{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:20:03Z","timestamp":1777389603480,"version":"3.51.4"},"reference-count":56,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T00:00:00Z","timestamp":1777593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["21JCYBJC00110"],"award-info":[{"award-number":["21JCYBJC00110"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["24JCYBJC00240"],"award-info":[{"award-number":["24JCYBJC00240"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019065","name":"Tianjin Municipal Science and Technology Program","doi-asserted-by":"publisher","award":["24ZXZSSS00420"],"award-info":[{"award-number":["24ZXZSSS00420"]}],"id":[{"id":"10.13039\/501100019065","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62233011"],"award-info":[{"award-number":["62233011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["72495155"],"award-info":[{"award-number":["72495155"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2026,5]]},"DOI":"10.1016\/j.knosys.2026.115836","type":"journal-article","created":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T15:55:47Z","timestamp":1774108547000},"page":"115836","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["Bounty hunter optimizer: A novel metaheuristic with an application to multi-UAV mobile edge computing and path planning"],"prefix":"10.1016","volume":"341","author":[{"given":"Mingyang","family":"Yu","sequence":"first","affiliation":[]},{"given":"Haorui","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jiaqi","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5937-5229","authenticated-orcid":false,"given":"Kaichen","family":"Ouyang","sequence":"additional","affiliation":[]},{"given":"Shengwei","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Panlong","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8532-2241","authenticated-orcid":false,"given":"Jing","family":"Xu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.knosys.2026.115836_bib0001","series-title":"Stochastic Adaptive Search for Global Optimization","author":"Zabinsky","year":"2003"},{"key":"10.1016\/j.knosys.2026.115836_bib0002","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1007\/s10462-024-10821-3","article-title":"Improved multi-strategy adaptive Grey Wolf Optimization for practical engineering applications and high-dimensional problem solving","volume":"57","author":"Yu","year":"2024","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.knosys.2026.115836_bib0003","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2024.102662","article-title":"Differential privacy distributed optimization algorithm against adversarial attacks for efficiency optimization of complex industrial processes","volume":"62","author":"Yue","year":"2024","journal-title":"Adv. Eng. Inform."},{"key":"10.1016\/j.knosys.2026.115836_bib0004","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2023.102210","article-title":"Genghis Khan shark optimizer: a novel nature-inspired algorithm for engineering optimization","volume":"58","author":"Hu","year":"2023","journal-title":"Adv. Eng. Inform."},{"key":"10.1016\/j.knosys.2026.115836_bib0005","series-title":"Geotechnical and Transport Engineering","article-title":"Metaheuristics in water","author":"Yang","year":"2012"},{"key":"10.1016\/j.knosys.2026.115836_bib0006","doi-asserted-by":"crossref","first-page":"2773","DOI":"10.1016\/j.jmatprotec.2008.06.028","article-title":"An effective hybrid immune-hill climbing optimization approach for solving design and manufacturing optimization problems in industry","volume":"209","author":"Y\u0131ld\u0131z","year":"2009","journal-title":"J. Mater. Process. Technol."},{"key":"10.1016\/j.knosys.2026.115836_bib0007","doi-asserted-by":"crossref","DOI":"10.1007\/s10462-025-11438-w","article-title":"Alzheimer\u2019s disease brain image segmentation using multi-feature fusion in 3D R\u00e9nyi entropy model and quantum hybrid optimization","author":"Yu","year":"2026","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.knosys.2026.115836_bib0008","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/0377-2217(93)E0228-P","article-title":"An application of genetic algorithms for flow shop problems","volume":"80","author":"Chen","year":"1995","journal-title":"Eur. J. Oper. Res."},{"key":"10.1016\/j.knosys.2026.115836_bib0009","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1016\/j.mcm.2006.12.019","article-title":"Parameter selection and adaptation in unified particle swarm optimization","volume":"46","author":"Parsopoulos","year":"2007","journal-title":"Math. Comput. Model."