{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:18:36Z","timestamp":1761110316310},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,4,4]],"date-time":"2017-04-04T00:00:00Z","timestamp":1491264000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s11277-017-4116-4","type":"journal-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T11:36:02Z","timestamp":1491392162000},"page":"4733-4746","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Genetic-Based Resource Allocation and Cooperative Node Selection Technique for Physical Layer Security Designs"],"prefix":"10.1007","volume":"95","author":[{"given":"Niloofar","family":"Okati","sequence":"first","affiliation":[]},{"given":"Mohammad Reza","family":"Mosavi","sequence":"additional","affiliation":[]},{"given":"Hamid","family":"Behroozi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,4]]},"reference":[{"issue":"5","key":"4116_CR1","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MWC.2008.4653131","volume":"15","author":"E Silva da","year":"2008","unstructured":"da Silva, E., dos Santos, A. L., Albini, L. C. P., & Lima, M. N. (2008). Identity-based key management in mobile ad hoc networks: Techniques and applications. IEEE Wireless Communications, 15(5), 46\u201352.","journal-title":"IEEE Wireless Communications"},{"issue":"8","key":"4116_CR2","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A Wyner","year":"1975","unstructured":"Wyner, A. (1975). The wire-tap channel. The Bell System Technical Journal, 54(8), 1355\u20131387.","journal-title":"The Bell System Technical Journal"},{"issue":"3","key":"4116_CR3","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszr","year":"1978","unstructured":"Csiszr, I., & Krner, J. (1978). Broadcast channels with confidential messages. IEEE Transactions on Information Theory, 24(3), 339\u2013348.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"8","key":"4116_CR4","first-page":"3114","volume":"6","author":"Y Zhao","year":"2007","unstructured":"Zhao, Y., Adve, R., & Lim, T. J. (2007). Improving amplify-and-forward relay networks: Optimal power allocation versus selection. IEEE Transactions on Wireless Communications, 6(8), 3114\u20133123.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"6","key":"4116_CR5","doi-asserted-by":"crossref","first-page":"3091","DOI":"10.1109\/TVT.2010.2048767","volume":"59","author":"G Amarasuriya","year":"2010","unstructured":"Amarasuriya, G., Ardakani, M., & Tellambura, C. (2010). Output-threshold multiple-relay-selection scheme for cooperative wireless networks. IEEE Transactions on Vehicular Technology, 59(6), 3091\u20133097.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"4116_CR6","doi-asserted-by":"crossref","unstructured":"Okati, N., Razeghi, B., & Mosavi, M. R. (2015). On relay selection to maximize coverage region for cooperative cellular networks with multiple fixed and unfixed relays. In 6th International conference on computing, communication and networking technologies (pp. 1\u20136), Denton, USA, Jul. 2015.","DOI":"10.1109\/ICCCNT.2015.7395205"},{"key":"4116_CR7","doi-asserted-by":"crossref","unstructured":"Razeghi, B., Okati, N., & Hodtani, G. Abed. (2015). A novel multi-criteria relay selection scheme in cooperation communication networks. In Proceedings of the 49th annual conference on information sciences and systems (CISS) (pp. 1\u20134), Baltimore, Maryland, Mar. 2015.","DOI":"10.1109\/CISS.2015.7086429"},{"issue":"2","key":"4116_CR8","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1109\/TWC.2011.120511.102047","volume":"11","author":"G Amarasuriya","year":"2012","unstructured":"Amarasuriya, G., Tellambura, C., & Ardakani, M. (2012). Joint relay and antenna selection for dual-hop amplify-and-forward mimo relay networks. IEEE Transaction on Wireless Communications, 11(2), 493\u2013499.","journal-title":"IEEE Transaction on Wireless Communications"},{"key":"4116_CR9","doi-asserted-by":"crossref","unstructured":"Cai, J., Shen (Sherman), X., Mark, J., & Alfa, A. (2008). Semi-distributed user relaying algorithm for amplify-and-forward wireless relay networks. IEEE Transaction on Wireless Communications, 7(4), 1348\u20131357","DOI":"10.1109\/TWC.2008.060909"},{"key":"4116_CR10","doi-asserted-by":"crossref","first-page":"1875","DOI":"10.1109\/TSP.2009.2038412","volume":"58","author":"L Dong","year":"2010","unstructured":"Dong, L., Han, Z., Petropulu, A., & Poor, H. (2010). Improving wireless physical layer security via cooperating relays. IEEE Transactions on Signal Processing, 58, 1875\u20131888.