{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:53:16Z","timestamp":1772063596576,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,2,20]],"date-time":"2016-02-20T00:00:00Z","timestamp":1455926400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11276-016-1211-5","type":"journal-article","created":{"date-parts":[[2016,2,20]],"date-time":"2016-02-20T10:05:48Z","timestamp":1455962748000},"page":"1373-1385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Cross-layer based congestion detection and routing protocol using fuzzy logic for MANET"],"prefix":"10.1007","volume":"23","author":[{"given":"M.","family":"Anuradha","sequence":"first","affiliation":[]},{"given":"G. S.","family":"Anandha Mala","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,2,20]]},"reference":[{"key":"1211_CR1","unstructured":"Jehan, M., & G. Radhamani, Scalable TCP: Better throughput in TCP congestion control algorithms on MANETs. International Journal of Advanced Computer Science and Applications Special Issue on Wireless and Mobile Networks."},{"key":"1211_CR2","unstructured":"Geetika, M., Gour, M., & Chourasia, U. K. (2014). A survey on congestion control in MANET. International Journal of Computer Science and Information Technologies 5 (2)."},{"issue":"6","key":"1211_CR3","doi-asserted-by":"crossref","first-page":"28","DOI":"10.5120\/3568-4921","volume":"29","author":"K Srinivas","year":"2011","unstructured":"Srinivas, K., & Chari, A. A. (2011). Cross layer congestion control in MANETs and current state of art. International Journal of Computer Applications, 29(6), 28\u201335.","journal-title":"International Journal of Computer Applications"},{"issue":"9","key":"1211_CR4","doi-asserted-by":"crossref","first-page":"60","DOI":"10.5120\/11427-6779","volume":"67","author":"S Sheeja","year":"2013","unstructured":"Sheeja, S., & Pujeri, R. V. (2013). Cross layer based congestion control scheme for mobile ad hoc networks. International Journal of Computer Applications, 67(9), 60\u201367.","journal-title":"International Journal of Computer Applications"},{"key":"1211_CR5","unstructured":"Senthilkumaran T & Sankaranarayanan V (2011) Early congestion detection and optimal control routing in manet. European Journal of Scientific Research, 63(1): 15\u201331, ISSN: 1450-216X."},{"key":"1211_CR6","unstructured":"Nidhi, S., Gupta, N., & Parveen, N. (2014). Survey of cross layer based TCP congestion control techniques in MANET. International Journal of Emerging Technology and Advanced Engineering, 4(3), ISSN: 2250-2459"},{"key":"1211_CR7","first-page":"2061","volume":"32","author":"BC Sreenivasa","year":"2011","unstructured":"Sreenivasa, B. C., BhanuPrakash, G. C., & Ramakrishnan, K. V. (2011). A survey on congestion control techniques in AD-HOC network. Elixir Adoc Networks, 32, 2061\u20132067.","journal-title":"Elixir Adoc Networks"},{"key":"1211_CR8","unstructured":"Appaji, V. V., & Sreedhar, Dr. (2012). CPCRT: Crosslayered and power conserved routing topology for congestion control in mobile ad hoc networks. IOSR Journal of Computer Engineering (IOSRJCE), 3(5): 17\u201325, ISSN: 2278-0661."},{"issue":"10","key":"1211_CR9","first-page":"700","volume":"3","author":"E Natarajan","year":"2014","unstructured":"Natarajan, E., & Devi, L. (2014). Cross layer based energy aware routing and congestion control algorithm in MANET. International Journal of Computer Science and Mobile Computing, 3(10), 700\u2013709.","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"1211_CR10","unstructured":"Thilagavathe, V., & Duraiswamy, Dr. K. (2011). Cross layer based congestion control technique for reliable and energy aware routing in MANET. International Journal of Computer Applications, 36(12): 1\u20136, ISSN: 0975\u20138887."},{"issue":"2","key":"1211_CR11","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1109\/TNET.2006.872546","volume":"14","author":"X Lin","year":"2006","unstructured":"Lin, X., & Shroff, N. B. (2006). The impact of imperfect scheduling on cross-layer congestion control in wireless networks. IEEE\/ACM Transactions onNetworking, 14(2), 302\u2013315.","journal-title":"IEEE\/ACM Transactions onNetworking"},{"key":"1211_CR12","doi-asserted-by":"crossref","unstructured":"Sunitha, D., Nagaraju, A., & Narsimha, G. (2014). A cross-layer approach for congestion control in multi hop mobile ad hoc networks. In Proceedings of international conference on computing for sustainable global development (INDIACom), pp. 54\u201360. IEEE.","DOI":"10.1109\/IndiaCom.2014.6828011"},{"issue":"4","key":"1211_CR13","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.comcom.2011.11.008","volume":"35","author":"H-P Chang","year":"2012","unstructured":"Chang, H.-P., Kan, H.-W., & Ho, M.