{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T01:49:15Z","timestamp":1769305755519,"version":"3.49.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:00:00Z","timestamp":1769212800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T00:00:00Z","timestamp":1769212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U21A20428"],"award-info":[{"award-number":["U21A20428"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["12171134"],"award-info":[{"award-number":["12171134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003995","name":"Anhui Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["2408085MA014"],"award-info":[{"award-number":["2408085MA014"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["JZ2024HGTB0203"],"award-info":[{"award-number":["JZ2024HGTB0203"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comp. Appl. Math."],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1007\/s40314-025-03615-y","type":"journal-article","created":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T05:43:34Z","timestamp":1769233414000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Four classes of wide minimal q-ary linear codes from a general method"],"prefix":"10.1007","volume":"45","author":[{"given":"Dengcheng","family":"Xie","sequence":"first","affiliation":[]},{"given":"Shixin","family":"Zhu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0286-9263","authenticated-orcid":false,"given":"Yang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,24]]},"reference":[{"issue":"5","key":"3615_CR1","doi-asserted-by":"publisher","first-page":"2010","DOI":"10.1109\/18.705584","volume":"44","author":"A Ashikhmin","year":"1998","unstructured":"Ashikhmin A, Barg A (1998) Minimal vectors in linear codes. IEEE Trans Inf Theory 44(5):2010\u20132017","journal-title":"IEEE Trans Inf Theory"},{"key":"3615_CR2","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s10801-019-00930-6","volume":"53","author":"M Bonini","year":"2021","unstructured":"Bonini M, Borello M (2021) Minimal linear codes arising from blocking sets. J Algebr Comb 53:327\u2013341","journal-title":"J Algebr Comb"},{"key":"3615_CR3","doi-asserted-by":"crossref","unstructured":"Chabanne H, Cohen G, Patey A (2014) Towards secure two-party computation from the wire-tap channel, in: H.-S. Lee, D.-G. Han (Eds.), Proceedings of ICISC 2013, in: Lecture Notes in Computer Science, vol. 8565, Springer-Verlag, Berlin, pp. 34\u201346","DOI":"10.1007\/978-3-319-12160-4_3"},{"issue":"6","key":"3615_CR4","doi-asserted-by":"publisher","first-page":"2089","DOI":"10.1109\/TIT.2005.847722","volume":"51","author":"C Carlet","year":"2005","unstructured":"Carlet C, Ding C, Yuan J (2005) Linear codes from perfect nonlinear functions and their secret sharing schemes. IEEE Trans Inf Theory 51(6):2089\u20132102","journal-title":"IEEE Trans Inf Theory"},{"issue":"4\u20135","key":"3615_CR5","first-page":"143","volume":"39","author":"AR Calderbank","year":"1984","unstructured":"Calderbank AR, Goethals J (1984) Three-weight codes and association schemes. Philips J Res 39(4\u20135):143\u2013152","journal-title":"Philips J Res"},{"key":"3615_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1112\/blms\/18.2.97","volume":"18","author":"AR Calderbank","year":"1986","unstructured":"Calderbank AR, Kantor WM (1986) The geometry of two-weight codes. Bull Lond Math Soc 18:97\u2013122","journal-title":"Bull Lond Math Soc"},{"issue":"9","key":"3615_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2024.114081","volume":"375","author":"Y Cheng","year":"2024","unstructured":"Cheng Y, Luo G, Cao X (2024) Constructions of MDS entanglement-assisted quantum codes with flexible lengths and large minimum distance. Discrete Math 375(9):114081","journal-title":"Discrete