{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:35:23Z","timestamp":1772120123773,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T00:00:00Z","timestamp":1748390400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T00:00:00Z","timestamp":1748390400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-025-00160-2","type":"journal-article","created":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T20:58:50Z","timestamp":1748379530000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On the characteristics of next generation for redundant clustered reliable data transmission scheme in critical IoT infrastructures"],"prefix":"10.1007","volume":"5","author":[{"given":"Grace","family":"Khayat","sequence":"first","affiliation":[]},{"given":"Constandinos X.","family":"Mavromoustakis","sequence":"additional","affiliation":[]},{"given":"George","family":"Mastorakis","sequence":"additional","affiliation":[]},{"given":"Athina","family":"Bourdena","sequence":"additional","affiliation":[]},{"given":"Evangelos","family":"Markakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,28]]},"reference":[{"key":"160_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.energy.2024.132827","volume":"308","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A, Navimipour NJ. Comprehensive survey of artificial intelligence techniques and strategies for climate change mitigation. Energy. 2024;308: 132827. https:\/\/doi.org\/10.1016\/j.energy.2024.132827.","journal-title":"Energy"},{"key":"160_CR2","doi-asserted-by":"publisher","DOI":"10.3390\/drones8070320","author":"Y Bu","year":"2024","unstructured":"Bu Y, Yan Y, Yang Y. Advancement challenges in UAV swarm formation control: a comprehensive review. Drones. 2024. https:\/\/doi.org\/10.3390\/drones8070320.","journal-title":"Drones."},{"key":"160_CR3","doi-asserted-by":"publisher","DOI":"10.36227\/techrxiv.12912449.v1","author":"A Sharma","year":"2020","unstructured":"Sharma A, Vanjani P, Paliwal N, Wijerathna Basnayaka CM, Jayakody DN, Wang H-C, Muthuchidambaranathane P. Communication and networking technologies for UAVS: a survey. J Netw Comput Appl. 2020. https:\/\/doi.org\/10.36227\/techrxiv.12912449.v1.","journal-title":"J Netw Comput Appl"},{"issue":"8","key":"160_CR4","doi-asserted-by":"publisher","first-page":"7648","DOI":"10.1109\/JIOT.2020.2988249","volume":"7","author":"M Zhang","year":"2020","unstructured":"Zhang M, Li X. Drone-enabled internet-of-things relay for environmental monitoring in remote areas without public networks. IEEE Internet Things J. 2020;7(8):7648\u201362. https:\/\/doi.org\/10.1109\/JIOT.2020.2988249.","journal-title":"IEEE Internet Things J"},{"key":"160_CR5","doi-asserted-by":"publisher","unstructured":"Schwung M, Lunze J. Control of an uav acting as a communication base station to satisfy data requirements. In: 2021 European Control Conference (ECC), 2021:183\u2013188 https:\/\/doi.org\/10.23919\/ECC54610.2021.9654930","DOI":"10.23919\/ECC54610.2021.9654930"},{"key":"160_CR6","doi-asserted-by":"publisher","unstructured":"Gupta K, Bansal S, Goel R. Uses of Drones In Fighting COVID-19 Pandemic, 2021;651\u2013655 https:\/\/doi.org\/10.1109\/SMART52563.2021.9676290","DOI":"10.1109\/SMART52563.2021.9676290"},{"key":"160_CR7","doi-asserted-by":"publisher","unstructured":"Qureshi A, Fakhar-I-Adil M, Arshad H, Aslam A, Deeba F. Applications of medical drones in public health: an overview. 2021. J Hum Anat. https:\/\/doi.org\/10.23880\/jhua-16000152","DOI":"10.23880\/jhua-16000152"},{"key":"160_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-022-01071-8","author":"S Khediri","year":"2022","unstructured":"Khediri S. Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols. Computing. 