{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:11Z","timestamp":1758987611288,"version":"3.44.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T00:00:00Z","timestamp":1747353600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T00:00:00Z","timestamp":1747353600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02004-w","type":"journal-article","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T07:20:20Z","timestamp":1747380020000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Energy aware DBSCAN and mobility aware balanced q-learning based opportunistic routing protocol in MANET"],"prefix":"10.1007","volume":"18","author":[{"given":"A. Daniel Gurwin","family":"Das","sequence":"first","affiliation":[]},{"given":"E. Anna","family":"Devi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"2004_CR1","doi-asserted-by":"publisher","unstructured":"Biswas S, Morris R (2005) Exor: Opportunistic multi-hop routing for wireless networks. In: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM \u201905), pp 133\u2013144. Association for Computing Machinery, New York, NY, USA . https:\/\/doi.org\/10.1145\/1080091.1080108","DOI":"10.1145\/1080091.1080108"},{"key":"2004_CR2","doi-asserted-by":"publisher","first-page":"47701","DOI":"10.1109\/ACCESS.2023.3279177","volume":"11","author":"J Ryu","year":"2023","unstructured":"Ryu J, Kim S (2023) Reputation-based opportunistic routing protocol using q-learning for manet attacked by malicious nodes. IEEE Access 11:47701\u201347711. https:\/\/doi.org\/10.1109\/ACCESS.2023.3279177","journal-title":"IEEE Access"},{"issue":"6","key":"2004_CR3","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TMC.2010.52","volume":"9","author":"T Hu","year":"2010","unstructured":"Hu T, Fei Y (2010) Qelar: A machine-learning-based adaptive routing protocol for energy-efficient and lifetime-extended underwater sensor networks. IEEE Trans Mob Comput 9(6):796\u2013809. https:\/\/doi.org\/10.1109\/TMC.2010.52","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"2004_CR4","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1007\/s11277-014-2247-4","volume":"82","author":"SA Thorat","year":"2015","unstructured":"Thorat SA, Kulkarni PJ (2015) Opportunistic routing in presence of selfish nodes for manet. Wireless Pers Commun 82(2):689\u2013708. https:\/\/doi.org\/10.1007\/s11277-014-2247-4","journal-title":"Wireless Pers Commun"},{"key":"2004_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2012-171","volume":"2012","author":"RA Alsaqour","year":"2012","unstructured":"Alsaqour RA, Abdelhaq MS, Alsukour OA (2012) Effect of network parameters on neighbor wireless link breaks in gpsr protocol and enhancement using mobility prediction model. EURASIP J Wireless Commun Netw 2012:1\u201315. https:\/\/doi.org\/10.1186\/1687-1499-2012-171","journal-title":"EURASIP J Wireless Commun Netw"},{"key":"2004_CR6","doi-asserted-by":"publisher","unstructured":"Moghaddam NA, Maleki A (2019) Rf energy harvesting system and circuits for charging of wireless devices using spectrum sensing. In: Amin M, Zhang YD (eds) Spectrum Sensing. IntechOpen, London. Chap. 3. https:\/\/doi.org\/10.5772\/intechopen.84895 . https:\/\/www.intechopen.com\/chapters\/65618","DOI":"10.5772\/intechopen.84895"},{"issue":"5","key":"2004_CR7","first-page":"545","volume":"9","author":"HR Tavakoli","year":"2019","unstructured":"Tavakoli HR, Aghaei M, Dadras H, Mahaki B (2019) The effect of battery charge levels of mobile phone on the amount of electromagnetic waves emission. J Biomed Phys Eng 9(5):545\u2013552","journal-title":"J Biomed Phys Eng"},{"issue":"11","key":"2004_CR8","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.3390\/su8111136","volume":"8","author":"S-Y