{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:28:23Z","timestamp":1740122903263,"version":"3.37.3"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"34","license":[{"start":{"date-parts":[[2024,3,9]],"date-time":"2024-03-09T00:00:00Z","timestamp":1709942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,3,9]],"date-time":"2024-03-09T00:00:00Z","timestamp":1709942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872284"],"award-info":[{"award-number":["61872284"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Industrial field of general projects of science and Technology Department of Shaanxi Province","award":["2023-YBGY-203","2023-YBGY-021"],"award-info":[{"award-number":["2023-YBGY-203","2023-YBGY-021"]}]},{"name":"Industrialization Project of Shaanxi Provincial Department of Education","award":["21JC017"],"award-info":[{"award-number":["21JC017"]}]},{"name":"National Key R&D Program Project","award":["2019YFD1100901"],"award-info":[{"award-number":["2019YFD1100901"]}]},{"name":"Key R&D Plan of Xianyang City","award":["L2023-ZDYF-QYCX-021"],"award-info":[{"award-number":["L2023-ZDYF-QYCX-021"]}]},{"name":"Natural Science Foundation of Shannxi Province","award":["2021JLM-16"],"award-info":[{"award-number":["2021JLM-16"]}]},{"DOI":"10.13039\/501100015401","name":"Key Research and Development Program of Shaanxi","doi-asserted-by":"crossref","award":["2023-YBGY-021"],"award-info":[{"award-number":["2023-YBGY-021"]}],"id":[{"id":"10.13039\/501100015401","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-18816-6","type":"journal-article","created":{"date-parts":[[2024,3,9]],"date-time":"2024-03-09T06:01:44Z","timestamp":1709964104000},"page":"81127-81149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and implementation of social based edge node selection algorithm"],"prefix":"10.1007","volume":"83","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4051-3137","authenticated-orcid":false,"given":"Qinlu","family":"He","sequence":"first","affiliation":[]},{"given":"Rui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Genqing","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Weiqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,9]]},"reference":[{"key":"18816_CR1","unstructured":"Cisco Annual Internet Report (2020\u20132025) White Paper.\u00a0https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html"},{"issue":"4","key":"18816_CR2","doi-asserted-by":"publisher","first-page":"2127","DOI":"10.1109\/TWC.2017.2785250","volume":"17","author":"L Wang","year":"2018","unstructured":"Wang L, Wu H, Han Z, Zhang P, Poor HV (2018) Multi-hop cooperative caching in social iot using matching theory. IEEE Trans Wireless Commun 17(4):2127\u20132145. https:\/\/doi.org\/10.1109\/TWC.2017.2785250","journal-title":"IEEE Trans Wireless Commun"},{"key":"18816_CR3","doi-asserted-by":"publisher","unstructured":"Wang W, Sun Y, Guo Y et al (2014)\u00a0CRCache: exploiting the correlation between content popularity and network topology information for ICN caching. IEEE International Conference on Communications. IEEE. https:\/\/doi.org\/10.1109\/ICC.2014.6883812","DOI":"10.1109\/ICC.2014.6883812"},{"key":"18816_CR4","doi-asserted-by":"publisher","unstructured":"Ramanan BA, Drabeck LM, Haner M, Nithi N, Klein TE, Sawkar C (2013) Cache ability analysis of HTTP traffic in an operational LTE network. 2013 Wireless Telecommunications Symposium (WTS) (pp 1\u20138).\u00a0IEEE. https:\/\/doi.org\/10.1109\/WTS.2013.6566245","DOI":"10.1109\/WTS.2013.6566245"},{"key":"18816_CR5","doi-asserted-by":"publisher","unstructured":"Kim G, Song Y, Rim M, Kang CG (2020) Contents caching scheme in D2D caching systems when incentives are provided to users. 