{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:38:05Z","timestamp":1755693485889},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"the MOE (Ministry of Education of China) Project of Humanities and Social Sciences","award":["23YJAZH169"],"award-info":[{"award-number":["23YJAZH169"]}]},{"name":"the Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation","award":["T2020017"],"award-info":[{"award-number":["T2020017"]}]},{"name":"the Natural Science Foundation of Xiaogan City","award":["XGKJ2022010095"],"award-info":[{"award-number":["XGKJ2022010095"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Sign Process Syst"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11265-024-01914-x","type":"journal-article","created":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T00:02:54Z","timestamp":1714521774000},"page":"169-178","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Energy and Cache Aware Routing for Socially Aware Networking in the Big Data Environment"],"prefix":"10.1007","volume":"96","author":[{"given":"Min","family":"Deng","sequence":"first","affiliation":[]},{"given":"Songhao","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chunmeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Na","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yuanlin","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Zenggang","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Manzoor","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,30]]},"reference":[{"issue":"1","key":"1914_CR1","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/s11265-020-01610-6","volume":"93","author":"ZG Xiong","year":"2021","unstructured":"Xiong, Z. G., Xiao, N., Xu, F., Zhang, X. M., Xu, Q., Zhang, K. B., & Ye, C. H. (2021). An equivalent exchange based data forwarding incentive scheme for socially aware networks. Journal of Signal Processing Systems, 93(1), 249\u2013263.","journal-title":"Journal of Signal Processing Systems"},{"issue":"1","key":"1914_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1587\/transcom.2017EBI0003","volume":"102","author":"S Tsugawa","year":"2019","unstructured":"Tsugawa, S. (2019). A survey of social network analysis techniques and their applications to socially aware networking. IEICE Transactions on Communications, 102(1), 17\u201339.","journal-title":"IEICE Transactions on Communications"},{"issue":"11","key":"1914_CR3","first-page":"109","volume":"54","author":"QY Tan","year":"2018","unstructured":"Tan, Q. Y., Liu, D. D., & Zhang, J. (2018). Research on adaptive congestion control mechanism in delay tolerance networks. Computer Engineering and Applications, 54(11), 109\u2013115.","journal-title":"Computer Engineering and Applications"},{"issue":"1","key":"1914_CR4","first-page":"50","volume":"42","author":"HT Zhao","year":"2020","unstructured":"Zhao, H. T., Cheng, H. L., Ding, Y., Zhang, H., & Zhu, H. B. (2020). Research on traffic accident risk prediction algorithm for vehicle connected edge network based on deep learning. Journal of Electronics and Information Technology, 42(1), 50\u201357.","journal-title":"Journal of Electronics and Information Technology"},{"issue":"2","key":"1914_CR5","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/TMC.2008.107","volume":"8","author":"M Musolesi","year":"2008","unstructured":"Musolesi, M., & Mascolo, C. (2008). Car: Context-aware adaptive routing for delay-tolerant mobile networks. IEEE Transactions on Mobile Computing, 8(2), 246\u2013260.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"1914_CR6","doi-asserted-by":"publisher","first-page":"77767","DOI":"10.1109\/ACCESS.2018.2884090","volume":"6","author":"C Paolo","year":"2018","unstructured":"Paolo, C., Saiful, A., Marco, Z., & Michele, Z. (2018). Underwater delay-tolerant routing via probabilistic spraying. IEEE Access, 6, 77767\u201377784.","journal-title":"IEEE Access"},{"issue":"12","key":"1914_CR7","first-page":"62","volume":"37","author":"G Liu","year":"2018","unstructured":"Liu, G., & Li, Y. M. (2018). Research on spread routing protocol for delay tolerance networks. Measurement and Control Technology, 37(12), 62\u201365.","journal-title":"Measurement and Control Technology"},{"key":"1914_CR8","doi-asserted-by":"crossref","unstructured":"Pathak, S., Gondaliya, N., & Raja, N. (2017). A survey on prophet based routing protocol in delay tolerant network. In 2017 International Conference on Emerging Trends & Innovation in ICT (ICEI), pages 110\u2013115. IEEE.","DOI":"10.1109\/ETIICT.2017.7977020"},{"key":"1914_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11432-018-9482-6","volume":"61","author":"SB Balaji","year":"2018","unstructured":"Balaji, S. B., Krishnan, M. N., Vajha, M., Ramkumar, V., Sasidharan, B., & Kumar, P. V. (2018). Erasure coding for distributed storage: An overview. Science China Information Sciences, 61, 1\u201345.","journal-title":"Science China Information Sciences"},{"key":"1914_CR10","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s11036-006-5186-9","volume":"11","author":"S