Math"},{"issue":"10","key":"3615_CR8","doi-asserted-by":"publisher","first-page":"2167","DOI":"10.1007\/s10623-017-0442-5","volume":"86","author":"S Chang","year":"2018","unstructured":"Chang S, Hyun JY (2018) Linear codes from simplicial complexes. Des Codes Cryptogr 86(10):2167\u20132181","journal-title":"Des Codes Cryptogr"},{"issue":"6","key":"3615_CR9","doi-asserted-by":"publisher","first-page":"3265","DOI":"10.1109\/TIT.2015.2420118","volume":"61","author":"C Ding","year":"2015","unstructured":"Ding C (2015) Linear codes from some 2-designs. IEEE Trans Inf Theory 61(6):3265\u20133275","journal-title":"IEEE Trans Inf Theory"},{"issue":"9","key":"3615_CR10","doi-asserted-by":"publisher","first-page":"2288","DOI":"10.1016\/j.disc.2016.03.029","volume":"339","author":"C Ding","year":"2016","unstructured":"Ding C (2016) A construction of binary linear codes from Boolean functions. Discrete Math 339(9):2288\u20132303","journal-title":"Discrete Math"},{"issue":"10","key":"3615_CR11","doi-asserted-by":"publisher","first-page":"6536","DOI":"10.1109\/TIT.2018.2819196","volume":"64","author":"C Ding","year":"2018","unstructured":"Ding C, Heng Z, Zhou Z (2018) Minimal binary linear codes. IEEE Trans Inf Theory 64(10):6536\u20136545","journal-title":"IEEE Trans Inf Theory"},{"key":"3615_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/3-540-45066-1_2","volume":"2731","author":"C Ding","year":"2003","unstructured":"Ding C, Yuan J (2003) Covering and secret sharing with linear codes. Discrete Math Theor Comput Sci 2731:11\u201325","journal-title":"Discrete Math Theor Comput Sci"},{"issue":"11","key":"3615_CR13","doi-asserted-by":"publisher","first-page":"5835","DOI":"10.1109\/TIT.2015.2473861","volume":"61","author":"K Ding","year":"2015","unstructured":"Ding K, Ding C (2015) A class of two-weight and three-weight codes and their applications in secret sharing. IEEE Trans Inf Theory 61(11):5835\u20135842","journal-title":"IEEE Trans Inf Theory"},{"issue":"6","key":"3615_CR14","doi-asserted-by":"publisher","first-page":"1455","DOI":"10.1007\/s10623-023-01353-y","volume":"92","author":"X Du","year":"2024","unstructured":"Du X, Rodr\u00edguez R, Wu H (2024) Infinite families of minimal binary codes via Krawtchouk polynomials. Des Codes Cryptogr 92(6):1455\u20131475","journal-title":"Des Codes Cryptogr"},{"key":"3615_CR15","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.laa.2015.10.029","volume":"490","author":"E Gorla","year":"2016","unstructured":"Gorla E, Ravagnani A (2016) Equidistant subspace codes. Linear Algebra Appl 490:48\u201365","journal-title":"Linear Algebra Appl"},{"issue":"10","key":"3615_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2023.113584","volume":"346","author":"J Gao","year":"2023","unstructured":"Gao J, Zhang Y, Meng X (2023) Minimal linear codes from defining sets over $$\\mathbb{F} _p+u\\mathbb{F} _p$$. Discrete Math 346(10):113584","journal-title":"Discrete Math"},{"key":"3615_CR17","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.ffa.2018.08.010","volume":"54","author":"Z Heng","year":"2018","unstructured":"Heng Z, Ding C, Zhou Z (2018) Minimal linear codes over finite fields. Finite Fields Appl 54:176\u2013196","journal-title":"Finite Fields Appl"},{"key":"3615_CR18","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ffa.2015.12.002","volume":"38","author":"Z Heng","year":"2016","unstructured":"Heng Z, Yue Q (2016) Two classes of two-weight linear codes. Finite Fields Appl 38:72\u201392","journal-title":"Finite Fields Appl"},{"issue":"11","key":"3615_CR19","doi-asserted-by":"publisher","first-page":"6872","DOI":"10.1109\/TIT.2020.3006846","volume":"66","author":"Z Heng","year":"2020","unstructured":"Heng Z, Wang Q, Ding C (2020) Two families of optimal linear codes and their subfield codes. IEEE Trans Inf Theory 