Afzal S, Brito SHB, Santos MAS, Rothenberg CE (2015) In: 2015 11th International Conference on Network and Service Management (CNSM), pp 384\u2013389. https:\/\/doi.org\/10.1109\/CNSM.2015.7367387","DOI":"10.1109\/CNSM.2015.7367387"},{"issue":"1","key":"1809_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.29304\/jqcm.2022.14.1.879","volume":"14","author":"AT Albu-Salih","year":"2022","unstructured":"Albu-Salih AT (2022) Performance evaluation of ryu controller in software defined networks. J Al-qadisiyah Comput Sci Math 14(1):1","journal-title":"J Al-qadisiyah Comput Sci Math"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01809-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01809-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01809-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:32:19Z","timestamp":1747474339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01809-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,25]]},"references-count":47,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1809"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01809-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,11,25]]},"assertion":[{"value":"1 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"All persons listed as authors have contributed to preparing the manuscript, agree with the presented work, and have provided their consent for authorship. Each author has read and approved the final version of the manuscript and accepts responsibility for its content.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All persons listed as authors agree to the publication of the paper.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":6,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"14"}}