{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T10:58:29Z","timestamp":1774522709075,"version":"3.50.1"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:00:00Z","timestamp":1771459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T00:00:00Z","timestamp":1774483200000},"content-version":"vor","delay-in-days":35,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Manipal Academy of Higher Education, Manipal"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Internet Things"],"DOI":"10.1007\/s43926-026-00306-w","type":"journal-article","created":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T14:06:01Z","timestamp":1771509961000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and optimisation of an IoT-based artificial intelligence framework for real-time health monitoring and telemedicine diagnostics in smart healthcare systems"],"prefix":"10.1007","volume":"6","author":[{"given":"Nithesh","family":"Naik","sequence":"first","affiliation":[]},{"given":"Nikhil","family":"Kassetty","sequence":"additional","affiliation":[]},{"given":"Srinivas","family":"Chippagiri","sequence":"additional","affiliation":[]},{"given":"Princy","family":"Randhawa","sequence":"additional","affiliation":[]},{"given":"B. M.","family":"Zeeshan Hameed","sequence":"additional","affiliation":[]},{"given":"Vathsala","family":"Patil","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,19]]},"reference":[{"issue":"11","key":"306_CR1","doi-asserted-by":"publisher","DOI":"10.3390\/app14114729","volume":"14","author":"SA Algethami","year":"2024","unstructured":"Algethami SA, Alshamrani SS. A deep learning-based framework for strengthening cybersecurity in internet of health things (IoHT) environments. Appl Sci. 2024;14(11):4729. https:\/\/doi.org\/10.3390\/app14114729.","journal-title":"Appl Sci"},{"issue":"1","key":"306_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.57159\/jcmm.4.1.25172","volume":"4","author":"VL Janani","year":"2025","unstructured":"Janani VL, Hansica BS, Kiruthika V, Kanishga B. Visual health track monitor: an IoT-enabled remote vital sign monitoring system. J Computers Mech Manage. 2025;4(1):20\u20134. https:\/\/doi.org\/10.57159\/jcmm.4.1.25172.","journal-title":"J Computers Mech Manage"},{"issue":"18","key":"306_CR3","doi-asserted-by":"publisher","DOI":"10.3390\/app11188383","volume":"11","author":"MA Alsoufi","year":"2021","unstructured":"Alsoufi MA, et al. Anomaly-based intrusion detection systems in IoT using deep learning: a systematic literature review. Appl Sci. 2021;11(18):8383. https:\/\/doi.org\/10.3390\/app11188383.","journal-title":"Appl Sci"},{"issue":"1","key":"306_CR4","doi-asserted-by":"publisher","DOI":"10.3390\/iot6010009","volume":"6","author":"MS Ahsan","year":"2025","unstructured":"Ahsan MS, Pathan A-S. A comprehensive survey on the requirements, applications, and future challenges for access control models in IoT: the state of the art. IoT. 2025;6(1):9. https:\/\/doi.org\/10.3390\/iot6010009.","journal-title":"IoT"},{"issue":"7","key":"306_CR5","doi-asserted-by":"publisher","DOI":"10.3390\/app15073629","volume":"15","author":"R Nabha","year":"2025","unstructured":"Nabha R, Laouiti A, Samhat AE. Internet of things-based healthcare systems: an overview of privacy-preserving mechanisms. Appl Sci. 2025;15(7):3629. https:\/\/doi.org\/10.3390\/app15073629.","journal-title":"Appl Sci"},{"key":"306_CR6","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1016\/j.trpro.2025.03.053","volume":"78","author":"MN Abid","year":"2025","unstructured":"Abid MN, Beggas M, Laouid A, Hammoudeh M. Enhancing cybersecurity in healthcare IoT systems using reinforcement learning. Transp Res Procedia. 