{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:37Z","timestamp":1740148897503,"version":"3.37.3"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T00:00:00Z","timestamp":1661472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004735","name":"Natural Science Foundation of\u00a0Hunan Province","doi-asserted-by":"publisher","award":["2018JJ3299","2018JJ3682"],"award-info":[{"award-number":["2018JJ3299","2018JJ3682"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,11]]},"DOI":"10.1007\/s12083-022-01365-w","type":"journal-article","created":{"date-parts":[[2022,8,26]],"date-time":"2022-08-26T11:02:42Z","timestamp":1661511762000},"page":"2719-2743","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Data transmission scheme based on node model training and time division multiple access with IoT in opportunistic social networks"],"prefix":"10.1007","volume":"15","author":[{"given":"Jia","family":"WU","sequence":"first","affiliation":[]},{"given":"Liao","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0453-8222","authenticated-orcid":false,"given":"Fangfang","family":"Gou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,26]]},"reference":[{"key":"1365_CR1","doi-asserted-by":"crossref","unstructured":"Zhou\u00a0D\u00a0et al (2021) Gateway placement in integrated satellite-terrestrial networks: supporting communications and internet of remote things. IEEE Int Things J\u00a09(6):4421\u20134434, 2022","DOI":"10.1109\/JIOT.2021.3103965"},{"key":"1365_CR2","doi-asserted-by":"crossref","unstructured":"Liu\u00a0C\u00a0et al (2022) Active computing toward 5G internet of things.\u00a0IEEE Wirel Commun\u00a01\u20137","DOI":"10.1109\/MWC.2020.1900479"},{"key":"1365_CR3","doi-asserted-by":"crossref","unstructured":"Prakasam P, Sayeed MS, Ajayan J (2021) Guest editorials: P2P computing for 5G, beyond 5G (B5G) networks and internet-of-everything (IoE).\u00a0Peer Peer Netwo Appl14(1):240\u2013242, 2020","DOI":"10.1007\/s12083-020-01001-5"},{"issue":"6","key":"1365_CR4","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1007\/s12083-021-01113-6","volume":"14","author":"SA Alghamdi","year":"2021","unstructured":"Alghamdi SA (2021) Stable zone-based 5G clustered MANET using interest-region-based routing and gateway selection. Peer Peer Netw Appl 14(6):3559\u20133577","journal-title":"Peer Peer Netw Appl"},{"key":"1365_CR5","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1007\/s12083-022-01309-4","volume":"15","author":"J Xia","year":"2022","unstructured":"Xia J et al (2022) Information transmission mode and IoT community reconstruction based on user influence in opportunistic social networks. Peer Peer Netw Appl 15:1398\u20131416. https:\/\/doi.org\/10.1007\/s12083-022-01309-4","journal-title":"Peer Peer Netw Appl"},{"key":"1365_CR6","doi-asserted-by":"publisher","first-page":"24376","DOI":"10.1109\/ACCESS.2019.2900195","volume":"7","author":"X Lu","year":"2019","unstructured":"Lu X et al (2019) Integrated use of licensed- and unlicensed-band mmwave radio technology in 5G and beyond. IEEE Access 7:24376\u201324391","journal-title":"IEEE Access"},{"key":"1365_CR7","doi-asserted-by":"crossref","unstructured":"Israr A, Yang Q, Israr A (2022) Power consumption analysis of access network in 5G mobile communication infrastructures \u2014 An analytical quantification model.\u00a0Pervasive Mob Comput 80","DOI":"10.1016\/j.pmcj.2022.101544"},{"key":"1365_CR8","doi-asserted-by":"publisher","unstructured":"Li\u00a0L et al (2022) Modified data delivery strategy based on stochastic block model and community detection in opportunistic social networks. Wirel Commun Mobile Comput\u00a02022:5067849 05 May\u00a02022.