{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:45:28Z","timestamp":1769741128792,"version":"3.49.0"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T00:00:00Z","timestamp":1720137600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T00:00:00Z","timestamp":1720137600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012335","name":"National Defense Basic Scientific Research Program of China","doi-asserted-by":"publisher","award":["JCKY2021214B002"],"award-info":[{"award-number":["JCKY2021214B002"]}],"id":[{"id":"10.13039\/501100012335","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013058","name":"Jiangsu Provincial Key Research and Development Program","doi-asserted-by":"publisher","award":["BE2022157"],"award-info":[{"award-number":["BE2022157"]}],"id":[{"id":"10.13039\/501100013058","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Saturated information load is defined as the information received by a unmanned aerial vehicle (UAV) node in a swarm network reaches the overload limit of its processing capability. When a UAV swarm performs a mission in an uncertain and adversarial complex environment, overloading of UAVs will lead to information diversion, which may cause other UAVs to experience overloading and diversion as well, affecting the transmission efficiency and robustness of the entire swarm network, which in turn affects the information sensing ability, execution ability, and coordination ability of the swarm in performing the mission. Therefore, this paper proposes a saturated information load-based UAV swarm network topology modelling method, which sets the saturated information load of the nodes in the network model in order to reasonably allocate network resources and optimise the network topology. In addition, through robustness experiments of complex networks and comparative analysis of different saturated information loads and three typical modelling methods, the saturated information load-based network structure modelling method has outstanding advantages and performance in terms of network connectivity, network communication efficiency, and destruction resistance.<\/jats:p>","DOI":"10.1007\/s40747-024-01526-9","type":"journal-article","created":{"date-parts":[[2024,7,5]],"date-time":"2024-07-05T07:01:46Z","timestamp":1720162906000},"page":"7127-7142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Optimal saturated information load analysis for enhancing robustness in unmanned swarms system"],"prefix":"10.1007","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1968-6586","authenticated-orcid":false,"given":"Jian","family":"Wu","sequence":"first","affiliation":[]},{"given":"Yichuan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Junjun","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Linfei","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,5]]},"reference":[{"key":"1526_CR1","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.techfore.2016.10.062","volume":"116","author":"S Burmaoglu","year":"2017","unstructured":"Burmaoglu S, Sar\u0131tas O (2017) Changing characteristics of warfare and the future of Military R&D[J]. Technol Forecast Soc Chang 116:151\u2013161","journal-title":"Technol Forecast Soc Chang"},{"key":"1526_CR2","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1360\/N112018-00168","volume":"49","author":"HB Duan","year":"2019","unstructured":"Duan HB, Zhang DF, Fan YM et al (2019) From wolf pack intelligence to UAV swarm cooperative decision-making[J]. Sci Sin Inform 49:112\u2013118","journal-title":"Sci Sin Inform"},{"key":"1526_CR3","unstructured":"Brasil M , Bosch B , Wagner F R , et al. Performance Comparison of Multi-Agent Middleware Platforms for Wireless Sensor Networks[J]. IEEE Sensors Journal, 2018:1\u20131."