TY - JOUR AU - Loai, T. AU - Rashid, M. AU - Elhadj, B. PY - 2017 DA - 2017// TI - Mobile cloud computing model and big data analysis for healthcare applications JO - IEEE Access VL - 4 ID - Loai2017 ER - TY - STD TI - Carriers warn of crisis in mobile spectrum [EB/OL]. http://www.nytimes.com/S012/04/18/technology/mobile-carriers-warn-of-spectrum-crisis-others-see-hyperbole.html. Accessed 17 Apr 2012. UR - http://www.nytimes.com/S012/04/18/technology/mobile-carriers-warn-of-spectrum-crisis-others-see-hyperbole.html ID - ref2 ER - TY - STD TI - Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Updata, 2013–2018 [EB/OL]. http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_cll-520862.pdf. Accessed 28 Oct 2014. UR - http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_cll-520862.pdf ID - ref3 ER - TY - JOUR AU - Stavroulaki, V. AU - Tsagkaris, K. AU - Logothetis, M. PY - 2011 DA - 2011// TI - Opportunistic networks JO - IEEE Veh Technol Mag VL - 6 UR - https://doi.org/10.1109/MVT.2011.941892 DO - 10.1109/MVT.2011.941892 ID - Stavroulaki2011 ER - TY - JOUR AU - Pelusi, L. AU - Passarella, A. AU - Conti, M. PY - 2006 DA - 2006// TI - Opportunistic networking: data forwarding in disconnected mobile ad hoc networks JO - IEEE Commun Mag VL - 44 UR - https://doi.org/10.1109/MCOM.2006.248176 DO - 10.1109/MCOM.2006.248176 ID - Pelusi2006 ER - TY - JOUR AU - Jones, M. AU - Morris, J. AU - Deruyter, F. PY - 2018 DA - 2018// TI - Mobile healthcare and people with disabilities: current state and future needs JO - Int J Environ Res Public Health VL - 15 UR - https://doi.org/10.3390/ijerph15030515 DO - 10.3390/ijerph15030515 ID - Jones2018 ER - TY - STD TI - Doukas C, Pliakas T, Maglogiannis I. 2010 Annual international conference of the IEEE engineering in medicine and biology-mobile healthcare information management utilizing Cloud Computing and Android OS. 2010:1037–40. ID - ref7 ER - TY - STD TI - Chengju L, Liu L, Shizong C, et al. Mobile healthcare service system using RFID. In: IEEE international conference on networking. IEEE, 2004. ID - ref8 ER - TY - JOUR AU - David, K. AU - Kevin, F. AU - Carl, G. PY - 2015 DA - 2015// TI - Security for mobile and cloud frontiers in healthcare JO - Commun ACM VL - 58 UR - https://doi.org/10.1145/2790830 DO - 10.1145/2790830 ID - David2015 ER - TY - JOUR AU - Baig, M. M. AU - Gholamhosseini, H. AU - Connolly, M. J. PY - 2015 DA - 2015// TI - Mobile healthcare applications: system design review, critical issues and JO - Australas Phys Eng Sci Med VL - 38 UR - https://doi.org/10.1007/s13246-014-0315-4 DO - 10.1007/s13246-014-0315-4 ID - Baig2015 ER - TY - JOUR AU - Rongxing, L. AU - Xiaodong, L. AU - Xuemin, S. PY - 2013 DA - 2013// TI - SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency JO - IEEE Trans Parallel Distrib Syst VL - 24 UR - https://doi.org/10.1109/TPDS.2012.146 DO - 10.1109/TPDS.2012.146 ID - Rongxing2013 ER - TY - JOUR AU - Kumar, R. R. AU - Iyengar, N. C. S. N. PY - 2014 DA - 2014// TI - Secure and synchronised mobile JXTA cloud ecosystem for sharing patient’s healthcare information and medical reports JO - Int J Comput Healthc VL - 2 UR - https://doi.org/10.1504/IJCIH.2014.065809 DO - 10.1504/IJCIH.2014.065809 ID - Kumar2014 ER - TY - JOUR AU - Rahman, S. M. M. AU - Masud, M. M. AU - Hossain, M. A. PY - 2016 DA - 2016// TI - Privacy preserving secure data exchange in mobile P2P cloud healthcare environment JO - Peer Peer Netw Appl VL - 9 UR - https://doi.org/10.1007/s12083-015-0334-2 DO - 10.1007/s12083-015-0334-2 ID - Rahman2016 ER - TY - JOUR AU - Azzedine, B. AU - Yonglin, R. PY - 2009 DA - 2009// TI - A secure mobile healthcare system using trust-based multicast scheme JO - IEEE J Sel Areas Commun VL - 27 UR - https://doi.org/10.1109/JSAC.2009.090504 DO - 10.1109/JSAC.2009.090504 ID - Azzedine2009 ER - TY - JOUR AU - AlMuhtadi, J. AU - Shahzad, B. AU - Saleem, K. PY - 2017 DA - 2017// TI - Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment JO - Health