66(11):6872\u20136883","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"3615_CR20","doi-asserted-by":"publisher","first-page":"1823","DOI":"10.1109\/TIT.2023.3305609","volume":"70","author":"Z Hu","year":"2024","unstructured":"Hu Z, Xu Y, Li N, Zeng X, Wang L, Tang X (2024) New constructions of optimal linear codes from simplicial complexes. IEEE Trans Inf Theory 70(3):1823\u20131835","journal-title":"IEEE Trans Inf Theory"},{"issue":"11","key":"3615_CR21","doi-asserted-by":"publisher","first-page":"6762","DOI":"10.1109\/TIT.2020.2993179","volume":"66","author":"JY Hyun","year":"2020","unstructured":"Hyun JY, Lee J, Lee Y (2020) Infinite families of optimal linear codes constructed from simplicial complexes. IEEE Trans Inf Theory 66(11):6762\u20136773","journal-title":"IEEE Trans Inf Theory"},{"issue":"7","key":"3615_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2025.114464","volume":"348","author":"W Jin","year":"2025","unstructured":"Jin W, Li K, Qu L (2025) Several classes of minimal linear codes from vectorial Boolean functions and $$p$$-ary functions. Discrete Math 348(7):114464","journal-title":"Discrete Math"},{"key":"3615_CR23","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.dam.2025.04.044","volume":"373","author":"W Jin","year":"2025","unstructured":"Jin W, Li K, Qu L (2025) Several classes of minimal linear codes from weakly regular and non-weakly regular bent functions. Discrete Applied Math 373:53\u201376","journal-title":"Discrete Applied Math"},{"issue":"3","key":"3615_CR24","doi-asserted-by":"publisher","first-page":"1794","DOI":"10.1109\/TIT.2025.3533494","volume":"71","author":"G Luo","year":"2025","unstructured":"Luo G, Chen B, Ezerman MF, Ling S (2025) Bounds and constructions of quantum locally recoverable codes from quantum CSS codes. IEEE Trans Inf Theory 71(3):1794\u20131802","journal-title":"IEEE Trans Inf Theory"},{"key":"3615_CR25","doi-asserted-by":"crossref","unstructured":"Lidl R, Niederreiter H (1997) Finite Fields. Cambridge University Press, Cambridge","DOI":"10.1017\/CBO9780511525926"},{"issue":"5","key":"3615_CR26","doi-asserted-by":"publisher","first-page":"2955","DOI":"10.1109\/TIT.2022.3231966","volume":"69","author":"Y Li","year":"2022","unstructured":"Li Y, Peng J, Kan H, Zheng L (2022) Minimal binary linear codes from vectorial Boolean functions. IEEE Trans Inf Theory 69(5):2955\u20132968","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"3615_CR27","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s12190-022-01736-9","volume":"69","author":"S Li","year":"2023","unstructured":"Li S, Shi M (2023) Two infinite families of two-weight codes over $${\\mathbb{Z} }_{2^m}$$. J Appl Math Comput 69(1):201\u2013218","journal-title":"J Appl Math Comput"},{"key":"3615_CR28","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s00200-016-0297-4","volume":"28","author":"C Li","year":"2016","unstructured":"Li C, Yue Q, Fu F-W (2016) A construction of several classes of two-weight and three-weight linear codes. Appl Algebra Eng Commun Comput 28:11\u201330","journal-title":"Appl Algebra Eng Commun Comput"},{"key":"3615_CR29","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10623-019-00682-1","volume":"88","author":"X Li","year":"2020","unstructured":"Li X, Yue Q (2020) Four classes of minimal binary linear codes with $$w_{min} \/w_{max} <1\/2$$ derived from Boolean functions. Des Codes Cryptogr 88:257\u2013271","journal-title":"Des Codes Cryptogr"},{"issue":"1","key":"3615_CR30","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/s12095-016-0186-5","volume":"9","author":"S Mesnager","year":"2017","unstructured":"Mesnager S (2017) Linear codes with few weights from weakly regular bent functions based on a generic construction. Cryptogr Commun 9(1):71\u201384","journal-title":"Cryptogr Commun"},{"issue":"2\u20133","key":"3615_CR31","doi-asserted-by":"publisher","first-page":"463","DOI":"10.1007\/s10623-018-0556-4","volume":"87","author":"S