{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T10:15:01Z","timestamp":1776161701529,"version":"3.50.1"},"reference-count":45,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,6,1]],"date-time":"2026-06-01T00:00:00Z","timestamp":1780272000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/100017525","name":"Tianjin University of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100017525","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["25JCZDJC00 420"],"award-info":[{"award-number":["25JCZDJC00 420"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006606","name":"Natural Science Foundation of Tianjin Municipality","doi-asserted-by":"publisher","award":["18JCZDJC96800"],"award-info":[{"award-number":["18JCZDJC96800"]}],"id":[{"id":"10.13039\/501100006606","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Network and Computer Applications"],"published-print":{"date-parts":[[2026,6]]},"DOI":"10.1016\/j.jnca.2026.104480","type":"journal-article","created":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T00:59:48Z","timestamp":1773968388000},"page":"104480","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["New multi-user computation unloading method of edge computing based on improved pelican optimization control strategy for smart city"],"prefix":"10.1016","volume":"250","author":[{"given":"Jie","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Fen","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Degan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Chuanpeng","family":"Bao","sequence":"additional","affiliation":[]},{"given":"Huijing","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Xingrui","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/j.jnca.2026.104480_bib1","doi-asserted-by":"crossref","first-page":"3598","DOI":"10.1109\/TNSM.2024.3355967","article-title":"Novel privacy awareness task offloading approach based on privacy entropy","volume":"21","author":"An","year":"2024","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"10","key":"10.1016\/j.jnca.2026.104480_bib2","first-page":"7358","article-title":"Pelican optimization algorithm: a new nature-inspired optimizer for engineering applications","volume":"18","author":"Askarzadeh","year":"2022","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"1","key":"10.1016\/j.jnca.2026.104480_bib3","first-page":"1175","article-title":"Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning","volume":"25","author":"Cao","year":"2022","journal-title":"Clust. Comput."},{"key":"10.1016\/j.jnca.2026.104480_bib4","series-title":"Low-Power CMOS VLSI Design [M]","author":"Chandrakasan","year":"2025"},{"issue":"2","key":"10.1016\/j.jnca.2026.104480_bib5","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/s11036-018-1123-y","article-title":"New method of energy efficient subcarrier allocation based on evolutionary game theory","volume":"26","author":"Chen","year":"2021","journal-title":"Mobile Network. Appl."},{"key":"10.1016\/j.jnca.2026.104480_bib6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.aeue.2022.154172","article-title":"An approach of flow compensation incentive based on Q-Learning strategy for IoT user privacy protection","volume":"148","author":"Chen","year":"2022","journal-title":"AE\u00dc, Int. J. Electron. Commun."},{"key":"10.1016\/j.jnca.2026.104480_bib7","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/j.future.2022.12.016","article-title":"A novel offoading approach of IoT user perception task based on quantum behavior particle swarm optimization","volume":"141","author":"Chen","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.jnca.2026.104480_bib8","first-page":"1","article-title":"A data secure transmission method for MEC smart devices based on oracles","volume":"12","author":"Chen","year":"2025","journal-title":"Secur. Privac."},{"issue":"10","key":"10.1016\/j.jnca.2026.104480_bib9","first-page":"1","article-title":"An edge computing key pre-distribution approach based on blockchain for perception data trustworthy On-Chain","volume":"200","author":"Chen","year":"2025","journal-title":"AEU-Internat. J. Electron. Commun."},{"issue":"2","key":"10.1016\/j.jnca.2026.104480_bib10","doi-asserted-by":"crossref","first-page":"1546","DOI":"10.1109\/TVT.2017.2753772","article-title":"Capacity of cooperative vehicular networks with infrastructure support: multi-user case","volume":"67","author":"Chen","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"10.1016\/j.jnca.2026.104480_bib11","first-page":"69058","article-title":"A multi-path routing protocol based on link lifetime and energy consumption prediction for Mobile edge computing","volume":"8","author":"Chen","year":"2020","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.jnca.2026.104480_bib12","first-page":"285","article-title":"New quantum-genetic based OLSR protocol (QG-OLSR) for Mobile Ad hoc network","volume":"80","author":"Cui","year":"2019","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"10.1016\/j.jnca.2026.104480_bib13","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1109\/TCSS.2022.3228692","article-title":"New computing tasks offloading method for MEC based on prospect theory framework","volume":"11","author":"Dong","year":"2024","journal-title":"IEEE Trans. Computat. Soc. Syst."