Hong","year":"2016","unstructured":"Hong S-Y, Lee S-H, Pyun J-Y (2016) Rssi-based distance estimation framework using a kalman filter for sustainable indoor computing environments. Sustainability 8(11):1136. https:\/\/doi.org\/10.3390\/su8111136","journal-title":"Sustainability"},{"key":"2004_CR9","doi-asserted-by":"publisher","unstructured":"Yang Z, Liu Y (2023) Distance measurement based on rssi and shadowing model in wireless sensor networks. In: AIP Conference Proceedings, vol. 2804, p. 040013. AIP Publishing, Melville, NY. https:\/\/doi.org\/10.1063\/5.0137391","DOI":"10.1063\/5.0137391"},{"issue":"12","key":"2004_CR10","doi-asserted-by":"publisher","first-page":"3494","DOI":"10.1109\/JSAC.2023.3322841","volume":"41","author":"B Zhao","year":"2023","unstructured":"Zhao B, Zhang J, Chen M, Liu X et al (2023) Fl-amm: Federated learning augmented map matching with heterogeneous cellular moving trajectories. IEEE J Sel Areas Commun 41(12):3494\u20133507. https:\/\/doi.org\/10.1109\/JSAC.2023.3322841","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"2004_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-1499-2014-179","volume":"2014","author":"A Alshamrani","year":"2014","unstructured":"Alshamrani A, Shen X, Liu L (2014) Reinforcement learning for routing in cognitive radio ad hoc networks. EURASIP J Wirel Commun Netw 2014(1):1\u201313. https:\/\/doi.org\/10.1186\/1687-1499-2014-179","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"2004_CR12","doi-asserted-by":"publisher","unstructured":"IEEE Computer Society (2021) IEEE Standard for Information technology\u2013Telecommunications and information exchange between systems Local and metropolitan area networks\u2013Specific requirements\u2013Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications\u2013Amendment 5: Enhancements for High Efficiency WLAN. IEEE Std 802.11ax-2021 (Amendment to IEEE Std 802.11-2020). Available at: https:\/\/ieeexplore.ieee.org\/document\/9442429. https:\/\/doi.org\/10.1109\/IEEESTD.2021.9442429","DOI":"10.1109\/IEEESTD.2021.9442429"},{"key":"2004_CR13","doi-asserted-by":"publisher","unstructured":"Singaravelan M, Thangam S et al (2024) Improving quality of service using an innovative energy effective reinforcement based path finding in mobile ad hoc network. In: Proceedings of the 2024 2nd International Conference on Computing and Data Analytics (ICCDA), pp 1\u20134. https:\/\/doi.org\/10.1109\/ICCDA64887.2024.10867371 . IEEE","DOI":"10.1109\/ICCDA64887.2024.10867371"},{"key":"2004_CR14","doi-asserted-by":"publisher","unstructured":"Pushpalatha K, Sherubha P, Sasirekha SP, Anguraj DK (2024) A constructive delay-aware model for opportunistic routing protocol in manet. Expert Syst Appl 124527. https:\/\/doi.org\/10.1016\/j.eswa.2024.124527","DOI":"10.1016\/j.eswa.2024.124527"},{"key":"2004_CR15","doi-asserted-by":"publisher","unstructured":"Yang T, Tang H, Liu J, Hao J, Meng Z (2023) Exploration in deep reinforcement learning: From single-agent to multiagent domain. IEEE Trans Neural Netw Learn Syst 34(1):1\u201321. https:\/\/doi.org\/10.1109\/TNNLS.2023.3236361","DOI":"10.1109\/TNNLS.2023.3236361"},{"key":"2004_CR16","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1023\/A:1025146013151","volume":"8","author":"L Butty\u00e1n","year":"2003","unstructured":"Butty\u00e1n L, Hubaux J-P (2003) Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Netw Appl 8:579\u2013592. https:\/\/doi.org\/10.1023\/A:1025146013151","journal-title":"Mobile Netw Appl"},{"key":"2004_CR17","doi-asserted-by":"publisher","unstructured":"Sharma S, Ghosh RK, Sangaiah AK (2021) An iot