Mesnager","year":"2019","unstructured":"Mesnager S, \u00d6zbudak F, Sinak A (2019) Linear codes from weakly regular plateaued functions and their secret sharing schemes. Des Codes Cryptogr 87(2\u20133):463\u2013480","journal-title":"Des Codes Cryptogr"},{"issue":"9","key":"3615_CR32","doi-asserted-by":"publisher","first-page":"5404","DOI":"10.1109\/TIT.2020.2978387","volume":"66","author":"S Mesnager","year":"2020","unstructured":"Mesnager S, Qi Y, Ru H, Tang C (2020) Minimal linear codes from characteristic functions. IEEE Trans Inf Theory 66(9):5404\u20135413","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"3615_CR33","doi-asserted-by":"publisher","first-page":"2296","DOI":"10.1109\/TIT.2019.2956130","volume":"66","author":"S Mesnager","year":"2020","unstructured":"Mesnager S, Sinak A (2020) Several classes of minimal linear codes with few weights from weakly regular plateaued functions. IEEE Trans Inf Theory 66(4):2296\u20132310","journal-title":"IEEE Trans Inf Theory"},{"issue":"7","key":"3615_CR34","doi-asserted-by":"publisher","first-page":"2550077","DOI":"10.1142\/S021949882550077X","volume":"23","author":"S Mesnager","year":"2024","unstructured":"Mesnager S, Sinak A (2024) Minimal linear codes derived from weakly regular bent and plateaued functions. J Algebra Appl 23(7):2550077","journal-title":"J Algebra Appl"},{"issue":"7","key":"3615_CR35","doi-asserted-by":"publisher","first-page":"5154","DOI":"10.1109\/TIT.2025.3538117","volume":"71","author":"L Qian","year":"2025","unstructured":"Qian L, Shi M (2025) On Four Conjectures of Heng-Ding and $$p$$-ary Linear Codes From Monomials. IEEE Trans Inf Theory 71(7):5154\u20135165","journal-title":"IEEE Trans Inf Theory"},{"issue":"6","key":"3615_CR36","doi-asserted-by":"publisher","first-page":"4445","DOI":"10.1109\/TIT.2023.3338577","volume":"70","author":"R Rodr\u00edguez-Aldama","year":"2023","unstructured":"Rodr\u00edguez-Aldama R, Pasalic E, Zhang F, Wei Y (2023) Minimal $$p$$-ary codes via the direct sum of functions, non-covering permutations and subspaces of derivatives. IEEE Trans Inf Theory 70(6):4445\u20134463","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"3615_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2020.112215","volume":"344","author":"A Sinak","year":"2021","unstructured":"Sinak A (2021) Minimal linear codes from weakly regular plateaued balanced functions. Discrete Math 344(3):112215","journal-title":"Discrete Math"},{"issue":"3","key":"3615_CR38","doi-asserted-by":"publisher","first-page":"953","DOI":"10.55730\/1300-0098.3135","volume":"46","author":"A Sinak","year":"2022","unstructured":"Sinak A (2022) Construction of minimal linear codes with few weights from weakly regular plateaued functions. Turk J Math 46(3):953\u2013972","journal-title":"Turk J Math"},{"issue":"10","key":"3615_CR39","doi-asserted-by":"publisher","first-page":"6240","DOI":"10.1109\/TIT.2017.2742499","volume":"63","author":"M Shi","year":"2017","unstructured":"Shi M, Guan Y, Sol\u00e9 P (2017) Two new families of two-weight codes. IEEE Trans Inf Theory 63(10):6240\u20136246","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"3615_CR40","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1109\/TIT.2016.2518678","volume":"62","author":"C Tang","year":"2016","unstructured":"Tang C, Li N, Qi F, Zhou Z, Helleseth T (2016) Linear codes with two or three weights from weakly regular bent functions. IEEE Trans Inf Theory 62(3):1166\u20131176","journal-title":"IEEE Trans Inf Theory"},{"issue":"6","key":"3615_CR41","doi-asserted-by":"publisher","first-page":"3690","DOI":"10.1109\/TIT.2021.3070377","volume":"67","author":"C Tang","year":"2021","unstructured":"Tang C, Qiu Y, Liao Q, Zhou Z (2021) Full characterization of minimal linear codes as cutting