{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T04:49:17Z","timestamp":1768711757545,"version":"3.49.0"},"reference-count":60,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T00:00:00Z","timestamp":1709596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T00:00:00Z","timestamp":1709596800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s12652-024-04757-3","type":"journal-article","created":{"date-parts":[[2024,3,5]],"date-time":"2024-03-05T09:02:38Z","timestamp":1709629358000},"page":"2317-2340","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Fuzzy knowledge based intelligent decision support system for ground based air defence"],"prefix":"10.1007","volume":"15","author":[{"given":"Adnan","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Rawan","family":"Amjad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5744-6498","authenticated-orcid":false,"given":"Amna","family":"Basharat","sequence":"additional","affiliation":[]},{"given":"Asma Ahmad","family":"Farhan","sequence":"additional","affiliation":[]},{"given":"Ali Ezad","family":"Abbas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,5]]},"reference":[{"issue":"8","key":"4757_CR1","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1007\/s11590-014-0823-x","volume":"9","author":"DK Ahner","year":"2015","unstructured":"Ahner DK, Parson CR (2015) Optimal multi-stage allocation of weapons to targets using adaptive dynamic programming. Optim Lett 9(8):1689\u20131701","journal-title":"Optim Lett"},{"issue":"6","key":"4757_CR2","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1287\/opre.1070.0440","volume":"55","author":"RK Ahuja","year":"2007","unstructured":"Ahuja RK, Kumar A, Jha KC et al (2007) Exact and heuristic algorithms for the weapon\u2013target assignment problem. Oper Res 55(6):1136\u20131146","journal-title":"Oper Res"},{"key":"4757_CR3","series-title":"Studies in fuzziness and soft computing","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53324-6","volume-title":"A first course in fuzzy logic, fuzzy dynamical systems, and biomathematics.","author":"LC Barros","year":"2017","unstructured":"Barros LC, Bassanezi RC, Lodwick WA (2017) Fuzzy sets theory and uncertainty in mathematical modeling. A first course in fuzzy logic, fuzzy dynamical systems, and biomathematics. Studies in fuzziness and soft computing, vol 347. Springer, Berlin, Heidelberg"},{"issue":"6","key":"4757_CR4","doi-asserted-by":"publisher","first-page":"1835","DOI":"10.1109\/TSMCB.2012.2231673","volume":"43","author":"ZR Bogdanowicz","year":"2012","unstructured":"Bogdanowicz ZR, Tolano A, Patel K et al (2012) Optimization of weapon\u2013target pairings based on kill probabilities. IEEE Trans Cybern 43(6):1835\u20131844","journal-title":"IEEE Trans Cybern"},{"key":"4757_CR5","doi-asserted-by":"crossref","unstructured":"Changwen Q, You H (2002) A method of threat assessment using multiple attribute decision making. In: 6th international conference on signal processing, 2002. IEEE, New York, pp 1091\u20131095","DOI":"10.1109\/ICOSP.2002.1179979"},{"key":"4757_CR6","doi-asserted-by":"crossref","unstructured":"Chen L, Wang W, Qu J, et\u00a0al (2020) A command and control system for air defense forces with augmented reality and multimodal interaction. J Phys Conf Ser, article no 012002","DOI":"10.1088\/1742-6596\/1627\/1\/012002"},{"key":"4757_CR7","unstructured":"Flood M (1957) Target-assignment model. In: Proceedings of the princeton university conference on linear programming. Princeton (NJ)"},{"issue":"9","key":"4757_CR8","doi-asserted-by":"publisher","first-page":"1360","DOI":"10.1093\/comjnl\/bxq010","volume":"53","author":"E Gelenbe","year":"2010","unstructured":"Gelenbe E, Timotheou S, Nicholson D (2010) Fast distributed near-optimum assignment of assets to tasks. Comput J 53(9):1360\u20131369","journal-title":"Comput J"},{"key":"4757_CR9","unstructured":"Georgieva P (2016) Fuzzy rule-based systems for decision-making. In: Engineering Sciences, Journal of the Bulgarian Academy of Sciences, vol LIII. pp 5\u201316. ISSN: 