\u00a0https:\/\/doi.org\/10.1155\/2022\/5067849","DOI":"10.1155\/2022\/5067849"},{"issue":"6","key":"1365_CR9","doi-asserted-by":"publisher","first-page":"3865","DOI":"10.1007\/s12083-021-01222-2","volume":"14","author":"A Najafizadeh","year":"2021","unstructured":"Najafizadeh A et al (2021) Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach. Peer Peer Netw Appl 14(6):3865\u20133890","journal-title":"Peer Peer Netw Appl"},{"key":"1365_CR10","doi-asserted-by":"publisher","unstructured":"Kumar U, Verma P, Qamar Abbas S (2021) Bringing edge computing into IoT architecture to improve IoT network performance. https:\/\/doi.org\/10.1109\/ICCCI50826.2021.9402499","DOI":"10.1109\/ICCCI50826.2021.9402499"},{"key":"1365_CR11","doi-asserted-by":"publisher","first-page":"106352","DOI":"10.1016\/j.compag.2021.106352","volume":"189","author":"W Tao","year":"2021","unstructured":"Tao W et al (2021) Review of the internet of things communication technologies in smart agriculture and challenges. Comput Electron Agric 189:106352","journal-title":"Comput Electron Agric"},{"key":"1365_CR12","doi-asserted-by":"publisher","first-page":"940","DOI":"10.1007\/s12083-019-00833-0","volume":"13","author":"Z Chen","year":"2020","unstructured":"Chen Z, Zhao M (2020) Community recombination and duplication node traverse algorithm in opportunistic social networks. Peer Peer Netw Appl 13:940\u2013947. https:\/\/doi.org\/10.1007\/s12083-019-00833-0","journal-title":"Peer Peer Netw Appl"},{"issue":"1","key":"1365_CR13","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1109\/JSEN.2020.3012814","volume":"21","author":"Q Liu","year":"2021","unstructured":"Liu Q et al (2021) Perpetual bluetooth communications for the IoT. IEEE Sens J 21(1):829\u2013837","journal-title":"IEEE Sens J"},{"key":"1365_CR14","doi-asserted-by":"publisher","first-page":"1669","DOI":"10.3390\/math10101669","volume":"10","author":"Y Shen","year":"2022","unstructured":"Shen Y et al (2022) Node screening method based on federated learning with IoT in opportunistic social networks. Mathematics 10:1669. https:\/\/doi.org\/10.3390\/math10101669","journal-title":"Mathematics"},{"issue":"3","key":"1365_CR15","doi-asserted-by":"publisher","first-page":"267","DOI":"10.3390\/mi12030267","volume":"12","author":"S Kim","year":"2021","unstructured":"Kim S et al (2021) Remote recognition of moving behaviors for captive harbor seals using a smart-patch system via bluetooth communication. Micromachines (Basel) 12(3):267","journal-title":"Micromachines (Basel)"},{"key":"1365_CR16","doi-asserted-by":"crossref","unstructured":"Sangeetha Francelin VF, Daniel J, Velliangiri S (2022) Intelligent agent and optimization\u2010based deep residual network to secure communication in UAV network.\u00a0Int J Intell Syst","DOI":"10.1002\/int.22800"},{"issue":"2","key":"1365_CR17","doi-asserted-by":"publisher","first-page":"2241","DOI":"10.1109\/JIOT.2018.2887086","volume":"6","author":"B Li","year":"2019","unstructured":"Li B, Fei Z, Zhang Y (2019) UAV communications for 5G and beyond: recent advances and future trends. IEEE Internet Things J 6(2):2241\u20132263","journal-title":"IEEE Internet Things J"},{"key":"1365_CR18","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.3390\/math10071090","volume":"10","author":"Y Shen","year":"2022","unstructured":"Shen Y, Dai Z (2022) Osteosarcoma MRI image-assisted segmentation system base on guided aggregated bilateral network. Mathematics 10:1090. https:\/\/doi.org\/10.3390\/math10071090","journal-title":"Mathematics"},{"issue":"6","key":"1365_CR19","doi-asserted-by":"publisher","first-page":"2078","DOI":"10.1007\/s12083-019-00827-y","volume":"13","author":"H Qi","year":"2020","unstructured":"Qi H (2020) Fuzzy logic hybridized artificial intelligence for computing and networking on internet of things platform. Peer Peer Netw Appl 13(6):2078\u20132088","journal-title":"Peer Peer Netw Appl"},{"issue":"6","key":"1365_CR20","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1007\/s12083-020-00883-9","volume":"13","author":"B