Informatics J UR - https://doi.org/10.1177/1460458217706184 DO - 10.1177/1460458217706184 ID - AlMuhtadi2017 ER - TY - JOUR AU - Kuan, Z. AU - Kan, Y. AU - Xiaohui, L. PY - 2015 DA - 2015// TI - Security and privacy for mobile healthcare networks: from a quality of protection JO - IEEE Wirel Commun VL - 22 UR - https://doi.org/10.1109/MWC.2015.7224734 DO - 10.1109/MWC.2015.7224734 ID - Kuan2015 ER - TY - STD TI - Vahdat A, Becher, D. Epidemic routing for partially connected ad hoc networks. In: Technical report CS 2006. Duke University, 2000. ID - ref17 ER - TY - JOUR AU - Lindgren, A. AU - Doria, A. AU - Schelén, O. PY - 2003 DA - 2003// TI - Probabilistic Routing in Intermittently Connected Networks JO - Acm Sigmobile Mobile Comput Commun Rev VL - 7 UR - https://doi.org/10.1145/961268.961272 DO - 10.1145/961268.961272 ID - Lindgren2003 ER - TY - JOUR AU - Hui, P. AU - Crowcroft, J. AU - Yoneki, E. PY - 2011 DA - 2011// TI - Bubble rap: social-based forwarding in delay-tolerant networks JO - IEEE Trans Mob Comput VL - 10 UR - https://doi.org/10.1109/TMC.2010.246 DO - 10.1109/TMC.2010.246 ID - Hui2011 ER - TY - STD TI - Wenrui Z, Mostafa H A. Message ferrying: proactive routing in highly-partitioned wireless ad hoc networks. In: IEEE workshop on distributed computing systems. IEEE, 2003; p. 308–14. ID - ref20 ER - TY - STD TI - Yoon J, Kim S K, Lee J Y, et al. An enhanced friendship-based routing scheme exploiting regularity in an opportunistic network. In: IEEE international conference on Internet of Things. 2017. ID - ref21 ER - TY - JOUR AU - Yeqing, Y. AU - Zhigang, C. AU - Jia, W. PY - 2019 DA - 2019// TI - Effective data transmission strategy based on node socialization in opportunistic social networks JO - IEEE Access VL - 7 UR - https://doi.org/10.1109/ACCESS.2019.2898895 DO - 10.1109/ACCESS.2019.2898895 ID - Yeqing2019 ER - TY - STD TI - Sharma D K, Dhurandher S K, Woungang I, et al. GD-CAR: a genetic algorithm based dynamic context aware routing protocol for opportunistic networks. In: International conference on network-based information systems. Cham: Springer, 2018. ID - ref23 ER - TY - JOUR AU - Jinsong, W. AU - Song, G. AU - Huawei, H. PY - 2018 DA - 2018// TI - Information and communications technologies for sustainable development goals: state-of-the-art, needs and perspectives JO - IEEE Commun Surv Tut VL - 20 UR - https://doi.org/10.1109/COMST.2018.2812301 DO - 10.1109/COMST.2018.2812301 ID - Jinsong2018 ER - TY - JOUR AU - Jinsong, W. AU - Song, G. AU - L, J. i. e. PY - 2016 DA - 2016// TI - Big data meet green challenges: big data toward green applications JO - IEEE Syst J VL - 10 UR - https://doi.org/10.1109/JSYST.2016.2599689 DO - 10.1109/JSYST.2016.2599689 ID - Jinsong2016 ER - TY - JOUR AU - Jinsong, W. AU - Song, G. AU - Jie, L. PY - 2016 DA - 2016// TI - Big data meet green challenges: greening big data JO - IEEE Syst J VL - 10 UR - https://doi.org/10.1109/JSYST.2016.2599689 DO - 10.1109/JSYST.2016.2599689 ID - Jinsong2016 ER - TY - JOUR AU - Rachad, A. AU - Lingjia, L. AU - Jinsong, W. PY - 2018 DA - 2018// TI - Big data meet cyber-physical systems: a panoramic survey JO - IEEE Access VL - 6 UR - https://doi.org/10.1109/ACCESS.2018.2878681 DO - 10.1109/ACCESS.2018.2878681 ID - Rachad2018 ER - TY - JOUR AU - Basatneh, R. AU - Najafi, B. AU - Armstrong, D. G. PY - 2018 DA - 2018// TI - Health sensors, smart home devices, and the internet of medical things: an opportunity for dramatic improvement in care for the lower extremity complications of diabetes JO - J Diabetes Sci Technol VL - 12 UR - https://doi.org/10.1177/1932296818768618 DO - 10.1177/1932296818768618 ID - Basatneh2018 ER - TY - STD TI - Alsubaei F, Abuhussein A, Shiva S. Security and privacy in the internet of medical things: taxonomy and risk assessment. In: Local computer networks workshops. 