2025;78:459\u201365. https:\/\/doi.org\/10.1016\/j.trpro.2025.03.053.","journal-title":"Transp Res Procedia"},{"key":"306_CR7","doi-asserted-by":"publisher","unstructured":"Chakraborty. Intelligent AI-Based Healthcare Cybersecurity System Using Multi-Source Transfer Learning Method 2025. https:\/\/doi.org\/10.1145\/3597210","DOI":"10.1145\/3597210"},{"issue":"3","key":"306_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.57159\/jcmm.4.3.25207","volume":"4","author":"SP Chinte","year":"2025","unstructured":"Chinte SP, Thakare PD, Jaiswal AR, Raja NH, Dhore PA. Blockchain-based decentralized storage for scalable and secure IoT data management. J Comput Mech Manage. 2025;4(3):35\u201342. https:\/\/doi.org\/10.57159\/jcmm.4.3.25207.","journal-title":"J Comput Mech Manage"},{"key":"306_CR9","doi-asserted-by":"crossref","unstructured":"Gueriani A, Kheddar H, Mazari AC. Enhancing IoT security with CNN and LSTM-Based intrusion detection systems. arXiv preprint arXiv:2405.18624. 2024.","DOI":"10.1109\/PAIS62114.2024.10541178"},{"key":"306_CR10","doi-asserted-by":"crossref","unstructured":"ElSayed Z, Elsayed N, Bay S. A novel Zero-Trust machine learning green architecture for healthcare IoT cybersecurity: review, Analysis, and implementation. ArXiv Preprint. 2024. https:\/\/arxiv.org\/abs\/2401.07368.","DOI":"10.1109\/SoutheastCon52093.2024.10500139"},{"issue":"13","key":"306_CR11","doi-asserted-by":"publisher","first-page":"4567","DOI":"10.3390\/s23134567","volume":"23","author":"GS Kuaban","year":"2023","unstructured":"Kuaban GS, et al. Modelling of the energy depletion process and battery depletion attacks for battery-Powered internet of things (IoT) devices. Sensors. 2023;23(13):4567. https:\/\/doi.org\/10.3390\/s23134567.","journal-title":"Sensors"},{"issue":"3","key":"306_CR12","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.3390\/s24031234","volume":"24","author":"Y Ma","year":"2024","unstructured":"Ma Y, et al. Impact of IoT system imperfections and passenger errors on cruise ship evacuation delay. Sensors. 2024;24(3):1234. https:\/\/doi.org\/10.3390\/s24031234.","journal-title":"Sensors"},{"issue":"11","key":"306_CR13","doi-asserted-by":"publisher","DOI":"10.3390\/s24113375","volume":"24","author":"K Pandav","year":"2024","unstructured":"Pandav K, Te AG, Tomer N, Nair SS, Tewari AK. Security analysis for smart healthcare systems. Sensors. 2024;24(11):3375. https:\/\/doi.org\/10.3390\/s24113375.","journal-title":"Sensors"},{"key":"306_CR14","doi-asserted-by":"crossref","unstructured":"Hussein DH, Ismail YM, Askar S, Ibrahim MA. Integration of deep learning applications and IoT for smart healthcare. Indonesian J Comput Sci. 2025;14(1). https:\/\/www.ijcs.net\/ijcs\/index.php\/ijcs\/article\/view\/4611","DOI":"10.33022\/ijcs.v14i1.4611"},{"key":"306_CR15","unstructured":"Khatun MA, Memon SF, Eising C, Dhirani LL. Machine learning for Healthcare-IoT security: a review and risk mitigation. arXiv preprint. 2024. https:\/\/arxiv.org\/abs\/2401.09124"},{"key":"306_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2025.112931","volume":"173","author":"Y Wu","year":"2025","unstructured":"Wu Y, et al. Online ensemble learning-based anomaly detection for IoT systems. Appl Soft Comput. 2025;173:112931. https:\/\/doi.org\/10.1016\/j.asoc.2025.112931.","journal-title":"Appl Soft Comput"},{"key":"306_CR17","doi-asserted-by":"crossref","unstructured":"Al-hammuri KA, et al. Zero Trust Context-Aware Access Control Framework for IoT Devices in Healthcare Cloud AI Ecosystem. ResearchGate. 