Wang","year":"2020","unstructured":"Wang B, Fan T, Nie X (2020) Advanced delay assured numerical heuristic modelling for peer to peer project management in cloud assisted internet of things platform. Peer Peer Netw Appl 13(6):2166\u20132176","journal-title":"Peer Peer Netw Appl"},{"key":"1365_CR21","doi-asserted-by":"publisher","first-page":"3460","DOI":"10.1007\/s12083-021-01205-3","volume":"14","author":"Y Deng","year":"2021","unstructured":"Deng Y et al (2021) Hybrid data transmission scheme based on source node centrality and community reconstruction in opportunistic social networks. Peer Peer Netw Appl 14:3460\u20133472. https:\/\/doi.org\/10.1007\/s12083-021-01205-3","journal-title":"Peer Peer Netw Appl"},{"issue":"10","key":"1365_CR22","first-page":"1138","volume":"10","author":"Y Lu","year":"2021","unstructured":"Lu Y et al (2021) Routing algorithm based on user adaptive data transmission scheme in opportunistic social networks. Electronics (Basel) 10(10):1138","journal-title":"Electronics (Basel)"},{"key":"1365_CR23","doi-asserted-by":"publisher","unstructured":"FG et al (2022) Message transmission strategy based on recurrent neural network and attention mechanism in IoT system. J Circuits Syst Comput 31(7). https:\/\/doi.org\/10.1142\/S0218126622501262","DOI":"10.1142\/S0218126622501262"},{"key":"1365_CR24","doi-asserted-by":"publisher","unstructured":"Tian\u00a0X et al (2022) Disease control and prevention in rare plants based on the dominant population selection method in opportunistic social networks.\u00a0Comput Intell Neurosci.\u00a02022, Article ID 1489988, 16 pages. https:\/\/doi.org\/10.1155\/2022\/1489988","DOI":"10.1155\/2022\/1489988"},{"key":"1365_CR25","doi-asserted-by":"publisher","unstructured":"Yang S, Zhou Z, Xie P, Xu N, Dai Z (2022) Intelligent segmentation medical assistance system for mri images of osteosarcoma in developing countries.\u00a0Comput Math Methods Med. 2022\u00a0Article ID 6654946, 17 pages. https:\/\/doi.org\/10.1155\/2022\/7703583","DOI":"10.1155\/2022\/7703583"},{"issue":"7973404","key":"1365_CR26","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1155\/2022\/7973404","volume":"2022","author":"T Ouyang","year":"2022","unstructured":"Ouyang T, Yang S, Diaz Z (2022) Rethinking U-Net from an attention perspective with transformers for osteosarcoma MRI image segmentation. Comput Intell Neurosci 2022(7973404):24. https:\/\/doi.org\/10.1155\/2022\/7973404","journal-title":"Comput Intell Neurosci"},{"key":"1365_CR27","doi-asserted-by":"crossref","unstructured":"Zhao\u00a0Y. Srivastava G (2021) A wireless mesh opportunistic network routing algorithm based on trust relationships.\u00a0IEEE Access10:4786\u20134793, 2022","DOI":"10.1109\/ACCESS.2021.3138370"},{"key":"1365_CR28","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.3390\/math10101665","volume":"10","author":"F Liu","year":"2022","unstructured":"Liu F et al (2022) An attention-preserving network-based method for assisted segmentation of osteosarcoma mri images. Mathematics 10:1665. https:\/\/doi.org\/10.3390\/math10101665","journal-title":"Mathematics"},{"key":"1365_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2021.3102683","author":"W Yang","year":"2021","unstructured":"Yang W, Luo J (2021) Application of information transmission control strategy based on incremental community division in IoT platform. IEEE Sens J. https:\/\/doi.org\/10.1109\/JSEN.2021.3102683","journal-title":"IEEE Sens J"},{"issue":"13","key":"1365_CR30","first-page":"1595","volume":"10","author":"Y Dong","year":"2021","unstructured":"Dong Y et al (2021) A routing query algorithm based on time-varying relationship group in opportunistic social networks. Electronics (Basel) 10(13):1595","journal-title":"Electronics (Basel)"},{"issue":"3","key":"1365_CR31","doi-asserted-by":"publisher","first-page":"2165","DOI":"10.1109\/JIOT.2021.3090301","volume":"9","author":"A Celik","year":"2021","unstructured":"Celik A et al (2021) Opportunistic routing for opto-acoustic internet of underwater things. IEEE Int Things J 9(3):2165\u20132179","journal-title":"IEEE Int Things J"},{"key":"1365_CR32","doi-asserted-by":"publisher","first-page":"6654946","DOI":"10.1155\/2021\/6654946","volume":"2021","author":"Y Tan","year":"2021","unstructured":"Tan Y et al (2021) A staging auxiliary diagnosis model for nonsmall cell lung cancer based on the intelligent medical system. Comput Math Methods Med 2021:6654946. https:\/\/doi.org\/10.1155\/2021\/6654946","journal-title":"Comput Math Methods Med"},{"key":"1365_CR33","doi-asserted-by":"publisher","first-page":"3141","DOI":"10.1007\/s12652-019-01480-2","volume":"11","author":"Z Chen","year":"2020","unstructured":"Chen Z, Zhao M (2020) An efficient data packet iteration and transmission algorithm in opportunistic social networks. J Ambient Intell Humaniz Comput 11:3141\u20133153. https:\/\/doi.org\/10.1007\/s12652-019-01480-2","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"1365_CR34","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s12083-019-00767-7","volume":"13","author":"P Zheng","year":"2020","unstructured":"Zheng P, Fei H, Yan Y (2020) An effective positive transmission routing algorithm based on social relationships in opportunistic social networks. Peer Peer Netw Appl 13(1):269\u2013286","journal-title":"Peer Peer Netw Appl"},{"key":"1365_CR35","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1155\/2021\/8554351","volume":"8554351","author":"W Xiong","year":"2021","unstructured":"Xiong W, Zhou X (2021) A reputation value-based task-sharing strategy in opportunistic complex social networks. Complexity 8554351:15. https:\/\/doi.org\/10.1155\/2021\/8554351","journal-title":"Complexity"},{"key":"1365_CR36","doi-asserted-by":"publisher","unstructured":"Zhan X, Long H, Duan X, Kong G (2021) A convolutional neural network-based intelligent medical system with sensors for assistive diagnosis and decision-making in non-small cell lung cancer.\u00a0Sensors\u00a021(23).\u00a0https:\/\/doi.org\/10.3390\/s21237996","DOI":"10.3390\/s21237996"},{"issue":"3","key":"1365_CR37","doi-asserted-by":"publisher","first-page":"2713","DOI":"10.1109\/TVT.2021.3057541","volume":"70","author":"L Rashidi","year":"2021","unstructured":"Rashidi L et al (2021) Modeling epidemic routing: capturing frequently visited locations while preserving scalability. IEEE Trans Veh Technol 70(3):2713\u20132727","journal-title":"IEEE Trans Veh Technol"},{"key":"1365_CR38","doi-asserted-by":"publisher","first-page":"65560","DOI":"10.1109\/ACCESS.2019.2916685","volume":"7","author":"R Wang","year":"2019","unstructured":"Wang R et al (2019) Epidemic routing performance in DTN with selfish nodes. IEEE Access 7:65560\u201365568","journal-title":"IEEE Access"},{"key":"1365_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107088","volume":"92","author":"Z Chunyue","year":"2021","unstructured":"Chunyue Z et al (2021) An energy-saving routing algorithm for opportunity networks based on asynchronous sleeping mode. Comput Electr Eng 92:107088","journal-title":"Comput Electr Eng"},{"issue":"7","key":"1365_CR40","doi-asserted-by":"publisher","first-page":"2403","DOI":"10.1007\/s11276-015-1105-y","volume":"22","author":"N Derakhshanfard","year":"2016","unstructured":"Derakhshanfard N, Sabaei M, Rahmani AM (2016) Sharing spray and wait routing algorithm in opportunistic networks. Wireless Netw 22(7):2403\u20132414","journal-title":"Wireless Netw"},{"issue":"13","key":"1365_CR41","doi-asserted-by":"publisher","first-page":"5595","DOI":"10.1109\/JSEN.2018.2838023","volume":"18","author":"N Li","year":"2018","unstructured":"Li N, Martinez-Ortega J, Hernandez