1312-5702"},{"issue":"5","key":"4757_CR10","doi-asserted-by":"publisher","first-page":"1257","DOI":"10.1007\/s10845-019-01510-y","volume":"31","author":"G Gonz\u00e1lez Rodr\u00edguez","year":"2020","unstructured":"Gonz\u00e1lez Rodr\u00edguez G, Gonzalez-Cava JM, M\u00e9ndez P\u00e9rez JA (2020) An intelligent decision support system for production planning based on machine learning. J Intell Manuf 31(5):1257\u20131273","journal-title":"J Intell Manuf"},{"key":"4757_CR11","doi-asserted-by":"crossref","unstructured":"Haider K, Tweedale J, Urlings P, et\u00a0al (2006) Intelligent decision support system in defense maintenance methodologies. In: 2006 international conference on emerging technologies. IEEE, New York, pp 560\u2013567","DOI":"10.1109\/ICET.2006.335948"},{"issue":"6","key":"4757_CR12","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1057\/jors.2011.79","volume":"63","author":"K Hausken","year":"2012","unstructured":"Hausken K, Zhuang J (2012) The timing and deterrence of terrorist attacks due to exogenous dynamics. J Oper Res Soc 63(6):726\u2013735","journal-title":"J Oper Res Soc"},{"issue":"3","key":"4757_CR13","doi-asserted-by":"publisher","first-page":"1032","DOI":"10.3390\/s22031032","volume":"22","author":"E Ho","year":"2022","unstructured":"Ho E, Rajagopalan A, Skvortsov A et al (2022) Game theory in defence applications: a review. Sensors 22(3):1032","journal-title":"Sensors"},{"key":"4757_CR14","unstructured":"Hocao\u011flu MF (2019) Rule based target evaluation and fire doctrine. In: Proceedings of the 2019 summer simulation conference. pp 1\u201312"},{"issue":"2","key":"4757_CR15","first-page":"28","volume":"6","author":"SC Huang","year":"2005","unstructured":"Huang SC, Li WM, Li W (2005) Multisensor management with ant colony algorithm for solving target assignment problem. J Air Force Eng Univ (Nat Sci Edn) (China) 6(2):28\u201331","journal-title":"J Air Force Eng Univ (Nat Sci Edn) (China)"},{"key":"4757_CR16","doi-asserted-by":"crossref","unstructured":"Johansson F, Falkman G (2008) A comparison between two approaches to threat evaluation in an air defense scenario. In: Modeling decisions for artificial intelligence: 5th international conference, MDAI 2008 Sabadell, Spain, October 30-31, 2008, pp 110\u2013121","DOI":"10.1007\/978-3-540-88269-5_11"},{"key":"4757_CR17","unstructured":"Johansson F, Falkman G (2009) An empirical investigation of the static weapon\u2013target allocation problem. In: Proceedings of the 3rd Sk\u00f6vde workshop on information fusion topics (SWIFT 2009), University of Sk\u00f6vde, pp 63\u201367"},{"key":"4757_CR18","doi-asserted-by":"crossref","unstructured":"Juan L, Jie C, Bin X (2015) Efficiently solving multi-objective dynamic weapon\u2013target assignment problems by NSGA-II. In: 2015 34th Chinese control conference (CCC)","DOI":"10.1109\/ChiCC.2015.7260033"},{"key":"4757_CR19","doi-asserted-by":"crossref","unstructured":"Julstrom BA (2009) String- and permutation-coded genetic algorithms for the static weapon\u2013target assignment problem. In: Proceedings of the 11th annual conference companion on genetic and evolutionary computation conference: late breaking papers, pp 2553\u20132558","DOI":"10.1145\/1570256.1570360"},{"issue":"17","key":"4757_CR20","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.ifacol.2016.09.002","volume":"49","author":"K Kalyanam","year":"2016","unstructured":"Kalyanam K, Rathinam S, Casbeer D et al (2016) Optimal threshold policy for sequential weapon target assignment. IFAC PapersOnLine 49(17):7\u201310","journal-title":"IFAC PapersOnLine"},{"issue":"6","key":"4757_CR21","doi-asserted-by":"publisher","first-page":"1759","DOI":"10.1016\/j.cor.2006.09.011","volume":"35","author":"O Karasakal","year":"2008","unstructured":"Karasakal O (2008) Air defense missile-target allocation models for a naval task group. Comput Oper Res 35(6):1759\u20131770","journal-title":"Comput Oper Res"},{"key":"4757_CR22","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.cor.2018.10.015","volume":"105","author":"A Kline","year":"2019","unstructured":"Kline A, Ahner D, Hill R (2019a) The weapon\u2013target assignment problem. Comput Oper Res 