2023.","DOI":"10.36227\/techrxiv.23716221.v1"},{"issue":"8","key":"306_CR18","doi-asserted-by":"publisher","first-page":"9889","DOI":"10.1109\/jiot.2024.3512657","volume":"12","author":"KI Ahmed","year":"2025","unstructured":"Ahmed KI, et al. Trust-Aware Authentication and Authorization for IoT: A Federated Machine Learning Approach. IEEE Internet Things J. 2025;12(8):9889\u2013904. https:\/\/doi.org\/10.1109\/jiot.2024.3512657.","journal-title":"IEEE Internet Things J"},{"key":"306_CR19","doi-asserted-by":"crossref","unstructured":"Reis MJCS, Serodio C. Edge AI for Real-Time Anomaly Detection in Smart Homes. ResearchGate. 2025.","DOI":"10.3390\/fi17040179"},{"key":"306_CR20","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140901","author":"Y Min","year":"2023","unstructured":"Min Y, Zhang J. Data anomaly detection in the internet of things: a review of current trends and research challenges. Int J Adv Comput Sci Appl. 2023. https:\/\/doi.org\/10.14569\/IJACSA.2023.0140901.","journal-title":"Int J Adv Comput Sci Appl"},{"key":"306_CR21","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10776-5","volume":"57","author":"YI Alzoubi","year":"2024","unstructured":"Alzoubi YI, et al. Research trends in deep learning and machine learning for cloud computing security. Artif Intell Rev. 2024;57:132. https:\/\/doi.org\/10.1007\/s10462-024-10776-5.","journal-title":"Artif Intell Rev"},{"key":"306_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3245678","author":"E Gelenbe","year":"2023","unstructured":"Gelenbe E, et al. IoT network cybersecurity assessment with the associated random neural network. IEEE Access. 2023. https:\/\/doi.org\/10.1109\/ACCESS.2023.3245678.","journal-title":"IEEE Access"},{"key":"306_CR23","doi-asserted-by":"publisher","first-page":"102345","DOI":"10.1016\/j.peva.2024.102345","volume":"150","author":"GS Kuaban","year":"2024","unstructured":"Kuaban GS, et al. Energy performance of off-grid green cellular base stations. Perform Eval. 2024;150:102345. https:\/\/doi.org\/10.1016\/j.peva.2024.102345.","journal-title":"Perform Eval"},{"key":"306_CR24","volume-title":"Disfida: distributed self-supervised federated intrusion detection algorithm with online learning","author":"E Gelenbe","year":"2024","unstructured":"Gelenbe E, et al. Disfida: distributed self-supervised federated intrusion detection algorithm with online learning. ResearchGate: for Health Internet of Things and Internet of Vehicles; 2024."},{"key":"306_CR25","unstructured":"Nguyen TA, et al. Federated PCA on Grassmann manifold for IoT anomaly Detection. 2024. ArXiv Preprint ArXiv:2407.07421. https:\/\/arxiv.org\/abs\/2407.07421"},{"key":"306_CR26","unstructured":"Ochiai H, et al. Detection of global anomalies on distributed IoT edges with Device-to-Device communication. 2024, arXiv preprint arXiv:2407.11308. https:\/\/arxiv.org\/abs\/2407.11308"},{"key":"306_CR27","doi-asserted-by":"crossref","unstructured":"Aaqib M, et al. IoT trust and reputation: a survey and taxonomy.\u00a02023. arXiv preprint arXiv:2304.06119. https:\/\/arxiv.org\/abs\/2304.06119","DOI":"10.1186\/s13677-023-00416-8"},{"issue":"1","key":"306_CR28","doi-asserted-by":"publisher","first-page":"2414","DOI":"10.53894\/ijirss.v8i1.4999","volume":"8","author":"U Mamodiya","year":"2025","unstructured":"Mamodiya U, Kishor I, Almaiah MA, Shehab R. AI-enhanced AR\/VR systems for remote healthcare to overcome real-time data integration and security challenges with IoT. Int J Innovative Res Sci Stud. 2025;8(1):2414\u201320. https:\/\/doi.org\/10.53894\/ijirss.v8i1.4999.","journal-title":"Int J Innovative Res Sci Stud"},{"key":"306_CR29","unstructured":"Ngo MV, et al. Adaptive Anomaly Detection for IoT Data in Hierarchical Edge Computing. 