{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T16:43:49Z","timestamp":1776876229625,"version":"3.51.2"},"reference-count":63,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,7,1]],"date-time":"2026-07-01T00:00:00Z","timestamp":1782864000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Applied Soft Computing"],"published-print":{"date-parts":[[2026,7]]},"DOI":"10.1016\/j.asoc.2026.115181","type":"journal-article","created":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T23:31:57Z","timestamp":1775604717000},"page":"115181","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Human-like AI algorithm for playing Iterated Prisoner\u2019s Dilemma"],"prefix":"10.1016","volume":"197","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0756-4290","authenticated-orcid":false,"given":"Ognjen","family":"Nikoli\u0107","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5857-6932","authenticated-orcid":false,"given":"Marija","family":"Kuzmanovi\u0107","sequence":"additional","affiliation":[]},{"given":"Dragan","family":"Pamu\u010dar","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.asoc.2026.115181_bib1","series-title":"The Evolution of Cooperation","author":"Axelrod","year":"1984"},{"issue":"1979","key":"10.1016\/j.asoc.2026.115181_bib2","doi-asserted-by":"crossref","first-page":"1390","DOI":"10.1126\/science.7466396","article-title":"The Evolution of Cooperation","volume":"211","author":"Axelrod","year":"1981","journal-title":"Science"},{"key":"10.1016\/j.asoc.2026.115181_bib3","series-title":"The Complexity of Cooperation: Agent-Based Models of Competition and Collaboration","author":"Axelrod","year":"1997"},{"key":"10.1016\/j.asoc.2026.115181_bib4","doi-asserted-by":"crossref","first-page":"35","DOI":"10.5334\/jors.125","article-title":"An Open Framework for the Reproducible Study of the Iterated Prisoner\u2019s Dilemma","volume":"4","author":"Knight","year":"2016","journal-title":"J. Open Res. Softw."},{"key":"10.1016\/j.asoc.2026.115181_bib5","doi-asserted-by":"crossref","first-page":"10134","DOI":"10.1073\/pnas.1208087109","article-title":"Extortion and cooperation in the Prisoner\u2019s Dilemma","volume":"109","author":"Stewart","year":"2012","journal-title":"Proc. Natl. Acad. Sci."},{"key":"10.1016\/j.asoc.2026.115181_bib6","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0188046","article-title":"Reinforcement learning produces dominant strategies for the Iterated Prisoner\u2019s Dilemma","volume":"12","author":"Harper","year":"2017","journal-title":"PLoS One"},{"key":"10.1016\/j.asoc.2026.115181_bib7","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pcbi.1012644","article-title":"Properties of winning Iterated Prisoner\u2019s Dilemma strategies","volume":"20","author":"Glynatsi","year":"2024","journal-title":"PLoS Comput. Biol."},{"key":"10.1016\/j.asoc.2026.115181_bib8","doi-asserted-by":"crossref","DOI":"10.1038\/s41598-020-73855-x","article-title":"Five rules for friendly rivalry in direct reciprocity","volume":"10","author":"Murase","year":"2020","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115181_bib9","doi-asserted-by":"crossref","DOI":"10.18564\/jasss.3517","article-title":"New Winning Strategies for the Iterated Prisoner\u2019s Dilemma","volume":"20","author":"Mathieu","year":"2017","journal-title":"J. Artif. Soc. Soc. Simul."},{"key":"10.1016\/j.asoc.2026.115181_bib10","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevResearch.6.013062","article-title":"Impact of committed minorities: Unveiling critical mass of cooperation in the iterated prisoner\u2019s dilemma game","volume":"6","author":"He","year":"2024","journal-title":"Phys. Rev. Res."},{"key":"10.1016\/j.asoc.2026.115181_bib11","doi-asserted-by":"crossref","DOI":"10.1007\/s11238-025-10029-z","article-title":"Forgiveness, cooperation, and present bias in the infinitely iterated Prisoner\u2019s dilemma","author":"Kang","year":"2025","journal-title":"Theory Decis."