{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T13:01:15Z","timestamp":1772024475414,"version":"3.50.1"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,11,10]],"date-time":"2015-11-10T00:00:00Z","timestamp":1447113600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2015,11,10]],"date-time":"2015-11-10T00:00:00Z","timestamp":1447113600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"the Open Research Fund of State Key Laboratory of Space-Ground Integrated Information Technology","award":["NO. 2014_CXJJ-TX_08."],"award-info":[{"award-number":["NO. 2014_CXJJ-TX_08."]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>According to the loss network problems caused by limited resources and environment interference factors, we presented a survivability mechanism based on mobility prediction and based on the topological evolution of cloud computing wireless multimedia sensor network (WMSN). First, based on cooperative neural network and opportunity Markov chain model, the multimedia mobile sensor node state and state transition probability could be predicted. Then, the opportunity computational scheme was given based on mobility prediction of dynamic topology evolution mechanism. Finally, using the network topology reconfiguration and opportunities for cloud computing, an enhanced WMSN survivability and end-to-end quality of service guarantee mechanism was proposed. Experimental results show that compared with the static scheme for WMSNs, the proposed survivability mechanism has the obvious advantage in the node protection, data communication, network life cycle, and decodable frame rate and other aspects, and can effectively improve the invulnerability of WMSNs.<\/jats:p>","DOI":"10.1186\/s13638-015-0471-6","type":"journal-article","created":{"date-parts":[[2015,11,10]],"date-time":"2015-11-10T07:43:23Z","timestamp":1447141403000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["RETRACTED ARTICLE: Invulnerability mechanism based on mobility prediction and opportunistic cloud computing with topological evolution for wireless multimedia sensor networks"],"prefix":"10.1186","volume":"2015","author":[{"given":"Jianming","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Tao","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,10]]},"reference":[{"key":"471_CR1","doi-asserted-by":"crossref","unstructured":"S Colonnese, F Cuomo, T Melodia. An empirical model of multiview video\t coding efficiency for wireless multimedia sensor networks. IEEE Trans. Multimedia 15(8), 1800\u20131814 (2013)","DOI":"10.1109\/TMM.2013.2271475"},{"key":"471_CR2","doi-asserted-by":"crossref","unstructured":"Y Yang, Y Wang, D Pi, R Wang. Optimization of self-directed target coverage in wireless multimedia sensor network. Scientific World Journal 2014, 416218 (2014)","DOI":"10.1155\/2014\/416218"},{"issue":"5","key":"471_CR3","doi-asserted-by":"publisher","first-page":"928","DOI":"10.1016\/j.jvcir.2014.02.008","volume":"25","author":"X Nan","year":"2014","unstructured":"X Nan, Y He, L Guan et al., Queueing model based resource optimization for multimedia cloud. J. Vis. Commun. Image Represent. 25(5), 928\u2013942 (2014)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"471_CR4","doi-asserted-by":"crossref","unstructured":"G Nan, Z Mao, M Li, Y Zhang, S Gjessing, H Wang, et al. Distributed resource allocation in cloud-based wireless multimedia social networks. IEEE Netw. 28(4), 74\u201380 (2014)","DOI":"10.1109\/MNET.2014.6863135"},{"key":"471_CR5","unstructured":"X Zheng, N Chen, Z Chen, C Rong, G Chen, W Guo. Mobile cloud based framework for remote-resident multimedia discovery and access. J. Internet Tech. 15(6), 1043\u20131050 (2014)"},{"key":"471_CR6","doi-asserted-by":"crossref","unstructured":"M Hefeeda, T ElGamal, K Calagari, A Abdelsadek. Cloud-based multimedia content protection system. IEEE Trans. Multimedia 17(3), 420\u2013433 (2015)","DOI":"10.1109\/TMM.2015.2389628"},{"issue":"3","key":"471_CR7","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1002\/wcm.2361","volume":"15","author":"K-I Kim","year":"2015","unstructured":"K-I Kim, T-E Sung. Modeling and routing scheme for (m, k)-firm streams in wireless multimedia sensor networks. Wirel. Commun. Mob. Comput. 15(3), 475\u2013483 (2015)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"3","key":"471_CR8","first-page":"1235","volume":"28","author":"A Alaybeyoglu","year":"2015","unstructured":"A Alaybeyoglu. Transmission of image data using fuzzy logic based clustering infrastructure in mobile multimedia sensor networks. J. Intell. Fuzzy Syst. 28(3), 1235\u20131242 (2015)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"471_CR9","doi-asserted-by":"crossref","unstructured":"Y Xu, J Choi, S Dass, T Maiti. Efficient Bayesian spatial prediction with mobile sensor networks using Gaussian Markov random fields. Automatica 49(12), 3520\u20133530 (2013)","DOI":"10.1016\/j.automatica.2013.09.008"},{"issue":"11","key":"471_CR10","doi-asserted-by":"publisher","first-page":"7865","DOI":"10.1007\/s13369-014-1372-4","volume":"39","author":"M Alshayeb","year":"2014","unstructured":"M Alshayeb, Y Eisa, A Ahmed Moataz et al., Object-oriented class stability prediction: a comparison between artificial neural network and support vector machine. Arab. J. Sci. Eng. 39(11), 7865\u20137876 (2014)","journal-title":"Arab. J. Sci. Eng."