2022. https:\/\/doi.org\/10.1007\/s00607-022-01071-8.","journal-title":"Computing"},{"key":"160_CR9","doi-asserted-by":"publisher","DOI":"10.1002\/ett.5056","author":"M Asadi","year":"2024","unstructured":"Asadi M, Jabraeil Jamali M, Heidari A, Navimipour N. Botnets unveiled: a comprehensive survey on evolving threats and defense strategies. Trans Emerg Telecommun Technol. 2024. https:\/\/doi.org\/10.1002\/ett.5056.","journal-title":"Trans Emerg Telecommun Technol."},{"key":"160_CR10","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-025-95854-6","author":"F Maleki","year":"2025","unstructured":"Maleki F, JabraeilJamali M, Heidari A. Unmanned aerial vehicle routing based on frog-leaping optimization algorithm. Sci Rep. 2025. https:\/\/doi.org\/10.1038\/s41598-025-95854-6.","journal-title":"Sci Rep."},{"key":"160_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/dac.5886","volume":"37","author":"K Zanbouri","year":"2024","unstructured":"Zanbouri K, Darbandi M, Nassr M, Heidari A, Navimipour N, Yalc\u0131n S. A GSO-based multi-objective technique for performance optimization of blockchain-based industrial internet of things. Int J Commun Syst. 2024;37:1\u201322. https:\/\/doi.org\/10.1002\/dac.5886.","journal-title":"Int J Commun Syst"},{"key":"160_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-09366-3","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A, Navimipour N, Esmaeilpour M, Yazdani Y. The deep learning applications in iot-based bio- and medical informatics a systematic literature review. Neural Comput Appl. 2024. https:\/\/doi.org\/10.1007\/s00521-023-09366-3.","journal-title":"Neural Comput Appl."},{"key":"160_CR13","doi-asserted-by":"publisher","unstructured":"Sowmya V, Janani AAS, Hussain SM, Aashica AC, Arvindh S. Creating a resilient solution: Innovating an emergency response drone for natural disasters. In: 2024 10th International Conference on Communication and Signal Processing (ICCSP), 2024;344\u2013348 https:\/\/doi.org\/10.1109\/ICCSP60870.2024.10543657","DOI":"10.1109\/ICCSP60870.2024.10543657"},{"key":"160_CR14","doi-asserted-by":"publisher","unstructured":"Mukhtaruzzaman M, Atiquzzaman M. Clustering in vehicular ad hoc network: Algorithms and challenges. 2020;88: 106851. https:\/\/doi.org\/10.1016\/j.compeleceng.2020.106851. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0045790620307047","DOI":"10.1016\/j.compeleceng.2020.106851"},{"key":"160_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-024-11049-8","author":"S Barnwal","year":"2024","unstructured":"Barnwal S, Prakash A. Comparative analysis of LEACH network routing protocol in wireless sensor networks: a survey. Wireless Pers Commun. 2024. https:\/\/doi.org\/10.1007\/s11277-024-11049-8.","journal-title":"Wireless Pers Commun."},{"key":"160_CR16","doi-asserted-by":"publisher","unstructured":"Yadav RK, Mahapatra RP. Hybrid metaheuristic algorithm for optimal cluster head selection in wireless sensor network. 2022. https:\/\/doi.org\/10.1016\/j.pmcj.2021.101504. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574119221001292","DOI":"10.1016\/j.pmcj.2021.101504"},{"key":"160_CR17","doi-asserted-by":"publisher","unstructured":"Shahraki A, Taherkordi A, Haugen Eliassen F. Clustering objectives in wireless sensor networks: A survey and research direction analysis 2020; https:\/\/doi.org\/10.1016\/j.comnet.2020.107376 . https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128620303121","DOI":"10.1016\/j.comnet.2020.107376"},{"key":"160_CR18","doi-asserted-by":"publisher","unstructured":"Wang J. Cpso: Chaotic particle swarm optimization for cluster analysis. J Artif Intell Technol. 2023; https:\/\/doi.org\/10.37965\/jait.2023.0166","DOI":"10.37965\/jait.2023.0166"},{"key":"160_CR19","doi-asserted-by":"publisher","unstructured":"Liang J, Xu Z, Xu Y, Zhou W, Li C. Adaptive Cooperative Routing Transmission for Energy Heterogeneous Wireless Sensor. Networks. 2021. https:\/\/doi.org\/10.1016\/j.phycom.2021.101460. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S187449072100197X","DOI":"10.1016\/j.phycom.2021.101460"},{"key":"160_CR20","doi-asserted-by":"publisher","first-page":"9759","DOI":"10.1007\/s00500-024-09814-9","volume":"28","author":"L Wang","year":"2024","unstructured":"Wang L, Tian D, Gou X, Shi Z. Hybrid particle swarm optimization with adaptive learning strategy. Soft Comput. 2024;28:9759\u201384. https:\/\/doi.org\/10.1007\/s00500-024-09814-9.","journal-title":"Soft Comput"},{"key":"160_CR21","doi-asserted-by":"publisher","unstructured":"Hu H, Liu J, Zhang X, Fang M. An effective and adaptable k-means algorithm for big data cluster analysis. 2023;139: 109404. https:\/\/doi.org\/10.1016\/j.patcog.2023.109404. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S003132032300105X","DOI":"10.1016\/j.patcog.2023.109404"},{"key":"160_CR22","doi-asserted-by":"publisher","unstructured":"Kumari P, Aggarwal G, Singh S. Clustering in mobile adhoc network: Wca algorithm, 2019;525\u2013533 https:\/\/doi.org\/10.1007\/978-3-030-03146-6_58","DOI":"10.1007\/978-3-030-03146-6_58"},{"issue":"6","key":"160_CR23","doi-asserted-by":"publisher","first-page":"4969","DOI":"10.1002\/ett.4969","volume":"35","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A, Zavvar M, Navimipour NJ, Esmaeilpour M. The applications of nature-inspired algorithms in internet of things-based healthcare service: a systematic literature review. Trans Emerg Telecommun Technol. 2024;35(6):4969. https:\/\/doi.org\/10.1002\/ett.4969.","journal-title":"Trans Emerg Telecommun Technol"},{"key":"160_CR24","doi-asserted-by":"publisher","unstructured":"Blessy A, M.C, S B. Maximizing vanet performance in cluster head selection using intelligent fuzzy bald eagle optimization. Veh Commun. 2024;45:100660 https:\/\/doi.org\/10.1016\/j.vehcom.2023.100660","DOI":"10.1016\/j.vehcom.2023.100660"},{"key":"160_CR25","doi-asserted-by":"publisher","unstructured":"C. Nguyen D, Pathirana P, Ding M, Seneviratne A. Secure computation offloading in blockchain based iot networks with deep reinforcement learning. IEEE Transactions on Network Science and Engineering 2021; https:\/\/doi.org\/10.1109\/TNSE.2021.3106956","DOI":"10.1109\/TNSE.2021.3106956"},{"key":"160_CR26","doi-asserted-by":"publisher","DOI":"10.3390\/jsan13050047","author":"SA Ghauri","year":"2024","unstructured":"Ghauri SA, Sarfraz M, Qamar RA, Sohail MF, Khan SA. A review of multi-uav task allocation algorithms for a search and rescue scenario. J Sens Actuat Netw. 2024. https:\/\/doi.org\/10.3390\/jsan13050047.","journal-title":"J Sens Actuat Netw."},{"key":"160_CR27","doi-asserted-by":"publisher","unstructured":"Chkirbene Z, Gouissem A, Hamila R, Unal D. The future of aerial communications: A survey of irs-enhanced uav communication technologies. In: 2024 IEEE 8th Energy Conference (ENERGYCON), 2024;1\u20136 https:\/\/doi.org\/10.1109\/ENERGYCON58629.2024.10488785","DOI":"10.1109\/ENERGYCON58629.2024.10488785"},{"key":"160_CR28","doi-asserted-by":"publisher","unstructured":"Wang Y, Wang Z, Xing N, Zhao S. Uav coverage path planning based on deep reinforcement learning, 2023;143\u2013147 https:\/\/doi.org\/10.1109\/CCET59170.2023.10335145","DOI":"10.1109\/CCET59170.2023.10335145"},{"key":"160_CR29","doi-asserted-by":"publisher","DOI":"10.3390\/su13063515","author":"RA Est\u00e9vez","year":"2021","unstructured":"Est\u00e9vez RA, Espinoza V, Ponce Oliva RD, V\u00e1squez-Lav\u00edn F, Gelcich S. Multi-criteria decision analysis for renewable energies: research trends, gaps and the challenge of improving participation. Sustainability. 2021. https:\/\/doi.org\/10.3390\/su13063515.","journal-title":"Sustainability."},{"key":"160_CR30","doi-asserted-by":"publisher","first-page":"1449","DOI":"10.4314\/jasem.v23i8.7","volume":"23","author":"G Odu","year":"2019","unstructured":"Odu G. Weighting methods for multi-criteria decision making technique. JAppl Sci Environ Manag. 