2017. ID - ref29 ER - TY - JOUR AU - Na, L. AU - Das, S. K. PY - 2013 DA - 2013// TI - A trust-based framework for data forwarding in opportunistic networks JO - Ad Hoc Netw VL - 11 UR - https://doi.org/10.1016/j.adhoc.2011.01.018 DO - 10.1016/j.adhoc.2011.01.018 ID - Na2013 ER - TY - JOUR AU - Al Hinai, A. AU - Zhang, H. AU - Chen, Y. PY - 2014 DA - 2014// TI - TB-Snw: trust-based spray-and wait routing for delay-tolerant networks JO - J Supercomput VL - 69 UR - https://doi.org/10.1007/s11227-014-1095-z DO - 10.1007/s11227-014-1095-z ID - Al Hinai2014 ER - TY - STD TI - Gupta S, Dhurandher S K, Woungang I, et al. Trust-based security protocol against black hole attacks in opportunistic networks. In: IEEE 9th international conference on wireless and mobile computing, networking and communications. 2013; p. 724–9. ID - ref32 ER - TY - STD TI - Trifunovic S, Legendre F, Anastasiades C. Social trust in opportunistic networks. In: INFOCOM IEEE conference on computer communications workshops. 2010; p. 1–6. ID - ref33 ER - TY - JOUR AU - Xi, C. AU - Liang, S. AU - Jianfeng, M. PY - 2015 DA - 2015// TI - A trust management scheme based on behavior feedback for opportunistic networks JO - China Commun VL - 12 UR - https://doi.org/10.1109/CC.2015.7114058 DO - 10.1109/CC.2015.7114058 ID - Xi2015 ER - TY - STD TI - Bulut E, Szymanski B K. Friendship based routing in delay tolerant mobile social networks. In: Proc. IEEE global telecommunications conference (GLOBECOM), Dec, 2010. ID - ref35 ER - TY - STD TI - Ke X. A social networking services system based on the “Six Degrees of Separation” theory and damping factors. In: International conference on future networks. 2010. ID - ref36 ER - TY - STD TI - Li F and Wu J, LocalCom: a community-based epidemic forwarding scheme in disruption-tolerant networks. In: Proc. IEEE Conf. sensor, mesh and ad hoc communications and networks. 2009; p. 574–82. ID - ref37 ER - TY - STD TI - Scott J, Gass R, Crowcroft J, Hui P, Diot C, Chaintreau A (May 2009) CRAWDAD trace Cambridge/haggle/imote/infocom2006 (v.2009-05-29), Downloaded from http://crawdad.cs.dartmouth.edu/Cambridge/haggle/imote/infocom2006. Accessed 29 May 2009. UR - http://crawdad.cs.dartmouth.edu/Cambridge/haggle/imote/infocom2006 ID - ref38 ER - TY - JOUR AU - Eagle, N. AU - Pentland, A. AU - Lazer, D. PY - 2009 DA - 2009// TI - Inferring friendship network structure by using mobile phone data JO - Proc Natl Acad Sci. VL - 106 UR - https://doi.org/10.1073/pnas.0900282106 DO - 10.1073/pnas.0900282106 ID - Eagle2009 ER - TY - STD TI - McKinsey 2018 Research report [EB/OL]. http://stock.10jqka.com.cn/20190308/c610142206.shtml. Accessed 8 Mar 2019. UR - http://stock.10jqka.com.cn/20190308/c610142206.shtml ID - ref40 ER - TY - JOUR AU - Lee, S. AU - Yoo, C. D. AU - Kalker, T. PY - 2007 DA - 2007// TI - Reversible image watermarking based on integer-to-integer wavelet transform JO - IEEE Trans Inf Forensics Secur. VL - 2 UR - https://doi.org/10.1109/TIFS.2007.905146 DO - 10.1109/TIFS.2007.905146 ID - Lee2007 ER - TY - JOUR AU - Reichel, J. AU - Menegaz, G. AU - Nadenau, M. J. PY - 2001 DA - 2001// TI - Integer wavelet transform for embedded lossy to lossless image compression JO - IEEE Trans Image Process VL - 10 UR - https://doi.org/10.1109/83.908504 DO - 10.1109/83.908504 ID - Reichel2001 ER - TY - JOUR AU - Hans, M. AU - Schafer, R. W. PY - 2001 DA - 2001// TI - Lossless compression of digital audio [J] JO - IEEE Signal Process Mag VL - 18 UR - https://doi.org/10.1109/79.939834 DO - 10.1109/79.939834 ID - Hans2001 ER - TY - STD TI - Spyropoulos T, Psounis K, Raghavendrac S. Spray and wait: an efficient routing scheme for intermittently connected mobile networks. 2005; p. 252–9. ID - ref44 ER - TY - STD TI - Daly E, Haahr M, et al. Social Network Analysis for Routing in Disconnected Delay-Tolerant MANETs. In: Acm international symposium on mobile ad hoc networking & computing. 2007:32–40. ID - ref45 ER - TY - STD TI - MIT-BIH Arrhythmia Database [EB/OL]. http://physionet.org/physiobank/database/mitdb. Accessed 6 July 2018. UR - http://physionet.org/physiobank/database/mitdb ID - ref46 ER -