{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T04:28:12Z","timestamp":1754108892164,"version":"3.37.3"},"reference-count":70,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11276-021-02545-x","type":"journal-article","created":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T16:02:53Z","timestamp":1611072173000},"page":"1755-1782","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Wireless communication networks and swarm intelligence"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9190-3605","authenticated-orcid":false,"given":"Ali Jameel","family":"Al-Mousawi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"2545_CR1","volume-title":"Computer networking: A top-down approach featuring the internet","author":"JF Kurose","year":"2001","unstructured":"Kurose, J. F., & Ross, K. W. (2001). Computer networking: A top-down approach featuring the internet. Boston: Addison-Wesley."},{"key":"2545_CR2","doi-asserted-by":"publisher","first-page":"3079","DOI":"10.1109\/ACCESS.2015.2507798","volume":"3","author":"J Qadir","year":"2015","unstructured":"Qadir, J., Yau, K. A., Imran, M. A., Ni, Q., & Vasilakos, A. V. (2015). IEEE access special section editorial: Artificial intelligence enabled networking. IEEE Access, 3, 3079\u20133082.","journal-title":"IEEE Access"},{"key":"2545_CR3","volume-title":"Wireless communications and networks","author":"W Stallings","year":"2004","unstructured":"Stallings, W. (2004). Wireless communications and networks (2nd ed.). Upper Saddle River: Prentice-Hall Inc.","edition":"2"},{"key":"2545_CR4","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1007\/s11390-006-0708-2","volume":"21","author":"G Gu","year":"2006","unstructured":"Gu, G., & Luo, J. (2006). Some issues on computer networks: architecture and key technologies. Journal of Computer Science and Technology, 21, 708.","journal-title":"Journal of Computer Science and Technology"},{"key":"2545_CR5","doi-asserted-by":"crossref","unstructured":"Brunette, E. S., Flemmer, R. C., & Flemmer, C. L. (2009). A review of artificial intelligence. In 4th International conference on Autonomous Robots and Agents, Wellington (pp. 385\u2013392).","DOI":"10.1109\/ICARA.2000.4804025"},{"key":"2545_CR6","unstructured":"Kumoye, A. O., Prasad, R., & Fonkam, M. (2020). Swarm intelligence algorithm and its application: A critical review. In International conference in mathematics, computer engineering and computer science (ICMCECS), Ayobo, Ipaja, Lagos, Nigeria."},{"key":"2545_CR7","doi-asserted-by":"crossref","unstructured":"Bai, H., & Zhao, B. (2006). A survey on application of swarm intelligence computation to electric power system. In 2006 6th World congress on intelligent control and automation, Dalian (pp. 7587\u20137591).","DOI":"10.1109\/WCICA.2006.1713441"},{"key":"2545_CR8","unstructured":"Sigeti, P., & Oravec, M., & Pavlovi\u010dov\u00e1, J. (2013). Some aspects of QoS in wireless networks. In Proceedings ELMAR-2013, Zadar (pp. 173\u2013176)."},{"key":"2545_CR9","doi-asserted-by":"crossref","unstructured":"Baojian, Z., & Kunhua, Z. (2009). Research on congestion control in networks based on chaos theory. In International conference on computer and communications security, Hong Kong (pp. 32\u201335).","DOI":"10.1109\/ICCCS.2009.12"},{"key":"2545_CR10","doi-asserted-by":"crossref","unstructured":"Yan, F., Jian-Wen, Y., & Lin, C. (2015). Computer network security and technology research. In Seventh international conference on measuring technology and mechatronics automation, Nanchang (pp. 293\u2013296).","DOI":"10.1109\/ICMTMA.2015.77"},{"key":"2545_CR11","doi-asserted-by":"publisher","first-page":"682","DOI":"10.1016\/j.compeleceng.2017.11.013","volume":"72","author":"AJ AL-Mousawi","year":"2018","unstructured":"AL-Mousawi, A. J., & AL-Hassani, M. H. (2018). A survey in wireless sensor network for explosives detection. Computers & Electrical Engineering, 72, 682\u2013701.","journal-title":"Computers & Electrical Engineering"},{"key":"2545_CR12","doi-asserted-by":"publisher","first-page":"2703","DOI":"10.1007\/s11277-019-07011-8","volume":"111","author":"N Muruganantham","year":"2020","unstructured":"Muruganantham, N., & El-Ocla, H. (2020). Routing using genetic algorithm