{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:04:42Z","timestamp":1761998682540,"version":"build-2065373602"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T00:00:00Z","timestamp":1502064000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Opening Project of Guangxi Colleges and Universities Key Laboratory of robot & welding. The project of Guangxi education Department","award":["KY2016YB531","2017KY0868"],"award-info":[{"award-number":["KY2016YB531","2017KY0868"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10586-017-1086-y","type":"journal-article","created":{"date-parts":[[2017,8,7]],"date-time":"2017-08-07T03:33:50Z","timestamp":1502076830000},"page":"3369-3377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Neural networks for MANET AODV: an optimization approach"],"prefix":"10.1007","volume":"20","author":[{"given":"Hua","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zhimei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhiyong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,7]]},"reference":[{"issue":"4","key":"1086_CR1","doi-asserted-by":"crossref","first-page":"45","DOI":"10.4018\/JITR.2016100104","volume":"9","author":"P Srivastava","year":"2016","unstructured":"Srivastava, P., Kumar, R.: An optimal fuzzy load balanced adaptive gateway discovery for ubiquitous internet access in MANET. J. Inform. Technol. Res. (JITR) 9(4), 45\u201363 (2016)","journal-title":"J. Inform. Technol. Res. (JITR)"},{"key":"1086_CR2","doi-asserted-by":"crossref","unstructured":"Nazir, M.K., Rehman, R.U., Nazir, A.: A novel review on security and routing protocols in MANET. Communications and Network 8.04, p. 205 (2016)","DOI":"10.4236\/cn.2016.84020"},{"issue":"1","key":"1086_CR3","first-page":"39","volume":"3","author":"S Rajasekar","year":"2016","unstructured":"Rajasekar, S., Subramani, A.: A review on routing protocols for mobile Adhoc networks. i-manager\u2019s J. Mob. Appl. Technol. 3(1), 39 (2016)","journal-title":"i-manager\u2019s J. Mob. Appl. Technol."},{"key":"1086_CR4","doi-asserted-by":"crossref","unstructured":"Walton, J., Blakeway, S., Kirpichnikova, A.: An analysis of MANET routing protocol performance for an interactive user engaging quiz. In: International Conference on Systems Informatics, Modelling and Simulation (SIMS). IEEE (2016)","DOI":"10.1109\/SIMS.2016.24"},{"issue":"8","key":"1086_CR5","doi-asserted-by":"crossref","first-page":"2554","DOI":"10.1073\/pnas.79.8.2554","volume":"79","author":"JJ Hopfield","year":"1982","unstructured":"Hopfield, J.J.: Neural networks and physical systems with emergent collective computational abilities. Proc. Natl. Acad. Sci. 79(8), 2554\u20132558 (1982)","journal-title":"Proc. Natl. Acad. Sci."},{"issue":"3","key":"1086_CR6","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/BF00339943","volume":"52","author":"JJ Hopfield","year":"1985","unstructured":"Hopfield, J.J., Tank, D.W.: \u201cNeural\u201d computation of decisions in optimization problems. Biol. Cybern. 52(3), 141\u2013152 (1985)","journal-title":"Biol. Cybern."},{"key":"1086_CR7","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1016\/j.neucom.2015.01.051","volume":"159","author":"J Bai","year":"2015","unstructured":"Bai, J., et al.: Finite-time stability analysis of discrete-time fuzzy Hopfield neural network. Neurocomputing 159, 263\u2013267 (2015)","journal-title":"Neurocomputing"},{"key":"1086_CR8","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.neucom.2014.12.031","volume":"154","author":"H Wang","year":"2015","unstructured":"Wang, H., et al.: Global stability analysis of fractional-order Hopfield neural networks with time delay. Neurocomputing 154, 15\u201323 (2015)","journal-title":"Neurocomputing"},{"key":"1086_CR9","first-page":"104","volume":"16","author":"S Zhang","year":"2015","unstructured":"Zhang, S., Yongguang, Y., Wang, H.: Mittag-Leffler stability of fractional-order Hopfield neural networks. Nonlinear Anal. 16, 104\u2013121 (2015)","journal-title":"Nonlinear Anal."},{"issue":"4","key":"1086_CR10","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1007\/s00521-015-1899-7","volume":"27","author":"S Duan","year":"2016","unstructured":"Duan, S., et al.: Small-world Hopfield neural networks with weight salience priority and memristor synapses for digit recognition. Neural Comput. Appl. 27(4), 837\u2013844 (2016)","journal-title":"Neural Comput. Appl."},{"key":"1086_CR11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2016.04.006","volume":"68","author":"N Ahad","year":"2016","unstructured":"Ahad, N., Qadir, J., Ahsan, N.: Neural networks in wireless networks: techniques, applications and guidelines. J. Netw. Comput. Appl. 68, 1\u201327 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"1086_CR12","doi-asserted-by":"crossref","first-page":"1011","DOI":"10.1109\/TNNLS.2016.2518672","volume":"28","author":"M Kobayashi","year":"2017","unstructured":"Kobayashi, M.: Symmetric complex-valued Hopfield neural networks. IEEE Trans. Neural Netw. Learn. Syst. 28(4), 1011\u20131015 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"1086_CR13","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P.: Optimized link state routing protocol (OLSR). No. RFC 3626 (2003)","DOI":"10.17487\/rfc3626"},{"key":"1086_CR14","doi-asserted-by":"crossref","unstructured":"Dutta, C.B., Biswas, U.: Intrusion detection