2020 International Conference on Electronics, Information, and Communication (ICEIC) (pp 1\u20133). https:\/\/doi.org\/10.1109\/ICEIC49074.2020.9051318","DOI":"10.1109\/ICEIC49074.2020.9051318"},{"key":"18816_CR6","doi-asserted-by":"publisher","unstructured":"Shi W, Sun H, Cao J et al (2017) Edge computing-An emerging computing model for the Internet of everything era. J Comput Res Dev. https:\/\/doi.org\/10.7544\/issn1000-1239.2017.20160941","DOI":"10.7544\/issn1000-1239.2017.20160941"},{"key":"18816_CR7","doi-asserted-by":"publisher","unstructured":"Shi W, Cao J, Zhang Q et al (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637\u2013646. https:\/\/doi.org\/10.1109\/JIOT.2016.2579198","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"18816_CR8","doi-asserted-by":"publisher","first-page":"2952","DOI":"10.1109\/ACCESS.2016.2569483","volume":"4","author":"D Muirhead","year":"2016","unstructured":"Muirhead D, Imran MA, Arshad K (2016) A Survey of the Challenges, opportunities and use of multiple antennas in current and future 5G small cell base stations. IEEE Access 4:2952\u20132964. https:\/\/doi.org\/10.1109\/ACCESS.2016.2569483","journal-title":"IEEE Access"},{"issue":"3","key":"18816_CR9","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/TWC.2016.2646360","volume":"16","author":"A Abrardo","year":"2017","unstructured":"Abrardo A, Moretti M (2017) Distributed Power Allocation for D2D Communications Underlaying\/Overlaying OFDMA Cellular Networks. IEEE Trans Wirel Commun 16(3):1466\u20131479. https:\/\/doi.org\/10.1109\/TWC.2016.2646360","journal-title":"IEEE Trans Wirel Commun"},{"key":"18816_CR10","doi-asserted-by":"publisher","unstructured":"Wang H, Li Y, Zhao X et al (2020) An algorithm based on markov chain to improve edge cache hit ratio for blockchain-enabled IoT[J]. China Commun 17(9):66\u201376. https:\/\/doi.org\/10.23919\/JCC.2020.09.006","DOI":"10.23919\/JCC.2020.09.006"},{"issue":"4","key":"18816_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1109\/MCOM.2014.6807946","volume":"52","author":"D Feng","year":"2014","unstructured":"Feng D, Lu L, Yuan-Wu Y, Li GY, Li S, Feng G (2014) Device-to-device communications in cellular networks. IEEE Commun Mag 52(4):49\u201355. https:\/\/doi.org\/10.1109\/MCOM.2014.6807946","journal-title":"IEEE Commun Mag"},{"key":"18816_CR12","doi-asserted-by":"crossref","unstructured":"Doppler K, Rinne MP, Wijting C et al (2009) Device-to-Device Communications as anUnderlay to LTE-Advanced Networks[J]. IEEE Commun Mag 47(12)","DOI":"10.1109\/MCOM.2009.5350367"},{"key":"18816_CR13","doi-asserted-by":"crossref","unstructured":"Zamli KZ, Alhadawi HS, Din F (2023) Utilizing the roulette wheel based social network search algorithm for substitution box construction and optimization. Neural Comput Appl 35:4051\u20134071","DOI":"10.1007\/s00521-022-07899-7"},{"issue":"9","key":"18816_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.23919\/JCC.2020.09.006","volume":"17","author":"H Wang","year":"2020","unstructured":"Wang H, Li Y, Zhao X, Yang F (2020) An algorithm based on markov chain to improve edge cache hit ratio for blockchain-enabled IoT. China Communications 17(9):66\u201376. https:\/\/doi.org\/10.23919\/JCC.2020.09.006","journal-title":"China Communications"},{"issue":"6","key":"18816_CR15","doi-asserted-by":"publisher","first-page":"2550","DOI":"10.1109\/TII.2017.2787201","volume":"14","author":"Q Xu","year":"2018","unstructured":"Xu Q, Su Z, Zheng Q, Luo M, Dong B (2018) Secure content delivery with edge nodes to save caching resources for mobile users in green cities. IEEE Trans Industr Inf 