-H. (2012). Adaptive TCP congestion control and routing schemes using cross-layer information for mobile ad hoc networks. Computer Communications, 35(4), 454\u2013474.","journal-title":"Computer Communications"},{"issue":"5","key":"1211_CR14","first-page":"1058","volume":"8","author":"W Zhao","year":"2013","unstructured":"Zhao, W., Huang, X., Shi, K., & Zhang, L. (2013). TSBCC: Time series-based congestion control algorithm for wireless network. Journal of Networks, 8(5), 1058\u20131064.","journal-title":"Journal of Networks"},{"key":"1211_CR15","doi-asserted-by":"crossref","unstructured":"Tabash, I. K., Ahmad, N., & Beg, S. (2011). A congestion window control mechanism based on fuzzy logic to improve tcp performance in manets. In Proceedings of international conference on computational intelligence and communication networks (CICN), IEEE (pp. 21\u201326).","DOI":"10.1109\/CICN.2011.5"},{"key":"1211_CR16","doi-asserted-by":"crossref","unstructured":"Douga, Y., & Bourenane, M. (2013). A cross layer solution to improve TCP performances in Ad Hoc wireless networks. In Proceedings of international conference on smart communications in network technologies (SaCoNeT), vol. 1, pp. 1\u20135. IEEE.","DOI":"10.1109\/SaCoNeT.2013.6654575"},{"key":"1211_CR17","doi-asserted-by":"crossref","unstructured":"Rath, H. K., Rajan, M. A. & Balamuralidhar, P. (2011). Monotonic signed graph approach for cross-layer congestion control in wireless ad-hoc networks. In GLOBECOM workshops (GC Wkshps) (pp. 309\u2013314). IEEE.","DOI":"10.1109\/GLOCOMW.2011.6162459"},{"key":"1211_CR18","unstructured":"Pushpender & Garg, S. (2014). New routing technique based on fuzzy and network dependent for wireless mesh networks. International Journal of Modern Electronics and Communication Engineering (IJMECE), 2(1), ISSN: 2321-2152."},{"issue":"3","key":"1211_CR19","first-page":"531","volume":"68","author":"M Anuradha","year":"2014","unstructured":"Anuradha, M. & Anandha Mala G. S. (2014). Multi-objective cross-layer based multipath routing protocol in manet. Journal of Theoretical and Applied Information Technology, 68(3), 531\u2013540.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"2","key":"1211_CR20","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161\u2013173.","journal-title":"Wireless Networks"},{"issue":"1","key":"1211_CR21","first-page":"4","volume":"17","author":"X Wang","year":"2012","unstructured":"Wang, X., et al. (2012). A survey of green mobile networks: Opportunities and challenges. MONET, 17(1), 4\u201320.","journal-title":"MONET"},{"key":"1211_CR22","unstructured":"Li, P. et al. (2012). CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding. In INFOCOM (pp. 100\u2013108)."},{"issue":"3","key":"1211_CR23","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1109\/TNSM.2014.2346080","volume":"11","author":"Y Song","year":"2014","unstructured":"Song, Y., et al. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management, 11(3), 417\u2013430.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"3","key":"1211_CR24","first-page":"819","volume":"64","author":"L Liu","year":"2015","unstructured":"Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819\u2013832.","journal-title":"IEEE Transactions on Computers"},{"issue":"7","key":"1211_CR25","doi-asserted-by":"crossref","first-page":"810","DOI":"10.1049\/iet-com.2009.0164","volume":"4","author":"Y Liu","year":"2010","unstructured":"Liu, Y. et al. (2010). Multi-layer clustering routing algorithm for wireless vehicular sensor networks. IET communications, 4(7), 810\u2013816.","journal-title":"IET communications"},{"issue":"9","key":"1211_CR26","doi-asserted-by":"crossref","first-page":"1270","DOI":"10.1109\/TC.2011.145","volume":"61","author":"C Busch","year":"2012","unstructured":"Busch, C., et al. (2012). approximating congestion\u00a0+\u00a0dilation in networks via \u201cquality of routing\u201d games. IEEE Transaction Computers, 61(9), 1270\u20131283.","journal-title":"IEEE Transaction Computers"},{"issue":"12","key":"1211_CR27","doi-asserted-by":"crossref","first-page":"3264","DOI":"10.1109\/TPDS.2013.2297105","volume":"25","author":"P Li","year":"2014","unstructured":"Li, P., et al. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264\u20133273.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1211_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417543","author":"T Meng","year":"2015","unstructured":"Meng, T., et al. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE TC,. doi: 10.1109\/TC.2015.2417543 .","journal-title":"IEEE TC"},{"issue":"4","key":"1211_CR29","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1145\/1851275.1851233","volume":"41","author":"A Dvir","year":"2011","unstructured":"Dvir, A., et al. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOMM Computer Communication Review, 41(4), 405\u2013406.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"11\u201312","key":"1211_CR30","doi-asserted-by":"crossref","first-page":"2238","DOI":"10.1016\/j.mcm.2010.10.008","volume":"53","author":"Y-S Yen","year":"2011","unstructured":"Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modelling, 53(11\u201312), 2238\u20132250.","journal-title":"Mathematical and Computer Modelling"},{"issue":"8","key":"1211_CR31","doi-asserted-by":"crossref","first-page":"2349","DOI":"10.1007\/s11276-010-0276-9","volume":"16","author":"T Spyropoulos","year":"2010","unstructured":"Spyropoulos, T., et al. (2010). Routing for disruption tolerant networks: Taxonomy and design. Wireless Networks, 16(8), 2349\u20132370.","journal-title":"Wireless Networks"},{"key":"1211_CR32","volume-title":"Delay tolerant networks: Protocols and applications","author":"A Vasilakos","year":"2012","unstructured":"Vasilakos, A., et al. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press."},{"issue":"1","key":"1211_CR33","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92\u2013109.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"1211_CR34","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-3514-3","volume-title":"Routing in opportunistic networks","author":"I Woungang","year":"2013","unstructured":"Woungang, I., et al. (2013). Routing in opportunistic networks. Berlin: Springer book."},{"issue":"4","key":"1211_CR35","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1109\/TMC.2014.2331966","volume":"14","author":"XM Zhang","year":"2015","unstructured":"Zhang, X. M., et al. (2015). Interference-based topology control algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742\u2013754.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"1","key":"1211_CR36","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/JSAC.2012.120111","volume":"30","author":"PBF Duarte","year":"2012","unstructured":"Duarte, P. B. F., et al. (2012). On the partially overlapped channel assignment on wireless mesh network backbone: A game theoretic approach. Selected Areas in Communications, IEEE Journal on, 30(1), 119\u2013127.","journal-title":"Selected Areas in Communications, IEEE Journal on"},{"key":"1211_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2015.02.001","volume":"52","author":"AV Vasilakos","year":"2015","unstructured":"Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1\u201310.","journal-title":"Journal of Network and Computer Applications"},{"key":"1211_CR38","doi-asserted-by":"crossref","unstructured":"Yao, Y., et al. (2013) EDAL: An Energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS (pp. 182\u2013190).","DOI":"10.1109\/MASS.2013.44"},{"key":"1211_CR39","unstructured":"Marwaha, S., et al. (2004). Evolutionary fuzzy multi-objective routing for wireless mobile ad hoc networks. Evolutionary Computation, CEC 2004. Congress on 2, 1964\u20131971."},{"key":"1211_CR40","doi-asserted-by":"crossref","unstructured":"Vasilakos, A. et al. (2003). Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. In Systems, man, and cybernetics, part C: applications and reviews, IEEE, 2003","DOI":"10.1109\/TSMCC.2003.817354"},{"key":"1211_CR41","doi-asserted-by":"crossref","unstructured":"Quan, W. et al. (2014) TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in content-centric networking. In IFIP Networking, 2014.","DOI":"10.1109\/IFIPNetworking.2014.6857122"},{"issue":"2","key":"1211_CR42","first-page":"8","volume":"5","author":"G Acampora","year":"2010","unstructured":"Acampora, G., et al. (2010). Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(2), 8.","journal-title":"ACM Transactions on Autonomous and Adaptive Systems (TAAS)"},{"issue":"2","key":"1211_CR43","first-page":"133","volume":"19","author":"M Reza Rahimi","year":"2014","unstructured":"Reza Rahimi, M., et al. (2014). Mobile cloud computing: A survey, state of art and future directions. MONET, 19(2), 133\u2013143.","journal-title":"MONET"},{"key":"1211_CR44","doi-asserted-by":"crossref","unstructured":"Xiang, L., et al. (2011) Compressed data aggregation for energy efficient wireless sensor networks. SECON 46\u201354.","DOI":"10.1109\/SAHCN.2011.5984932"},{"issue":"1","key":"1211_CR45","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s11036-014-0533-8","volume":"20","author":"M Yang","year":"2015","unstructured":"Yang, M., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. ACM\/Springer Mobile Networks and Applications, 20(1), 4\u201318.","journal-title":"ACM\/Springer Mobile Networks and Applications"}],"updated-by":[{"DOI":"10.1007\/s11276-016-1260-9","type":"erratum","label":"Erratum","source":"publisher","updated":{"date-parts":[[2016,4,26]],"date-time":"2016-04-26T00:00:00Z","timestamp":1461628800000}}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-016-1211-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1211-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1211-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-016-1211-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,4]],"date-time":"2019-09-04T16:41:12Z","timestamp":1567615272000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-016-1211-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,20]]},"references-count":45,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["1211"],"URL":"https:\/\/doi.org\/10.1007\/s11276-016-1211-5","relation":{"erratum":[{"id-type":"doi","id":"10.1007\/s11276-016-1260-9","asserted-by":"object"}]},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,20]]}}}