},{"key":"471_CR11","doi-asserted-by":"crossref","unstructured":"P Pirozmand, G Wu, B Jedari, F Xia. Human mobility in opportunistic networks: characteristics, models and prediction methods. J. Netw. Comput. Appl. 42, 45\u201358 (2014)","DOI":"10.1016\/j.jnca.2014.03.007"},{"key":"471_CR12","doi-asserted-by":"crossref","unstructured":"J Chen, L Ma, and Y Xu. Support vector machine based mobility prediction scheme in heterogeneous wireless networks. Math. Probl. Eng. (2015)","DOI":"10.1155\/2015\/373824"},{"issue":"6","key":"471_CR13","doi-asserted-by":"publisher","first-page":"2561","DOI":"10.1109\/TVT.2014.2345255","volume":"64","author":"A Nadembega","year":"2015","unstructured":"A Nadembega, A Hafid, T Taleb et al., Mobility-prediction-aware bandwidth reservation scheme for mobile networks. IEEE Trans. Veh. Technol. 64(6), 2561\u20132576 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"471_CR14","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s11276-013-0628-3","volume":"20","author":"K Demir Alper","year":"2014","unstructured":"K Demir Alper, H Demiray, S Baydere, Engin QoSMOS: cross-layer QoS architecture for wireless multimedia sensor networks. Wireless Network 20(4), 655\u2013670 (2014)","journal-title":"Wireless Network"},{"key":"471_CR15","doi-asserted-by":"crossref","unstructured":"S Chen, J Jiang, S Pang, S Nie, Y Lai. Modeling and optimization of train scheduling network based on invulnerability analysis. Applied Mathematics & Information Sciences. 7(1), 113\u2013119, (2013)","DOI":"10.12785\/amis\/070112"},{"key":"471_CR16","doi-asserted-by":"crossref","unstructured":"P Xing-Zhao, Y Hong, D Jun, D Chao, Z Zhi-Hao. Study on cascading invulnerability of multi-coupling-links coupled networks based on time-delay coupled map lattices model. Acta Physica Sinica. 63(7), (2014)","DOI":"10.7498\/aps.63.078901"},{"key":"471_CR17","doi-asserted-by":"crossref","unstructured":"H Shen, G Bai, Z Tang, L Zhao. QMOR: QoS-aware multi-sink opportunistic routing for wireless multimedia sensor networks. Wirel. Pers. Commun. 75(2), 1307\u20131330 (2014)","DOI":"10.1007\/s11277-013-1425-0"},{"key":"471_CR18","doi-asserted-by":"crossref","unstructured":"DP Mendes Lucas, JPC Rodrigues Joel, J Lloret, S Sendra. Cross-layer dynamic admission control for cloud-based multimedia sensor networks. IEEE Syst. J. 8(1), 235\u2013246 (2014)","DOI":"10.1109\/JSYST.2013.2260653"},{"key":"471_CR19","doi-asserted-by":"crossref","unstructured":"E Baccarelli, F Chiti, N Cordeschi R Fantacci, D Marabissi, R Parisi. Green multimedia wireless sensor networks: distributed intelligent data fusion, in-network processing, and optimized resource management. IEEE Wirel. Commun. 21(4), 20\u201326 (2014)","DOI":"10.1109\/MWC.2014.6882292"},{"issue":"3","key":"471_CR20","doi-asserted-by":"publisher","first-page":"1892","DOI":"10.1109\/JSEN.2014.2366511","volume":"15","author":"Y Zhou","year":"2015","unstructured":"Y Zhou, W Xiang, G Wang. Frame loss concealment for multiview video transmission over wireless multimedia sensor networks. IEEE Sensors J. 15(3), 1892\u20131901 (2015)","journal-title":"IEEE Sensors J."}],"updated-by":[{"DOI":"10.1186\/s13638-016-0799-6","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T00:00:00Z","timestamp":1485993600000},"record-id":"6149"},{"DOI":"10.1186\/s13638-016-0799-6","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T00:00:00Z","timestamp":1485993600000}},{"DOI":"10.1186\/s13638-015-0471-6","type":"retraction","label":"Retraction","source":"publisher","updated":{"date-parts":[[2015,11,10]],"date-time":"2015-11-10T00:00:00Z","timestamp":1447113600000}}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0471-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-015-0471-6","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0471-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0471-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T12:06:17Z","timestamp":1772021177000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13638-015-0471-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,10]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2015,12]]}},"alternative-id":["471"],"URL":"https:\/\/doi.org\/10.1186\/s13638-015-0471-6","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,10]]},"assertion":[{"value":"23 July 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"243"}}