in a wireless sensor network. Wireless Personal Communications, 111, 2703\u20132732.","journal-title":"Wireless Personal Communications"},{"issue":"45","key":"2545_CR13","first-page":"2624","volume":"2","author":"MT Bhoskar","year":"2015","unstructured":"Bhoskar, M. T., Kulkarni, M. O. K., Kulkarni, M. N. K., Patekar, M. S. L., Kakandikar, G. M., & Nandedkar, V. M. (2015). Genetic algorithm and its applications to mechanical engineering: A review, materials today. Proceedings, 2(45), 2624\u20132630.","journal-title":"Proceedings"},{"issue":"1","key":"2545_CR14","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.cam.2004.07.034","volume":"184","author":"J McCall","year":"2005","unstructured":"McCall, J. (2005). Genetic algorithms for modelling and optimisation. Journal of Computational and Applied Mathematics, 184(1), 205\u2013222.","journal-title":"Journal of Computational and Applied Mathematics"},{"key":"2545_CR15","doi-asserted-by":"crossref","unstructured":"Al-Mousawi, A. J. (2019). Evolutionary intelligence in wireless sensor network: Routing, clustering, localization, and coverage. Wireless Networks.","DOI":"10.1007\/s11276-019-02008-4"},{"key":"2545_CR16","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.3390\/s18041265","volume":"18","author":"X Yang","year":"2018","unstructured":"Yang, X., Chen, X., Xia, R., & Qian, Z. (2018). Wireless sensor network congestion control based on standard particle swarm optimization and single neuron PID. Sensors, 18, 1265.","journal-title":"Sensors"},{"issue":"1","key":"2545_CR17","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/4235.985692","volume":"6","author":"M Clerc","year":"2002","unstructured":"Clerc, M., & Kennedy, J. (2002). The particle swarm-explosion, stability and convergence in a multidimensional complex space. IEEE Transactions on Evolutionary Computation, 6(1), 58\u201373.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"2545_CR18","unstructured":"Kennedy, J. (2002). Bare bones particle swarms. In Proceedings of the IEEE swarm intelligence symposium (pp. 80\u201387). Piscataway, NJ: IEEE Press."},{"key":"2545_CR19","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/0-387-27705-6_6","volume-title":"Handbook of nature-inspired and innovative computing: integrating classical models with emerging technologies","author":"J Kennedy","year":"2006","unstructured":"Kennedy, J. (2006). Swarm intelligence. In A. Y. Zomaya (Ed.), Handbook of nature-inspired and innovative computing: integrating classical models with emerging technologies (pp. 187\u2013219). New York: Springer."},{"key":"2545_CR20","doi-asserted-by":"crossref","unstructured":"Sharma, S., & Nidhi. (2019). Vehicular ad-hoc network: An overview. In 2019 International conference on computing, communication, and intelligent systems (ICCCIS), Greater Noida, India (pp. 131\u2013134).","DOI":"10.1109\/ICCCIS48478.2019.8974524"},{"key":"2545_CR21","doi-asserted-by":"crossref","unstructured":"Karabulut, M. A., Shahen Shah, A. F. M. & Ilhan, H. (2019). Performance optimization by using artificial neural network algorithms in VANETs. In 2019 42nd International conference on telecommunications and signal processing (TSP), Budapest, Hungary (pp. 633\u2013636).","DOI":"10.1109\/TSP.2019.8768830"},{"key":"2545_CR22","doi-asserted-by":"crossref","unstructured":"Jain, M., & Saxena, R. (2017). Overview of VANET: Requirements and its routing protocols. In 2017 International conference on communication and signal processing (ICCSP), Chennai (pp. 1957\u20131961).","DOI":"10.1109\/ICCSP.2017.8286742"},{"issue":"11","key":"2545_CR23","doi-asserted-by":"publisher","first-page":"2741","DOI":"10.1016\/j.cam.2012.01.013","volume":"236","author":"W Gao","year":"2012","unstructured":"Gao, W., Liu, S., & Huang, L. (2012). A global best artificial bee colony algorithm for global optimization. Journal of Computational and Applied Mathematics, 236(11), 2741\u20132753.","journal-title":"Journal of Computational and Applied Mathematics"},{"key":"2545_CR24","doi-asserted-by":"crossref","unstructured":"Linh, N. T., & Anh, N. Q. (2010). Application artificial bee colony algorithm (ABC) for reconfiguring distribution network. In Second international conference on computer