},{"key":"10.1016\/j.asoc.2026.115181_bib12","doi-asserted-by":"crossref","DOI":"10.1098\/rsif.2023.0301","article-title":"Small bots, big impact: solving the conundrum of cooperation in optional Prisoner\u2019s Dilemma game through simple strategies","volume":"20","author":"Sharma","year":"2023","journal-title":"J. R. Soc. Interface"},{"key":"10.1016\/j.asoc.2026.115181_bib13","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/s11403-024-00436-w","article-title":"Exploring the role of character traits in the iterated prisoner\u2019s dilemma using case-based decision theory","volume":"20","author":"Boohaker","year":"2025","journal-title":"J. Econ. Interact. Coord."},{"key":"10.1016\/j.asoc.2026.115181_bib14","doi-asserted-by":"crossref","DOI":"10.1016\/j.jebo.2024.106819","article-title":"Inequality, social norms and cooperation: Strategy choice in the infinitely socially iterated prisoner\u2019s dilemma","volume":"229","author":"Teyssier","year":"2025","journal-title":"J. Econ. Behav. Organ"},{"key":"10.1016\/j.asoc.2026.115181_bib15","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.geb.2023.12.003","article-title":"Cooperation, competition, and welfare in a matching market","volume":"143","author":"Bester","year":"2024","journal-title":"Games Econ. Behav."},{"key":"10.1016\/j.asoc.2026.115181_bib16","first-page":"47","article-title":"Environment promotes the evolution of cooperation in spatial voluntary prisoner\u2019s dilemma game","volume":"315","author":"Guo","year":"2017","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.asoc.2026.115181_bib17","first-page":"224","article-title":"Strategy-updating depending on local environment enhances cooperation in prisoner\u2019s dilemma game","volume":"301","author":"Zhang","year":"2017","journal-title":"Appl. Math. Comput."},{"key":"10.1016\/j.asoc.2026.115181_bib18","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2024.111962","article-title":"Freedom of choice disrupts cyclic dominance but maintains cooperation in voluntary prisoner\u2019s dilemma game","volume":"299","author":"Jia","year":"2024","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.asoc.2026.115181_bib19","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2024.107859","article-title":"A study of factors in the formation of population game cooperation based on mixed learning rules","volume":"132","author":"Xing","year":"2024","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.asoc.2026.115181_bib20","doi-asserted-by":"crossref","DOI":"10.1038\/srep26889","article-title":"Small groups and long memories promote cooperation","volume":"6","author":"Stewart","year":"2016","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115181_bib21","doi-asserted-by":"crossref","first-page":"17558","DOI":"10.1073\/pnas.1408618111","article-title":"Collapse of cooperation in evolving games","volume":"111","author":"Stewart","year":"2014","journal-title":"Proc. Natl. Acad. Sci."},{"key":"10.1016\/j.asoc.2026.115181_bib22","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.asoc.2016.03.025","article-title":"Cooperation in the evolutionary iterated prisoner\u2019s dilemma game with risk attitude adaptation","volume":"44","author":"Zeng","year":"2016","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.115181_bib23","doi-asserted-by":"crossref","first-page":"10409","DOI":"10.1073\/pnas.1206569109","article-title":"Iterated Prisoner\u2019s Dilemma contains strategies that dominate any evolutionary opponent","volume":"109","author":"Press","year":"2012","journal-title":"Proc. Natl. Acad. Sci."},{"key":"10.1016\/j.asoc.2026.115181_bib24","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.jtbi.2014.05.004","article-title":"The robustness of zero-determinant strategies in Iterated Prisoner\u05f3s Dilemma games","volume":"357","author":"Chen","year":"2014","journal-title":"J. Theor. Biol."