{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:57:41Z","timestamp":1761897461491,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"The 2017 National University Students\u2019 Innovation and Entrepreneurship Training Program Project of Hefei University of Technology","award":["201710359055"],"award-info":[{"award-number":["201710359055"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571179"],"award-info":[{"award-number":["61571179"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s12652-020-02874-3","type":"journal-article","created":{"date-parts":[[2021,1,29]],"date-time":"2021-01-29T08:33:05Z","timestamp":1611909185000},"page":"183-192","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A moving energy-based routing in DTNs with speed heterogeneity"],"prefix":"10.1007","volume":"12","author":[{"given":"Chaohu","family":"Luo","sequence":"first","affiliation":[]},{"given":"Xi","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Wenjuan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Manman","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Taolue","family":"Long","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4264-0180","authenticated-orcid":false,"given":"Qingshan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,29]]},"reference":[{"key":"2874_CR1","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s12652-017-0462-z","volume":"9","author":"SJ Borah","year":"2019","unstructured":"Borah SJ, Dhurandher SK, Woungang I, Kumar V, Barolli L (2019) A multi-objectives based technique for optimized routing in opportunistic networks. J Ambient Intell Humaniz Comput 9:655\u2013666","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"2874_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3516-1","volume-title":"Mathematical models in population biology and epidemiology","author":"F Brauer","year":"2001","unstructured":"Brauer F, Castillo-Chvez C (2001) Mathematical models in population biology and epidemiology. Springer, New York"},{"key":"2874_CR3","doi-asserted-by":"crossref","unstructured":"Cabrero S, Garca R, Paeda XG, Melendi D (2015) Understanding opportunistic networking for emergency services: analysis of one year of GPS traces. In: Proceeding of the 10th ACM MobiCom Workshop on Challenged Networks (CHANTS-2015), pp 31\u201336","DOI":"10.1145\/2799371.2799381"},{"issue":"6","key":"2874_CR6","first-page":"1478","volume":"18","author":"C Chen","year":"2017","unstructured":"Chen C, Zhang DQ, Ma XJ, Guo B, Wang LY, Wang YS, Sha E (2017) Crowddeliver: planning city-wide package delivery paths leveraging the crowds of taxis. IEEE Trans Intell Transp Syst 18(6):1478\u20131496","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"10","key":"2874_CR5","doi-asserted-by":"publisher","first-page":"3292","DOI":"10.1109\/TITS.2017.2771231","volume":"19","author":"C Chen","year":"2018","unstructured":"Chen C, Jiao SH, Zhang S, Liu WC, Wang YS (2018) TripImputor: real-time imputing taxi trip purpose leveraging multi-sourced urban data. IEEE Trans Intell Transp Syst 19(10):3292\u20133304","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"2874_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2019.2910591","author":"C Chen","year":"2019","unstructured":"Chen C, Ding Y, Xie XF, Zhang S, Wang Z, Feng L (2019) TrajCompressor: an online map-matching-based trajectory compression framework leveraging vehicle heading direction and change. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/TITS.2019.2910591","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"1","key":"2874_CR7","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1109\/TDSC.2016.2530705","volume":"15","author":"JH Cho","year":"2018","unstructured":"Cho JH, Chen IR (2018) PROVEST: provenance-based trust model for delay tolerant networks. IEEE Trans Depend Secure 15(1):151\u2013165","journal-title":"IEEE Trans Depend Secure"},{"key":"2874_CR8","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s12652-017-0676-0","volume":"10","author":"M Cuka","year":"2019","unstructured":"Cuka M, Elmazi D, Bylykbashi K, Spaho E, Ikeda M, Barolli L (2019) Implementation and performance evaluation of two fuzzy-based systems for selection of IoT devices in opportunistic networks. J Ambient Intell Humaniz Comput 10:519\u2013529","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"5","key":"2874_CR9","doi-asserted-by":"publisher","first-page":"3360","DOI":"10.1109\/TVT.2015.2450202","volume":"65","author":"L Galluccio","year":"2016","unstructured":"Galluccio L, Lorenzo B, Glisic S (2016) Sociality-aided new adaptive infection recovery schemes for multicast DTNs. IEEE Trans Veh Technol 65(5):3360\u20133376","journal-title":"IEEE Trans Veh Technol"},{"key":"2874_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2876841","author":"LY Gong","year":"2018","unstructured":"Gong LY, Zhao YY, Xiang CC, Li ZH, Qian C, Yang PL (2018) Robust light-weight magnetic-based door event detection with smartphones. IEEE Trans Mobile Comput. https:\/\/doi.org\/10.1109\/TMC.2018.2876841","journal-title":"IEEE Trans Mobile Comput"},{"issue":"4","key":"2874_CR11","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1109\/TNET.2002.801403","volume":"10","author":"M Grossglauser","year":"2002","unstructured":"Grossglauser M, Tse D (2002) Mobility increases the capacity of ad hoc wireless networks. IEEE\/ACM Trans on Netw 10(4):477\u2013486","journal-title":"IEEE\/ACM Trans on Netw"},{"key":"2874_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.adhoc.2017.08.005","volume":"66","author":"H Guo","year":"2017","unstructured":"Guo H, Wang X, Cheng H, Huang M (2017) A location aided controlled spraying routing algorithm for Delay Tolerant Networks. Ad Hoc Netw 66:16\u201325","journal-title":"Ad Hoc Netw"},{"key":"2874_CR13","doi-asserted-by":"crossref","unstructured":"Hui P, Crowcroft J (2007) How small labels create big improvements. In: Fifth annual IEEE international conference on pervasive computing and communications workshops (PerComW-2007), pp 65\u201370","DOI":"10.1109\/PERCOMW.2007.55"},{"issue":"11","key":"2874_CR14","doi-asserted-by":"publisher","first-page":"1576","DOI":"10.1109\/TMC.2010.246","volume":"10","author":"P Hui","year":"2011","unstructured":"Hui P, Crowcroft J, Yoneki E (2011) BUBBLE rap: social-based forwarding in delay-tolerant networks. IEEE Trans Mobile Comput 10(11):1576\u20131589","journal-title":"IEEE Trans Mobile Comput"},{"issue":"3","key":"2874_CR15","doi-asserted-by":"publisher","first-page":"730","DOI":"10.1109\/TMC.2016.2567388","volume":"16","author":"M Karaliopoulos","year":"2017","unstructured":"Karaliopoulos M (2017) Engage others or leave it to the source? on optimal message replication in DTNs under imperfect cooperation. IEEE Trans Mobile Comput 16(3):730\u2013743","journal-title":"IEEE Trans Mobile Comput"},{"issue":"8","key":"2874_CR16","doi-asserted-by":"publisher","first-page":"7195","DOI":"10.1109\/TVT.2017.2653843","volume":"66","author":"F Li","year":"2017","unstructured":"Li F, Jiang H, Li HS, Cheng Y (2017) SEBAR: social-energy-based routing for mobile social delay-tolerant networks. IEEE Trans Veh Technol 66(8):7195\u20137206","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"2874_CR17","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TMC.2017.2743703","volume":"17","author":"W Li","year":"2018","unstructured":"Li W, Galluccio L, Bassi F, Kieffer M (2018) Distributed faulty node detection in delay tolerant networks: design and analysis. IEEE Trans Mobile Comput 17(4):831\u2013844","journal-title":"IEEE Trans Mobile Comput"},{"issue":"3","key":"2874_CR18","first-page":"9","volume":"7","author":"A Lindgren","year":"2004","unstructured":"Lindgren A, Doria A, Scheln O (2004) Probabilistic routing in intermittently connected networks. ACM Sigmob Mob Comput Commun Rev 