2020, arXiv preprint arXiv:2001.03314. https:\/\/arxiv.org\/abs\/2001.03314"},{"key":"306_CR30","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.0140901","author":"M Yang","year":"2023","unstructured":"Yang M, Zhang J. Data anomaly detection in the internet of things: a review of current trends and research challenges. Int J Adv Comput Sci Appl. 2023. https:\/\/doi.org\/10.14569\/IJACSA.2023.0140901.","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"5","key":"306_CR31","doi-asserted-by":"publisher","first-page":"1329","DOI":"10.3390\/pr11051329","volume":"11","author":"Z Diao","year":"2023","unstructured":"Diao Z, Sun F. A Deep-Learning neural network approach for secure wireless communication in the surveillance of electronic health records. Processes. 2023;11(5):1329. https:\/\/doi.org\/10.3390\/pr11051329.","journal-title":"Processes"},{"issue":"8s","key":"306_CR32","first-page":"183","volume":"11","author":"H Singh","year":"2023","unstructured":"Singh H, Ahmed Z, Khare MD,J., B. An IoT and Blockchain-Based secure medical care framework using deep learning and Nature-Inspired algorithms. Int J Intell Syst Appl Eng. 2023;11(8s):183\u201391. https:\/\/www.ijisae.org\/index.php\/IJISAE\/article\/view\/3039.","journal-title":"Int J Intell Syst Appl Eng"},{"key":"306_CR33","unstructured":"Ali M, Naeem F, Tariq M, Kaddoum G. Federated Learning for Privacy Preservation in Smart Healthcare Systems: A Comprehensive Survey.\u00a02022. arXiv preprint. https:\/\/arxiv.org\/abs\/2203.09702"},{"key":"306_CR34","doi-asserted-by":"crossref","unstructured":"Baucas M, Spachos P, Plataniotis K. Federated learning and blockchain-enabled Fog-IoT platform for wearables in predictive healthcare. ArXiv Preprint. 2023. https:\/\/arxiv.org\/abs\/2301.04511.","DOI":"10.1109\/TCSS.2023.3235950"},{"key":"306_CR35","doi-asserted-by":"publisher","first-page":"1524286","DOI":"10.3389\/fmed.2025.1524286","volume":"12","author":"JA Shaikh","year":"2025","unstructured":"Shaikh JA, Wang C, Sima MWU, et al. A deep reinforcement Learning-Based robust intrusion detection system for Securing IoMT healthcare networks. Front Med. 2025;12:1524286. https:\/\/doi.org\/10.3389\/fmed.2025.1524286.","journal-title":"Front Med"},{"issue":"3","key":"306_CR36","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.3390\/s22031130","volume":"22","author":"JA Sanchez-Perez","year":"2022","unstructured":"Sanchez-Perez JA, et al. A wearable multimodal sensing system for tracking changes in pulmonary fluid Status, lung Sounds, and respiratory markers. Sensors. 2022;22(3):1130. https:\/\/doi.org\/10.3390\/s22031130.","journal-title":"Sensors"},{"key":"306_CR37","doi-asserted-by":"publisher","DOI":"10.5121\/ijaia.2022.13404","author":"K Sharma","year":"2022","unstructured":"Sharma K, Eskicioglu R. Deep learning-based ECG classification on Raspberry Pi using a TensorFlow Lite model based on PTB-XL dataset. Int J Artif Intell Appl. 2022. https:\/\/doi.org\/10.5121\/ijaia.2022.13404.","journal-title":"Int J Artif Intell Appl"},{"key":"306_CR38","unstructured":"Fares MH, Saad AMSES. Towards privacy-Preserving medical imaging: federated learning with differential privacy and secure aggregation using a modified ResNet Architecture. 