{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T18:54:57Z","timestamp":1722711297176},"reference-count":38,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/100010897","name":"Newton Fund Institutional Links","doi-asserted-by":"publisher","award":["216429427"],"id":[{"id":"10.13039\/100010897","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1016\/j.comcom.2020.01.021","type":"journal-article","created":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T16:25:24Z","timestamp":1579623924000},"page":"81-92","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":23,"special_numbering":"C","title":["Performance evaluation of hybrid disaster recovery framework with D2D communications"],"prefix":"10.1016","volume":"152","author":[{"given":"Enver","family":"Ever","sequence":"first","affiliation":[]},{"given":"Eser","family":"Gemikonakli","sequence":"additional","affiliation":[]},{"given":"Huan X.","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Fadi","family":"Al-Turjman","sequence":"additional","affiliation":[]},{"given":"Adnan","family":"Yazici","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2020.01.021_b1","article-title":"A profitable and energy-efficient cooperative fog solution for IoT services","author":"Al\u00a0Ridhawi","year":"2019","journal-title":"IEEE Trans. Ind. Inf."},{"key":"10.1016\/j.comcom.2020.01.021_b2","first-page":"1","article-title":"Reliability of response region: a novel mechanism in visual tracking by edge computing for IIoT environments","author":"Liu","year":"2020","journal-title":"Mech. Syst. Signal Process."},{"issue":"12","key":"10.1016\/j.comcom.2020.01.021_b3","doi-asserted-by":"crossref","first-page":"3554","DOI":"10.1109\/TMC.2017.2695452","article-title":"Teamphone: networking smartphones for disaster recovery","volume":"16","author":"Lu","year":"2017","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.comcom.2020.01.021_b4","unstructured":"K.R. Malik, M. Ahmad, S. Khalid, H. Ahmad, F. Al-Turjman, S. Jabbar, Image and command hybrid model for vehicle control using Internet of Vehicles, Trans. Emerg. Telecommun. Technol."},{"key":"10.1016\/j.comcom.2020.01.021_b5","doi-asserted-by":"crossref","first-page":"18818","DOI":"10.1109\/ACCESS.2017.2752174","article-title":"Internet of things for disaster management: state-of-the-art and prospects","volume":"5","author":"Ray","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2020.01.021_b6","doi-asserted-by":"crossref","first-page":"1649","DOI":"10.1109\/ACCESS.2015.2479855","article-title":"A software-defined device-to-device communication architecture for public safety applications in 5G networks","volume":"3","author":"Usman","year":"2015","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2020.01.021_b7","series-title":"IEEE Proceedings of, the 43rd IEEE Conference on Local Computer Networks (LCN)","first-page":"1","article-title":"Hybrid approach for disaster recovery using P2P communications in android","author":"Yatbaz","year":"2018"},{"key":"10.1016\/j.comcom.2020.01.021_b8","doi-asserted-by":"crossref","first-page":"10733","DOI":"10.1109\/ACCESS.2017.2766921","article-title":"A Stackelberg-game approach for disaster-recovery communications utilizing cooperative D2D","volume":"6","author":"Chu","year":"2018","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.comcom.2020.01.021_b9","doi-asserted-by":"crossref","first-page":"2080","DOI":"10.1109\/TWC.2017.2789195","article-title":"Fair sharing of backup power supply in multi-operator wireless cellular towers","volume":"17","author":"Nguyen","year":"2018","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.comcom.2020.01.021_b10","doi-asserted-by":"crossref","DOI":"10.1109\/TETC.2017.2688078","article-title":"Flexibility-enhanced HTS system for disaster management: responding to communication demand explosion in a disaster","author":"Tani","year":"2017","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"10.1016\/j.comcom.2020.01.021_b11","series-title":"In aftermath of greek fires, suspicion combines with grief and recrimination","author":"Horowitz","year":"2018"},{"issue":"7","key":"10.1016\/j.comcom.2020.01.021_b12","doi-asserted-by":"crossref","first-page":"559","DOI":"10.5047\/eps.2011.06.028","article-title":"Focal mechanism and slip history of the 2011 mw 9.1 off the pacific coast of tohoku earthquake, constrained with teleseismic body and surface waves","volume":"63","author":"Shao","year":"2011","journal-title":"Earth Planets Space"},{"issue":"1","key":"10.1016\/j.comcom.2020.01.021_b13","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.ijinfomgt.2010.10.001","article-title":"Emergency knowledge management and social media technologies: a case study of the 2010 Haitian earthquake","volume":"31","author":"Yates","year":"2011","journal-title":"Int. J. Inf. Manage."},{"issue":"2","key":"10.1016\/j.comcom.2020.01.021_b14","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1109\/SURV.2013.082713.00034","article-title":"Survey of wireless communication technologies for public safety","volume":"16","author":"Baldini","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10.1016\/j.comcom.2020.01.021_b15","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/COMST.2016.2612223","article-title":"A survey on legacy and emerging technologies for public safety communications","volume":"19","author":"Kumbhar","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.comcom.2020.01.021_b16","unstructured":"D. Guha-Sapir, P. Hoyois, P. Wallemacq, R. Below, Annual disaster statistical review 2016 the numbers and trends, Centre for Research on the Epidemiology of Disasters, 2017."},{"key":"10.1016\/j.comcom.2020.01.021_b17","doi-asserted-by":"crossref","DOI":"10.1109\/ACCESS.2017.2768800","article-title":"Heterogeneous public safety network architecture based on RAN slicing","author":"Marabissi","year":"2017","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.comcom.2020.01.021_b18","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MCOM.2016.7432142","article-title":"Toward moving public safety networks","volume":"54","author":"Favraud","year":"2016","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"10.1016\/j.comcom.2020.01.021_b19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TGCN.2017.2763826","article-title":"Secure wireless powered and cooperative jamming D2D communications","volume":"2","author":"Chu","year":"2018","journal-title":"IEEE Trans. Green Commun. Netw."