105:226\u2013236","journal-title":"Comput Oper Res"},{"issue":"3","key":"4757_CR23","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/s10732-018-9401-1","volume":"25","author":"AG Kline","year":"2019","unstructured":"Kline AG, Ahner DK, Lunday BJ (2019b) Real-time heuristic algorithms for the static weapon target assignment problem. J Heuristics 25(3):377\u2013397","journal-title":"J Heuristics"},{"key":"4757_CR24","doi-asserted-by":"crossref","unstructured":"Kolitz SE (1988) Analysis of a maximum marginal return assignment algorithm. In: Proceedings of the 27th IEEE conference on decision and control. IEEE, New York, pp 2431\u20132436","DOI":"10.1109\/CDC.1988.194778"},{"issue":"03","key":"4757_CR25","first-page":"185","volume":"2","author":"TS Kumar","year":"2020","unstructured":"Kumar TS (2020) Data mining based marketing decision support system using hybrid machine learning algorithm. J Artif Intell 2(03):185\u2013193","journal-title":"J Artif Intell"},{"key":"4757_CR26","unstructured":"Kumar S, Dixit AM (2012) Threat evaluation modelling for dynamic targets using fuzzy logic approach. In: International conference on computer science and engineering, pp 143\u2013149"},{"key":"4757_CR27","doi-asserted-by":"crossref","unstructured":"Lee ZJ, Lee WL (2003) A hybrid search algorithm of ant colony optimization and genetic algorithm applied to weapon\u2013target assignment problems. In: International conference on intelligent data engineering and automated learning. Springer, Berlin, pp 278\u2013285","DOI":"10.1007\/978-3-540-45080-1_37"},{"issue":"1\u20133","key":"4757_CR28","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.ins.2004.07.010","volume":"173","author":"ZJ Lee","year":"2005","unstructured":"Lee ZJ, Lee CY (2005) A hybrid search algorithm with heuristics for resource allocation problem. Inf Sci 173(1\u20133):155\u2013167","journal-title":"Inf Sci"},{"issue":"1","key":"4757_CR29","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/S1568-4946(02)00027-3","volume":"2","author":"ZJ Lee","year":"2002","unstructured":"Lee ZJ, Lee CY, Su SF (2002a) An immunity-based ant colony optimization algorithm for solving weapon\u2013target assignment problem. Appl Soft Comput 2(1):39\u201347","journal-title":"Appl Soft Comput"},{"issue":"3","key":"4757_CR30","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1080\/02533839.2002.9670703","volume":"25","author":"ZJ Lee","year":"2002","unstructured":"Lee ZJ, Su SF, Lee CY (2002b) A genetic algorithm with domain knowledge for weapon\u2013target assignment problems. J Chin Inst Eng 25(3):287\u2013295","journal-title":"J Chin Inst Eng"},{"key":"4757_CR31","doi-asserted-by":"crossref","unstructured":"Liebhaber MJ, Feher B (2002) Air threat assessment: research, model, and display guidelines. In: Proceedings of the 2002 command and control research and technology symposium, pp 90\u201393","DOI":"10.21236\/ADA458047"},{"key":"4757_CR32","unstructured":"Lloyd SP, Witsenhausen HS (1986) Weapons allocation is np-complete. In: 1986 summer computer simulation conference, pp 1054\u20131058"},{"key":"4757_CR33","unstructured":"L\u00f6tter DP, Van Vuuren JH (2014) Weapon assignment decision support in a surface-based air defence\nenvironment. Mil Oper Res 4052\u20134057"},{"issue":"1","key":"4757_CR34","doi-asserted-by":"publisher","first-page":"31","DOI":"10.5784\/29-1-138","volume":"29","author":"DP L\u00f6tter","year":"2013","unstructured":"L\u00f6tter DP, Nieuwoudt I, Van Vuuren JH (2013) A multiobjective approach towards weapon assignment in a ground-based air defence environment. ORiON 29(1):31\u201354","journal-title":"ORiON"},{"key":"4757_CR35","doi-asserted-by":"publisher","DOI":"10.1016\/j.omega.2019.102138","volume":"98","author":"Y Lu","year":"2021","unstructured":"Lu Y, Chen DZ (2021) A new exact algorithm for the weapon\u2013target assignment problem. Omega 98:102138","journal-title":"Omega"},{"issue":"6","key":"4757_CR36","doi-asserted-by":"publisher","first-page":"405","DOI":"10.2514\/1.34254","volume":"6","author":"AM Madni","year":"2009","unstructured":"Madni AM, Andrecut M (2009) Efficient heuristic approach to