7(3):9\u201320","journal-title":"ACM Sigmobile Mobile Computing and Communications Review"},{"issue":"5","key":"2874_CR20","doi-asserted-by":"publisher","first-page":"1292","DOI":"10.1109\/TMC.2015.2451624","volume":"15","author":"Z Lu","year":"2016","unstructured":"Lu Z, Wen Y, Zhang W, Zheng Q, Cao G (2016) Towards information diffusion in mobile social networks. IEEE Trans Mobile Comput 15(5):1292\u20131304","journal-title":"IEEE Trans Mobile Comput"},{"issue":"1","key":"2874_CR19","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1109\/TMC.2018.2827985","volume":"18","author":"Z Lu","year":"2019","unstructured":"Lu Z, Sagduyu Y, Shi Y (2019) Integrating social links into wireless networks: modeling, routing, analysis and evaluation. IEEE Trans Mobile Comput 18(1):111\u2013124","journal-title":"IEEE Trans Mobile Comput"},{"key":"2874_CR21","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2080","author":"G Malkin","year":"1997","unstructured":"Malkin G, Minnear R (1997) RIPng for IPv6. Network Working Group. https:\/\/doi.org\/10.17487\/RFC2080","journal-title":"Network Working Group"},{"issue":"4","key":"2874_CR22","first-page":"2506","volume":"5","author":"ZL Ning","year":"2018","unstructured":"Ning ZL, Hu XP, Chen ZK, Zhou MC, Hu B, Cheng J, Obaidat MS (2018) A cooperative quality-aware service access system for social Internet of vehicles. IEEE IoT Journal 5(4):2506\u20132517","journal-title":"IEEE IoT Journal"},{"key":"2874_CR23","doi-asserted-by":"publisher","first-page":"1307","DOI":"10.1007\/s12652-018-0993-y","volume":"10","author":"DK Sharma","year":"2019","unstructured":"Sharma DK, Kukreja D, Chugh S, Kumaram S (2019) Supernode routing: a grid-based message passing scheme for sparse opportunistic networks. J Ambient Intell Humaniz Comput 10:1307\u20131324","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"2874_CR32","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIC.2018.011581518","volume":"22","author":"P Sommer","year":"2018","unstructured":"Sommer P, Kusy B, Valencia P, Dungavell R, Jurdak R (2018) Delay tolerant networking for long-term animal tracking. IEEE Internet Comput 22(1):62\u201372","journal-title":"IEEE Internet Comput"},{"issue":"1","key":"2874_CR26","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1109\/TCSS.2017.2779578","volume":"5","author":"S Souravlas","year":"2018","unstructured":"Souravlas S, Sifaleras A (2018) Efficient community-based data distribution over multicast trees. IEEE Trans Comput Soc Syst 5(1):229\u2013243","journal-title":"IEEE Trans Comput Soc Syst"},{"key":"2874_CR24","doi-asserted-by":"crossref","unstructured":"Spyropoulos T, Psounis K, Raghavendra CS (2005) Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceeding of the 2005 ACM SIGCOMM workshop on delay-tolerant networking (WDTN-2005), pp 252\u2013259","DOI":"10.1145\/1080139.1080143"},{"key":"2874_CR25","doi-asserted-by":"crossref","unstructured":"Spyropoulos T, Psounis K, Raghavendra CS (2007) Spray and Focus: efficient mobility-assisted routing for heterogeneous and correlated mobility. In: Fifth annual IEEE international conference on pervasive computing and communications workshops (PerComW-2007), pp 79\u201385","DOI":"10.1109\/PERCOMW.2007.108"},{"key":"2874_CR27","unstructured":"Vahdat A, Becker D (2000) Epidemic routing for partially connected ad hoc networks. Duke University Tech Rep Technical Report CS- 200006"},{"issue":"8","key":"2874_CR30","doi-asserted-by":"publisher","first-page":"1686","DOI":"10.1109\/TMC.2014.2364846","volume":"14","author":"QS Wang","year":"2015","unstructured":"Wang QS, Wang Q (2015) Restricted epidemic routing in multi-community delay tolerant networks. IEEE Trans Mobile Comput 14(8):1686\u20131697","journal-title":"IEEE Trans Mobile Comput"},{"key":"2874_CR29","doi-asserted-by":"crossref","unstructured":"Wang E, Yang Y,Wu J, Liu WB (2016) A multi-copy delegation forwarding based on short-term