14(6):2550\u20132559. https:\/\/doi.org\/10.1109\/TII.2017.2787201","journal-title":"IEEE Trans Industr Inf"},{"issue":"15","key":"18816_CR16","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MCOM.2015.7105641","volume":"53","author":"Y Gu","year":"2015","unstructured":"Gu Y, Saad W, Bennis M, Debbah M, Han Z (2015) Matching theory for future wireless networks: Fundamentals and applications. IEEE Commun Mag 53(15):52\u201359","journal-title":"IEEE Commun Mag"},{"key":"18816_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56252-0","volume-title":"Matching theory for wireless networks","author":"Z Han","year":"2017","unstructured":"Han Z, Gu Y, Saad W (2017) Matching theory for wireless networks. Springer, Berlin, Germany"},{"issue":"12","key":"18816_CR18","doi-asserted-by":"publisher","first-page":"8402","DOI":"10.1109\/TIT.2013.2281606","volume":"59","author":"K Shanmugam","year":"2013","unstructured":"Shanmugam K, Golrezaei N, Dimakis AG, Molisch AF, Caire G (2013) Femto caching: Wireless content delivery through distributed caching helpers. IEEE Trans Inf Theory 59(12):8402\u20138413","journal-title":"IEEE Trans Inf Theory"},{"issue":"10","key":"18816_CR19","doi-asserted-by":"publisher","first-page":"6321","DOI":"10.1109\/TWC.2017.2721938","volume":"16","author":"Z Hu","year":"2017","unstructured":"Hu Z, Zheng Z, Wang T, Song L, Li X (2017) Roadside unit caching: Auction-based storage allocation for multiple content providers. IEEE Trans Wireless Commun 16(10):6321\u20136334","journal-title":"IEEE Trans Wireless Commun"},{"issue":"1","key":"18816_CR20","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1080\/00029890.1962.11989827","volume":"69","author":"D Gale","year":"1962","unstructured":"Gale D, Shapley LS (1962) College admissions and the stability of marriage. Amer Math Monthly 69(1):9\u201315","journal-title":"Amer Math Monthly"},{"issue":"6","key":"18816_CR21","doi-asserted-by":"publisher","first-page":"1475","DOI":"10.2307\/2938326","volume":"58","author":"AE Roth","year":"1990","unstructured":"Roth AE, Vate JHV (1990) Random paths to stability in two-sided matching. Econometrica J Econ Soc 58(6):1475\u20131480","journal-title":"Econometrica J Econ Soc"},{"issue":"4","key":"18816_CR22","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/MNET.2017.1600307","volume":"31","author":"T Tran","year":"2017","unstructured":"Tran T, Hajsami A, Pompili D (2017) Cooperative hierarchical caching in 5G cloud radio access networks. IEEE Netw 31(4):35\u201341","journal-title":"IEEE Netw"},{"issue":"1","key":"18816_CR23","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn HW (1955) The Hungarian method for the assignment problem. Naval Res Logistics Quart 2(1):83\u201397","journal-title":"Naval Res Logistics Quart"},{"issue":"1","key":"18816_CR24","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1137\/0105003","volume":"5","author":"J Munkres","year":"1957","unstructured":"Munkres J (1957) Algorithms for the assignment and transportation problems. J Soc Ind Appl Math 5(1):32\u201338","journal-title":"J Soc Ind Appl Math"},{"key":"18816_CR25","doi-asserted-by":"publisher","unstructured":"Sharghivand N, Derakhshan F, MashayekhyL, Mohammad Khanli L (n.d.) An Edge Computing Matching Framework with Guaranteed Quality of Service. In IEEE Transactions on Cloud Computing. https:\/\/doi.org\/10.1109\/TCC.2020.3005539","DOI":"10.1109\/TCC.2020.3005539"},{"key":"18816_CR26","doi-asserted-by":"publisher","unstructured":"Kim K, Hong CS (2019) Optimal task-UAV-edge matching for computation offloading in uav assisted mobile edge computing. 