modeling and simulation.","DOI":"10.1109\/ICCMS.2010.306"},{"issue":"1","key":"2545_CR25","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.petlm.2015.11.004","volume":"2","author":"B Nozohour-leilabady","year":"2016","unstructured":"Nozohour-leilabady, B., & Fazelabdolabadi, B. (2016). On the application of artificial bee colony (ABC) algorithm for optimization of well placements in fractured reservoirs; efficiency comparison with the particle swarm optimization (PSO) methodology. Petroleum, 2(1), 79\u201389.","journal-title":"Petroleum"},{"key":"2545_CR26","unstructured":"Karaboga, D. (2005). An idea based on honey bee swarm for numerical optimization. Technical Report TR06, Erciyes University, Engineering Faculty, Computer Engineering Department."},{"key":"2545_CR27","unstructured":"Dom\u00ednguez, O. C. (2009). An adaptation of the scout bee behavior in the Artificial Bee Colony algorithm to solve constrained optimization problems. Laboratorio Nacional de Inform\u00e1tica Avanzada (LANIA), MsC, Thesis, Supervisor, Efr\u00e9n Mezura-Montes."},{"key":"2545_CR28","unstructured":"Karaboga, D., Basturk, B., & Ozturk, C. (2007). Artificial bee colony (ABC) optimization algorithm for training feed-forward neural networks. In Modeling decisions for artificial intelligence, volume 4617\/2007 of LNCS (pp. 318\u2013319). Berlin: Springer."},{"key":"2545_CR29","doi-asserted-by":"crossref","unstructured":"Smith, S. C., Hammell, R. J., Parker, T. W. & Marvel, L. M. (2014). A theoretical exploration of the impact of packet loss on network intrusion detection. In 15th IEEE\/ACIS international conference on software engineering, artificial intelligence, networking and parallel\/distributed computing (SNPD), Las Vegas, NV (pp. 1\u20136).","DOI":"10.1109\/SNPD.2014.6888699"},{"key":"2545_CR30","doi-asserted-by":"crossref","unstructured":"Al-Maslamani, N., & Abdallah, M. (2020). Malicious node detection in wireless sensor network using swarm intelligence optimization. In 2020 IEEE international conference on informatics, IoT, and enabling technologies (ICIoT), Doha, Qatar (pp. 219\u2013224).","DOI":"10.1109\/ICIoT48696.2020.9089527"},{"key":"2545_CR31","doi-asserted-by":"crossref","unstructured":"Djenna, A., & Sa\u00efdouni, D. E. (2018). Cyber attacks classification in IoT-based-healthcare infrastructure. In 2nd Cyber security in networking conference (CSNet), Paris (pp. 1\u20134).","DOI":"10.1109\/CSNET.2018.8602974"},{"key":"2545_CR32","doi-asserted-by":"crossref","unstructured":"Kheyrihassankandi, J., Singh, Y. P., & Ho, C. K. (2012). A hybrid adaptive routing algorithm for mobile WiMAX using swarm intelligence. In 2012 International conference on computer and communication engineering (ICCCE), Kuala Lumpur (pp. 402\u2013407).","DOI":"10.1109\/ICCCE.2012.6271219"},{"key":"2545_CR33","unstructured":"Kamali, B. (2018). The IEEE 802.16 standards and the WiMAX technology. In AeroMACS: An IEEE 802.16 standard-based technology for the next generation of air transportation systems (pp. 189\u2013258). IEEE."},{"issue":"5","key":"2545_CR34","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MWC.2008.4653133","volume":"15","author":"V Genc","year":"2008","unstructured":"Genc, V., Murphy, S., Yu, Y., & Murphy, J. (2008). IEEE 802.16J relay-based wireless access networks: An overview. IEEE Wireless Communications, 15(5), 56\u201363.","journal-title":"IEEE Wireless Communications"},{"issue":"4","key":"2545_CR35","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1002\/bltj.20343","volume":"13","author":"G Shen","year":"2009","unstructured":"Shen, G., Liu, J., Wang, D., Wang, J., & Jin, S. (2009). Multi-hop relay for next-generation wireless access networks. Bell Labs Technical Journal, 13(4), 175\u2013193.","journal-title":"Bell Labs Technical Journal"},{"key":"2545_CR36","doi-asserted-by":"crossref","unstructured":"Yonghua, Z., Jin, Z., Wentong, Y., & Yong, C. (2011). The advanced ant colony algorithm and its application. In Third international conference on measuring technology and mechatronics automation, Shangshai (pp. 664\u2013667).","DOI":"10.1109\/ICMTMA.2011.737"},{"key":"2545_CR37","doi-asserted-by":"crossref","unstructured":"Cui, S., & Han, S. (2013). Ant colony algorithm and its application in solving the traveling salesman problem. In Third international conference on instrumentation, measurement, computer, communication and control, Shenyang (pp. 1200\u20131203).","DOI":"10.1109\/IMCCC.2013.266"},{"key":"2545_CR38","unstructured":"Wei, W., Yi, M., Feng, Y., & Lei, Z. (2011). Application of individual differences ant colony algorithm in transmission network expansion planning. In 2011 International conference on electric information and control engineering, Wuhan (pp. 4798\u20134802)."