{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:14:37Z","timestamp":1757618077467,"version":"3.44.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T00:00:00Z","timestamp":1747267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T00:00:00Z","timestamp":1747267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100003977","name":"Israel Science Foundation","doi-asserted-by":"publisher","award":["1789\/23","1789\/23"],"award-info":[{"award-number":["1789\/23","1789\/23"]}],"id":[{"id":"10.13039\/501100003977","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100018703","name":"HORIZON EUROPE European Innovation Council","doi-asserted-by":"publisher","award":["DiDAX, 101115134","DiDAX, 101115134"],"award-info":[{"award-number":["DiDAX, 101115134","DiDAX, 101115134"]}],"id":[{"id":"10.13039\/100018703","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF2212437"],"award-info":[{"award-number":["CCF2212437"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005005","name":"Ben-Gurion University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100005005","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2025,8]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In this paper, we focus on constructing unique-decodable and list-decodable codes for the recently studied (<jats:italic>t<\/jats:italic>,\u00a0<jats:italic>e<\/jats:italic>)-composite-asymmetric error-correcting codes ((<jats:italic>t<\/jats:italic>,\u00a0<jats:italic>e<\/jats:italic>)-CAECCs). Let <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$\\mathcal {X}$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>X<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula> be an <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$m \\times n$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>m<\/mml:mi>\n                    <mml:mo>\u00d7<\/mml:mo>\n                    <mml:mi>n<\/mml:mi>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula> binary matrix in which each row has Hamming weight <jats:italic>w<\/jats:italic>. If at most <jats:italic>t<\/jats:italic> rows of <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$\\mathcal {X}$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>X<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula> contain errors, and in each erroneous row, there are at most <jats:italic>e<\/jats:italic> occurrences of <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$1 \\rightarrow 0$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mn>1<\/mml:mn>\n                    <mml:mo>\u2192<\/mml:mo>\n                    <mml:mn>0<\/mml:mn>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula> errors, we say that a (<jats:italic>t<\/jats:italic>,\u00a0<jats:italic>e<\/jats:italic>)-composite-asymmetric error occurs in <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$\\mathcal {X}$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mi>X<\/mml:mi>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>. For general values of <jats:italic>m<\/jats:italic>,\u00a0<jats:italic>n<\/jats:italic>,\u00a0<jats:italic>w<\/jats:italic>,\u00a0<jats:italic>t<\/jats:italic>, and <jats:italic>e<\/jats:italic>, we propose new constructions of (<jats:italic>t<\/jats:italic>,\u00a0<jats:italic>e<\/jats:italic>)-CAECCs with redundancy at most <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$(t-1)\\log (m) + O(1)$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mi>t<\/mml:mi>\n                    <mml:mo>-<\/mml:mo>\n                    <mml:mn>1<\/mml:mn>\n                    <mml:mo>)<\/mml:mo>\n                    <mml:mo>log<\/mml:mo>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mi>m<\/mml:mi>\n                    <mml:mo>)<\/mml:mo>\n                    <mml:mo>+<\/mml:mo>\n                    <mml:mi>O<\/mml:mi>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mn>1<\/mml:mn>\n                    <mml:mo>)<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>, where <jats:italic>O<\/jats:italic>(1) is independent of the code length <jats:italic>m<\/jats:italic>. In particular, this yields a class of (2,\u00a0<jats:italic>e<\/jats:italic>)-CAECCs that are optimal in terms of redundancy. When <jats:italic>m<\/jats:italic> is a prime power, the redundancy can be further reduced to <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$(t-1)\\log (m) - O(\\log (m))$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mi>t<\/mml:mi>\n                    <mml:mo>-<\/mml:mo>\n                    <mml:mn>1<\/mml:mn>\n                    <mml:mo>)<\/mml:mo>\n                    <mml:mo>log<\/mml:mo>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mi>m<\/mml:mi>\n                    <mml:mo>)<\/mml:mo>\n                    <mml:mo>-<\/mml:mo>\n                    <mml:mi>O<\/mml:mi>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mo>log<\/mml:mo>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mi>m<\/mml:mi>\n                    <mml:mo>)<\/mml:mo>\n                    <mml:mo>)<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>. To further increase the code size, we introduce a combinatorial object called a weak <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$B_e$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:msub>\n                    <mml:mi>B<\/mml:mi>\n                    <mml:mi>e<\/mml:mi>\n                  <\/mml:msub>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>-set. When <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$e = w$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mi>e<\/mml:mi>\n                    <mml:mo>=<\/mml:mo>\n                    <mml:mi>w<\/mml:mi>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>, we present an efficient encoding and decoding method for our codes. Finally, we explore potential improvements by relaxing the requirement of unique decoding to list-decoding. We show that when the list size is <jats:italic>t<\/jats:italic>! or an exponential function of <jats:italic>t<\/jats:italic>, there exist list-decodable (<jats:italic>t<\/jats:italic>,\u00a0<jats:italic>e<\/jats:italic>)-CAECCs with constant redundancy. When the list size is two, we construct list-decodable (3,\u00a02)-CAECCs with redundancy <jats:inline-formula>\n              <jats:alternatives>\n                <jats:tex-math>$$\\log (m) + O(1)$$<\/jats:tex-math>\n                <mml:math xmlns:mml=\"https:\/\/2.zoppoz.workers.dev:443\/http\/www.w3.org\/1998\/Math\/MathML\">\n                  <mml:mrow>\n                    <mml:mo>log<\/mml:mo>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mi>m<\/mml:mi>\n                    <mml:mo>)<\/mml:mo>\n                    <mml:mo>+<\/mml:mo>\n                    <mml:mi>O<\/mml:mi>\n                    <mml:mo>(<\/mml:mo>\n                    <mml:mn>1<\/mml:mn>\n                    <mml:mo>)<\/mml:mo>\n                  <\/mml:mrow>\n                <\/mml:math>\n              <\/jats:alternatives>\n            <\/jats:inline-formula>.<\/jats:p>","DOI":"10.1007\/s10623-025-01634-8","type":"journal-article","created":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T11:14:33Z","timestamp":1747307673000},"page":"3437-3462","update-policy":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["More on codes for combinatorial composite DNA"],"prefix":"10.1007","volume":"93","author":[{"given":"Zuo","family":"Ye","sequence":"first","affiliation":[]},{"given":"Omer","family":"Sabary","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Gabrys","sequence":"additional","affiliation":[]},{"given":"Eitan","family":"Yaakobi","sequence":"additional","affiliation":[]},{"given":"Ohad","family":"Elishco","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,15]]},"reference":[{"key":"1634_CR1","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1038\/s41587-019-0240-x","volume":"37","author":"L Anavy","year":"2019","unstructured":"Anavy L., Vaknin I., Atar O., Amit R., Yakhini Z.: Data storage in DNA with fewer synthesis cycles using composite DNA letters. Nat. Biotechnol. 37, 1229\u20131236 (2019).","journal-title":"Nat. Biotechnol."},{"issue":"1","key":"1634_CR2","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/BF02566968","volume":"37","author":"RC Bose","year":"1962","unstructured":"Bose R.C., Chowla S.: Theorems in the additive theory of numbers. Comment. Math. Helv. 37(1), 141\u2013147 (1962).","journal-title":"Comment. Math. Helv."},{"key":"1634_CR3","doi-asserted-by":"publisher","first-page":"6582","DOI":"10.1038\/s41598-019-43105-w","volume":"9","author":"Y Choi","year":"2019","unstructured":"Choi Y., Ryu T., Lee A.C., et al.: High information capacity DNA-based data storage with augmented encoding characters using degenerate bases. Sci. Rep. 9, 6582 (2019).","journal-title":"Sci. Rep."