},{"key":"10.1016\/j.comcom.2020.01.021_b20","doi-asserted-by":"crossref","first-page":"1510","DOI":"10.1109\/ACCESS.2014.2379938","article-title":"Device-to-device communications for national security and public safety","volume":"2","author":"Fodor","year":"2014","journal-title":"IEEE Access"},{"key":"10.1016\/j.comcom.2020.01.021_b21","series-title":"Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), 2015 IEEE 20th International Workshop on","first-page":"75","article-title":"Software-defined architecture for mobile cloud in device-to-device communication","author":"Usman","year":"2015"},{"key":"10.1016\/j.comcom.2020.01.021_b22","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.comcom.2019.08.011","article-title":"DABFS: a robust routing protocol for warning messages dissemination in VANETs","volume":"147","author":"Haider","year":"2019","journal-title":"Comput. Commun."},{"key":"10.1016\/j.comcom.2020.01.021_b23","series-title":"New Trends in Intelligent Information and Database Systems","first-page":"191","article-title":"An ad hoc mobile cloud and its dynamic loading of modules into a mobile device running google android","author":"Maly","year":"2015"},{"key":"10.1016\/j.comcom.2020.01.021_b24","series-title":"Open Systems (ICOS), 2012 IEEE Conference on","first-page":"1","article-title":"Location based early disaster warning and evacuation system on mobile phones using openstreetmap","author":"Rahman","year":"2012"},{"issue":"6","key":"10.1016\/j.comcom.2020.01.021_b25","first-page":"343","article-title":"A mobile disaster management system using the android technology","volume":"9","author":"Fajardo","year":"2010","journal-title":"WSEAS Trans. Commun."},{"issue":"12","key":"10.1016\/j.comcom.2020.01.021_b26","doi-asserted-by":"crossref","first-page":"6697","DOI":"10.1109\/TWC.2014.2335734","article-title":"Queuing models with applications to mode selection in device-to-device communications underlaying cellular networks.","volume":"13","author":"Lei","year":"2014","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"9","key":"10.1016\/j.comcom.2020.01.021_b27","doi-asserted-by":"crossref","first-page":"8303","DOI":"10.1109\/TVT.2017.2682123","article-title":"On relay selection schemes for relay-assisted D2D communications in LTE-A systems","volume":"66","author":"Ma","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comcom.2020.01.021_b28","doi-asserted-by":"crossref","DOI":"10.1109\/COMST.2018.2848108","article-title":"Routing in multi-hop cellular device-to-device (D2D) networks: a survey","author":"Shaikh","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1\u20134","key":"10.1016\/j.comcom.2020.01.021_b29","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.peva.2005.07.024","article-title":"Scalability of routing methods in ad hoc networks","volume":"62","author":"Naumov","year":"2005","journal-title":"Perform. Eval."},{"issue":"12","key":"10.1016\/j.comcom.2020.01.021_b30","first-page":"1996","article-title":"Performance of routing protocols in very large scale wireless sensor networks","volume":"7","author":"Cai","year":"2012","journal-title":"J. Netw."},{"issue":"2","key":"10.1016\/j.comcom.2020.01.021_b31","doi-asserted-by":"crossref","first-page":"1660","DOI":"10.1109\/TVT.2017.2751569","article-title":"Resource allocation in public safety broadband networks with rapid-deployment access points","volume":"67","author":"Chen","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10.1016\/j.comcom.2020.01.021_b32","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1023\/A:1018974722301","article-title":"Spectral expansion solution for some finite capacity queues","volume":"79","author":"Chakka","year":"1998","journal-title":"Ann. Oper. Res."},{"issue":"9","key":"10.1016\/j.comcom.2020.01.021_b33","doi-asserted-by":"crossref","first-page":"1523","DOI":"10.1109\/LCOMM.2014.2336841","article-title":"Fault-tolerant two-stage open queuing systems with server failures at both stages","volume":"18","author":"Ever","year":"2014","journal-title":"IEEE Commun. Lett."},{"key":"10.1016\/j.comcom.2020.01.021_b34","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/j.comnet.2017.03.016","article-title":"Modelling green HetNets in dynamic ultra large-scale applications: a case-study for femtocells in smart-cities","volume":"128","author":"Ever","year":"2017","journal-title":"Comput. Netw."},{"issue":"3","key":"10.1016\/j.comcom.2020.01.021_b35","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1016\/0166-5316(94)00025-F","article-title":"Spectral expansion solution for a class of Markov models: application and comparison with the matrix-geometric method","volume":"23","author":"Mitrani","year":"1995","journal-title":"Perform. Eval."},{"key":"10.1016\/j.comcom.2020.01.021_b36","series-title":"Discrete-event System Simulation","author":"Banks","year":"2010"},{"key":"10.1016\/j.comcom.2020.01.021_b37","series-title":"Proceedings of the 2015 Winter Simulation Conference","first-page":"1810","article-title":"Statistical analysis of simulation output data: the practical state of the art","author":"Law","year":"2015"},{"key":"10.1016\/j.comcom.2020.01.021_b38","series-title":"Realistic lte performance from peak rate to subcriber experience","author":"MOTOROLA","year":"2009"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366419316433?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366419316433?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T14:51:31Z","timestamp":1582037491000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366419316433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":38,"alternative-id":["S0140366419316433"],"URL":"https:\/\/doi.org\/10.1016\/j.comcom.2020.01.021","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2020,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Performance evaluation of hybrid disaster recovery framework with D2D communications","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comcom.2020.01.021","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}