the weapon\u2013target assignment problem. J Aerosp Comput Inf Commun 6(6):405\u2013414","journal-title":"J Aerosp Comput Inf Commun"},{"key":"4757_CR37","unstructured":"Malcolm WP (2004) On the character and complexity of certain defensive resource allocation problems. Tech. rep., Defence Science and Technology Organisation Salisbury (Australia) Systems"},{"issue":"3","key":"4757_CR38","doi-asserted-by":"publisher","first-page":"346","DOI":"10.1287\/opre.6.3.346","volume":"6","author":"AS Manne","year":"1958","unstructured":"Manne AS (1958) A target-assignment problem. Oper Res 6(3):346\u2013351","journal-title":"Oper Res"},{"issue":"8","key":"4757_CR39","doi-asserted-by":"publisher","first-page":"4126","DOI":"10.1016\/j.eswa.2015.01.003","volume":"42","author":"A Mardani","year":"2015","unstructured":"Mardani A, Jusoh A, Zavadskas EK (2015) Fuzzy multiple criteria decision-making techniques and applications\u2014two decades review from 1994 to 2014. Expert Syst Appl 42(8):4126\u20134148","journal-title":"Expert Syst Appl"},{"key":"4757_CR40","unstructured":"Metler WA, Preston FL, Hofmann J (1990) A suite of weapon assignment algorithms for a sdi mid-course battle manager. Tech. rep., Naval Research Lab, Washington DC"},{"key":"4757_CR41","doi-asserted-by":"crossref","unstructured":"Murphey RA (2000) An approximate algorithm for a weapon target assignment stochastic program. In: Approximation and complexity in numerical optimization. Springer, Berlin, pp 406\u2013421","DOI":"10.1007\/978-1-4757-3145-3_24"},{"key":"4757_CR42","unstructured":"Naeem H, Masood A, Hussain M, et\u00a0al (2009) A novel two-staged decision support based threat evaluation and weapon assignment algorithm, asset-based dynamic weapon scheduling using artificial intelligence techinques. arXiv preprint arXiv:0907.0067"},{"key":"4757_CR43","doi-asserted-by":"crossref","unstructured":"Naseem A, Khan SA, Malik AW (2017a) Optimization of decision support system based on three-stage threat evaluation and resource management. In: 2017 IEEE international conference on industrial engineering and engineering management (IEEM), pp 544\u2013548","DOI":"10.1109\/IEEM.2017.8289950"},{"key":"4757_CR44","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1057\/s41274-016-0139-6","volume":"68","author":"A Naseem","year":"2017","unstructured":"Naseem A, Khan SA, Malik AW (2017b) A real-time man-in-loop threat evaluation and resource assignment in defense. J Oper Res Soc 68:725\u2013738","journal-title":"J Oper Res Soc"},{"issue":"1","key":"4757_CR45","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/JPROC.2015.2483592","volume":"104","author":"M Nickel","year":"2015","unstructured":"Nickel M, Murphy K, Tresp V et al (2015) A review of relational machine learning for knowledge graphs. Proc IEEE 104(1):11\u201333","journal-title":"Proc IEEE"},{"key":"4757_CR46","doi-asserted-by":"crossref","unstructured":"Paradis S, Benaskeur A, Oxenham M, et\u00a0al (2005) Threat evaluation and weapons allocation in network-centric warfare, vol 2","DOI":"10.1109\/ICIF.2005.1591977"},{"issue":"6","key":"4757_CR47","doi-asserted-by":"publisher","first-page":"6029","DOI":"10.1007\/s12652-020-02163-z","volume":"12","author":"M Rajasekaran Indra","year":"2021","unstructured":"Rajasekaran Indra M, Govindan N, Divakarla Naga Satya RK et al (2021) Fuzzy rule based ontology reasoning. J Ambient Intell Humaniz Comput 12(6):6029\u20136035","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"2","key":"4757_CR48","doi-asserted-by":"publisher","first-page":"151","DOI":"10.5784\/23-2-54","volume":"23","author":"JN Roux","year":"2007","unstructured":"Roux JN, Van Vuuren JH (2007) Threat evaluation and weapon assignment decision support: a review of the state of the art. ORiON 23(2):151\u2013187","journal-title":"ORiON"},{"key":"4757_CR49","unstructured":"Shang GAO (2003) Ant colony algorithm for weapon-target assignment problem [J]. Comput Eng Appl 78\u201379"},{"key":"4757_CR50","doi-asserted-by":"crossref","unstructured":"Shang G (2008) Solving weapon\u2013target assignment problems by a new ant colony algorithm. In: 2008 