},{"key":"10.1016\/j.asoc.2026.115181_bib25","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1016\/j.ejor.2023.12.013","article-title":"An incentive compatible ZD strategy-based data sharing model for federated learning: A perspective of iterated prisoner\u2019s dilemma","volume":"315","author":"Jie","year":"2024","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/j.asoc.2026.115181_bib26","doi-asserted-by":"crossref","first-page":"5174","DOI":"10.1038\/s41598-022-08750-8","article-title":"Misperception influence on zero-determinant strategies in iterated Prisoner\u2019s Dilemma","volume":"12","author":"Cheng","year":"2022","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115181_bib27","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.1038\/ncomms3193","article-title":"Evolutionary instability of zero-determinant strategies demonstrates that winning is not everything","volume":"4","author":"Adami","year":"2013","journal-title":"Nat. Commun."},{"key":"10.1016\/j.asoc.2026.115181_bib28","first-page":"359","article-title":"Fuzzy logic based game theory applications in multi-criteria decision making process","volume":"25","author":"Aplak","year":"2013","journal-title":"J. Intell. & Fuzzy Syst."},{"key":"10.1016\/j.asoc.2026.115181_bib29","article-title":"Improving the quality of service indices of task allocation in mobile crowd sensing with fuzzy-based inverse stackelberg game theory","volume":"20","author":"Vahedi","year":"2023","journal-title":"Intell. Syst. Appl."},{"key":"10.1016\/j.asoc.2026.115181_bib30","doi-asserted-by":"crossref","first-page":"209","DOI":"10.2298\/YJOR231122013D","article-title":"Solving constrained matrix games with fuzzy random linear constraints","volume":"35","author":"Djebara","year":"2025","journal-title":"Yugosl. J. Oper. Res."},{"key":"10.1016\/j.asoc.2026.115181_bib31","doi-asserted-by":"crossref","DOI":"10.1016\/j.asoc.2025.113654","article-title":"An adaptive strategy quantum particle swarm optimization method based on intuitionistic fuzzy entropy and evolutionary game theory","volume":"183","author":"Zhou","year":"2025","journal-title":"Appl. Soft Comput."},{"key":"10.1016\/j.asoc.2026.115181_bib32","doi-asserted-by":"crossref","DOI":"10.1016\/j.fss.2023.108798","article-title":"On a value of a matrix game with fuzzy sets of player strategies","volume":"477","author":"Mashchenko","year":"2024","journal-title":"Fuzzy Sets Syst."},{"key":"10.1016\/j.asoc.2026.115181_bib33","article-title":"A fuzzy approach to strategic games","volume":"7","author":"Song","year":"1999","journal-title":"IEEE Trans. Fuzzy Syst."},{"key":"10.1016\/j.asoc.2026.115181_bib34","series-title":"IEEE Region 10 Annual International Conference, Proceedings\/TENCON","article-title":"A fuzzy approach to the prisoner\u2019s dilemma game using fuzzy expected value models","author":"Mathew","year":"2003"},{"key":"10.1016\/j.asoc.2026.115181_bib35","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1007\/s10100-019-00638-9","article-title":"Hesitant interval-valued intuitionistic fuzzy-linguistic term set approach in Prisoners\u2019 dilemma game theory using TOPSIS: a case study on Human-trafficking","volume":"28","author":"Bhaumik","year":"2020","journal-title":"Cent. Eur. J. Oper. Res."},{"key":"10.1016\/j.asoc.2026.115181_bib36","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.geb.2024.01.004","article-title":"Reinforcement learning in a prisoner\u2019s dilemma","volume":"144","author":"Dolgopolov","year":"2024","journal-title":"Games Econ. Behav."