},{"key":"10.1016\/j.knosys.2026.115836_bib0010","doi-asserted-by":"crossref","first-page":"5227","DOI":"10.1016\/j.ins.2011.07.026","article-title":"Multi-stage genetic programming: a new strategy to nonlinear system modeling","volume":"181","author":"Gandomi","year":"2011","journal-title":"Inf. Sci."},{"key":"10.1016\/j.knosys.2026.115836_bib0011","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.aej.2025.01.055","article-title":"A multi-strategy enhanced Dung Beetle Optimization for real-world engineering problems and UAV path planning","volume":"118","author":"Yu","year":"2025","journal-title":"Alex. Eng. J."},{"key":"10.1016\/j.knosys.2026.115836_bib0012","doi-asserted-by":"crossref","first-page":"122","DOI":"10.3390\/a14040122","article-title":"Bio-inspired algorithms and its applications for optimization in fuzzy clustering","volume":"14","author":"Valdez","year":"2021","journal-title":"Algorithms"},{"key":"10.1016\/j.knosys.2026.115836_bib0013","volume":"204","author":"Qasim","year":"2020"},{"key":"10.1016\/j.knosys.2026.115836_bib0014","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","article-title":"The whale optimization algorithm","volume":"95","author":"Mirjalili","year":"2016","journal-title":"Adv. Eng. Softw."},{"key":"10.1016\/j.knosys.2026.115836_bib0015","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","article-title":"Grey wolf optimizer","volume":"69","author":"Mirjalili","year":"2014","journal-title":"Adv. Eng. Softw."},{"key":"10.1016\/j.knosys.2026.115836_bib0016","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1080\/21642583.2019.1708830","article-title":"A novel swarm intelligence optimization approach: sparrow search algorithm","volume":"8","author":"Xue","year":"2020","journal-title":"Syst. Sci. Control Eng."},{"key":"10.1016\/j.knosys.2026.115836_bib0017","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2025.103344","article-title":"Optimized UAV view planning for high-quality 3D reconstruction of buildings using a modified sparrow search algorithm","volume":"65","author":"Liang","year":"2025","journal-title":"Adv. Eng. Inform."},{"key":"10.1016\/j.knosys.2026.115836_bib0018","doi-asserted-by":"crossref","DOI":"10.1016\/j.apm.2025.116736","article-title":"A Reinforced Quantum Aquila Optimizer for Multi-Threat 3D UAVs Path Planning in Complex Environments","author":"Yang","year":"2026","journal-title":"Appl. Math. Model."},{"key":"10.1016\/j.knosys.2026.115836_bib0019","unstructured":"J. Kudela, The evolutionary computation methods no one should use, arXiv preprint arXiv:2301.01984, (2023)."},{"key":"10.1016\/j.knosys.2026.115836_bib0020","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.121597","article-title":"Human memory optimization algorithm: a memory-inspired optimizer for global optimization problems","volume":"237","author":"Zhu","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.knosys.2026.115836_bib0021","doi-asserted-by":"crossref","DOI":"10.1016\/j.aei.2025.103657","article-title":"Towards large-scale cotton blending optimization: dual-pheromone crossover ant colony algorithm with expert heuristic cognition","volume":"68","author":"Wang","year":"2025","journal-title":"Adv. Eng. Inform."},{"key":"10.1016\/j.knosys.2026.115836_bib0022","doi-asserted-by":"crossref","first-page":"10187","DOI":"10.1109\/TVT.2019.2935877","article-title":"Joint resources and workflow scheduling in UAV-enabled wirelessly-powered MEC for IoT systems","volume":"68","author":"Du","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.knosys.2026.115836_bib0023","first-page":"1","article-title":"Mobile edge computing\u2014A key technology towards 5G","volume":"11","author":"Hu","year":"2015","journal-title":"ETSI White Pap."},{"key":"10.1016\/j.knosys.2026.115836_bib0024","doi-asserted-by":"crossref","first-page":"2322","DOI":"10.1109\/COMST.2017.2745201","article-title":"A survey on mobile edge computing: the communication perspective","volume":"19","author":"Mao","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.knosys.2026.115836_bib0025","doi-asserted-by":"crossref","first-page":"1879","DOI":"10.1109\/JIOT.2018.2878876","article-title":"Joint offloading and trajectory design for UAV-enabled mobile edge computing systems","volume":"6","author":"Hu","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.knosys.2026.115836_bib0026","doi-asserted-by":"crossref","first-page":"14803","DOI":"10.1109\/TMC.2024.3446819","article-title":"Multi-objective optimization for multi-UAV-assisted mobile edge computing","volume":"23","author":"Sun","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.knosys.2026.115836_bib0027","article-title":"Online collaborative resource allocation and task offloading for multi-access edge