},{"key":"1634_CR4","doi-asserted-by":"crossref","unstructured":"Cohen T., Yaakobi E.: Optimizing the decoding probability and coverage ratio of composite DNA. In: Proc. IEEE Int. Symp. Inf. Theory (ISIT), Athens, Greece, pp. 1949\u20131954 (2024).","DOI":"10.1109\/ISIT57864.2024.10619348"},{"key":"1634_CR5","unstructured":"David\u00a0Reinsel J.G., Rydning J.: The digitization of the world from edge to core. In: IDC Report (2018). https:\/\/2.zoppoz.workers.dev:443\/https\/www.seagate.com\/files\/www-content\/our-story\/trends\/files\/idc-seagate-dataage-whitepaper.pdf."},{"issue":"4","key":"1634_CR6","doi-asserted-by":"publisher","first-page":"2120","DOI":"10.1137\/080730093","volume":"23","author":"L Dolecek","year":"2010","unstructured":"Dolecek L., Anantharam V.: Repetition error correcting sets: explicit constructions and prefixing methods. SIAM J. Discrete Math. 23(4), 2120\u20132146 (2010).","journal-title":"SIAM J. Discrete Math."},{"issue":"6328","key":"1634_CR7","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1126\/science.aaj2038","volume":"355","author":"Y Erlich","year":"2017","unstructured":"Erlich Y., Zielinski D.: DNA Fountain enables a robust and efficient storage architecture. Science 355(6328), 950\u2013954 (2017).","journal-title":"Science"},{"key":"1634_CR8","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807077","volume-title":"Fundamentals of Error-Correcting Codes","author":"WC Huffman","year":"2003","unstructured":"Huffman W.C., Pless V.: Fundamentals of Error-Correcting Codes. Cambridge University Press, Cambridge (2003)."},{"key":"1634_CR9","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2103-4","volume-title":"A Classical Introduction to Modern Number Theory","author":"K Ireland","year":"1990","unstructured":"Ireland K., Rosen M.: A Classical Introduction to Modern Number Theory, vol. 84, 2nd edn Graduate Texts in Mathematics. Springer, New York (1990).","edition":"2"},{"key":"1634_CR10","unstructured":"Kabal P.: Combinatorial Coding and Lexicographic Ordering (2018). https:\/\/2.zoppoz.workers.dev:443\/https\/www.mmsp.ece.mcgill.ca\/Documents\/Reports\/2018\/KabalR2018.pdf."},{"key":"1634_CR11","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-58575-3","volume-title":"Introduction to Coding Theory","author":"JH Lint","year":"1999","unstructured":"Lint J.H.: Introduction to Coding Theory, vol. 86, 3rd edn Graduate Texts in Mathematics. Springer, Berlin (1999).","edition":"3"},{"key":"1634_CR12","doi-asserted-by":"publisher","DOI":"10.1101\/2022.10.06.511077","author":"E Marinelli","year":"2022","unstructured":"Marinelli E., Yan Y., Magnone V., Dumargne M.-C., Barbry P., Heinis T., Appuswamy R.: Oligoarchive-DSM: columnar design for error-tolerant database archival using synthetic DNA. bioRxiv (2022). https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1101\/2022.10.06.511077.","journal-title":"bioRxiv"},{"key":"1634_CR13","unstructured":"Nguyen T.T., Wang C., Cai K., Zhang Y., Yakhini Z.: Constrained Coding for Composite DNA: Channel Capacity and Efficient Constructions (2025). arXiv:2501.10645v1."},{"key":"1634_CR14","doi-asserted-by":"publisher","first-page":"7731","DOI":"10.1038\/s41598-024-58386-z","volume":"14","author":"I Preuss","year":"2024","unstructured":"Preuss I., Rosenberg M., Yakhini Z., Anavy L.: Efficient DNA-based data storage using shortmer combinatorial encoding. Sci. Rep. 14, 7731 (2024).","journal-title":"Sci. Rep."},{"key":"1634_CR15","doi-asserted-by":"publisher","DOI":"10.1101\/2024.01.10.574966","author":"I Preuss","year":"2024","unstructured":"Preuss I., Galili B., Yakhini Z., Anavy L.: Sequencing coverage analysis for combinatorial DNA-based storage systems. IEEE Trans. Mol. Biol. Multiscale Commun. (2024). https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1101\/2024.01.10.574966.","journal-title":"IEEE Trans. Mol. Biol. Multiscale Commun."},{"key":"1634_CR16","doi-asserted-by":"publisher","DOI":"10.1101\/2021.04.20.440194","author":"N Roquet","year":"2021","unstructured":"Roquet N., Bhatia S.P., Flickinger S.A., Mihm S., Norsworthy M.W., Leake D., Park H.: DNA-based data storage via combinatorial assembly. bioRxiv (2021). https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1101\/2021.04.20.440194.","journal-title":"bioRxiv"},{"key":"1634_CR17","doi-asserted-by":"crossref","unstructured":"Sabary O., Preuss I., Gabrys R., Yakhini Z., Anavy L., Yaakobi E.: Error-correcting codes for combinatorial DNA composite. In: Proc. IEEE Int. Symp. Inf. Theory (ISIT), Athens, Greece, pp. 109\u2013114 (2024).","DOI":"10.1109\/ISIT57864.2024.10619334"},{"issue":"1","key":"1634_CR18","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1007\/BF01455900","volume":"106","author":"S Sidon","year":"1932","unstructured":"Sidon S.: Ein Satz \u00fcber Trigonometrische Polynome und Seine Anwendung in der Theorie der Fourier-Reihen. Math. Ann. 106(1), 536\u2013539 (1932) (in German).","journal-title":"Math. Ann."