and long-term speed in DTNs. In: IEEE 13th international conference on mobile ad hoc and sensor systems (MASS-2016), pp 237\u2013245","DOI":"10.1109\/MASS.2016.038"},{"issue":"8","key":"2874_CR28","doi-asserted-by":"publisher","first-page":"7411","DOI":"10.1109\/TVT.2017.2670620","volume":"66","author":"E Wang","year":"2017","unstructured":"Wang E, Yang Y, Wu J (2017) Energy efficient beaconing control strategy based on time-continuous Markov model in DTNs. IEEE Trans Veh Technol 66(8):7411\u20137421","journal-title":"IEEE Trans Veh Technol"},{"key":"2874_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.049","author":"T Wang","year":"2018","unstructured":"Wang T, Zhang GX, Bhuiyan MZA, Liu AF, Jia WJ, Xie MD (2018a) A novel trust mechanism based on fog computing in sensor-cloud system. Future Gener Comp Sy. https:\/\/doi.org\/10.1016\/j.future.2018.05.049","journal-title":"Future Gener Comp Sy"},{"key":"2874_CR35","doi-asserted-by":"publisher","unstructured":"Wang T, Zhang GX, Liu AF, Bhuiyan M, Jin Q (2018b) A secure IoT service architecture with an efficient balance dynamics based on cloud and edge computing. IEEE IoT J. https:\/\/doi.org\/10.1109\/JIOT.2018.2870288","DOI":"10.1109\/JIOT.2018.2870288"},{"key":"2874_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-019-00741-3","author":"QS Wang","year":"2019","unstructured":"Wang QS, Yang HE, Wang Q, Huang W, Deng B (2019a) A deep learning based data forwarding algorithm in mobile social networks. Peer Peer Netw Appl. https:\/\/doi.org\/10.1007\/s12083-019-00741-3","journal-title":"Peer Peer Netw Appl"},{"key":"2874_CR33","doi-asserted-by":"publisher","unstructured":"Wang T, Liang YZ, Jia WJ, Arif M, Liu AF, Xie M (2019b) Coupling resource management based on fog computing in smart city systems. J Netw Comput Appl. https:\/\/doi.org\/10.1016\/j.jnca.2019.02.021","DOI":"10.1016\/j.jnca.2019.02.021"},{"key":"2874_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01480-2","author":"J Wu","year":"2019","unstructured":"Wu J, Chen ZG, Zhao M (2019) An efficient data packet iteration and transmission algorithm in opportunistic social networks. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-019-01480-2","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"11","key":"2874_CR37","doi-asserted-by":"publisher","first-page":"2825","DOI":"10.1109\/TMC.2016.2517649","volume":"15","author":"F Xia","year":"2016","unstructured":"Xia F, Liu L, Jedari B, Das SK (2016) PIS: a multi-dimensional routing protocol for socially-aware networking. IEEE Trans Mobile Comput 15(11):2825\u20132836","journal-title":"IEEE Trans Mobile Comput"},{"key":"2874_CR38","unstructured":"Yang X, Jia L, Ando R, Ando R, Shiratori N (2018) End-to-end congestion relief routing protocol for ad hoc networks. In: International conference on networking and network applications (NaNA-2017), pp 87\u201392"},{"key":"2874_CR39","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5109","author":"GX Zhang","year":"2018","unstructured":"Zhang GX, Wang T, Wang GJ, Liu AF, Jia WJ (2018) Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurr Comp-Pract E. https:\/\/doi.org\/10.1002\/cpe.5109","journal-title":"Concurr Comp-Pract E"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02874-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-020-02874-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-020-02874-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,19]],"date-time":"2021-02-19T22:44:02Z","timestamp":1613774642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-020-02874-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["2874"],"URL":"https:\/\/doi.org\/10.1007\/s12652-020-02874-3","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"type":"print","value":"1868-5137"},{"type":"electronic","value":"1868-5145"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"8 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}