},{"issue":"10","key":"1526_CR4","doi-asserted-by":"publisher","first-page":"3434","DOI":"10.3390\/s18103434","volume":"18","author":"L Wang","year":"2018","unstructured":"Wang L, Lu D, Zhang Y et al (2018) A complex network theory-based modeling framework for unmanned aerial vehicle swarms. Sensors 18(10):3434","journal-title":"Sensors"},{"key":"1526_CR5","doi-asserted-by":"crossref","unstructured":"Lizhi W, Xuejiao Z, Zhang Y, et al. Unmanned aerial vehicle swarm mission reliability modeling and evaluation method oriented to systematic and networked mission. Chinese Journal of Aeronautics, 2021, 34(2): 466\u2013478.","DOI":"10.1016\/j.cja.2020.02.026"},{"issue":"1","key":"1526_CR6","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1016\/j.cja.2019.04.025","volume":"33","author":"W Xiaohong","year":"2020","unstructured":"Xiaohong W, Zhang Y, Lizhi W et al (2020) Robustness evaluation method for unmanned aerial vehicle swarms based on complex network theory. Chin J Aeronaut 33(1):352\u2013364","journal-title":"Chin J Aeronaut"},{"issue":"1","key":"1526_CR7","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.dt.2019.09.002","volume":"16","author":"J Fan","year":"2020","unstructured":"Fan J, Li D, Li R et al (2020) Analysis on MAV\/UAV cooperative combat based on complex network. Defence Technology 16(1):150\u2013157","journal-title":"Defence Technology"},{"key":"1526_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2019.106602","volume":"193","author":"G Bai","year":"2020","unstructured":"Bai G, Li Y, Fang Y et al (2020) Network approach for resilience evaluation of a UAV swarm by considering communication limits. Reliab Eng Syst Saf 193:106602","journal-title":"Reliab Eng Syst Saf"},{"key":"1526_CR9","doi-asserted-by":"publisher","first-page":"77089","DOI":"10.1109\/ACCESS.2020.2989614","volume":"8","author":"M Chen","year":"2020","unstructured":"Chen M, Wang H, Chang CY et al (2020) SIDR: A swarm intelligence-based damage-resilient mechanism for UAV swarm networks. IEEE Access 8:77089\u201377105","journal-title":"IEEE Access"},{"key":"1526_CR10","doi-asserted-by":"publisher","first-page":"61786","DOI":"10.1109\/ACCESS.2019.2916004","volume":"7","author":"F Dai","year":"2019","unstructured":"Dai F, Chen M, Wei X et al (2019) Swarm intelligence-inspired autonomous flocking control in UAV networks. IEEE Access 7:61786\u201361796","journal-title":"IEEE Access"},{"key":"1526_CR11","doi-asserted-by":"crossref","unstructured":"Fu X, Zhang J, Chen J, et al. Formation flying and obstacle avoidance control of UAV cluster based on backbone network. In 2020 IEEE 16th International Conference on Control & Automation (ICCA). IEEE, 2020: 859\u2013863.","DOI":"10.1109\/ICCA51439.2020.9264356"},{"key":"1526_CR12","doi-asserted-by":"publisher","first-page":"115448","DOI":"10.1109\/ACCESS.2020.3002594","volume":"8","author":"T Duan","year":"2020","unstructured":"Duan T, Wang W, Wang T et al (2020) Dynamic tasks scheduling model of UAV cluster based on flexible network architecture. IEEE Access 8:115448\u2013115460","journal-title":"IEEE Access"},{"issue":"10","key":"1526_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MAES.2022.3204730","volume":"37","author":"A Guerra","year":"2022","unstructured":"Guerra A, Guidi F, Dardari D et al (2022) Networks of UAVs of low complexity for time-critical localization. IEEE Aerosp Electron Syst Mag 37(10):22\u201338","journal-title":"IEEE Aerosp Electron Syst Mag"},{"issue":"5","key":"1526_CR14","doi-asserted-by":"publisher","first-page":"8958","DOI":"10.1109\/JIOT.2019.2925567","volume":"6","author":"MY Arafat","year":"2019","unstructured":"Arafat MY, Moh S (2019) Localization and clustering based on swarm intelligence in UAV networks for emergency communications. IEEE Internet Things J 6(5):8958\u20138976","journal-title":"IEEE Internet Things J"},{"key":"1526_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2022.108478","volume":"223","author":"Q Feng","year":"2022","unstructured":"Feng Q, Liu M, Dui H et al (2022) Importance measure-based phased mission reliability and UAV number optimization for swarm. Reliab Eng Syst Saf 223:108478","journal-title":"Reliab Eng Syst Saf"},{"key":"1526_CR16","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1016\/j.apm.2022.12.032","volume":"117","author":"J Li","year":"2023","unstructured":"Li J, Liu J, Huangfu S et al (2023) Leader-follower formation of light-weight UAVs with novel active disturbance rejection control. Appl Math Model 117:577\u2013591","journal-title":"Appl Math Model"},{"issue":"1","key":"1526_CR17","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1016\/j.cja.2020.10.029","volume":"35","author":"F Qiang","year":"2022","unstructured":"Qiang F, Xingshuo HAI, Bo SUN et al (2022) Resilience optimization for multi-UAVformation reconfiguration via enhanced pigeon-inspired optimization. Chin J Aeronaut 35(1):110\u2013123","journal-title":"Chin J Aeronaut"},{"key":"1526_CR18","unstructured":"Cares JR. An information age combat model. In: 9th ICCRTS; 2004."