The advances in wireless communication technologies and the proliferation of mobile devices have enabled the realization of intelligent environments for people and machines to communicate with each other, interact with information-processing devices, and receive a wide range of mobile wireless services through various types of networks and systems everywhere, anytime. A key enabler of these pervasive and ubiquitous connectivity environments is the advancement of software technology in various communication sectors, ranging from communication middleware and operating systems to networking protocols and applications.
This special issue features four selected papers with high quality.
The global epidemic model was proposed to explain influenza activities through climatological factors. Motivated by this, the first article, “The effects of climatological factors on global influenza across temperate and tropical regions”, extended the global epidemic model by interactions of climatological factors to sense the relative benefits of such interactions in explaining the global influenza epidemics, so as to improve influenza surveillance and control.
The development of medical sensors and the Internet of Things (IoT) offers many opportunities for research on disease diagnosis and prognosis in the electronic healthcare (eHealth) industry. The second article titled “Study QoS-aware Fog Computing for Disease Diagnosis and Prognosis” conducted a comprehensive survey on the diagnosis and prognosis of diseases using fog computing in the electronic healthcare (eHealth) industry that summarized the main challenges and analyzed the corresponding solutions in existing works.
In the next article, entitled “An improved recommendation algorithm for polarized population”, the authors presented a collaborative filtering algorithm adapted to polarized crowds to solve the echo chamber effect in various recommendation algorithms. The proposed algorithm can determine whether the user is a polarized crowd by using both user characteristic information and user behavior information, and make collaborative filtering that adapts to the polarized crowds, thus making different recommendation services.
The last article, entitled “A hierarchical key management scheme for cross-domain secure deduplication”, proposed a hierarchical key management scheme based on a threshold blind signature for secure deduplication. This architecture enables sub-key nodes to be distributed in multiple independent network domains and interact with master key nodes through the Internet. In addition to ensuring data encryption security, preventing brute force attacks, and satisfying convergence key security, the proposed scheme supports secure deduplication in a cross-domain environment.