},{"issue":"6","key":"10.1016\/j.jnca.2026.104480_bib14","doi-asserted-by":"crossref","first-page":"3587","DOI":"10.1007\/s11276-019-01955-2","article-title":"Novel approach of distributed & adaptive trust metrics for MANET","volume":"25","author":"Gao","year":"2019","journal-title":"Wirel. Netw."},{"issue":"4","key":"10.1016\/j.jnca.2026.104480_bib15","doi-asserted-by":"crossref","first-page":"1517","DOI":"10.1109\/TITS.2018.2853165","article-title":"New multi-hop clustering algorithm for vehicular Ad hoc networks","volume":"20","author":"Ge","year":"2019","journal-title":"IEEE Trans. Intell. Transport. Syst."},{"key":"10.1016\/j.jnca.2026.104480_bib16","series-title":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","first-page":"1","article-title":"Task offoading based on lyapunov optimization for MEC-assisted platooning[C]","author":"Hu","year":"2019"},{"key":"10.1016\/j.jnca.2026.104480_bib17","doi-asserted-by":"crossref","first-page":"185131","DOI":"10.1109\/ACCESS.2019.2960887","article-title":"Dynamic computation offloading based on graph partitioning in Mobile edge computing","volume":"7","author":"Li","year":"2019","journal-title":"IEEE Access"},{"issue":"15","key":"10.1016\/j.jnca.2026.104480_bib18","first-page":"1","article-title":"Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for Mobile education","volume":"88","author":"Liu","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"issue":"18","key":"10.1016\/j.jnca.2026.104480_bib19","first-page":"1","article-title":"Novel dynamic source routing protocol (DSR) based on genetic algorithm-bacterial foraging optimization (GA-BFO)","volume":"31","author":"Liu","year":"2018","journal-title":"Int. J. Commun. Syst."},{"issue":"1","key":"10.1016\/j.jnca.2026.104480_bib20","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1016\/j.comcom.2020.01.024","article-title":"Adaptive repair algorithm for TORA routing protocol based on flood control strategy","volume":"151","author":"Liu","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.jnca.2026.104480_bib21","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.comcom.2021.11.012","article-title":"A kind of novel edge computing architecture based on adaptive stratifed sampling","volume":"183","author":"Ni","year":"2022","journal-title":"Comput. Commun."},{"key":"10.1016\/j.jnca.2026.104480_bib22","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.future.2022.12.039","article-title":"New method of vehicle cooperative communication based on fuzzy logic and signal game strategy","volume":"142","author":"Ni","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"issue":"11","key":"10.1016\/j.jnca.2026.104480_bib23","first-page":"1","article-title":"New algorithm of multi-strategy channel allocation for edge computing","volume":"126","author":"Piao","year":"2020","journal-title":"AE\u00dc, Int. J. Electron. Commun."},{"issue":"1","key":"10.1016\/j.jnca.2026.104480_bib24","first-page":"226","article-title":"Novel reliable routing method for engineering of internet of vehicles based on graph theory","volume":"36","author":"Tang","year":"2019","journal-title":"Eng. Comput."},{"key":"10.1016\/j.jnca.2026.104480_bib25","article-title":"A content distribution method of internet of vehicles based on edge cache and immune cloning strategy","volume":"138","author":"Wang","year":"2023","journal-title":"Ad Hoc Netw."},{"issue":"162","key":"10.1016\/j.jnca.2026.104480_bib26","first-page":"1","article-title":"New clustering routing method based on PECE for WSN","volume":"2015","author":"Wang","year":"2015","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"6","key":"10.1016\/j.jnca.2026.104480_bib27","doi-asserted-by":"crossref","first-page":"3181","DOI":"10.1109\/TCSS.2022.3193739","article-title":"New method of fuzzy mutli-criteria routing in vehicle Ad-Hoc network","volume":"10","author":"Wang","year":"2023","journal-title":"IEEE Trans. Computat. Soc. Syst."},{"issue":"4","key":"10.1016\/j.jnca.2026.104480_bib28","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1109\/TSC.2014.2370642","article-title":"A novel approach to mapped correlation of ID for RFID anti-collision","volume":"7","author":"Wang","year":"2014","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"3","key":"10.1016\/j.jnca.2026.104480_bib29","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/TWC.2019.2897296","article-title":"Optimal base station antenna downtilt in downlink cellular networks","volume":"18","author":"Yang","year":"2019","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.jnca.2026.104480_bib30","series-title":"2019 IEEE International Conference on Smart Internet of Things (SmartIoT)","first-page":"378","article-title":"Green-oriented offloading and resource allocation by reinforcement learning in MEC[C]","author":"Yang","year":"2019"},{"issue":"1","key":"10.1016\/j.jnca.2026.104480_bib31","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.neucom.2020.09.042","article-title":"A new method of data missing estimation with FNN-based tensor heterogeneous ensemble learning for internet of vehicle","volume":"420","author":"Zhang","year":"2021","journal-title":"Neurocomputing"},{"key":"10.1016\/j.jnca.2026.104480_bib32","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2024.103434","article-title":"UAV-assisted task offloading system using dung beetle optimization algorithm & deep reinforcement learning","volume":"156","author":"Zhang","year":"2024","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.jnca.2026.104480_bib33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.adhoc.2024.103682","article-title":"New routing method based on sticky bacteria algorithm and link stability for VANET","volume":"166","author":"Zhang","year":"2025","journal-title":"Ad Hoc Netw."