{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:22:49Z","timestamp":1743063769810,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030335816"},{"type":"electronic","value":"9783030335823"}],"license":[{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33582-3_67","type":"book-chapter","created":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T07:46:34Z","timestamp":1572594394000},"page":"714-723","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Movement Pattern Extraction Method in OppNet Geocast Routing"],"prefix":"10.1007","author":[{"given":"Aliyu M.","family":"Abali","sequence":"first","affiliation":[]},{"given":"Norafida Bte","family":"Ithnin","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Dawood","sequence":"additional","affiliation":[]},{"given":"Tekenate Amah","family":"Ebibio","sequence":"additional","affiliation":[]},{"given":"Wadzani A.","family":"Gadzama","sequence":"additional","affiliation":[]},{"given":"Fuad A.","family":"Ghaleb","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,2]]},"reference":[{"key":"67_CR1","unstructured":"The UUCP Mapping Project: UUCP mapping project (1985). \n                    http:\/\/www.uucp.org\/index.shtml"},{"key":"67_CR2","doi-asserted-by":"crossref","unstructured":"Finn, G.G.: Routing and addressing problems in large metropolitan-scale internetworks (1987)","DOI":"10.21236\/ADA180187"},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"Han, B., et al.: Cellular traffic offloading through opportunistic communications. In: Proceedings of the 5th ACM Workshop on Challenged Networks - CHANTS 2010, p. 31 (2010)","DOI":"10.1145\/1859934.1859943"},{"issue":"2","key":"67_CR4","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1016\/j.jnca.2012.11.001","volume":"36","author":"A Mart\u00edn-Campillo","year":"2013","unstructured":"Mart\u00edn-Campillo, A., Crowcroft, J., Yoneki, E., Mart\u00ed, R.: Evaluating opportunistic networks in disaster scenarios. J. Netw. Comput. Appl. 36(2), 870\u2013880 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"67_CR5","doi-asserted-by":"crossref","unstructured":"Boldrini, C., Conti, M., Passarella, A.: Impact of social mobility on routing protocols for opportunistic networks. In: 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WOWMOM (2007)","DOI":"10.1109\/WOWMOM.2007.4351687"},{"key":"67_CR6","doi-asserted-by":"crossref","unstructured":"Farahmand, F., Patel, A.N., Jue, J.P., Soares, V.G., Rodrigues, J.J.: Vehicular wireless burst switching network: enhancing rural connectivity. In: 2008 IEEE Globecom Work, GLOBECOM 2008 (2008)","DOI":"10.1109\/GLOCOMW.2008.ECP.68"},{"issue":"7196","key":"67_CR7","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1038\/nature06958","volume":"453","author":"MC Gonz\u00e1lez","year":"2008","unstructured":"Gonz\u00e1lez, M.C., Hidalgo, C.A., Barab\u00e1si, A.L.: Understanding individual human mobility patterns. Nature 453(7196), 779\u2013782 (2008)","journal-title":"Nature"},{"key":"67_CR8","unstructured":"Burns, B., Brock, O., Levine, B.N., Burns, B., Levine, B.N.: MV routing and capacity building in disruption tolerant networks. In: Proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Society, pp. 398\u2013408 (2005)"},{"key":"67_CR9","unstructured":"Ma, Y., Jamalipour, A.: Opportunistic geocast in disruption-tolerant networks. In: IEEE Global Telecommunications Conference - GLOBECOM (2011)"},{"key":"67_CR10","doi-asserted-by":"crossref","unstructured":"Lu, S., Liu, Y., Liu, Y., Kumar, M.: LOOP: a location based routing scheme for opportunistic networks. In: 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), pp. 118\u2013126 (2012)","DOI":"10.1109\/MASS.2012.6502509"},{"key":"67_CR11","doi-asserted-by":"crossref","unstructured":"Lu, S., Liu, Y.: Geoopp: geocasting for opportunistic networks. In: IEEE Wireless Communications and Networking Conference (WCNC), vol. 3, pp. 2582\u20132587 (2014)","DOI":"10.1109\/WCNC.2014.6952815"},{"key":"67_CR12","volume-title":"Centrality based geocasting for opportunistic networks","author":"J Singh","year":"2019","unstructured":"Singh, J., Dhurandher, S.K., Woungang, I., Takizawa, M.: Centrality based geocasting for opportunistic networks, vol. 1. Springer, Cham (2019)"},{"issue":"1","key":"67_CR13","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/TNET.2013.2296751","volume":"23","author":"K Chen","year":"2015","unstructured":"Chen, K., Shen, H.: DTN-FLOW: inter-landmark data flow for high-throughput routing in DTNs. IEEE\/ACM Trans. Netw. 23(1), 212\u2013226 (2015)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"67_CR14","doi-asserted-by":"crossref","unstructured":"Costantino, G., Maiti, R.R., Martinelli, F., Santi, P.: LoSeRO: a locality sensitive routing protocol in opportunistic networks. In: Proceedings of the 31st Annual ACM Symposium on Applied Computing - SAC 2016, vol. 14, no. 8, pp. 644\u2013650 (2016)","DOI":"10.1145\/2851613.2851726"},{"key":"67_CR15","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.comcom.2018.05.014","volume":"127","author":"A Rajaei","year":"2018","unstructured":"Rajaei, A., Chalmers, D., Wakeman, I., Parisis, G.: Efficient geocasting in opportunistic networks. Comput. Commun. 127, 105\u2013121 (2018)","journal-title":"Comput. Commun."},{"key":"67_CR16","doi-asserted-by":"crossref","unstructured":"Wang, S., Liu, M., Cheng, X., Li, Z., Huang, J., Chen, B.: HERO - a home based routing in pocket switched networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), LNCS, vol. 7405, pp. 20\u201330 (2012)","DOI":"10.1007\/978-3-642-31869-6_2"}],"container-title":["Advances in Intelligent Systems and Computing","Emerging Trends in Intelligent Computing and Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33582-3_67","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T17:11:24Z","timestamp":1572628284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33582-3_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,2]]},"ISBN":["9783030335816","9783030335823"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33582-3_67","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2019,11,2]]},"assertion":[{"value":"2 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IRICT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Reliable Information and Communication Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Johor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"irict2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/irict.co\/irict2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}