{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T19:09:15Z","timestamp":1655838555481},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T00:00:00Z","timestamp":1478563200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11277-016-3864-x","type":"journal-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T12:53:58Z","timestamp":1478609638000},"page":"1531-1552","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Energy and Delay Efficient Dynamic Cluster Formation Using Improved Ant Colony Optimization Algorithm in EAACK MANETs"],"prefix":"10.1007","volume":"95","author":[{"given":"J.","family":"Sathiamoorthy","sequence":"first","affiliation":[]},{"given":"B.","family":"Ramakrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,11,8]]},"reference":[{"key":"3864_CR1","doi-asserted-by":"crossref","unstructured":"Nishitha, T., & Chenna Reddy, P. (2012). Performance evaluation Of AntHocNet routing algorithm in ad hoc networks. In IEEE ICCS.","DOI":"10.1109\/ICCS.2012.58"},{"key":"3864_CR2","doi-asserted-by":"crossref","unstructured":"Shivaprakash, T., Aravinda, C., Deepak, A. P., Kamal, S., Mahantesh, H. L., Venugopal, K. R., et al. (2005). Efficient passive clustering and gateway selection in MANETs. In IWDC. Springer, Berlin.","DOI":"10.1007\/11603771_61"},{"issue":"1","key":"3864_CR3","first-page":"144","volume":"5","author":"J Sathiamoorthy","year":"2015","unstructured":"Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144\u2013151.","journal-title":"Journal of Network Communications and Emerging Technologies"},{"key":"3864_CR4","unstructured":"Ramakrishnan, B. Analytical study of cluster and sans cluster vehicular adhoc network communication. International Journal of Computer Engineering and Information Technology, IJCEIT ISSN 0974-2034 2010\/9."},{"issue":"11","key":"3864_CR5","first-page":"364","volume":"2","author":"MU Bokhari","year":"2012","unstructured":"Bokhari, M. U., Hamatta, H. S. A., & Siddigui, S. T. (2012). A review of clustering algorithms as applied in MANETs. International Journal Advanced Research in Computer Science and Software Engineering, 2(11), 364\u2013369.","journal-title":"International Journal Advanced Research in Computer Science and Software Engineering"},{"key":"3864_CR6","unstructured":"Sampath, A., Tripti, C., Sabu, M., Thampi, An ACO algorithm for effective cluster head selection."},{"key":"3864_CR7","unstructured":"Jiang, M., Li, J. & Tay, Y. C. Cluster based routing protocol (CBRP) functional specification. INTERNET-DRAFT draft-ietf-manet-cbrp-spec-Feb-2000."},{"issue":"2","key":"3864_CR8","first-page":"98","volume":"1","author":"R Agarwal","year":"2009","unstructured":"Agarwal, R., & Motwani, M. (2009). Survey of clustering algorithms for MANET. International Journal on Computer Science and Engineering, 1(2), 98\u2013104.","journal-title":"International Journal on Computer Science and Engineering"},{"key":"3864_CR9","doi-asserted-by":"crossref","unstructured":"Camara, D., & Loureiro, A. A. F. (2000). A novel routing algorithm for ad hoc networks. In 33rd Hawaii International Conference on System Sciences\u2014IEEE.","DOI":"10.1109\/HICSS.2000.926984"},{"issue":"5","key":"3864_CR10","first-page":"1793","volume":"2","author":"OA Mohamed Jafar","year":"2010","unstructured":"Mohamed Jafar, O. A., & Sivakumar, R. (2010). Ant-based clustering algorithms: A brief survey. International Journal of Computer Theory and Engineering, 2(5), 1793\u20138201.","journal-title":"International Journal of Computer Theory and Engineering"},{"issue":"2","key":"3864_CR11","first-page":"8","volume":"5","author":"G Acampora","year":"2010","unstructured":"Acampora, G., et al. (2010). Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(2), 8.","journal-title":"ACM Transactions on Autonomous and Adaptive Systems (TAAS)"},{"issue":"2","key":"3864_CR12","first-page":"1100","volume":"3","author":"P Krishan","year":"2013","unstructured":"Krishan, P. (2013). A study on dynamic and static clustering based routing schemes for wireless sensor networks. International Journal of Modern Engineering Research (IJMER), 3(2), 1100\u20131104.","journal-title":"International Journal of Modern Engineering Research (IJMER)"},{"issue":"1","key":"3864_CR13","first-page":"1","volume":"2","author":"B Ramakrishnan","year":"2011","unstructured":"Ramakrishnan, B., Rajesh, R. S., & Shaji, R. S. (2011). Analysis of routing protocols for highway model without using roadside unit and cluster. International Journal of Scientific & Engineering Research, 2(1), 1\u20139.","journal-title":"International Journal of Scientific & Engineering Research"},{"key":"3864_CR14","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1002\/wcm.72","volume":"2","author":"T Camp","year":"2000","unstructured":"Camp, T., Belong, J., & Davies, V. (2000). A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing, 2, 483\u2013502.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"3","key":"3864_CR15","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/TMC.2011.67","volume":"11","author":"M Khabbazian","year":"2011","unstructured":"Khabbazian, M., Blake, I. F., & Bhargava, V. K. (2011). Local broadcast algorithms in wireless ad hoc networks: Reducing the number of transmissions. IEEE Transactions on Mobile Computing, 11(3), 402\u2013413.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"8","key":"3864_CR16","doi-asserted-by":"crossref","first-page":"1072","DOI":"10.1109\/TC.2008.51","volume":"57","author":"M Khabbazian","year":"2008","unstructured":"Khabbazian, M., & Bhargava, V. K. (2008). Localized broadcasting with guaranteed delivery and boundedtransmission redundancy. IEEE Transactions on Computers, 57(8), 1072\u20131086.","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"3864_CR17","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1109\/TMC.2008.94","volume":"8","author":"M Khabbazian","year":"2009","unstructured":"Khabbazian, M., & Bhargava, V. K. (2009). Effcient broadcasting in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 8(2), 231\u2013245.