{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:02:15Z","timestamp":1772064135014,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T00:00:00Z","timestamp":1576627200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T00:00:00Z","timestamp":1576627200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s12652-019-01629-z","type":"journal-article","created":{"date-parts":[[2019,12,18]],"date-time":"2019-12-18T20:02:22Z","timestamp":1576699342000},"page":"3947-3962","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Acknowledgment scheme using cloud for node networks with energy-aware hybrid scheduling strategy"],"prefix":"10.1007","volume":"11","author":[{"given":"Siddardha","family":"Kaja","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Elhadi M.","family":"Shakshuki","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sony","family":"Guntuka","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ansar-Ul-Haque","family":"Yasar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haroon","family":"Malik","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2019,12,18]]},"reference":[{"key":"1629_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22168-7_4","author":"M Aazam","year":"2015","unstructured":"Aazam M, Huh E-N, St-Hilaire M, Lung C-H, Lambadaris I (2015) Cloud of Things Integr IoT Cloud Comput. https:\/\/doi.org\/10.1007\/978-3-319-22168-7_4","journal-title":"Cloud of Things Integr IoT Cloud Comput"},{"issue":"3","key":"1629_CR3","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.scient.2011.11.047","volume":"19","author":"S Abrishami","year":"2011","unstructured":"Abrishami S, Naghibzadeh M (2011) Deadline-constrained workflow scheduling in software as a service cloud. Sci Iran 19(3):680\u2013689. https:\/\/doi.org\/10.1016\/j.scient.2011.11.047","journal-title":"Sci Iran"},{"issue":"12","key":"1629_CR6","doi-asserted-by":"publisher","first-page":"97","DOI":"10.3991\/ijoe.v14i12.8338","volume":"14","author":"T Alam","year":"2018","unstructured":"Alam T, Benaida M (2018) The role of cloud-MANET framework in the internet of things (IoT). Int J Online Eng (iJOE) 14(12):97\u2013111. https:\/\/doi.org\/10.3991\/ijoe.v14i12.8338","journal-title":"Int J Online Eng (iJOE)"},{"key":"1629_CR8","doi-asserted-by":"publisher","unstructured":"Alshareef HN, Grigoras D (2014) Mobile ad hoc network management in the cloud. In: IEEE 13th international symposium on parallel and distributed computing. https:\/\/doi.org\/10.1109\/ispd.2014.22","DOI":"10.1109\/ispd.2014.22"},{"key":"1629_CR12","doi-asserted-by":"publisher","unstructured":"Bhatt S, Loai AT, Chhetri P, Bhatt P (2019) Authorizations in cloud-based internet of things: current trends and use cases. In: fourth international conference on fog and mobile edge computing (FME). https:\/\/doi.org\/10.1109\/FMEC.2019.8795309","DOI":"10.1109\/FMEC.2019.8795309"},{"issue":"9","key":"1629_CR13","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1007\/s12652-018-1071-1","volume":"10","author":"HR Boveiri","year":"2019","unstructured":"Boveiri HR, Khayami R, Elhoseny M, Gunasekaran M (2019) An efficient swarm intelligence approach for task scheduling in cloud-based internet of things applications. J Ambient Intell Hum Comput 10(9):3469\u20133479","journal-title":"J Ambient Intell Hum Comput"},{"key":"1629_CR17","unstructured":"Chris Hoffman Power (2017) PSA: Do not shut down your computer, just use sleep (or Hibernation). https:\/\/www.howtogeek.com\/256395\/psa-don%E2%80%99t-shut-down-your-computer-just-use-sleep-or-hibernation. Accessed 25 October 2019"},{"key":"1629_CR21","unstructured":"Eduri EM (2009) Forwarding information lookup method. US Patent, Patent No.: US 7,606,236 B2"},{"key":"1629_CR22","unstructured":"Elegant NX (2019) The internet cloud