{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T22:08:46Z","timestamp":1740175726115,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T00:00:00Z","timestamp":1653436800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T00:00:00Z","timestamp":1653436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"the research start-up fund of Dr","award":["BSJ2019027"],"award-info":[{"award-number":["BSJ2019027"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The 5G IoT is very complicated and there are many factors that affect the network performance. Presently, the optimization of network is still the focus of research. Although the existing literature has done a large number of researches in this aspect, there have always been problems, such as complex algorithms. Based on the previous research, we propose a big data mining analysis method, which improves the comprehensive performance of the network by analyzing the relationship of massive data variables so as to optimize the combination of the network. In this paper, according to each of terminal variables at any moment such as power consumption, bandwidth, noise power, subcarrier bandwidth, interference power and coding efficiency, etc. we develop the mathematical modeling of principal component multiple regression. Then we simulate this scheme by edge computing technology and combine it with intelligent algorithms. The research results show that this method can effectively predict the data concerned, and the residual is the smallest. Therefore, the research provides an important basic for application of the approach to the mobile edge network optimization of IoTs.<\/jats:p>","DOI":"10.1007\/s40747-022-00735-4","type":"journal-article","created":{"date-parts":[[2022,5,25]],"date-time":"2022-05-25T08:04:02Z","timestamp":1653465842000},"page":"3943-3952","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Research on energy saving technology at mobile edge networks of IoTs based on big data analysis"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9884-2593","authenticated-orcid":false,"given":"Chaochen","family":"Xie","sequence":"first","affiliation":[]},{"given":"Qiaozhi","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Jianzhou","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Rujing","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Haiyan","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Lixia","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,25]]},"reference":[{"key":"735_CR1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3075995","author":"H Li","year":"2021","unstructured":"Li H, Yu K, Liu B, Feng C, Qin Z, Srivastava G (2021) An efficient ciphertext-policy weighted attribute-based encryption for the internet of health things. IEEE J Biomed Health Inform. https:\/\/doi.org\/10.1109\/JBHI.2021.3075995","journal-title":"IEEE J Biomed Health Inform"},{"key":"735_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3070544","author":"Y Sun","year":"2022","unstructured":"Sun Y, Liu J, Yu K, Alazab M, Lin K (2022) PMRSS: privacy-preserving medical record searching scheme for intelligent diagnosis in IoT healthcare. IEEE Trans Ind Inform. https:\/\/doi.org\/10.1109\/TII.2021.3070544","journal-title":"IEEE Trans Ind Inform."},{"issue":"3","key":"735_CR3","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MWC.001.2000374","volume":"28","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Lin L, Cheng X, Yi Z, Sato T (2021) Deep-learning-empowered breast cancer auxiliary diagnosis for 5GB remote E-health. IEEE Wirel Commun 28(3):54\u201361. https:\/\/doi.org\/10.1109\/MWC.001.2000374","journal-title":"IEEE Wirel Commun"},{"key":"735_CR4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.101.2001126","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Mumtaz S, Al-Rubaye S, Al-Dulaimi A, Bashir AK, Khan FA (2021) Securing critical infrastructures: deep learning-based threat detection in the IIoT. IEEE Commun Mag. https:\/\/doi.org\/10.1109\/MCOM.101.2001126","journal-title":"IEEE Commun Mag"},{"issue":"8","key":"735_CR5","doi-asserted-by":"publisher","first-page":"2072","DOI":"10.1109\/TIM.2015.2444238","volume":"64","author":"K Yu","year":"2015","unstructured":"Yu K, Arifuzzaman M, Wen Z, Zhang D, Sato T (2015) A key management scheme for secure communications of information centric advanced metering infrastructure in smart grid. IEEE Trans Instrum Meas 64(8):2072\u20132085","journal-title":"IEEE Trans Instrum Meas"},{"key":"735_CR6","doi-asserted-by":"publisher","unstructured":"Zhao L, Li H, Lin N, Lin M, Fan C, Shi J (2021) Intelligent content caching strategy in autonomous driving towards 6G. IEEE Trans Intell Trans Syst (T-ITS). https:\/\/doi.org\/10.1109\/TITS.2021.3114199","DOI":"10.1109\/TITS.2021.3114199"},{"key":"735_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3081874","author":"L Tan","year":"2021","unstructured":"Tan L, Yu K, Ming F, Cheng X, Srivastava G (2021) Secure and resilient artificial intelligence of things: a HoneyNet approach for threat detection and situational awareness. IEEE Consum Electron Mag. https:\/\/doi.org\/10.1109\/MCE.2021.3081874","journal-title":"IEEE Consum Electron Mag"},{"key":"735_CR8","unstructured":"Fan S (2015) Research on intelligent control and optimization strategy of self-organizing network[D]. Beijing University of Posts and Telecommunications"},{"key":"735_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2020.3047606","author":"F Ding","year":"2021","unstructured":"Ding F, Zhu G, Alazab M, Li X, Yu K (2021) Deep-learning-empowered digital forensics for edge consumer electronics in 5G HetNets. IEEE Consum Electron Mag. https:\/\/doi.org\/10.1109\/MCE.2020.3047606","journal-title":"IEEE Consum Electron Mag"},{"issue":"8","key":"735_CR10","doi-asserted-by":"publisher","first-page":"5533","DOI":"10.1109\/TII.2020.3024631","volume":"17","author":"Y Gong","year":"2021","unstructured":"Gong Y, Zhang L, Liu R, Yu K, Srivastava G (2021) Nonlinear MIMO for industrial internet of things in cyber-physical systems. IEEE Trans Ind Inf 17(8):5533\u20135541. https:\/\/doi.org\/10.1109\/TII.2020.3024631","journal-title":"IEEE Trans Ind Inf"},{"issue":"9","key":"735_CR11","doi-asserted-by":"publisher","first-page":"4746","DOI":"10.1109\/TWC.2014.2330334","volume":"13","author":"Y Huang","year":"2014","unstructured":"Huang Y, Zhang X, Zhang J et al (2014) Energy-efficient design in heterogeneous cellular networks based on large-scale user behavior constraints[J]. IEEE Trans Wirel Commun 13(9):4746\u20134757","journal-title":"IEEE Trans Wirel Commun"},{"issue":"5","key":"735_CR12","doi-asserted-by":"publisher","first-page":"5184","DOI":"10.1109\/TVT.2021.3076015","volume":"70","author":"L Zhen","year":"2021","unstructured":"Zhen L, Zhang Y, Yu K, Kumar N, Barnawi A, Xie Y (2021) Early collision detection for massive random access in satellite-based internet of things. IEEE Trans Veh Technol 70(5):5184\u20135189. https:\/\/doi.org\/10.1109\/TVT.2021.3076015","journal-title":"IEEE Trans Veh Technol"},{"key":"735_CR13","unstructured":"Shen Y, Chen J, Ji Z, et al (2017) A multi-objective artificial bee colony algorithm based on evolutionary knowledge fusion[J]. Control Decis."},{"key":"735_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3120075","author":"F Ding","year":"2021","unstructured":"Ding F, Yu K, Gu Z, Li X, Shi Y (2021) Perceptual enhancement for autonomous vehicles: restoring visually degraded images for context prediction via adversarial training. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/TITS.2021.3120075","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"735_CR15","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3119921","author":"L Tan","year":"2021","unstructured":"Tan L, Yu K, Lin L, Srivastava G, Lin JC, Wei W (2021) Speech emotion recognition enhanced traffic efficiency solution for autonomous vehicles in a 5G-enabled space-air-ground integrated intelligent transportation system. IEEE Trans Intell Transp Syst. https:\/\/doi.org\/10.1109\/TITS.2021.3119921","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"735_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3116132","author":"C Feng","year":"2021","unstructured":"Feng C, Liu B, Yu K, Goudos SK, Wan S (2021) Blockchain-empowered decentralized horizontal federated learning for 5G-enabled UAVs. IEEE Trans Ind Inform. https:\/\/doi.org\/10.1109\/TII.2021.3116132","journal-title":"IEEE Trans Ind Inform"},{"key":"735_CR17","doi-asserted-by":"publisher","first-page":"116429","DOI":"10.1016\/j.apenergy.2020.116429","volume":"285","author":"W Shang","year":"2021","unstructured":"Shang W, Chen J, Bi H, Sui Y, Chen Y, Yu H (2021) Impacts of COVID-19 pandemic on user behaviors and environmental benefits of bike sharing: a big-data analysis. Appl Energy 285:116429. https:\/\/doi.org\/10.1016\/j.apenergy.2020.116429","journal-title":"Appl Energy"},{"issue":"4","key":"735_CR18","doi-asserted-by":"publisher","first-page":"2342","DOI":"10.1109\/JIOT.2020.3048345","volume":"8","author":"L Liu","year":"2021","unstructured":"Liu L et al (2021) Blockchain-enabled secure data sharing scheme in mobile-edge computing: an