},{"key":"2545_CR39","doi-asserted-by":"crossref","unstructured":"Long, F., & Sun, F. (2006). An improved ant colony algorithm and its application in routing computation of satellite networks. In The proceedings of the multiconference on \"computational engineering in systems applications\", Beijing (pp. 1567\u20131573).","DOI":"10.1109\/CESA.2006.4281885"},{"key":"2545_CR40","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1613\/jair.530","volume":"9","author":"D Caro","year":"1998","unstructured":"Caro, D., & Dorigo, M. (1998). AntNet: Distributed stigmergetic control for communications networks. Journal of Artificial Intelligence Research, 9, 317\u2013365.","journal-title":"Journal of Artificial Intelligence Research"},{"issue":"2\u20133","key":"2545_CR41","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1016\/j.tcs.2005.05.020","volume":"344","author":"M Dorigo","year":"2005","unstructured":"Dorigo, M., & Blum, C. (2005). Ant colony optimization theory: A survey. Theoretical Computer Science, 344(2\u20133), 243\u2013278.","journal-title":"Theoretical Computer Science"},{"key":"2545_CR42","volume-title":"Ant colony optimization","author":"M Dorigo","year":"2005","unstructured":"Dorigo, M., & St\u00fctzle, T. (2005). Ant colony optimization. Cambridge, MA: MIT Press."},{"issue":"4","key":"2545_CR43","doi-asserted-by":"publisher","first-page":"4618","DOI":"10.1016\/j.eswa.2011.09.076","volume":"39","author":"B Chandra Mohan","year":"2012","unstructured":"Chandra Mohan, B., & Baskaran, R. (2012). A survey: Ant colony optimization based recent research and implementation on several engineering domain. Expert Systems with Applications, 39(4), 4618\u20134627.","journal-title":"Expert Systems with Applications"},{"issue":"1","key":"2545_CR44","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.amc.2009.03.090","volume":"214","author":"D Karaboga","year":"2009","unstructured":"Karaboga, D., & Akay, B. (2009). a comparative study of artificial bee colony algorithm. Applied Mathematics and Computation, 214(1), 108\u2013132.","journal-title":"Applied Mathematics and Computation"},{"key":"2545_CR45","doi-asserted-by":"crossref","unstructured":"Suliman, I. A., & Abdalla, G. M. T. (2016). Comparative study of wireless LAN using OPNET and NS-2. In Conference of basic sciences and engineering studies (SGCAC), Khartoum (pp. 196\u2013200).","DOI":"10.1109\/SGCAC.2016.7458029"},{"key":"2545_CR46","doi-asserted-by":"crossref","unstructured":"Sureshkumar, A., Ellappan, V., & Manivel, K. (2017). A comparison analysis of DSDV and AODV routing protocols in mobile AD HOC networks. In Conference on emerging devices and smart systems (ICEDSS), Tiruchengode (pp. 234\u2013237)","DOI":"10.1109\/ICEDSS.2017.8073696"},{"key":"2545_CR47","doi-asserted-by":"crossref","unstructured":"Dosciatti, E. R., & Foronda, A. (2015). Time frame optimization using PSO to guarantee QoS in IEEE 802.16 networks. In 2015 Science and information conference (SAI), London (pp. 506\u2013513).","DOI":"10.1109\/SAI.2015.7237190"},{"key":"2545_CR48","doi-asserted-by":"crossref","unstructured":"Tang, T. W., Green, D., Rumsewicz, M., & Bean, N. (2007). An architecture for IEEE 802.16 MAC scheduler design. In 2007 15th IEEE international conference on networks, Adelaide, SA (pp. 89\u201394).","DOI":"10.1109\/ICON.2007.4444067"},{"key":"2545_CR49","unstructured":"IEEE Standard for Air Interface for Broadband Wireless Access Systems. IEEE Std 802.16\u20132012 (Revision of IEEE Std 802.16\u20132009), 2012, pp. 1\u20132542."