Diaz V (2018) Cross-layer and reliable opportunistic routing algorithm for mobile ad hoc networks. IEEE Sens J 18(13):5595\u20135609","journal-title":"IEEE Sens J"},{"issue":"1","key":"1365_CR42","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/s12083-018-0649-x","volume":"12","author":"Z Chen","year":"2018","unstructured":"Chen Z, Zhao M (2018) Weight distribution and community recon-stitution based on communities communications in social opportunistic networks. Peer Peer Netw Appl 12(1):158\u2013166. https:\/\/doi.org\/10.1007\/s12083-018-0649-x","journal-title":"Peer Peer Netw Appl"},{"key":"1365_CR43","first-page":"70","volume-title":"Proc Int Conf Next Gener Comput Technol","author":"S Jain","year":"2017","unstructured":"Jain S, Yadav P (2017) Controlled replication based bubble rap routing algorithm in delay tolerant network. Proc Int Conf Next Gener Comput Technol. Springer, Singapore, pp 70\u201387"},{"key":"1365_CR44","doi-asserted-by":"publisher","DOI":"10.1109\/ICCTICT.2016.7514553","author":"A Gupta","year":"2016","unstructured":"Gupta A, Agrawal A, Nagrath P (2016) Variant of BUBBLE rap forwarding algorithm for delay tolerant networks. https:\/\/doi.org\/10.1109\/ICCTICT.2016.7514553","journal-title":"Variant of BUBBLE rap forwarding algorithm for delay tolerant networks"},{"issue":"1","key":"1365_CR45","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00607-020-00843-4","volume":"103","author":"MR Penurkar","year":"2021","unstructured":"Penurkar MR, Deshpande UA (2021) Social characteristics-based routing algorithm for a mobile social network. Computing 103(1):133\u2013153","journal-title":"Computing"},{"key":"1365_CR46","doi-asserted-by":"crossref","unstructured":"Xu\u00a0F\u00a0et al (2022)\u00a0Efficient opportunistic routing with social context awareness for distributed mobile social networks.\u00a0Concurr Comput\u00a034(7):n\/a","DOI":"10.1002\/cpe.5524"},{"issue":"2","key":"1365_CR47","doi-asserted-by":"publisher","first-page":"1006","DOI":"10.1007\/s12083-020-01060-8","volume":"14","author":"J Qu","year":"2021","unstructured":"Qu J, Yu G (2021) Behavior prediction based on interest characteristic and user communication in opportunistic social networks. Peer Peer Netw Appl 14(2):1006\u20131018","journal-title":"Peer Peer Netw Appl"},{"key":"1365_CR48","doi-asserted-by":"crossref","unstructured":"Srinidhi\u00a0NN\u00a0et al (2020) An improved PRoPHET - Random forest based optimized multi-copy routing for opportunistic IoT networks.\u00a0IoT\u00a011","DOI":"10.1016\/j.iot.2020.100203"},{"issue":"3","key":"1365_CR49","doi-asserted-by":"publisher","first-page":"2207","DOI":"10.1109\/JSYST.2016.2630923","volume":"12","author":"DK Sharma","year":"2018","unstructured":"Sharma DK et al (2018) A machine learning-based protocol for efficient routing in opportunistic networks. IEEE Syst J 12(3):2207\u20132213","journal-title":"IEEE Syst J"},{"key":"1365_CR50","first-page":"883","volume":"8","author":"Y Yao","year":"2017","unstructured":"Yao Y et al (2017) A low delay routing algorithm for opportunistic networks based on social relations. Zhongguo Keji Lunwen = China Sciencepaper 8:883","journal-title":"Zhongguo Keji Lunwen = China Sciencepaper"},{"key":"1365_CR51","doi-asserted-by":"crossref","unstructured":"Alrfaay\u00a0M\u00a0et al (2022) R-SOR: Ranked Social-based Routing Protocol in Opportunistic Mobile Social Networks.\u00a0Eng Technol Appl Sci Res\u00a012(1)","DOI":"10.48084\/etasr.4612"},{"key":"1365_CR52","doi-asserted-by":"publisher","DOI":"10.1109\/ICINPRO43533.2018.9096784","author":"DK Sharma","year":"2018","unstructured":"Sharma DK, Agrawal S, Bansal V (2018) Ameliorations in MaxProp routing protocol in delay-tolerant networks. https:\/\/doi.org\/10.1109\/ICINPRO43533.2018.9096784","journal-title":"Ameliorations in MaxProp routing protocol in delay-tolerant networks."