2024. ArXiv Preprint ArXiv:2412.00687. https:\/\/arxiv.org\/abs\/2412.00687"},{"issue":"5","key":"306_CR39","doi-asserted-by":"publisher","first-page":"21","DOI":"10.5815\/ijwmt.2022.05.03","volume":"12","author":"A Rauf","year":"2022","unstructured":"Rauf A, Shaikh RA, Shah A. Trust modelling and management for IoT healthcare. Int J Wirel Microw Technol. 2022;12(5):21\u201335. https:\/\/doi.org\/10.5815\/ijwmt.2022.05.03.","journal-title":"Int J Wirel Microw Technol"},{"key":"306_CR40","doi-asserted-by":"crossref","unstructured":"Yao A, Jiang F, Li X, Dong C, Xu J, Xu Y, Liu X. A novel security framework for edge computing based uav delivery system. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);\u00a02021, pp. 1031\u20131038.","DOI":"10.1109\/TrustCom53373.2021.00142"},{"key":"306_CR41","doi-asserted-by":"publisher","first-page":"16383","DOI":"10.1038\/s41598-024-67285-2","volume":"14","author":"B Suganya","year":"2024","unstructured":"Suganya B, et al. Dynamic task offloading edge-Aware optimization framework for enhanced UAV operations on edge computing platform. Sci Rep. 2024;14:16383. https:\/\/doi.org\/10.1038\/s41598-024-67285-2.","journal-title":"Sci Rep"},{"issue":"1","key":"306_CR42","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-024-01038-w","volume":"12","author":"K Qi","year":"2025","unstructured":"Qi K. Advancing hospital healthcare: achieving IoT-based secure health monitoring through multilayer machine learning. J Big Data. 2025;12(1):62. https:\/\/doi.org\/10.1186\/s40537-024-01038-w.","journal-title":"J Big Data"},{"issue":"14","key":"306_CR43","doi-asserted-by":"publisher","first-page":"4764","DOI":"10.3390\/s21144764","volume":"21","author":"H Sun","year":"2021","unstructured":"Sun H, et al. Multi-modal adaptive fusion transformer network for the estimation of depression level. Sensors. 2021;21(14):4764. https:\/\/doi.org\/10.3390\/s21144764.","journal-title":"Sensors"},{"issue":"2","key":"306_CR44","doi-asserted-by":"publisher","first-page":"40","DOI":"10.57159\/jcmm.4.2.25197","volume":"4","author":"SB Bharat","year":"2025","unstructured":"Bharat SB, Patil ME. Blockchain-Integrated authentication framework for secure Cloud-Based health monitoring with wearable devices. J Computers Mech Manage. 2025;4(2):40\u20138. https:\/\/doi.org\/10.57159\/jcmm.4.2.25197.","journal-title":"J Computers Mech Manage"},{"key":"306_CR45","unstructured":"Gupta A. Efficient Convolutional Neural Networks on Raspberry Pi: Enhancing Performance with Pruning and Quantization. ResearchGate. 2024. https:\/\/www.researchgate.net\/publication\/380308872."},{"key":"306_CR46","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3458983","author":"M Saleem","year":"2024","unstructured":"Saleem M, Farooq MS, Shahzad T, Hassan A, Abbas S, Ali T, et al. Secure and transparent mobility in smart cities: revolutionizing AVNs to predict traffic congestion using MapReduce, private Blockchain and XAI. IEEE Access. 2024. https:\/\/doi.org\/10.1109\/access.2024.3458983.","journal-title":"IEEE Access"},{"issue":"2","key":"306_CR47","doi-asserted-by":"publisher","DOI":"10.3390\/s22020634","volume":"22","author":"Y Alghofaili","year":"2022","unstructured":"Alghofaili Y, Rassam MA. A trust management model for IoT devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique. Sensors. 