},{"issue":"4","key":"10.1016\/j.jnca.2026.104480_bib34","doi-asserted-by":"crossref","first-page":"5190","DOI":"10.1109\/TR.2025.3617340","article-title":"New method of vehicular network content distribution based on edge caching and catch fish optimization strategy","volume":"74","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Reliab."},{"key":"10.1016\/j.jnca.2026.104480_bib35","first-page":"1","article-title":"UAV-assisted geo-edge routing protocol for internet of vehicles based on reinforcement learning strategy","volume":"1","author":"Zhang","year":"2026","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"10.1016\/j.jnca.2026.104480_bib36","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1109\/TII.2013.2250910","article-title":"An energy-balanced routing method based on forward-aware factor for wireless sensor network","volume":"10","author":"Zhang","year":"2014","journal-title":"IEEE Trans. Ind. Inf."},{"issue":"6","key":"10.1016\/j.jnca.2026.104480_bib37","doi-asserted-by":"crossref","first-page":"4203","DOI":"10.1007\/s10586-022-03635-x","article-title":"An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G","volume":"25","author":"Zhang","year":"2022","journal-title":"Clust. Comput."},{"issue":"8","key":"10.1016\/j.jnca.2026.104480_bib38","doi-asserted-by":"crossref","first-page":"8324","DOI":"10.1109\/TITS.2023.3264553","article-title":"Novel edge caching approach based on multi-agent deep reinforcement learning for internet of vehicles","volume":"24","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Intell. Transport. Syst."},{"issue":"3","key":"10.1016\/j.jnca.2026.104480_bib39","doi-asserted-by":"crossref","first-page":"2264","DOI":"10.1109\/TNSM.2025.3539865","article-title":"New offloading method of computing task based on gray wolf hunting optimization mechanism for the IOV","volume":"22","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"3","key":"10.1016\/j.jnca.2026.104480_bib40","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1109\/TSUSC.2024.3503580","article-title":"Novel approach of vehicular cooperative communication based on strategy of interval Type-2 fuzzy logic and cooperative game","volume":"10","author":"Zhang","year":"2025","journal-title":"IEEE Trans. Sustain. Comput."},{"issue":"2","key":"10.1016\/j.jnca.2026.104480_bib41","doi-asserted-by":"crossref","first-page":"2042","DOI":"10.1109\/TII.2023.3285301","article-title":"New method of edge computing based data adaptive return in internet of vehicles","volume":"20","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.jnca.2026.104480_bib42","first-page":"1","article-title":"Novel approach of computational resource allocation in fog computing based on deep reinforcement learning strategies","volume":"8","author":"Zhang","year":"2025","journal-title":"IEEE Internet Things J."},{"issue":"7","key":"10.1016\/j.jnca.2026.104480_bib43","doi-asserted-by":"crossref","first-page":"1817","DOI":"10.1007\/s00500-014-1366-x","article-title":"A novel multicast routing method with minimum transmission for WSN of cloud computing service","volume":"19","author":"Zheng","year":"2015","journal-title":"Soft Comput."},{"issue":"4","key":"10.1016\/j.jnca.2026.104480_bib44","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1007\/s11036-017-0878-x","article-title":"A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy","volume":"23","author":"Zhou","year":"2018","journal-title":"Mobile Network. Appl."},{"issue":"5","key":"10.1016\/j.jnca.2026.104480_bib45","doi-asserted-by":"crossref","first-page":"1044","DOI":"10.1016\/j.camwa.2012.03.023","article-title":"A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the internet of things (IOT)","volume":"64","author":"Zhu","year":"2012","journal-title":"Comput. Math. Appl."}],"container-title":["Journal of Network and Computer Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S108480452600055X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S108480452600055X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T09:16:09Z","timestamp":1776158169000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S108480452600055X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,6]]},"references-count":45,"alternative-id":["S108480452600055X"],"URL":"https:\/\/doi.org\/10.1016\/j.jnca.2026.104480","relation":{},"ISSN":["1084-8045"],"issn-type":[{"value":"1084-8045","type":"print"}],"subject":[],"published":{"date-parts":[[2026,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"New multi-user computation unloading method of edge computing based on improved pelican optimization control strategy for smart city","name":"articletitle","label":"Article Title"},{"value":"Journal of Network and Computer Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jnca.2026.104480","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Ltd. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"104480"}}