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"10","key":"4116_CR11","doi-asserted-by":"crossref","first-page":"5003","DOI":"10.1109\/TWC.2009.090323","volume":"8","author":"I Krikidis","year":"2009","unstructured":"Krikidis, I., Thompson, J. S., & McLaughlin, S. (2009). Relay selection for secure cooperative networks with jamming. IEEE Transactions on Wireless Communications, 8(10), 5003\u20135011.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"1","key":"4116_CR12","doi-asserted-by":"crossref","first-page":"310","DOI":"10.1109\/TIFS.2011.2166386","volume":"7","author":"J Chen","year":"2012","unstructured":"Chen, J., Zhang, R., Song, L., Han, Z., & Jiao, B. (2012). Joint relay and jammer selection for secure two-way relay networks. IEEE Transactions on Information Forensics and Security, 7(1), 310\u2013320.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"4116_CR13","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1109\/TSP.2010.2092774","volume":"59","author":"G Zheng","year":"2011","unstructured":"Zheng, G., Choo, L. C., & Wong, L. K. (2011). Optimal cooperative jamming to enhance physical layer security using relays. IEEE Transactions on Signal Processing, 59(3), 1317\u20131322.","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"2","key":"4116_CR14","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1049\/iet-net.2013.0010","volume":"3","author":"WH Fang","year":"2014","unstructured":"Fang, W. H., Chen, C. F., & Lang, H. S. (2014). Joint resource allocation and relay selection via genetic algorithm in multi-user decode-and-forward cooperative systems. IET Networks, 3(2), 65\u201373.","journal-title":"IET Networks"},{"key":"4116_CR15","doi-asserted-by":"crossref","unstructured":"Tera, A. D., Gurrala, K. K., & Das, S. (2014). Power allocation for AF cooperative relaying using particle swarm optimization. In International conference on green computing communication and electrical engineering (ICGCCEE), Coimbatore (pp. 1\u20134), Mar. 2014.","DOI":"10.1109\/ICGCCEE.2014.6922309"},{"key":"4116_CR16","doi-asserted-by":"crossref","unstructured":"Ma, N., Yang, M., & Shin, Y. (2013). A distributed power allocation algorithm for OFDM-based cognitive radio networks. In IEEE region 10 conference (TENCON), Coimbatore (pp. 1\u20134), Oct. 2013.","DOI":"10.1109\/TENCON.2013.6718877"},{"key":"4116_CR17","unstructured":"Xu, S., Zhang, Q., & Lin, W. (2014). PSO-based OFDM adaptive power and bit allocation for multiuser cognitive radio system. In 5th International conference on wireless communications, networking and mobile computing, Beijing (pp. 1\u20134), Sept. 2014."},{"key":"4116_CR18","unstructured":"Wang, Z., Li, Y., Zhao, C., & Chen, J. (2012). An energy-efficient resource allocation scheme based on genetic simulated annealing algorithm. In International symposium on communications and information technologies (ISCIT) (pp. 867\u2013870). QLD: Gold Coast."},{"issue":"3","key":"4116_CR19","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1109\/4235.930314","volume":"5","author":"HG Beyer","year":"2001","unstructured":"Beyer, H. G., & Deb, K. (2001). On self-adaptive features in real-parameter evolutionary algorithms. IEEE Transactions on Evolutionary Computation, 5(3), 250\u2013270.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"4116_CR20","volume-title":"An introduction to genetic algorithms","author":"M Melanie","year":"1998","unstructured":"Melanie, M. (1998). An introduction to genetic algorithms. Cambridge: MIT press."},{"key":"4116_CR21","first-page":"187","volume":"2","author":"LJ Eshelman","year":"1993","unstructured":"Eshelman, L. J., & Schaffer, J. D. (1993). Real-coded genetic algorithms and interval schemata. Foundations of Genetic Algorithms, 2, 187\u2013202.","journal-title":"Foundations of Genetic Algorithms"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4116-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4116-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4116-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,8]],"date-time":"2017-08-08T17:39:14Z","timestamp":1502213954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4116-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,4]]},"references-count":21,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["4116"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4116-4","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,4]]}}}