},{"key":"10.1016\/j.asoc.2026.115181_bib37","first-page":"1","article-title":"Online Reinforcement Learning-Based Strategy Learning in Iterated Prisoner\u2019s Dilemma","author":"Xing","year":"2025","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"10.1016\/j.asoc.2026.115181_bib38","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1109\/JAS.2017.7510466","article-title":"An adaptive strategy via reinforcement learning for the prisoner dilemma game","volume":"5","author":"Xue","year":"2018","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"10.1016\/j.asoc.2026.115181_bib39","doi-asserted-by":"crossref","first-page":"2523","DOI":"10.1109\/TCSS.2023.3289470","article-title":"Causal Reinforcement Learning in Iterated Prisoner\u2019s Dilemma","volume":"11","author":"Kazemi","year":"2024","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"10.1016\/j.asoc.2026.115181_bib40","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2025.113153","article-title":"The evolution of cooperation in continuous dilemmas via multi-agent reinforcement learning","volume":"315","author":"Zhu","year":"2025","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.asoc.2026.115181_bib41","series-title":"A Fuzzy Resolution of the Prisoner\u2019s Dilemma","author":"Raman","year":"2002"},{"key":"10.1016\/j.asoc.2026.115181_bib42","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0303-2647(96)01667-X","article-title":"A fuzzy approach to the prisoner\u2019s dilemma","volume":"41","author":"Borges","year":"1997","journal-title":"Biosystems"},{"key":"10.1016\/j.asoc.2026.115181_bib43","doi-asserted-by":"crossref","DOI":"10.1016\/j.jet.2023.105731","article-title":"The folk theorem for the prisoner\u2019s dilemma with endogenous private monitoring","volume":"213","author":"Carmona","year":"2023","journal-title":"J. Econ. Theory"},{"key":"10.1016\/j.asoc.2026.115181_bib44","article-title":"Fuzzy strategy updating in the prisoner\u2019s dilemma game","volume":"13","author":"Deng","year":"2012","journal-title":"International Journal Simulation Systems Science Technology"},{"key":"10.1016\/j.asoc.2026.115181_bib45","doi-asserted-by":"crossref","first-page":"1383","DOI":"10.1163\/156853906778987506","article-title":"Humanfriendship favours cooperation in the Iterated Prisoner\u2019s Dilemma","volume":"143","author":"Majolo","year":"2006","journal-title":"Behaviour"},{"key":"10.1016\/j.asoc.2026.115181_bib46","doi-asserted-by":"crossref","DOI":"10.1098\/rsos.230867","article-title":"Individualistic attitudes in Iterated Prisoner\u2019s Dilemma undermine evolutionary fitness and may drive cooperative human players to extinction","volume":"11","author":"Pulcu","year":"2024","journal-title":"R. Soc. Open Sci."},{"key":"10.1016\/j.asoc.2026.115181_bib47","doi-asserted-by":"crossref","first-page":"7589","DOI":"10.1038\/s41598-022-11654-2","article-title":"Inferring strategies from observations in long iterated Prisoner\u2019s dilemma experiments","volume":"12","author":"Montero-Porras","year":"2022","journal-title":"Sci. Rep."},{"key":"10.1016\/j.asoc.2026.115181_bib48","doi-asserted-by":"crossref","first-page":"13755","DOI":"10.1073\/pnas.95.23.13755","article-title":"Working memory constrains human cooperation in the Prisoner\u2019s Dilemma","volume":"95","author":"Milinski","year":"1998","journal-title":"Proc. Natl. Acad. Sci."},{"key":"10.1016\/j.asoc.2026.115181_bib49","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.2214\/AJR.19.22145","article-title":"Interpretable Artificial Intelligence: Why and When","volume":"214","author":"Ghosh","year":"2020","journal-title":"Am. J. Roentgenol."},{"key":"10.1016\/j.asoc.2026.115181_bib50","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1080\/08838151.2022.2057984","article-title":"Platforms We Trust?Unlocking the Black-Box of News Algorithms through Interpretable AI","volume":"66","author":"Shin","year":"2022","journal-title":"J. Broadcast. Electron. Media"},{"key":"10.1016\/j.asoc.2026.115181_bib51","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1038\/s42256-019-0048-x","article-title":"Stop explaining black box machine learning models for high stakes decisions and use interpretable models instead","volume":"1","author":"Rudin","year":"2019","journal-title":"Nat. Mach. Intell."