},{"key":"1526_CR19","volume-title":"Distributed networked operations: the foundations of network centric warfare","author":"JR Cares","year":"2005","unstructured":"Cares JR (2005) Distributed networked operations: the foundations of network centric warfare. Iuniverse INC, Bloomington"},{"key":"1526_CR20","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.ress.2013.04.004","volume":"118","author":"M Fonoberova","year":"2013","unstructured":"Fonoberova M, Fonoberov VA, Mezi\u0107 I (2013) Global sensitivity\/uncertainty analysis for agent-based models. Reliab Eng Syst Saf 118:8\u201317","journal-title":"Reliab Eng Syst Saf"},{"issue":"2","key":"1526_CR21","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/s11192-011-0468-9","volume":"89","author":"M Niazi","year":"2011","unstructured":"Niazi M, Hussain A (2011) Agent-based computing from multi-agent systems to agent-based models: a visual survey. Scientometrics 89(2):479\u2013499","journal-title":"Scientometrics"},{"key":"1526_CR22","doi-asserted-by":"crossref","unstructured":"Michel F, Ferber J, Drogoul A. Multi-agent systems and simulation: A survey from the agent commu-nity\u2019s perspective[M]\/\/Multi-Agent Systems. CRC Press, 2018: 17\u201366.","DOI":"10.1201\/9781420070248-10"},{"issue":"1","key":"1526_CR23","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/s10588-021-09358-5","volume":"28","author":"E Borgonovo","year":"2022","unstructured":"Borgonovo E, Pangallo M, Rivkin J et al (2022) Sensitivity analysis of agent-based models: a new protocol. Comput Math Organ Theory 28(1):52\u201394","journal-title":"Comput Math Organ Theory"},{"issue":"6","key":"1526_CR24","doi-asserted-by":"publisher","first-page":"1425","DOI":"10.1109\/TSMCA.2012.2199304","volume":"42","author":"RM Crowder","year":"2012","unstructured":"Crowder RM, Robinson MA, Hughes HPN et al (2012) The development of an agent-based modeling framework for simulating engineering team work. IEEE Trans Syst Man Cybernet-Part A 42(6):1425\u20131439","journal-title":"IEEE Trans Syst Man Cybernet-Part A"},{"key":"1526_CR25","doi-asserted-by":"crossref","unstructured":"Zhang Y, Li Z, Zhang Y. Validation and calibration of an agent-based model: A surrogateapproach. Discrete Dynamics in Nature and Society, 2020, 2020.","DOI":"10.1155\/2020\/6946370"},{"issue":"5","key":"1526_CR26","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1002\/sys.21546","volume":"23","author":"ME Miller","year":"2020","unstructured":"Miller ME, McGuirl JM, Schneider MF et al (2020) Systems modeling language extension to support modeling of human-agent teams. Syst Eng 23(5):519\u2013533","journal-title":"Syst Eng"},{"key":"1526_CR27","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1016\/j.ssci.2016.05.006","volume":"88","author":"R Wang","year":"2016","unstructured":"Wang R, Zheng W, Liang C et al (2016) An integrated hazard identification method based on the hierarchical Colored Petri Net. Saf Sci 88:166\u2013179","journal-title":"Saf Sci"},{"key":"1526_CR28","doi-asserted-by":"publisher","first-page":"120735","DOI":"10.1109\/ACCESS.2022.3222828","volume":"10","author":"E Ku\u010dera","year":"2022","unstructured":"Ku\u010dera E, Haffner O, Draho\u0161 P et al (2022) Modeling and control of discrete event and hybrid systems using petri nets and OPC unified architecture. IEEE Access 10:120735\u2013120751","journal-title":"IEEE Access"},{"key":"1526_CR29","doi-asserted-by":"publisher","first-page":"25219","DOI":"10.1109\/ACCESS.2021.3056747","volume":"9","author":"W Zhijun","year":"2021","unstructured":"Zhijun W, Haolin M, Meng Y (2021) Reliability assessment model of IMA partition software using stochastic Petri nets. IEEE Access 9:25219\u201325232","journal-title":"IEEE Access"},{"issue":"12","key":"1526_CR30","doi-asserted-by":"publisher","first-page":"7774","DOI":"10.1109\/TSMC.2022.3163741","volume":"52","author":"R Yang","year":"2022","unstructured":"Yang R, Ding Z, Guo T et al (2022) Model checking of variable petri nets by using the kripke structure. IEEE Trans Syst Man Cybernet 52(12):7774\u20137786","journal-title":"IEEE Trans Syst Man Cybernet"},{"key":"1526_CR31","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.compchemeng.2016.02.019","volume":"89","author":"C