international symposium on computational intelligence and design. IEEE, New York, pp 221\u2013224","DOI":"10.1109\/ISCID.2008.28"},{"key":"4757_CR51","doi-asserted-by":"crossref","unstructured":"Shang G, Zaiyue Z, Xiaoru Z, et\u00a0al (2007) Immune genetic algorithm for weapon\u2013target assignment problem. In: Workshop on intelligent information technology application (IITA 2007). IEEE, New York, pp 145\u2013148","DOI":"10.1109\/IITA.2007.24"},{"key":"4757_CR52","unstructured":"Sikanen T (2008) Solving weapon target assignment problem with dynamic programming. Independent research projects in applied mathematics, p\u00a032"},{"key":"4757_CR53","doi-asserted-by":"crossref","unstructured":"Song Z, Zhu F, Zhang D (2009) A heuristic genetic algorithm for solving constrained weapon-target assignment problem. In: 2009 IEEE international conference on intelligent computing and intelligent systems. IEEE, New York, pp 336\u2013341","DOI":"10.1109\/ICICISYS.2009.5357831"},{"key":"4757_CR54","unstructured":"Tariq A, Rafi K (2012) Intelligent decision support systems\u2014a framework. In: Information and knowledge management. Citeseer, pp 12\u201320"},{"issue":"1","key":"4757_CR55","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/DS-170007","volume":"1","author":"X Wilcke","year":"2017","unstructured":"Wilcke X et al (2017) The knowledge graph as the default data model for machine learning. Data Sci 1(1):39\u201357","journal-title":"Data Sci"},{"key":"4757_CR56","unstructured":"Wu L, Wang Hy, Lu Fx, et\u00a0al (2008) An anytime algorithm based on modified ga for dynamic weapon-target allocation problem. In: 2008 IEEE congress on evolutionary computation (IEEE World Congress on Computational Intelligence). IEEE, New York, pp 2020\u20132025"},{"issue":"6","key":"4757_CR57","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSMCC.2010.2049261","volume":"40","author":"B Xin","year":"2010","unstructured":"Xin B, Chen J, Zhang J et al (2010) Efficient decision makings for dynamic weapon\u2013target assignment by virtual permutation and tabu search heuristics. IEEE Trans Syst Man Cybern 40(6):649\u2013662","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"3","key":"4757_CR58","doi-asserted-by":"publisher","first-page":"598","DOI":"10.1109\/TSMCA.2010.2089511","volume":"41","author":"B Xin","year":"2011","unstructured":"Xin B, Chen J, Peng Z et al (2011) An efficient rule-based constructive heuristic to solve dynamic weapon-target assignment problem. IEEE Trans Syst Man Cybern Part A Syst Humans 41(3):598\u2013606. https:\/\/doi.org\/10.1109\/TSMCA.2010.2089511","journal-title":"IEEE Trans Syst Man Cybern Part A Syst Humans"},{"issue":"5","key":"4757_CR59","doi-asserted-by":"publisher","first-page":"939","DOI":"10.1016\/S1004-4132(08)60179-6","volume":"19","author":"W Yanxia","year":"2008","unstructured":"Yanxia W, Longjun Q, Zhi G et al (2008) Weapon target assignment problem satisfying expected damage probabilities based on ant colony algorithm. J Syst Eng Elect 19(5):939\u2013944","journal-title":"J Syst Eng Elect"},{"key":"4757_CR60","doi-asserted-by":"crossref","unstructured":"Yun J, Hong SS, Han MM (2012) A dynamic neuro fuzzy knowledge based system in threat evaluation. In: The 6th international conference on soft computing and intelligent systems, and the 13th international symposium on advanced intelligence systems. IEEE, New York, pp 1601\u20131605","DOI":"10.1109\/SCIS-ISIS.2012.6505178"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-024-04757-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-024-04757-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-024-04757-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T18:17:10Z","timestamp":1712686630000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-024-04757-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,5]]},"references-count":60,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["4757"],"URL":"https:\/\/doi.org\/10.1007\/s12652-024-04757-3","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,5]]},"assertion":[{"value":"13 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}