{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:18:44Z","timestamp":1743106724789,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031088117"},{"type":"electronic","value":"9783031088124"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-08812-4_2","type":"book-chapter","created":{"date-parts":[[2022,6,16]],"date-time":"2022-06-16T03:39:30Z","timestamp":1655350770000},"page":"10-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance Evaluation of\u00a0a Drone-Based Data Replication Method in\u00a0Urban Disaster Scenario"],"prefix":"10.1007","author":[{"given":"Makoto","family":"Ikeda","sequence":"first","affiliation":[]},{"given":"Seiya","family":"Sako","sequence":"additional","affiliation":[]},{"given":"Masaya","family":"Azuma","sequence":"additional","affiliation":[]},{"given":"Shota","family":"Uchimura","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,17]]},"reference":[{"key":"2_CR1","unstructured":"Rec. ITU-R P.1411-7: Propagation data and prediction methods for the planning of short-range outdoor radiocommunication systems and radio local area networks in the frequency range 300 MHz to 100 GHz. ITU (2013)"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"59891","DOI":"10.1109\/ACCESS.2018.2875739","volume":"6","author":"MY Arafat","year":"2018","unstructured":"Arafat, M.Y., Moh, S.: Location-aided delay tolerant routing protocol in UAV networks for post-disaster operation. IEEE Access 6, 59891\u201359906 (2018)","journal-title":"IEEE Access"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Azuma, M., Uchimura, S., Tada, Y., Ikeda, M., Barolli, L.: An adaptive anti-packet recovery method for vehicular DTN: performance evaluation considering shuttle buses and roadside units scenario. In: Proceedings of the 16th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA-2021), pp. 234\u2013241, October 2021","DOI":"10.1007\/978-3-030-90072-4_25"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Cerf, V., et al.: Delay-tolerant networking architecture. IETF RFC 4838 (Informational), April 2007","DOI":"10.17487\/rfc4838"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Fall, K.: A delay-tolerant network architecture for challenged Internets. In: Proceedings of the International Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM 2003, pp. 27\u201334 (2003)","DOI":"10.1145\/863955.863960"},{"key":"2_CR6","unstructured":"Kawabata, N., Yamasaki, Y., Ohsaki, H.: Hybrid cellular-DTN for vehicle volume data collection in rural areas. In: Proceedings of the IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC-2019), vol.\u00a02, pp. 276\u2013284, July 2019"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Ramanathan, R., Hansen, R., Basu, P., Hain, R.R., Krishnan, R.: Prioritized epidemic routing for opportunistic networks. In: Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking (MobiOpp 2007) pp. 62\u201366 (2007)","DOI":"10.1145\/1247694.1247707"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"R\u00fcsch, S., Sch\u00fcrmann, D., Kapitza, R., Wolf, L.: Forward secure delay-tolerant networking. In: Proceedings of the 12th Workshop on Challenged Networks (CHANTS-2017), pp. 7\u201312, October 2017","DOI":"10.1145\/3124087.3124094"},{"key":"2_CR9","unstructured":"Scenargie: Space-time engineering, LLC. http:\/\/www.spacetime-eng.com\/"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Solpico, D., et al.: Application of the V-HUB standard using LoRa beacons, mobile cloud, UAVs, and DTN for disaster-resilient communications. In: Proceedings of the IEEE Global Humanitarian Technology Conference (GHTC-2019), pp. 1\u20138, October 2019","DOI":"10.1109\/GHTC46095.2019.9033139"},{"key":"2_CR11","volume-title":"Epidemic routing for partially-connected ad hoc networks","author":"A Vahdat","year":"2000","unstructured":"Vahdat, A., Becker, D.: Epidemic routing for partially-connected ad hoc networks. Duke University, Tech. rep. (2000)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Wyatt, J., Burleigh, S., Jones, R., Torgerson, L., Wissler, S.: Disruption tolerant networking flight validation experiment on NASA\u2019s EPOXI mission. In: Proceedings of the 1st International Conference on Advances in Satellite and Space Communications (SPACOMM-2009), pp. 187\u2013196, July 2009","DOI":"10.1109\/SPACOMM.2009.39"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Zhao, W., Ammar, M., Zegura, E.: Controlling the mobility of multiple data transport ferries in a delay-tolerant network. In: Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, vol.\u00a02, pp. 1407\u20131418, March 2005","DOI":"10.1109\/INFCOM.2005.1498365"},{"key":"2_CR14","unstructured":"Zhao, W., Ammar, M.: Message ferrying: proactive routing in highly-partitioned wireless ad hoc networks. In: The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems, 2003, FTDCS 2003. Proceedings, pp. 308\u2013314, May 2003"}],"container-title":["Lecture Notes in Networks and Systems","Complex, Intelligent and Software Intensive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-08812-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T00:56:24Z","timestamp":1727398584000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-08812-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031088117","9783031088124"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-08812-4_2","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Computational Intelligence in Security for Information Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisis-spain2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/cisis\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}