based uav network for military applications. In: 2021 International Conference on Computer Communication and Informatics (ICCCI), pp 1\u20136. IEEE, ???. https:\/\/doi.org\/10.1109\/ICCCI50826.2021.9402466","DOI":"10.1109\/ICCCI50826.2021.9402466"},{"key":"2004_CR18","doi-asserted-by":"publisher","unstructured":"Hosseinzadeh M, Tanveer J, Rahmani AM, Aurangzeb K, Yousefpoor E, Yousefpoor MS, Darwesh A, Lee S-W, Fazlali M (2024) A q-learning-based smart clustering routing method in flying ad hoc networks. J King Saud Univ-Comp Inf Sci 36(1):101894. https:\/\/doi.org\/10.1016\/j.jksuci.2022.101894","DOI":"10.1016\/j.jksuci.2022.101894"},{"key":"2004_CR19","doi-asserted-by":"publisher","unstructured":"Duan S, Lyu F, Wu H, Chen W, Lu H, Dong Z, Shen X (2022) Moto: Mobility-aware online task offloading with adaptive load balancing in small-cell mec. IEEE Trans Mob Comput 23(1):645\u2013659. https:\/\/doi.org\/10.1109\/TMC.2021.3090706","DOI":"10.1109\/TMC.2021.3090706"},{"key":"2004_CR20","doi-asserted-by":"publisher","unstructured":"Das ADG, Devi EA (2024) Impact of node mobility in manet & analysis of bonnmotion mobility models using ns-3. In: 2024 1st International Conference on Advances in Computing, Communication and Networking (ICAC2N), pp 1466\u20131473. IEEE, Noida, India. https:\/\/doi.org\/10.1109\/ICAC2N58929.2024.10895122. https:\/\/ieeexplore.ieee.org\/document\/10895122","DOI":"10.1109\/ICAC2N58929.2024.10895122"},{"key":"2004_CR21","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, Vanderplas J, Passos A, Cournapeau D, Brucher M, Perrot M, Duchesnay E (2011) Scikit-learn: Machine learning in python. J Mach Learn Res 12:2825\u20132830","journal-title":"J Mach Learn Res"},{"issue":"3","key":"2004_CR22","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MCSE.2007.55","volume":"9","author":"JD Hunter","year":"2007","unstructured":"Hunter JD (2007) Matplotlib: A 2d graphics environment. Comput Sci Eng 9(3):90\u201395. https:\/\/doi.org\/10.1109\/MCSE.2007.55","journal-title":"Comput Sci Eng"},{"key":"2004_CR23","doi-asserted-by":"publisher","unstructured":"Reback J et al. Pandas-dev\/pandas: Pandas. https:\/\/doi.org\/10.5281\/zenodo.3509134","DOI":"10.5281\/zenodo.3509134"},{"key":"2004_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2024.3510812","author":"A Malik","year":"2024","unstructured":"Malik A, Tyagi V, Singh S, Kumar R, Wu H, Gill SS (2024) Optimizing secure data transmission in 6g-enabled iomt using blockchain integration. IEEE Trans Consum Electron. https:\/\/doi.org\/10.1109\/TCE.2024.3510812","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"2004_CR25","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1109\/TNSM.2023.3287456","volume":"21","author":"W Liu","year":"2024","unstructured":"Liu W, Zhang M, Chen H (2024) Blockchain-based security enhancement for IoMT networks: Challenges and solutions. IEEE Trans Netw Serv Manage 21(1):218\u2013233. https:\/\/doi.org\/10.1109\/TNSM.2023.3287456","journal-title":"IEEE Trans Netw Serv Manage"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02004-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02004-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02004-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:47Z","timestamp":1758986507000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02004-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,16]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2004"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02004-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,5,16]]},"assertion":[{"value":"27 January 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"175"}}