Li","year":"2016","unstructured":"Li C, Ren J, Wang H (2016) A system dynamics simulation model of chemical supply chain transportation risk management systems. Comput Chem Eng 89:71\u201383","journal-title":"Comput Chem Eng"},{"issue":"1","key":"1526_CR32","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1002\/bse.2610","volume":"30","author":"Y Kazancoglu","year":"2021","unstructured":"Kazancoglu Y, Ekinci E, Mangla SK et al (2021) Performance evaluation of reverse logistics in food supply chains in a circular economy using system dynamics. Bus Strateg Environ 30(1):71\u201391","journal-title":"Bus Strateg Environ"},{"issue":"4","key":"1526_CR33","doi-asserted-by":"publisher","first-page":"114","DOI":"10.3390\/systems10040114","volume":"10","author":"M Azizsafaei","year":"2022","unstructured":"Azizsafaei M, Hosseinian-Far A, Khandan R et al (2022) Assessing risks in dairy supply chain systems: a system dynamics approach. Systems 10(4):114","journal-title":"Systems"},{"issue":"6","key":"1526_CR34","doi-asserted-by":"publisher","first-page":"1814","DOI":"10.1080\/00207543.2020.1725683","volume":"59","author":"R Rathore","year":"2021","unstructured":"Rathore R, Thakkar JJ, Jha JK (2021) Impact of risks in foodgrains transportation system: a system dynamics approach. Int J Prod Res 59(6):1814\u20131833","journal-title":"Int J Prod Res"},{"key":"1526_CR35","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.compchemeng.2019.05.040","volume":"128","author":"F Daneshzand","year":"2019","unstructured":"Daneshzand F, Amin-Naseri MR, Asali M et al (2019) A system dynamics model for optimal allocation of natural gas to various demand sectors. Comput Chem Eng 128:88\u2013105","journal-title":"Comput Chem Eng"},{"key":"1526_CR36","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.1601679","volume":"2","author":"CI Del Genio","year":"2016","unstructured":"Del Genio CI, G\u00f3mez-Garde\u00f1es J, Bonamassa I, Boccaletti S (2016) Synchronization innetworks with multiple interaction layers. Sci Adv 2:e1601679. https:\/\/doi.org\/10.1126\/sciadv.1601679","journal-title":"Sci Adv"},{"key":"1526_CR37","doi-asserted-by":"publisher","first-page":"9211","DOI":"10.3390\/en8099211","volume":"8","author":"L Cuadra","year":"2015","unstructured":"Cuadra L, Salcedo-Sanz S, Del Ser J, Jim\u00e9nez-Fern\u00e1ndez S, Geem ZW (2015) A criticalreview of robustness in power grids using complex networks concepts. Energies 8:9211\u20139265. https:\/\/doi.org\/10.3390\/en8099211","journal-title":"Energies"},{"key":"1526_CR38","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.ress.2017.04.023","volume":"167","author":"S Thacker","year":"2017","unstructured":"Thacker S, Pant R, Hall JW (2017) System-of-systems formulation and disruption analysis for multi-scale critical national infrastructures. Reliab Eng Syst Saf 167:30\u201341. https:\/\/doi.org\/10.1016\/j.ress.2017.04.023","journal-title":"Reliab Eng Syst Saf"},{"key":"1526_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jairtraman.2016.12.008","volume":"60","author":"MM Hossain","year":"2017","unstructured":"Hossain MM, Alam S (2017) A complex network approach towards modeling and analysis of the Australian airport network. J Air Transp Manag 60:1\u20139. https:\/\/doi.org\/10.1016\/j.jairtraman.2016.12.008","journal-title":"J Air Transp Manag"},{"key":"1526_CR40","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ress.2018.11.019","volume":"183","author":"A Abedi","year":"2019","unstructured":"Abedi A, Gaudard L, Romerio F (2019) Review of major approaches to analyze vulnerability in power system. Reliab Eng Syst Saf 183:153\u2013172","journal-title":"Reliab Eng Syst Saf"},{"key":"1526_CR41","doi-asserted-by":"crossref","unstructured":"Nurdin Y. Understanding the cascading failures in Indonesian power grids with complex network theory. In: 2019 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom). IEEE, 2019: 50\u201355.","DOI":"10.1109\/CYBERNETICSCOM.2019.8875659"},{"key":"1526_CR42","doi-asserted-by":"crossref","unstructured":"De Bona A, Rosa M, Fonseca K, et al. Congestion potential\u2013a new way to analyze public transportation based on complex networks. In: 2018 IEEE International Smart Cities Conference (ISC2). IEEE, 2018: 1\u20138.","DOI":"10.1109\/ISC2.2018.8656960"},{"issue":"6","key":"1526_CR43","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.66.065102","volume":"66","author":"AE