},{"issue":"3","key":"1634_CR19","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1090\/S0002-9947-1938-1501951-4","volume":"43","author":"J Singer","year":"1938","unstructured":"Singer J.: A theorem in finite projective geometry and some applications to number theory. Trans. Am. Math. Soc. 43(3), 377\u2013385 (1938).","journal-title":"Trans. Am. Math. Soc."},{"key":"1634_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2024.3506938","author":"R Sokolovskii","year":"2025","unstructured":"Sokolovskii R., Agarwal P., Croquevielle L.A., Zhou Z., Heinis T.: Coding over coupon collector channels for combinatorial motif-based DNA storage. IEEE Trans. Commun., Early Access (2025). https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1109\/TCOMM.2024.3506938.","journal-title":"IEEE Trans. Commun., Early Access"},{"key":"1634_CR21","doi-asserted-by":"crossref","unstructured":"Walter F., Sabary O., Wachter-Zeh A., Yaakobi E.: Coding for composite DNA to correct substitutions, strand losses, and deletions. In: Proc. IEEE Int. Symp. Inf. Theory (ISIT), Athens, Greece, pp. 97\u2013102 (2024).","DOI":"10.1109\/ISIT57864.2024.10619202"},{"key":"1634_CR22","unstructured":"Walter F., Yehezkeally Y.: Coding for Strand Breaks in Composite DNA (2025). arXiv:2501.15851v1."},{"key":"1634_CR23","doi-asserted-by":"publisher","first-page":"15978","DOI":"10.1038\/s41598-023-43172-0","volume":"13","author":"Y Yan","year":"2023","unstructured":"Yan Y., Pinnamaneni N., Chalapati S., Crosbie C., Appuswamy R.: Scaling logical density of DNA storage with enzymatically-ligated composite motifs. Sci. Rep. 13, 15978 (2023).","journal-title":"Sci. Rep."},{"issue":"3","key":"1634_CR24","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1109\/TMBMC.2016.2537305","volume":"1","author":"SMHT Yazdi","year":"2015","unstructured":"Yazdi S.M.H.T., Kiah H.M., Garcia-Ruiz E., Ma J., Zhao H., Milenkovic O.: DNA-based storage: trends and methods. IEEE Trans. Mol. Biol. Multiscale Commun. 1(3), 230\u2013248 (2015).","journal-title":"IEEE Trans. Mol. Biol. Multiscale Commun."},{"issue":"10","key":"1634_CR25","doi-asserted-by":"publisher","first-page":"2357","DOI":"10.1109\/TIT.2004.834744","volume":"50","author":"S Yekhanin","year":"2004","unstructured":"Yekhanin S., Dumer I.: Long nonbinary codes exceeding the Gilbert-Varshamov bound for any fixed distance. IEEE Trans. Inf. Theory 50(10), 2357\u20132362 (2004).","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1634_CR26","doi-asserted-by":"crossref","unstructured":"Zhang W., Chen Z., Wang Z.: Limited-magnitude error correction for probability vectors in DNA storage. In: Proc. Int. Conf. Commun. (ICC), Seoul, Republic of Korea, pp. 3460\u20133465 (2022).","DOI":"10.1109\/ICC45855.2022.9838471"},{"key":"1634_CR27","unstructured":"Zhang W., Wang Z.: Codes for Limited-Magnitude Probability Error in DNA Storage (2024). arXiv:2405.10447v1."}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01634-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/article\/10.1007\/s10623-025-01634-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/content\/pdf\/10.1007\/s10623-025-01634-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,6]],"date-time":"2025-09-06T14:42:15Z","timestamp":1757169735000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/link.springer.com\/10.1007\/s10623-025-01634-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,15]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,8]]}},"alternative-id":["1634"],"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1007\/s10623-025-01634-8","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"type":"print","value":"0925-1022"},{"type":"electronic","value":"1573-7586"}],"subject":[],"published":{"date-parts":[[2025,5,15]]},"assertion":[{"value":"1 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 May 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}