2019;23:1449. https:\/\/doi.org\/10.4314\/jasem.v23i8.7.","journal-title":"JAppl Sci Environ Manag."},{"key":"160_CR31","doi-asserted-by":"publisher","DOI":"10.3390\/electronics14071237","author":"S Lakmayer","year":"2025","unstructured":"Lakmayer S, Danielson M. Efficient weight ranking in multi-criteria decision support systems. Electronics. 2025. https:\/\/doi.org\/10.3390\/electronics14071237.","journal-title":"Electronics."},{"key":"160_CR32","doi-asserted-by":"publisher","first-page":"2021901","DOI":"10.14488\/BJOPM.2021.014","volume":"18","author":"F Silva","year":"2021","unstructured":"Silva F, Souza C, Silva FF, Costa H, Hora H, Erthal M. Elicitation of criteria weights for multicriteria models: bibliometrics, typologies, characteristics and applications. Braz J Oper Prod Manag. 2021;18:2021901. https:\/\/doi.org\/10.14488\/BJOPM.2021.014.","journal-title":"Braz J Oper Prod Manag"},{"key":"160_CR33","doi-asserted-by":"publisher","unstructured":"Liu S, Hu Y, Zhang X, Li Y, Liu L. Blockchain service provider selection based on an integrated bwm-entropy-topsis method under an intuitionistic fuzzy environment. IEEE Access 2020;1\u20131 https:\/\/doi.org\/10.1109\/ACCESS.2020.2999367","DOI":"10.1109\/ACCESS.2020.2999367"},{"key":"160_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108428","volume":"124","author":"M Zhang","year":"2021","unstructured":"Zhang M. Weighted clustering ensemble: a review. Pattern Recogn. 2021;124: 108428. https:\/\/doi.org\/10.1016\/j.patcog.2021.108428.","journal-title":"Pattern Recogn"},{"key":"160_CR35","doi-asserted-by":"publisher","DOI":"10.1002\/eng2.13050","author":"A Heidari","year":"2024","unstructured":"Heidari A, Amiri Z, Jabraeil Jamali M, Navimipour N. Enhancing solar convection analysis with multi-core processors and gpus. Eng Rep. 2024. https:\/\/doi.org\/10.1002\/eng2.13050.","journal-title":"Eng Rep."},{"key":"160_CR36","doi-asserted-by":"publisher","first-page":"9322368","DOI":"10.1155\/2021\/9322368","volume":"2021","author":"B Xie","year":"2021","unstructured":"Xie B, Dong X, Wang C. An improved k-means clustering intrusion detection algorithm for wireless networks based on federated learning. Wireless Commun Mobile Comput. 2021;2021:9322368. https:\/\/doi.org\/10.1155\/2021\/9322368.","journal-title":"Wireless Commun Mobile Comput."},{"key":"160_CR37","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.8252","author":"A Heidari","year":"2024","unstructured":"Heidari A, Amiri Z, Ali M, JabraeilJamali M, Navimipour N. Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults. Concurr Comput Pract Exp. 2024. https:\/\/doi.org\/10.1002\/cpe.8252.","journal-title":"Concurr Comput Pract Exp."},{"issue":"1","key":"160_CR38","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1109\/TKDE.2020.2981062","volume":"34","author":"L Li","year":"2022","unstructured":"Li L, Wang S, Zhou X. Fastest path query answering using time-dependent hop-labeling in road network. IEEE Trans Knowl Data Eng. 2022;34(1):300\u201313. https:\/\/doi.org\/10.1109\/TKDE.2020.2981062.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"160_CR39","unstructured":"Zhu D, Wang C, Wang W, Garg R, Scherer S, Meng MQ-H. Vdb-edt: An efficient euclidean distance transform algorithm based on vdb data structure. 2021. https:\/\/arxiv.org\/abs\/2105.04419"},{"key":"160_CR40","doi-asserted-by":"publisher","unstructured":"Nunome S, Nagaoka R, Hasegawa H. Accuracy evaluation of 3d velocity estimation by multi-frequency phase-sensitive motion estimator under various specifications of matrix array probe. Jpn J Appl Phys. 2020;59:01 https:\/\/doi.org\/10.35848\/1347-4065\/ab78e7 .","DOI":"10.35848\/1347-4065\/ab78e7"},{"key":"160_CR41","doi-asserted-by":"publisher","DOI":"10.1007\/s13160-023-00593-8","author":"S Rump","year":"2023","unstructured":"Rump S. Fast and accurate computation of the euclidean norm of a vector. Jpn J Ind Appl Math. 2023. https:\/\/doi.org\/10.1007\/s13160-023-00593-8.","journal-title":"Jpn J Ind Appl Math"},{"key":"160_CR42","doi-asserted-by":"publisher","first-page":"181","DOI":"10.3390\/electronics11020181","volume":"11","author":"C-Q Du","year":"2022","unstructured":"Du C-Q, Shao J-B, Wu D-M, Ren Z, Wu Z-Y, Ren W-Q. Research on co-estimation algorithm of soc and soh for lithium-ion batteries in electric vehicles. Electronics. 