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"3864_CR18","doi-asserted-by":"crossref","unstructured":"Wu, J., & Dai, F. (2003). Broadcasting in ad hoc networks based on self pruning. In Proceedings IEEEINFOCOM (pp. 2240\u20132250).","DOI":"10.1109\/INFCOM.2003.1209244"},{"issue":"4","key":"3864_CR19","first-page":"755","volume":"2","author":"B Ramakrishnan","year":"2011","unstructured":"Ramakrishnan, B., Rajesh, R. S., & Shaji, R. S. (2011). CBVANET: A cluster based vehicular adhoc network model for simple highway communication. International Journal of Advanced Networking and Applications, 2(4), 755\u2013761.","journal-title":"International Journal of Advanced Networking and Applications"},{"key":"3864_CR20","first-page":"136","volume":"3","author":"S Preethi","year":"2011","unstructured":"Preethi, S., & Ramachandran, B. (2011). Energy efficient routing protocols for mobile adhoc networks. IEEE International Conference on Emerging Trends in Networks and Computer Communications, 3, 136\u2013141.","journal-title":"IEEE International Conference on Emerging Trends in Networks and Computer Communications"},{"key":"3864_CR21","first-page":"1","volume":"2","author":"P Nand","year":"2011","unstructured":"Nand, P., & Sharma, S. C. (2011). Comparative analysis of broadcasting techniques for routing protocols. IEEE International Conference on Devices and Communications, 2, 1\u20135.","journal-title":"IEEE International Conference on Devices and Communications"},{"issue":"10","key":"3864_CR22","doi-asserted-by":"crossref","first-page":"1343","DOI":"10.1109\/TC.2004.69","volume":"53","author":"J Wu","year":"2004","unstructured":"Wu, J., & Dai, F. (2004). A generic distributed broadcast scheme in ad hoc wireless networks. IEEE Transactions on Computers, 53(10), 1343\u20131354.","journal-title":"IEEE Transactions on Computers"},{"key":"3864_CR23","first-page":"621","volume":"2","author":"P Nand","year":"2011","unstructured":"Nand, P., & Sharma, S. C. (2011). Probability based improved broadcasting for AODV routing protocol. IEEE International Conference on Computational Intelligence and Communication Networks, 2, 621\u2013625.","journal-title":"IEEE International Conference on Computational Intelligence and Communication Networks"},{"key":"3864_CR24","first-page":"421","volume":"2","author":"D Dembla","year":"2010","unstructured":"Dembla, D., & Chaba, Y. (2010). Performance modeling of efficient and dynamic broadcasting algorithm in MANETs routing protocols. IEEE International Conference on Computer Research and Development, 2, 421\u2013425.","journal-title":"IEEE International Conference on Computer Research and Development"},{"key":"3864_CR25","first-page":"9","volume":"30","author":"SK Singh","year":"2011","unstructured":"Singh S. K., Singh M. P., Singh, D. K. (2011). Intrusion detection based security solution for cluster-based wireless sensor networks. International Journal of Advanced Science and Technology, 30, 9\u201311.","journal-title":"International Journal of Advanced Science and Technology"},{"key":"3864_CR26","doi-asserted-by":"crossref","DOI":"10.1002\/9780470443521","volume-title":"Wireless sensor networks: A networking perspective","author":"J Zheng","year":"2009","unstructured":"Zheng, J., & Jamalpour, A. (2009). Wireless sensor networks: A networking perspective. New York: IEEE."},{"key":"3864_CR27","unstructured":"Su, C. C., Chang, K. M., Kue, Y. H., & Horng, M. F. (2005). The new intrusion prevention and detection Approaches for clustering-based sensor networks. In Proceedings of 2005 IEEE Wireless Communications and Networking Conference (WCNC\u201905) (Vol. 4, pp. 1927\u20131932) New Orleans, L.A."},{"issue":"1","key":"3864_CR28","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92\u2013109.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"4","key":"3864_CR29","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1145\/1851275.1851233","volume":"41","author":"A Dvir","year":"2011","unstructured":"Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs. ACM SIGCOM Computer Communication Review, 41(4), 405\u2013406.","journal-title":"ACM SIGCOM Computer Communication Review"},{"issue":"4","key":"3864_CR30","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1109\/TMC.2014.2331966","volume":"14","author":"XM Zhang","year":"2015","unstructured":"Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742\u2013754.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"3864_CR31","doi-asserted-by":"crossref","first-page":"64","DOI":"10.5815\/ijcnis.2016.02.08","volume":"2","author":"J Sathiamoorthy","year":"2016","unstructured":"Sathiamoorthy, J., & Ramakrishnan, B. (2016). CEAACK\u2014A reduced acknowledgment for better data transmission for MANETs. International Journal of Computer Network and Information Security, 2, 64\u201371.","journal-title":"International Journal of Computer Network and Information Security"},{"issue":"3","key":"3864_CR32","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TIE.2012.2196010","volume":"60","author":"EM Shakshuki","year":"2013","unstructured":"Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK\u2014A secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1\u201310.","journal-title":"IEEE Transactions on Industrial Electronics"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3864-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3864-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3864-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,15]],"date-time":"2019-09-15T07:13:52Z","timestamp":1568531632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3864-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,8]]},"references-count":32,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["3864"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3864-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,8]]}}}