asynchronous advantage actor\u2013critic learning approach. IEEE Internet Things J 8(4):2342\u20132353. https:\/\/doi.org\/10.1109\/JIOT.2020.3048345","journal-title":"IEEE Internet Things J"},{"issue":"11","key":"735_CR19","doi-asserted-by":"publisher","first-page":"13784","DOI":"10.1109\/TVT.2020.3027568","volume":"69","author":"C Feng","year":"2020","unstructured":"Feng C et al (2020) Attribute-based encryption with parallel outsourced decryption for edge intelligent IoV. IEEE Trans Veh Technol 69(11):13784\u201313795. https:\/\/doi.org\/10.1109\/TVT.2020.3027568","journal-title":"IEEE Trans Veh Technol"},{"key":"735_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3079574","author":"K Yu","year":"2021","unstructured":"Yu K, Guo Z, Shen Y, Wang W, Lin JC, Sato T (2021) Secure artificial intelligence of things for implicit group recommendations. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2021.3079574","journal-title":"IEEE Internet Things J"},{"key":"735_CR21","unstructured":"Wang D, Xu G, Ding W (2021) Wireless network technology and planning and design [M]. People's Posts and Telecommunications Press, Beijing, 169\u2013219."},{"key":"735_CR22","first-page":"84","volume-title":"Data mining and predictive analytics, second edition [M]","author":"DT Larose","year":"2018","unstructured":"Larose DT, Larose CD (2018) Data mining and predictive analytics, second edition [M]. Tsinghua University Press, Beijing, pp 84\u201399"},{"issue":"1","key":"735_CR23","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/TKDE.2013.109","volume":"26","author":"W Xindong","year":"2014","unstructured":"Xindong W, Gong-Qing W, Xingquan Z et al (2014) Data mining with big data[J]. IEEE Trans Knowl Data Eng 26(1):97\u2013107","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"735_CR24","doi-asserted-by":"crossref","unstructured":"Sun Z, Dong J (2020) Application of big data mining in prediction and optimization of mobile communication networks[M].","DOI":"10.1007\/978-981-15-3250-4_125"},{"key":"735_CR25","first-page":"31","volume-title":"5G wireless access network architecture and key technologies","author":"F Yang","year":"2019","unstructured":"Yang F, Xie W, Zhang J (2019) 5G wireless access network architecture and key technologies. People\u2019s Posts and Telecommunications Press, Beijing, pp 31\u201362"},{"key":"735_CR26","doi-asserted-by":"crossref","unstructured":"Shang Y (2013) Matrix theory[M]. Science Press","DOI":"10.1090\/gsm\/147"},{"key":"735_CR27","unstructured":"Zhang Z (217) Research on the application of big data in the optimization of mobile communication networks[J]. Mob Commun"},{"issue":"1","key":"735_CR28","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/TNSE.2021.3101842","volume":"9","author":"L Tan","year":"2022","unstructured":"Tan L, Yu K, Shi N, Yang C, Wei W, Lu H (2022) Towards secure and privacy-preserving data sharing for COVID-19 medical records: a blockchain-empowered approach. IEEE Trans Netw Sci Eng 9(1):271\u2013281. https:\/\/doi.org\/10.1109\/TNSE.2021.3101842","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"735_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3126830","author":"Q Zhang","year":"2021","unstructured":"Zhang Q, Yu K, Guo Z, Garg S, Rodrigues JJPC, Hassan MM, Guizani M (2021) Graph neural networks-driven traffic forecasting for connected internet of vehicles. IEEE Trans Netw Sci Eng. https:\/\/doi.org\/10.1109\/TNSE.2021.3126830","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"735_CR30","doi-asserted-by":"publisher","unstructured":"Yu K, et al.(2021) A Blockchain-based Shamir\u2019s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2021.3125190.","DOI":"10.1109\/JIOT.2021.3125190"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00735-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-022-00735-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-022-00735-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T14:08:09Z","timestamp":1664287689000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-022-00735-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,25]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["735"],"URL":"https:\/\/doi.org\/10.1007\/s40747-022-00735-4","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"type":"print","value":"2199-4536"},{"type":"electronic","value":"2198-6053"}],"subject":[],"published":{"date-parts":[[2022,5,25]]},"assertion":[{"value":"5 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We all declare that we have no conflict of interest in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}