Jain","year":"2006","unstructured":"Jain, S., Shah, R. C., Brunette, W., Borriello, G., & Roy, S. (2006). Exploiting mobility for energy efficient data collection in wireless sensor networks. Mobile networks and Applications, 11, 327\u2013339.","journal-title":"Mobile networks and Applications"},{"key":"1914_CR11","doi-asserted-by":"crossref","unstructured":"Abdelmoumen, M., Dhib, E., Frikha, M., & Chahed, T. (2010). How to improve the performance in delay tolerant networks under manhattan mobility model. In 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pages 2008\u20132013. IEEE.","DOI":"10.1109\/PIMRC.2010.5671593"},{"issue":"4","key":"1914_CR12","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TNET.2002.801403","volume":"10","author":"M Grossglauser","year":"2002","unstructured":"Grossglauser, M., & Tse, D. N. C. (2002). Mobility increases the capacity of ad hoc wireless networks. IEEE\/ACM transactions on networking, 10(4), 477\u2013486.","journal-title":"IEEE\/ACM transactions on networking"},{"key":"1914_CR13","doi-asserted-by":"crossref","unstructured":"Kumar, S., Tripathy, P., Dwivedi, K., & Pandey, S. (2019). Improved prophet routing algorithm for opportunistic networks. In Advances in Data and Information Sciences: Proceedings of ICDIS 2017, Volume 2, pages 303\u2013312. Springer.","DOI":"10.1007\/978-981-13-0277-0_25"},{"key":"1914_CR14","doi-asserted-by":"crossref","unstructured":"Balaram, A., Sakthivel, T., & Chandan, R.\u00a0R. (2023). A context-aware improved por protocol for delay tolerant networks. Automatika: \u010dasopis za automatiku, mjerenje, elektroniku, ra\u010dunarstvo i komunikacije, 64(1):22\u201333.","DOI":"10.1080\/00051144.2022.2095830"},{"issue":"2","key":"1914_CR15","first-page":"71","volume":"45","author":"CY Zhou","year":"2021","unstructured":"Zhou, C. Y., & Pang, D. (2021). Opportunistic network routing algorithm based on node attributes and cache management. Journal of BeijingJiaotong University, 45(2), 71\u201379.","journal-title":"Journal of BeijingJiaotong University"},{"issue":"6","key":"1914_CR16","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1016\/j.jpdc.2009.02.005","volume":"69","author":"MK Qiu","year":"2009","unstructured":"Qiu, M. K., Guo, M. Y., Liu, M. Q., Xue, C. J., Yang, L. T., & Sha, E. H. M. (2009). Loop scheduling and bank type assignment for heterogeneous multi-bank memory. Journal of Parallel and Distributed Computing, 69(6), 546\u2013558.","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"2","key":"1914_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2514641.2514650","volume":"13","author":"H Huang","year":"2014","unstructured":"Huang, H., Chaturvedi, V., Quan, G., Fan, J., & Qiu, M. K. (2014). Throughput maximization for periodic real-time systems under the maximal temperature constraint. ACM Transactions on Embedded Computing Systems (TECS), 13(2), 1\u201322.","journal-title":"ACM Transactions on Embedded Computing Systems (TECS)"},{"issue":"9","key":"1914_CR18","doi-asserted-by":"publisher","first-page":"6163","DOI":"10.1109\/TII.2019.2950667","volume":"16","author":"Y Song","year":"2019","unstructured":"Song, Y., Li, Y. B., Jia, L., & Qiu, M. K. (2019). Retraining strategy-based domain adaption network for intelligent fault diagnosis. IEEE Transactions on Industrial Informatics, 16(9), 6163\u20136171.","journal-title":"IEEE Transactions on Industrial Informatics"},{"issue":"3","key":"1914_CR19","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/961268.961272","volume":"7","author":"A Lindgren","year":"2003","unstructured":"Lindgren, A., Doria, A., & Schel\u00e9n, O. (2003). Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 19\u201320.","journal-title":"ACM SIGMOBILE Mobile Computing and Communications Review"},{"key":"1914_CR20","doi-asserted-by":"crossref","unstructured":"Ker\u00e4nen, A., Ott, J., & K\u00e4rkk\u00e4inen, T. (2009). The one simulator for dtn protocol evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques, pages 1\u201310.","DOI":"10.4108\/ICST.SIMUTOOLS2009.5674"}],"container-title":["Journal of Signal Processing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-024-01914-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11265-024-01914-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11265-024-01914-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T08:14:17Z","timestamp":1715760857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11265-024-01914-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["1914"],"URL":"https:\/\/doi.org\/10.1007\/s11265-024-01914-x","relation":{},"ISSN":["1939-8018","1939-8115"],"issn-type":[{"value":"1939-8018","type":"print"},{"value":"1939-8115","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]},"assertion":[{"value":"14 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"For this type of study formal consent was not required. This manuscript does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"The authors have no conflicts of interest to declare for this manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}