computing","author":"Sun","year":"2025","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.knosys.2026.115836_bib0028","article-title":"A dynamic optimization framework for computation rate maximization in UAV-assisted mobile edge computing","author":"Chen","year":"2025","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.knosys.2026.115836_bib0029","doi-asserted-by":"crossref","first-page":"4684","DOI":"10.1109\/TVT.2024.3485182","article-title":"Dynamic trajectory design for multi-UAV-assisted mobile edge computing","volume":"74","author":"Wang","year":"2024","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.knosys.2026.115836_bib0030","doi-asserted-by":"crossref","first-page":"2720","DOI":"10.1109\/JIOT.2022.3215255","article-title":"Joint multi-UAV path planning and LoS communication for mobile-edge computing in IoT networks with RISs","volume":"10","author":"Savkin","year":"2022","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.knosys.2026.115836_bib0031","doi-asserted-by":"crossref","first-page":"7957","DOI":"10.1109\/TVT.2019.2920284","article-title":"Trajectory design and power control for multi-UAV assisted wireless networks: a machine learning approach","volume":"68","author":"Liu","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.knosys.2026.115836_bib0032","doi-asserted-by":"crossref","first-page":"5723","DOI":"10.1109\/TVT.2020.2982508","article-title":"Path planning for UAV-mounted mobile edge computing with deep reinforcement learning","volume":"69","author":"Liu","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.knosys.2026.115836_bib0033","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2024.3426945","article-title":"Joint association, deployment and flight trajectory optimization for multi-UAV-enabled large-scale mobile edge computing","author":"Han","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.knosys.2026.115836_bib0034","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1186\/s13638-024-02426-9","article-title":"Joint trajectory design and resource allocation for UAV-assisted mobile edge computing in power convergence network","volume":"2025","author":"Cui","year":"2025","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"10.1016\/j.knosys.2026.115836_bib0035","doi-asserted-by":"crossref","first-page":"3948","DOI":"10.3390\/s24123948","article-title":"UAV-assisted mobile edge computing: dynamic trajectory design and resource allocation","volume":"24","author":"Wang","year":"2024","journal-title":"Sensors"},{"key":"10.1016\/j.knosys.2026.115836_bib0036","first-page":"578","article-title":"UAV trajectory planning based on improved bidirectional RRT algorithm","volume":"16","author":"WANG","year":"2025","journal-title":"J. Meas. Sci. Instrum."},{"key":"10.1016\/j.knosys.2026.115836_bib0037","series-title":"A Dual-Layer UAV-assisted Mobile Edge Computing System For Disaster rescue: Coordinated optimization of coverage, Obstacle-Avoidance Path Planning and Task Offloading","author":"Gu","year":"2025"},{"key":"10.1016\/j.knosys.2026.115836_bib0038","doi-asserted-by":"crossref","first-page":"1837","DOI":"10.3390\/s24061837","article-title":"Trajectory-aware offloading decision in UAV-aided edge computing: a comprehensive survey","volume":"24","author":"Baidya","year":"2024","journal-title":"Sensors"},{"key":"10.1016\/j.knosys.2026.115836_bib0039","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","article-title":"Mobile edge computing: a survey","volume":"5","author":"Abbas","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.knosys.2026.115836_bib0040","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1109\/TETCI.2021.3083410","article-title":"Multi-UAV mobile edge computing and path planning platform based on reinforcement learning","volume":"6","author":"Chang","year":"2021","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"10.1016\/j.knosys.2026.115836_bib0041","series-title":"The Principle of SA Algorithm and Algorithm\u2019s application On Optimization Problem","first-page":"6","author":"Feng","year":"2006"},{"key":"10.1016\/j.knosys.2026.115836_bib0042","doi-asserted-by":"crossref","first-page":"849","DOI":"10.1016\/j.future.2019.02.028","article-title":"Harris hawks optimization: Algorithm and applications","volume":"97","author":"Heidari","year":"2019","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.knosys.2026.115836_bib0043","doi-asserted-by":"crossref","DOI":"10.1016\/j.oceaneng.2024.119665","article-title":"IPORF: a combined improved parrot optimizer algorithm and random forest for fault diagnosis in AUV","volume":"313","author":"Huang","year":"2024","journal-title":"Ocean Eng."