Motter","year":"2002","unstructured":"Motter AE, Lai YC (2002) Cascade-based attacks on  complex networks. Phys Rev E 66(6):065102","journal-title":"Phys Rev E"},{"key":"1526_CR44","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.procs.2016.09.302","volume":"95","author":"HT Tran","year":"2016","unstructured":"Tran HT, Domer\u00e7ant JC, Mavris DN (2016) A network-based cost comparison of resilient and robust system-of-systems. Procedia Computer Science 95:126\u2013133","journal-title":"Procedia Computer Science"},{"issue":"1","key":"1526_CR45","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1109\/SURV.2012.020212.00049","volume":"15","author":"D Feng","year":"2012","unstructured":"Feng D, Jiang C, Lim G et al (2012) A survey of energy-efficient wireless communications. IEEE Communications Surveys & Tutorials 15(1):167\u2013178","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"6","key":"1526_CR46","first-page":"5915","volume":"35","author":"S Freitas","year":"2022","unstructured":"Freitas S, Yang D, Kumar S et al (2022) Graph vulnerability and robustness: a survey. IEEE Trans Knowl Data Eng 35(6):5915\u20135934","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1526_CR47","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.chaos.2019.01.036","volume":"121","author":"Z Li","year":"2019","unstructured":"Li Z, Chen L (2019) Robustness of multipartite networks in face of random node failure. Chaos, Solitons Fractals 121:149\u2013159","journal-title":"Chaos, Solitons Fractals"},{"key":"1526_CR48","doi-asserted-by":"crossref","unstructured":"Teng M, Gao C, Wang Z, et al. A communication-based identification of critical drones in malicious drone swarm networks. Complex & Intelligent Systems, 2024: 1\u201315.","DOI":"10.1007\/s40747-023-01316-9"},{"issue":"3","key":"1526_CR49","doi-asserted-by":"publisher","first-page":"3745","DOI":"10.1007\/s11042-022-12943-8","volume":"82","author":"E Nasiri","year":"2023","unstructured":"Nasiri E, Berahmand K, Li Y (2023) Robust graph regularization nonnegative matrix factorization for link prediction in attributed networks. Multimedia Tools Appl 82(3):3745\u20133768","journal-title":"Multimedia Tools Appl"},{"issue":"3\u20134","key":"1526_CR50","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1080\/23789689.2019.1666340","volume":"6","author":"M Ezzeldin","year":"2021","unstructured":"Ezzeldin M, El-Dakhakhni WE (2021) Robustness of Ontario power network under systemic risks. Sustain Resilient Infrastruct 6(3\u20134):252\u2013271","journal-title":"Sustain Resilient Infrastruct"},{"key":"1526_CR51","doi-asserted-by":"publisher","first-page":"14717","DOI":"10.1109\/ACCESS.2022.3147517","volume":"10","author":"K Chen","year":"2022","unstructured":"Chen K, Lu Y, Guo L et al (2022) A genetic algorithm-based methodology for analyzing the characteristics of high-operational-capability combat networks. IEEE Access 10:14717\u201314730","journal-title":"IEEE Access"},{"key":"1526_CR52","doi-asserted-by":"crossref","unstructured":"Albert R, Jeong H, Barab\u00e1si A L. Error and attack tolerance of complex networks. Nature, 2000, 406(6794): 378\u2013382.","DOI":"10.1038\/35019019"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01526-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-024-01526-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-024-01526-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T15:21:40Z","timestamp":1726327300000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-024-01526-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,5]]},"references-count":52,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["1526"],"URL":"https:\/\/doi.org\/10.1007\/s40747-024-01526-9","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,5]]},"assertion":[{"value":"27 February 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest or competing interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"The article has the approval of all the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"All the authors gave their consent to participate in this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"The authors gave their authorization for the publishing of this article.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}}]}}