},{"key":"1365_CR53","doi-asserted-by":"publisher","unstructured":"Gou F, Wu J (2022) Triad link prediction method based on the evolutionary analysis with IoT in opportunistic social networks.\u00a0Comp Commun 181:143\u2013155. 01 Jan\u00a02022.\u00a0https:\/\/doi.org\/10.1016\/j.comcom.2021.10.009","DOI":"10.1016\/j.comcom.2021.10.009"},{"issue":"3","key":"1365_CR54","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1007\/s12083-022-01293-9","volume":"15","author":"R Das","year":"2022","unstructured":"Das R, Dwivedi M (2022) Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks. Peer Peer Netw Appl 15(3):1505\u20131520","journal-title":"Peer Peer Netw Appl"},{"issue":"2","key":"1365_CR55","doi-asserted-by":"publisher","first-page":"948","DOI":"10.1007\/s12083-021-01072-y","volume":"14","author":"S Yin","year":"2021","unstructured":"Yin S, Yu G (2021) Low energy consumption routing algorithm based on message importance in opportunistic social networks. Peer Peer Netw Appl 14(2):948\u2013961","journal-title":"Peer Peer Netw Appl"},{"issue":"6","key":"1365_CR56","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1007\/s12083-019-00741-3","volume":"12","author":"Q Wang","year":"2019","unstructured":"Wang Q et al (2019) A deep learning based data forwarding algorithm in mobile social networks. Peer Peer Netw Appl 12(6):1638\u20131650","journal-title":"Peer Peer Netw Appl"},{"issue":"1","key":"1365_CR57","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/JSYST.2021.3071470","volume":"16","author":"J Li","year":"2022","unstructured":"Li J et al (2022) An energy-constrained forwarding scheme based on group trustworthiness in mobile internet of things. IEEE Syst J 16(1):531\u2013542","journal-title":"IEEE Syst J"},{"key":"1365_CR58","doi-asserted-by":"publisher","first-page":"196472","DOI":"10.1109\/ACCESS.2020.3034468","volume":"8","author":"W Xiong","year":"2020","unstructured":"Xiong W, Zhou X (2020) Effective data transmission based on cluster user communications in opportunistic complexity social networks. IEEE Access 8:196472\u2013196481","journal-title":"IEEE Access"},{"issue":"6","key":"1365_CR59","doi-asserted-by":"publisher","first-page":"2977","DOI":"10.1007\/s11276-018-1691-6","volume":"25","author":"Z Chen","year":"2019","unstructured":"Chen Z, Zhao M (2019) Information cache management and data transmission algorithm in opportunistic social networks. Wireless Netw 25(6):2977\u20132988","journal-title":"Wireless Netw"},{"issue":"5","key":"1365_CR60","doi-asserted-by":"publisher","first-page":"2629","DOI":"10.1007\/s11227-018-2675-0","volume":"75","author":"Z Chen","year":"2019","unstructured":"Chen Z, Zhao M (2019) SECM: status estimation and cache management algorithm in opportunistic networks. J Supercomput 75(5):2629\u20132647","journal-title":"J Supercomput"},{"key":"1365_CR61","doi-asserted-by":"crossref","unstructured":"Yang\u00a0W, Luo J (2020) Effective data transmission and control based on social communication in social opportunistic complex networks.\u00a0Complexity (New York, N.Y.) 2020: 1\u201320","DOI":"10.1155\/2020\/3721579"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01365-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01365-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01365-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,8]],"date-time":"2022-11-08T09:40:41Z","timestamp":1667900441000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01365-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,26]]},"references-count":61,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,11]]}},"alternative-id":["1365"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01365-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,8,26]]},"assertion":[{"value":"21 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}