},{"key":"2545_CR50","doi-asserted-by":"crossref","unstructured":"Zhang, J., Li, W., Cui, D., Zhao X, & Yin, Z. (2009). The NS2-based simulation and research on wireless sensor network route protocol. In 2009 5th International conference on wireless communications, networking and mobile computing, Beijing (pp. 1\u20134).","DOI":"10.1109\/WICOM.2009.5302699"},{"key":"2545_CR51","doi-asserted-by":"publisher","first-page":"012062","DOI":"10.1088\/1742-6596\/1192\/1\/012062","volume":"1192","author":"P Son","year":"2019","unstructured":"Son, P., Satria, M., & Kang, A. (2019). A new method for congestion avoidance in wireless mesh networks. Journal of Physics: Conference Series., 1192, 012062. https:\/\/doi.org\/10.1088\/1742-6596\/1192\/1\/012062.","journal-title":"Journal of Physics: Conference Series."},{"key":"2545_CR52","doi-asserted-by":"publisher","first-page":"47","DOI":"10.5815\/ijcnis","volume":"4","author":"G Anuj","year":"2012","unstructured":"Anuj, G., Harsh, S., & Anil, V. (2012). Computation of pheromone values in AntNet algorithm. International Journal of Computer Network & Information Security., 4, 47\u201354. https:\/\/doi.org\/10.5815\/ijcnis.","journal-title":"International Journal of Computer Network & Information Security."},{"issue":"2","key":"2545_CR53","first-page":"2014","volume":"2","author":"V Ranjana","year":"2014","unstructured":"Ranjana, V. (2014). Optimization with congestion aware routing in mesh topology topology. IJREAT International Journal of Research in Engineering & Advanced Technology, 2(2), 2014.","journal-title":"IJREAT International Journal of Research in Engineering & Advanced Technology"},{"key":"2545_CR54","doi-asserted-by":"crossref","unstructured":"Negoita, M. G. (2007). Artificial immune systems\u2014An emergent technology performing the defence of complex systems. In 2007 ECSIS symposium on bio-inspired, learning, and intelligent systems for security (BLISS 2007), Edinburgh (pp. 145\u2013150).","DOI":"10.1109\/BLISS.2007.37"},{"issue":"4","key":"2545_CR55","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/CI-M.2006.248056","volume":"1","author":"D Dasgupta","year":"2006","unstructured":"Dasgupta, D. (2006). Advances in artificial immune systems. IEEE Computational Intelligence Magazine, 1(4), 40\u201349.","journal-title":"IEEE Computational Intelligence Magazine"},{"key":"2545_CR56","first-page":"55","volume":"2250\u20133536","author":"A Mohammed","year":"2014","unstructured":"Mohammed, A. (2014). A study on IEEE 802.16 (WiMAX) and its security issues. International Journal of Advanced Technology & Engineering Research, 2250\u20133536, 55\u201362.","journal-title":"International Journal of Advanced Technology & Engineering Research"},{"key":"2545_CR57","doi-asserted-by":"publisher","first-page":"175","DOI":"10.7753\/IJCATR0704.1004","volume":"07","author":"R Mehrafrooz","year":"2018","unstructured":"Mehrafrooz, R., Vahid, A., & Mohsen, S. Z. (2018). Intrusion detection against DDoS attack in WiMAX network by artificial immune system. International Journal of Computer Applications Technology and Research, 07, 175\u2013184. https:\/\/doi.org\/10.7753\/IJCATR0704.1004.","journal-title":"International Journal of Computer Applications Technology and Research"},{"key":"2545_CR58","doi-asserted-by":"crossref","unstructured":"Zhou, B. (2011). An intrusion detection system based on WiMAX. In Proceedings of 2011 international conference on computer science and network technology, Harbin (pp. 2448\u20132451).","DOI":"10.1109\/ICCSNT.2011.6182465"},{"key":"2545_CR59","doi-asserted-by":"crossref","unstructured":"Kim, Y., Lim, H., & Bahk, S. (2008). Shared authentication information for preventing DDoS attacks in mobile WiMAX networks. In 5th IEEE consumer communications and networking conference, Las Vegas, NV (pp. 765\u2013769).","DOI":"10.1109\/ccnc08.2007.177"},{"key":"2545_CR60","doi-asserted-by":"crossref","unstructured":"EshghiShargh, A. (2009). Using artificial immune system on implementation of intrusion detection systems. In Third UKSim European symposium on computer modeling and simulation, Athens (pp. 164\u2013168).","DOI":"10.1109\/EMS.2009.45"},{"key":"2545_CR61","doi-asserted-by":"crossref","unstructured":"Idris, I., & Selamat, A. (2011). Negative selection algorithm in artificial immune system for spam detection. In Malaysian conference in software engineering, Johor Bahru (pp. 