system for power-aware OLSR. In: 2015 International Conference on Computational Intelligence and Networks (CINE). IEEE (2015)","DOI":"10.1109\/CINE.2015.35"},{"key":"1086_CR15","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.jnca.2015.03.008","volume":"53","author":"A Boushaba","year":"2015","unstructured":"Boushaba, A., et al.: Multi-point relay selection strategies to reduce topology control traffic for OLSR protocol in MANETs. J. Netw. Comput. Appl. 53, 91\u2013102 (2015)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"1086_CR16","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1145\/190809.190336","volume":"24","author":"CE Perkins","year":"1994","unstructured":"Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput. Commun. Rev. 24(4), 234\u2013244 (1994)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"1086_CR17","doi-asserted-by":"crossref","unstructured":"Imani, A., Keshavarz-Haddad, A.: DSDV-Het: a new scalable routing protocol for large heterogeneous Ad Hoc networks. In: 2014 7th International Symposium on Telecommunications (IST). IEEE (2014)","DOI":"10.1109\/ISTEL.2014.7000774"},{"issue":"3","key":"1086_CR18","first-page":"39","volume":"5","author":"D Kaur","year":"2013","unstructured":"Kaur, D., Kumar, N.: Comparative analysis of aodv, olsr, tora, dsr and dsdv routing protocols in mobile ad-hoc networks. Int. J. Comput. Netw. Inform. Secur. 5(3), 39 (2013)","journal-title":"Int. J. Comput. Netw. Inform. Secur."},{"key":"1086_CR19","doi-asserted-by":"crossref","unstructured":"Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561 (2003)","DOI":"10.17487\/rfc3561"},{"key":"1086_CR20","unstructured":"Fehnker, A., et al.: Modelling and analysis of AODV in UPPAAL. arXiv:1512.07312 (2015)"},{"key":"1086_CR21","doi-asserted-by":"publisher","unstructured":"Rao, M., Singh, N.: Performance evaluation of AODV nth BR routing protocol under varying node density and node mobility for MANETs. Ind. J. Sci. Technol. (2015). 10.17485\/ijst\/2015\/v8i17\/70445","DOI":"10.17485\/ijst\/2015\/v8i17\/70445"},{"key":"1086_CR22","doi-asserted-by":"publisher","unstructured":"Pearlin, R.F.S., Rekha, G.: Performance comparison of AODV, DSDV and DSR protocols in mobile networks using NS-2. Ind. J. Sci. Technol. (2016). 10.17485\/ijst\/2016\/v9i8\/87948","DOI":"10.17485\/ijst\/2016\/v9i8\/87948"},{"issue":"2","key":"1086_CR23","first-page":"1","volume":"3","author":"S Zafar","year":"2016","unstructured":"Zafar, S., Manzoor, H.T.M.: Throughput and delay analysis of AODV, DSDV and DSR routing protocols in mobile ad hoc networks. Int. J. Comput. Netw. Appl. (IJCNA) 3(2), 1\u20137 (2016)","journal-title":"Int. J. Comput. Netw. Appl. (IJCNA)"},{"key":"1086_CR24","doi-asserted-by":"crossref","unstructured":"Johnson, D., Hu, Y., Maltz, D.: The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. No. RFC 4728 (2007)","DOI":"10.17487\/rfc4728"},{"key":"1086_CR25","doi-asserted-by":"crossref","unstructured":"Shirke, S., et al.: Cluster based hierarchical addressing for dynamic source routing. In: International Conference on Smart Trends for Information Technology and Computer Communications. Springer, Singapore (2016)","DOI":"10.1007\/978-981-10-3433-6_32"},{"key":"1086_CR26","doi-asserted-by":"crossref","unstructured":"Yanai, N.: Towards provable security of dynamic source routing protocol and its applications. In: International Conference on Conceptual Modeling. Springer International Publishing, New York (2016)","DOI":"10.1007\/978-3-319-47717-6_20"},{"key":"1086_CR27","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.ins.2014.09.039","volume":"295","author":"S Chatterjee","year":"2015","unstructured":"Chatterjee, S., Das, S.: Ant colony optimization based enhanced dynamic source routing algorithm for mobile Ad-hoc network. Inf. Sci. 295, 67\u201390 (2015)","journal-title":"Inf. Sci."},{"key":"1086_CR28","unstructured":"Haas, Z.J., Pearlman, M.R., Samar, P.: The zone routing protocol (ZRP) for ad hoc networks (2002)"},{"issue":"11","key":"1086_CR29","doi-asserted-by":"crossref","first-page":"P11023","DOI":"10.1088\/1742-5468\/2015\/11\/P11023","volume":"2015","author":"O Hirschberg","year":"2015","unstructured":"Hirschberg, O., Mukamel, D., Sch\u00fctz, G.M.: Density profiles, dynamics, and condensation in the ZRP conditioned on an atypical current. J. Stat. Mech. Theory Exp. 2015(11), P11023 (2015)","journal-title":"J. Stat. Mech. Theory Exp."},{"key":"1086_CR30","doi-asserted-by":"crossref","unstructured":"Sharma, S., Jain, A., Gupta, N.: Modified ZRP to identify cooperative attacks. In: 2016 Second International Conference on Computational Intelligence & Communication Technology (CICT). IEEE (2016)","DOI":"10.1109\/CICT.2016.66"},{"key":"1086_CR31","unstructured":"https:\/\/www.nsnam.org\/releases\/ (2016)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1086-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1086-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1086-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T20:57:20Z","timestamp":1659301040000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1086-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,7]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["1086"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1086-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2017,8,7]]}}}