},{"key":"10.1016\/j.asoc.2026.115181_bib52","first-page":"1","article-title":"Bridging the Black Box: A Survey on Mechanistic Interpretability in AI","volume":"58","author":"Somvanshi","year":"2026","journal-title":"ACM Comput. Surv."},{"key":"10.1016\/j.asoc.2026.115181_bib53","first-page":"95","article-title":"Self-explaining AI as an Alternative to Interpretable AI","volume":"12177","author":"Elton","year":"2020"},{"key":"10.1016\/j.asoc.2026.115181_bib54","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","article-title":"Fuzzy Sets","volume":"8","author":"Zadeh","year":"1965","journal-title":"Inf. Control"},{"key":"10.1016\/j.asoc.2026.115181_bib55","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s10462-023-10632-y","article-title":"A comprehensive survey on scheduling algorithms using fuzzy systems in distributed environments","volume":"57","author":"Jalali Khalil Abadi","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.asoc.2026.115181_bib56","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.plrev.2015.04.033","article-title":"Universal scaling for the dilemma strength in evolutionary games","volume":"14","author":"Wang","year":"2015","journal-title":"Phys. Life Rev."},{"key":"10.1016\/j.asoc.2026.115181_bib57","unstructured":"V. Knight, Running Axelrod\u2019s First Tournament, (2015). \u3008https:\/\/axelrod.readthedocs.io\/en\/stable\/tutorials\/running_axelrods_first_tournament\/index.html\u3009 (accessed June 27, 2025)."},{"key":"10.1016\/j.asoc.2026.115181_bib58","unstructured":"V. Knight, Include noise, (2015). \u3008https:\/\/axelrod.readthedocs.io\/en\/stable\/how-to\/include_noise.html\u3009 (accessed January 26, 2026)."},{"key":"10.1016\/j.asoc.2026.115181_bib59","unstructured":"T. Singer-Clark, Morality Metrics On Iterated Prisoners Dilemma Players, 2014."},{"key":"10.1016\/j.asoc.2026.115181_bib60","unstructured":"V. Knight, Run Axelrod\u2019s Ecological Variant, (2015). \u3008https:\/\/axelrod.readthedocs.io\/en\/stable\/how-to\/run_axelrods_ecological_variant.html\u3009 (accessed February 15, 2026)."},{"key":"10.1016\/j.asoc.2026.115181_bib61","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0204981","article-title":"Evolution reinforces cooperation with the emergence of self-recognition mechanisms: An empirical study of strategies in the Moran process for the iterated prisoner\u2019s dilemma","volume":"13","author":"Knight","year":"2018","journal-title":"PLoS One"},{"key":"10.1016\/j.asoc.2026.115181_bib62","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevE.90.042726","article-title":"Nonequivalence of updating rules in evolutionary games under high mutation rates","volume":"90","author":"Kaiping","year":"2014","journal-title":"Phys. Rev. E"},{"key":"10.1016\/j.asoc.2026.115181_bib63","unstructured":"V. Knight, Moran Process, (2015). \u3008https:\/\/axelrod.readthedocs.io\/en\/stable\/tutorials\/new_to_game_theory_and_or_python\/moran.html\u3009 (accessed February 15, 2026)."}],"container-title":["Applied Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006290?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1568494626006290?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T15:59:23Z","timestamp":1776873563000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1568494626006290"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,7]]},"references-count":63,"alternative-id":["S1568494626006290"],"URL":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115181","relation":{},"ISSN":["1568-4946"],"issn-type":[{"value":"1568-4946","type":"print"}],"subject":[],"published":{"date-parts":[[2026,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Human-like AI algorithm for playing Iterated Prisoner\u2019s Dilemma","name":"articletitle","label":"Article Title"},{"value":"Applied Soft Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.asoc.2026.115181","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"115181"}}