2022;11:181. https:\/\/doi.org\/10.3390\/electronics11020181.","journal-title":"Electronics."},{"key":"160_CR43","doi-asserted-by":"publisher","unstructured":"Zhao H, Gao G, Li S, Tang X, Wang Q, Li T. Configuration of battery capacity for energy storage participating in primary frequency regulation based on vsg control. In: 2023 5th International Conference on Power and Energy Technology (ICPET), 2023;329\u2013334 https:\/\/doi.org\/10.1109\/ICPET59380.2023.10367718","DOI":"10.1109\/ICPET59380.2023.10367718"},{"key":"160_CR44","doi-asserted-by":"publisher","unstructured":"Jabraeil\u00a0Jamali M, Bahrami B, Heidari A, Allahverdizadeh P, Norouzi F. The IoT Landscape, 2020;1\u20138 https:\/\/doi.org\/10.1007\/978-3-030-18468-1_1","DOI":"10.1007\/978-3-030-18468-1_1"},{"key":"160_CR45","doi-asserted-by":"publisher","unstructured":"Khayat G, Mavromoustakis C, Pitsillides A, Batalla J, Markakis E. Multiple Redundant K-Means Clustered Scheme Based on Weighted Cluster Head Selection for Damaged S-UAV, 2023;6177\u20136182 https:\/\/doi.org\/10.1109\/GLOBECOM54140.2023.10437501","DOI":"10.1109\/GLOBECOM54140.2023.10437501"},{"key":"160_CR46","doi-asserted-by":"publisher","unstructured":"Santos C, Dias C.. Note on the coefficient of variation properties. Braz Electron J Math (BEJOM) 2021;2:101\u2013111 https:\/\/doi.org\/10.14393\/BEJOM-v2-n4-2021-58062","DOI":"10.14393\/BEJOM-v2-n4-2021-58062"},{"key":"160_CR47","doi-asserted-by":"publisher","unstructured":"Khayat G, Mavromoustakis C, Mastorakis G, Pallis E, Markakis E, Bourdena A. S-UAV Multiple Redundant Routing Scheme for Crisis Scenario, 2024;81\u201391 https:\/\/doi.org\/10.1007\/978-3-031-58527-2_4","DOI":"10.1007\/978-3-031-58527-2_4"},{"key":"160_CR48","doi-asserted-by":"publisher","unstructured":"Khayat G, Mavromoustakis CX, Mastorakis G, Mongay Batalla J, Pallis E. Swarm uav network constraints in damaged infrastructures. In: ICC 2022 - IEEE International Conference on Communications, 2022;835\u2013840 https:\/\/doi.org\/10.1109\/ICC45855.2022.9839071","DOI":"10.1109\/ICC45855.2022.9839071"},{"key":"160_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100666","volume":"54","author":"Z Amiri","year":"2024","unstructured":"Amiri Z, Heidari A, Jafari N, Hosseinzadeh M. Deep study on autonomous learning techniques for complex pattern recognition in interconnected information systems. Comput Sci Rev. 2024;54: 100666. https:\/\/doi.org\/10.1016\/j.cosrev.2024.100666.","journal-title":"Comput Sci Rev"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00160-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-025-00160-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-025-00160-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,27]],"date-time":"2025-05-27T20:58:52Z","timestamp":1748379532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-025-00160-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,28]]},"references-count":49,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["160"],"URL":"https:\/\/doi.org\/10.1007\/s43926-025-00160-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-6115517\/v1","asserted-by":"object"}]},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,28]]},"assertion":[{"value":"26 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no Conflict of interest to declare that are relevant to the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"62"}}