has a dirty secret. https:\/\/fortune.com\/2019\/09\/18\/internet-cloud-server-data-center-energy-consumption-renewable-coal.Accessed 1 December 2019"},{"issue":"6","key":"1629_CR23","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1016\/j.jpdc.2010.04.004","volume":"71","author":"SK Garg","year":"2011","unstructured":"Garg SK, Yeo CS, Dasivam AA, Buyya RK (2011) Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers. J Parallel Distrib Comput 71(6):732\u2013749. https:\/\/doi.org\/10.1016\/j.jpdc.2010.04.004","journal-title":"J Parallel Distrib Comput"},{"issue":"6","key":"1629_CR26","doi-asserted-by":"publisher","first-page":"151","DOI":"10.23956\/ijarcsse\/v7i6\/0254","volume":"7","author":"K Gupta","year":"2017","unstructured":"Gupta K, Mittal PK (2017) An overview of security in MANET. Int J Adv Res Comput Sci Softw Eng ISSN 7(6):151\u2013156. https:\/\/doi.org\/10.23956\/ijarcsse\/v7i6\/0254","journal-title":"Int J Adv Res Comput Sci Softw Eng ISSN"},{"key":"1629_CR28","unstructured":"Halasz DE (2001) Packet assembly. US Patent, Patent No.: US 7,039,068 B1"},{"key":"1629_CR29","unstructured":"Huang C-L, Yeh W-C (2019) A new SSO-based algorithm for the bi-objective time-constrained task scheduling problem in cloud computing services. arXiv:1905.04855v1"},{"key":"1629_CR31","doi-asserted-by":"crossref","unstructured":"Jones N (2018) How to stop data centres from gobbling up the world\u2019s electricity. https:\/\/www.nature.com\/articles\/d41586-018-06610-y. Accessed 1 December 2019","DOI":"10.1038\/d41586-018-06610-y"},{"issue":"5","key":"1629_CR33","doi-asserted-by":"publisher","first-page":"488","DOI":"10.1109\/TMC.2007.1036","volume":"6","author":"K Liu","year":"2007","unstructured":"Liu K, Deng J, Varshney PK, Balakrishnan K (2007) An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans Mob Comput 6(5):488\u2013502. https:\/\/doi.org\/10.1109\/TMC.2007.1036","journal-title":"IEEE Trans Mob Comput"},{"key":"1629_CR34","unstructured":"Mangu A (2018) Managing energy consumption of data centers. http:\/\/large.stanford.Edu\/courses\/2018\/ph240\/mangu2\/. Accessed 1 December 2019"},{"key":"1629_CR57","doi-asserted-by":"publisher","unstructured":"Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proc. 6th Annu. Int. Conf. Mobile compute. Network., Boston, MA, 2000, pp. 255\u2013265. https:\/\/doi.org\/10.1145\/345910.345955","DOI":"10.1145\/345910.345955"},{"key":"1629_CR35","doi-asserted-by":"publisher","DOI":"10.1177\/0972150918818262","author":"JB Matias","year":"2019","unstructured":"Matias JB, Hernandez AA (2019) Cloud computing adoption intention by MSMEs in the Philippines. Glob Bus Rev. https:\/\/doi.org\/10.1177\/0972150918818262","journal-title":"Glob Bus Rev"},{"key":"1629_CR40","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.omega.2017.12.003","volume":"82","author":"J Pei","year":"2017","unstructured":"Pei J, Liu X, Fan W, Pardalos PM, Lu S (2017) A hybrid BA-VNS algorithm for coordinated serial-batching Scheduling with deteriorating jobs, financial budget and resource constraint in multiple manufacturers. Omega 82:55\u201369. https:\/\/doi.org\/10.1016\/j.omega.2017.12.003","journal-title":"Omega"},{"key":"1629_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2906870","author":"S Sahoo","year":"2019","unstructured":"Sahoo S, Sahoo B, Turuk AK (2019) A learning automata-based scheduling for deadline sensitive task in the cloud. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2019.2906870","journal-title":"IEEE Trans Serv Comput"},{"key":"1629_CR44","doi-asserted-by":"publisher","unstructured":"Shakshuki EM, Kang N, Sheltami TR (2010) Detecting misbehaving nodes in MANETS. In: Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8\u201310, pp. 216\u2013222. https:\/\/doi.org\/10.1145\/1967486.1967522","DOI":"10.1145\/1967486.1967522"},{"issue":"3","key":"1629_CR45","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1109\/TIE.2012.2196010","volume":"60","author":"EM Shakshuki","year":"2013","unstructured":"Shakshuki EM, Kang N, Sheltami T (2013) EAACK\u2014a secure intrusion-detection system for MANETs. IEEE Trans Ind Electron 60(3):1089\u20131098. https:\/\/doi.org\/10.1109\/TIE.2012.2196010","journal-title":"IEEE Trans Ind Electron"},{"issue":"5","key":"1629_CR46","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/s00530-009-0166-0","volume":"15","author":"T Sheltami","year":"2009","unstructured":"Sheltami T, Al-Roubaiey A, Shakshuki E, Mahmoud A (2009) Video transmission enhancement in presence of misbehaving nodes in MANETs. Int J Multimed Syst 15(5):273\u2013282. https:\/\/doi.org\/10.1007\/s00530-009-0166-0","journal-title":"Int J Multimed Syst"},{"key":"1629_CR48","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.pmcj.2015.07.005","volume":"27","author":"T Shi","year":"2015","unstructured":"Shi T, Yang M, Li X, Lei Q, Jiang YT (2015) An energy-efficient scheduling scheme for time-constrained tasks in local mobile clouds. Pervasive Mob Comput 27:90\u2013105. https:\/\/doi.org\/10.1016\/j.pmcj.2015.07.005","journal-title":"Pervasive Mob Comput"},{"issue":"4\u20135","key":"1629_CR50","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.parco.2013.03.002","volume":"39","author":"S Su","year":"2013","unstructured":"Su S, Li J, Huang Q, Huang X, Shuang K, Wang J (2013) Cost-efficient task scheduling for executing large programs in the cloud. Parallel Comput 39(4\u20135):177\u2013188. https:\/\/doi.org\/10.1016\/j.parco.2013.03.002","journal-title":"Parallel Comput"},{"issue":"6","key":"1629_CR52","first-page":"437","volume":"2","author":"S Supreeth","year":"2013","unstructured":"Supreeth S, Biradar S (2013) Scheduling virtual machines for load balancing in cloud computing platform. Int J Sci Res (IJSR) 2(6):437\u2013441","journal-title":"Int J Sci Res (IJSR)"},{"key":"1629_CR54","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2008.31","author":"L Wang","year":"2008","unstructured":"Wang L, Ying L (2008) Efficient power management of heterogeneous soft real-time clusters. IEEE Real Time Syst Symp. https:\/\/doi.org\/10.1109\/RTSS.2008.31","journal-title":"IEEE Real Time Syst Symp"},{"key":"1629_CR55","doi-asserted-by":"publisher","DOI":"10.1109\/CSC.2011.6138514","author":"G Wen","year":"2011","unstructured":"Wen G, Hong J, Chengzhong X, Balaji P, Feng S, Jiang P (2011) Energy-aware hierarchical scheduling of applications in large scale data centers. Int Conf Cloud Serv Comput. https:\/\/doi.org\/10.1109\/CSC.2011.6138514","journal-title":"Int Conf Cloud Serv Comput"},{"issue":"5","key":"1629_CR59","first-page":"54","volume":"9","author":"L Zhu","year":"2012","unstructured":"Zhu L, Qingshui L, Lingna H (2012) Study on cloud computing resource scheduling strategy based on the ant colony optimization algorithm. IJCSI Int J Comput Sci Issues 9(5):54\u201358","journal-title":"IJCSI Int J Comput Sci Issues"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01629-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01629-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01629-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,17]],"date-time":"2020-12-17T00:35:25Z","timestamp":1608165325000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01629-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,18]]},"references-count":29,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["1629"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01629-z","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,18]]},"assertion":[{"value":"24 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}