blocking sets. IEEE Trans Inf Theory 67(6):3690\u20133700","journal-title":"IEEE Trans Inf Theory"},{"key":"3615_CR42","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1007\/s12095-021-00553-4","volume":"14","author":"X Wu","year":"2022","unstructured":"Wu X, Lu W, Cao X (2022) Minimal linear codes constructed from functions. Cryptogr Commun 14:875\u2013895","journal-title":"Cryptogr Commun"},{"issue":"3","key":"3615_CR43","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1007\/s12095-023-00689-5","volume":"16","author":"X Wu","year":"2024","unstructured":"Wu X, Lu W, Cao X (2024) Minimal linear codes constructed from partial spreads. Cryptogr Commun 16(3):601\u2013611","journal-title":"Cryptogr Commun"},{"issue":"11","key":"3615_CR44","doi-asserted-by":"publisher","first-page":"7067","DOI":"10.1109\/TIT.2019.2918537","volume":"65","author":"G Xu","year":"2019","unstructured":"Xu G, Qu L (2019) Three classes of minimal linear codes over the finite fields of odd characteristic. IEEE Trans Inf Theory 65(11):7067\u20137078","journal-title":"IEEE Trans Inf Theory"},{"key":"3615_CR45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2020.101688","volume":"65","author":"G Xu","year":"2020","unstructured":"Xu G, Qu L, Cao X (2020) Minimal linear codes from Maiorana-McFarland functions. Finite Fields Appl 65:101688","journal-title":"Finite Fields Appl"},{"key":"3615_CR46","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s12095-021-00519-6","volume":"14","author":"G Xu","year":"2022","unstructured":"Xu G, Qu L, Luo G (2022) Minimal linear codes from weakly regular bent functions. Cryptogr Commun 14:415\u2013431","journal-title":"Cryptogr Commun"},{"key":"3615_CR47","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s00200-018-0367-x","volume":"30","author":"W Zhang","year":"2019","unstructured":"Zhang W, Yan H, Wei H (2019) Four families of minimal binary linear codes with $$w_{\\rm min}\/w_{\\rm max} \\le 1\/2$$. Appl Algebra Eng Commun Comput 30:175\u2013184","journal-title":"Appl Algebra Eng Commun Comput"},{"key":"3615_CR48","doi-asserted-by":"publisher","first-page":"1485","DOI":"10.1007\/s10623-021-00883-7","volume":"89","author":"F Zhang","year":"2021","unstructured":"Zhang F, Pasalic E, Rodr\u00edguez R, Wei Y (2021) Wide minimal binary linear codes from the general Maiorana-McFarland class. Des Codes Cryptogr 89:1485\u20131507","journal-title":"Des Codes Cryptogr"},{"issue":"2","key":"3615_CR49","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10623-015-0144-9","volume":"81","author":"Z Zhou","year":"2016","unstructured":"Zhou Z, Li N, Fan C, Helleseth T (2016) Linear codes with two or three weights from quadratic bent functions. Des Codes Cryptogr 81(2):283\u2013295","journal-title":"Des Codes Cryptogr"}],"container-title":["Computational and Applied Mathematics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-025-03615-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40314-025-03615-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40314-025-03615-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T07:02:22Z","timestamp":1769238142000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40314-025-03615-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,24]]},"references-count":49,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2026,6]]}},"alternative-id":["3615"],"URL":"https:\/\/doi.org\/10.1007\/s40314-025-03615-y","relation":{},"ISSN":["2238-3603","1807-0302"],"issn-type":[{"value":"2238-3603","type":"print"},{"value":"1807-0302","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,24]]},"assertion":[{"value":"2 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2026","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no possible conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}],"article-number":"214"}}