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), Matsue, Japan, pp 1\u20134. https:\/\/doi.org\/10.23919\/APNOMS.2019.8892864","DOI":"10.23919\/APNOMS.2019.8892864"},{"key":"18816_CR27","doi-asserted-by":"publisher","unstructured":"Tang Y (2019) Minimizing energy for caching resource allocation in information-centric networking with mobile edge computing. 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing. Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), Fukuoka, Japan, pp 301\u2013304. https:\/\/doi.org\/10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00062","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/CyberSciTech.2019.00062"},{"issue":"3","key":"18816_CR28","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1109\/JCN.2018.000036","volume":"20","author":"B Jia","year":"2018","unstructured":"Jia B, Hu H, Zeng Y, Xu T, Yang Y (2018) Double-matching resource allocation strategy in fog computing networks based on cost efficiency. J Commun Netw 20(3):237\u2013246. https:\/\/doi.org\/10.1109\/JCN.2018.000036","journal-title":"J Commun Netw"},{"key":"18816_CR29","doi-asserted-by":"publisher","first-page":"27628","DOI":"10.1109\/ACCESS.2019.2896000","volume":"7","author":"P Liu","year":"2019","unstructured":"Liu P, Li J, Sun Z (2019) Matching-based task offloading for vehicular edge computing. IEEE Access 7:27628\u201327640. https:\/\/doi.org\/10.1109\/ACCESS.2019.2896000","journal-title":"IEEE Access"},{"key":"18816_CR30","doi-asserted-by":"publisher","first-page":"1809","DOI":"10.1109\/ACCESS.2015.2477307","volume":"3","author":"J Hu","year":"2015","unstructured":"Hu J, Yang L, Poor HV, Hanzo L (2015) Bridging the social and wireless networking divide: information dissemination in integrated cellular and opportunistic networks. IEEE Access 3:1809\u20131848. https:\/\/doi.org\/10.1109\/ACCESS.2015.2477307","journal-title":"IEEE Access"},{"key":"18816_CR31","doi-asserted-by":"publisher","first-page":"7606","DOI":"10.1109\/ACCESS.2018.2886601","volume":"7","author":"I Ud Din","year":"2019","unstructured":"Ud Din I et al (2019) The internet of things: A review of enabled technologies and future challenges\u201d. IEEE Access 7:7606\u20137640","journal-title":"IEEE Access"},{"issue":"6","key":"18816_CR32","doi-asserted-by":"publisher","first-page":"2550","DOI":"10.1109\/TII.2017.2787201","volume":"14","author":"Q Xu","year":"2018","unstructured":"Xu Q, Su Z, Zheng Q, Luo M, Dong B (2018) Secure content delivery with edge nodesto save caching resources for mobile users in green cities. IEEE Trans Industr Inf 14(6):2550\u20132559. https:\/\/doi.org\/10.1109\/TII.2017.2787201","journal-title":"IEEE Trans Industr Inf"},{"issue":"1","key":"18816_CR33","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/JSYST.2019.2903293","volume":"14","author":"H Wei","year":"2020","unstructured":"Wei H, Luo H, Sun Y, Obaidat MS (2020) Cache-aware computation offloading in IoT systems. IEEE Syst J 14(1):61\u201372. https:\/\/doi.org\/10.1109\/JSYST.2019.2903293","journal-title":"IEEE Syst J"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18816-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-18816-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-18816-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,9]],"date-time":"2024-10-09T12:14:30Z","timestamp":1728476070000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-18816-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,9]]},"references-count":33,"journal-issue":{"issue":"34","published-online":{"date-parts":[[2024,10]]}},"alternative-id":["18816"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-18816-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2024,3,9]]},"assertion":[{"value":"19 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}