2022;22(2):634. https:\/\/doi.org\/10.3390\/s22020634.","journal-title":"Sensors"},{"key":"306_CR48","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2024.100345","volume":"22","author":"AA Biswas","year":"2024","unstructured":"Biswas AA. A comprehensive review of explainable AI for disease diagnosis. Array. 2024;22:100345. https:\/\/doi.org\/10.1016\/j.array.2024.100345.","journal-title":"Array"},{"key":"306_CR49","doi-asserted-by":"crossref","unstructured":"Xia H, Darbandi M. A new method for solving the task offloading problem in smart mobile internet of things using an intelligent adaptive learning-based optimization algorithm. IETE J Res. https:\/\/doi.org\/10.1080\/03772063.2025.2501179 https:\/\/www.mdpi.com\/1099-4300\/23\/9\/1146","DOI":"10.1080\/03772063.2025.2501179"},{"key":"306_CR50","doi-asserted-by":"crossref","unstructured":"Fang K, Deng J, Dong C, Naseem U, Liu T, Feng H, Wang W. MoCFL: mobile cluster federated learning framework for highly dynamic network. In: Proceedings of the ACM on Web Conference 2025; pp. 5065\u20135074.","DOI":"10.1145\/3696410.3714515"},{"key":"306_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.107706","author":"A Yao","year":"2025","unstructured":"Yao A, Pal S, Li G, Li X, Zhang Z, Jiang F, et al. FedShufde: a privacy preserving framework of federated learning for edge-based smart UAV delivery system. Future Gener Comput Syst. 2025. https:\/\/doi.org\/10.1016\/j.future.2025.107706.","journal-title":"Future Gener Comput Syst"},{"issue":"1","key":"306_CR52","doi-asserted-by":"publisher","first-page":"19223","DOI":"10.1038\/s41598-025-03358-0","volume":"15","author":"KM Adnan","year":"2025","unstructured":"Adnan KM, Ghazal TM, Saleem M, Farooq MS, Yeun CY, Ahmad M, et al. Deep learning driven interpretable and informed decision making model for brain tumour prediction using explainable AI. Sci Rep. 2025;15(1):19223.","journal-title":"Sci Rep"},{"key":"306_CR53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2025.104130","author":"N Anjum","year":"2025","unstructured":"Anjum N, Latif Z, Chen H. Security and privacy of industrial big data: motivation, opportunities, and challenges. J Netw Comput Appl. 2025. https:\/\/doi.org\/10.1016\/j.jnca.2025.104130.","journal-title":"J Netw Comput Appl."},{"issue":"2","key":"306_CR54","doi-asserted-by":"publisher","first-page":"400","DOI":"10.26599\/TST.2023.9010007","volume":"29","author":"NA Jalali","year":"2024","unstructured":"Jalali NA, Chen H. Federated learning security and privacy-preserving algorithm and experiments research under internet of things critical infrastructure. Tsinghua Sci Technol. 2024;29(2):400\u201314.","journal-title":"Tsinghua Sci Technol"},{"key":"306_CR55","doi-asserted-by":"crossref","unstructured":"Self-adaptive learning of task Offloading in mobile edge computing. Entropy. 2021;23(9):1146.","DOI":"10.3390\/e23091146"}],"container-title":["Discover Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s43926-026-00306-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00306-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s43926-026-00306-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T09:57:16Z","timestamp":1774519036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s43926-026-00306-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,19]]},"references-count":55,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["306"],"URL":"https:\/\/doi.org\/10.1007\/s43926-026-00306-w","relation":{},"ISSN":["2730-7239"],"issn-type":[{"value":"2730-7239","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,19]]},"assertion":[{"value":"22 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"37"}}