379\u2013382).","DOI":"10.1109\/MySEC.2011.6140701"},{"issue":"1","key":"2545_CR62","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/MWC.2007.314554","volume":"14","author":"W Bolton","year":"2005","unstructured":"Bolton, W., Xiao, Y., & Guizani, M. (2005). IEEE 80220: Mobile broadband wireless access. IEEE Wireless Communications, 14(1), 84\u201395.","journal-title":"IEEE Wireless Communications"},{"issue":"1","key":"2545_CR63","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1080\/10798587.2011.10643133","volume":"17","author":"M Saad","year":"2011","unstructured":"Saad, M., & Muhaureq, S. (2011). Joint routing and radio resource management in multihop cellular networks using particle swarm optimization. Intelligent Automation & Soft Computing, 17(1), 61\u201370.","journal-title":"Intelligent Automation & Soft Computing"},{"issue":"2","key":"2545_CR64","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/JSAC.2007.070209","volume":"25","author":"TC Ng","year":"2007","unstructured":"Ng, T. C., & Yu, W. (2007). Joint optimization of relay strategies and resource allocations in cooperative cellular networks. IEEE Journal on Selected Areas in Communications, 25(2), 328\u2013339.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2545_CR65","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3954","author":"K Shoukath","year":"2019","unstructured":"Shoukath, K., & Sampath, P. (2019). Particle swarm optimization-based power allocation for Alamouti amplify and forward relaying protocol. International Journal of Communication Systems. https:\/\/doi.org\/10.1002\/dac.3954.","journal-title":"International Journal of Communication Systems"},{"key":"2545_CR66","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s11036-010-0248-4","volume":"16","author":"D Benyamina","year":"2011","unstructured":"Benyamina, D., Hafid, A., & Gendreau, M. (2011). Throughput gateways-congestion trade-off in designing multi-radio wireless networks. Mobile Network Application, 16, 109\u2013121.","journal-title":"Mobile Network Application"},{"key":"2545_CR67","doi-asserted-by":"crossref","unstructured":"Datta, R., & Marchang, N. (2012). Chapter 7\u2014Security for mobile ad hoc networks. In S. K. Das, K. Kant, N. Zhang (Eds.), Handbook on securing cyber-physical critical infrastructure (pp. 147\u2013190). Morgan Kaufmann. ISBN 9780124158153.","DOI":"10.1016\/B978-0-12-415815-3.00007-8"},{"key":"2545_CR68","unstructured":"Mazhar, N., & Farooq, M. (2007). BeeAIS: Artificial immune system security for nature inspired, MANET routing protocol, BeeAdHoc. In L. N. de Castro, F. J. Von Zuben, H. Knidel (Eds.), Artificial immune systems. ICARIS 2007. Lecture notes in computer science (Vol. 4628). Berlin: Springer."},{"key":"2545_CR69","doi-asserted-by":"publisher","first-page":"2005","DOI":"10.1007\/s11276-016-1270-7","volume":"23","author":"PCS Rao","year":"2016","unstructured":"Rao, P. C. S., Jana, P. K., & Banka, H. (2016). A particle swarm optimization based energy efficient cluster head selection algorithm for wireless sensor networks. Wireless Networks, 23, 2005\u20132020.","journal-title":"Wireless Networks"},{"key":"2545_CR70","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/s11276-015-1156-0","volume":"23","author":"PC Srinivasa Rao","year":"2017","unstructured":"Srinivasa Rao, P. C., & Banka, H. (2017). Energy-efficient clustering algorithms for wireless sensor networks: Novel chemical reaction optimization approach. Wireless Networks, 23, 433\u2013452.","journal-title":"Wireless Networks"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02545-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11276-021-02545-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-021-02545-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T07:33:15Z","timestamp":1619076795000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11276-021-02545-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,19]]},"references-count":70,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["2545"],"URL":"https:\/\/doi.org\/10.1007\/s11276-021-02545-x","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2021,1,19]]},"assertion":[{"value":"6 January 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}}]}}