},{"key":"10.1016\/j.knosys.2026.115836_bib0044","doi-asserted-by":"crossref","DOI":"10.1016\/j.cma.2022.115764","article-title":"A multi-strategy improved slime mould algorithm for global optimization and engineering design problems","volume":"404","author":"Deng","year":"2023","journal-title":"Comput. Methods Appl. Mech. Eng."},{"key":"10.1016\/j.knosys.2026.115836_bib0045","doi-asserted-by":"crossref","first-page":"1919","DOI":"10.1007\/s10462-023-10567-4","article-title":"Crayfish optimization algorithm","volume":"56","author":"Jia","year":"2023","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.knosys.2026.115836_bib0046","doi-asserted-by":"crossref","DOI":"10.1016\/j.knosys.2023.110939","article-title":"Optical microscope algorithm: A new metaheuristic inspired by microscope magnification for solving engineering optimization problems","volume":"279","author":"Cheng","year":"2023","journal-title":"Knowl.-Based Syst."},{"key":"10.1016\/j.knosys.2026.115836_bib0047","series-title":"2017 IEEE Congress on Evolutionary Computation (CEC)","first-page":"145","article-title":"LSHADE with semi-parameter adaptation hybrid with CMA-ES for solving CEC 2017 benchmark problems","author":"Mohamed","year":"2017"},{"key":"10.1016\/j.knosys.2026.115836_bib0048","series-title":"2017 IEEE Congress on Evolutionary Computation (CEC)","first-page":"372","article-title":"Ensemble sinusoidal differential covariance matrix adaptation with Euclidean neighborhood for solving CEC2017 benchmark problems","author":"Awad","year":"2017"},{"key":"10.1016\/j.knosys.2026.115836_bib0049","series-title":"2021 IEEE Congress on Evolutionary Computation (CEC)","first-page":"832","article-title":"Improving differential evolution through Bayesian hyperparameter optimization","author":"Biswas","year":"2021"},{"key":"10.1016\/j.knosys.2026.115836_bib0050","series-title":"2022 IEEE Congress on Evolutionary Computation (CEC)","first-page":"1","article-title":"Eigen crossover in cooperative model of evolutionary algorithms applied to CEC 2022 single objective numerical optimisation","author":"Bujok","year":"2022"},{"key":"10.1016\/j.knosys.2026.115836_bib0051","doi-asserted-by":"crossref","DOI":"10.1016\/j.eswa.2023.123088","article-title":"Football team training algorithm: a novel sport-inspired meta-heuristic optimization algorithm for global optimization","volume":"245","author":"Tian","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"10.1016\/j.knosys.2026.115836_bib0052","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.2016.7470933","article-title":"Wireless communications with unmanned aerial vehicles: opportunities and challenges","volume":"54","author":"Zeng","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.knosys.2026.115836_bib0053","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1109\/COMST.2015.2495297","article-title":"Survey of important issues in UAV communication networks","volume":"18","author":"Gupta","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.knosys.2026.115836_bib0054","doi-asserted-by":"crossref","first-page":"1995","DOI":"10.1109\/LCOMM.2014.2354409","article-title":"QoE-aware scheduling for sigmoid optimization in wireless networks","volume":"18","author":"Lee","year":"2014","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.knosys.2026.115836_bib0055","doi-asserted-by":"crossref","first-page":"859","DOI":"10.23919\/cje.2023.00.264","article-title":"Multi-dimensional QoS evaluation and optimization of mobile edge computing for IoT: a survey","volume":"33","author":"Huang","year":"2024","journal-title":"Chin. J. Electron."},{"key":"10.1016\/j.knosys.2026.115836_bib0056","series-title":"Proceedings of the 44th IEEE Conference on Decision and Control","first-page":"1867","article-title":"Network utility maximization with nonconcave utilities using sum-of-squares method","author":"Fazel","year":"2005"}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705126005629?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705126005629?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T08:40:04Z","timestamp":1776156004000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705126005629"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5]]},"references-count":56,"alternative-id":["S0950705126005629"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2026.115836","relation":{},"ISSN":["0950-7051"],"issn-type":[{"value":"0950-7051","type":"print"}],"subject":[],"published":{"date-parts":[[2026,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Bounty hunter optimizer: A novel metaheuristic with an application to multi-UAV mobile edge computing and path planning","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2026.115836","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"115836"}}