{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,1]],"date-time":"2025-07-01T23:15:51Z","timestamp":1751411751379,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,22]],"date-time":"2022-11-22T00:00:00Z","timestamp":1669075200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,22]]},"DOI":"10.1109\/acit57182.2022.9994179","type":"proceedings-article","created":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T18:38:43Z","timestamp":1672857523000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Message Broadcasting Algorithm Implementation Using Mobile Long Term Evolution and Narrow Band Internet of Things Over Intelligent Transportation System (ITS)"],"prefix":"10.1109","author":[{"given":"Ghassan","family":"Samara","sequence":"first","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa,Jordan"}]},{"given":"Mohammad","family":"Aljaidi","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa,Jordan"}]},{"given":"Essam Al","family":"Daoud","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa,Jordan"}]},{"given":"Maram Y.","family":"Al-Safarini","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa,Jordan"}]},{"given":"Ghassan M.","family":"Alsayyed","sequence":"additional","affiliation":[{"name":"Zarqa University,Computer Science Department,Zarqa,Jordan"}]},{"given":"Sattam","family":"Almatarneh","sequence":"additional","affiliation":[{"name":"Zarqa University,Artificial Intelligence Department,Zarqa,Jordan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2010.1056.1061"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICFCC.2010.5497419"},{"issue":"10","key":"ref3","article-title":"Dynamic Safety Message Power Control in VANET Using PSO","volume":"3","author":"Samara","year":"2013","journal-title":"World of Computer Science & Information Technology Journal"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3923\/jas.2011.2606.2612"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246119"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2018.094399"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2012.1235.1242"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.11591\/ijai.v9.i3.pp439-447"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2020.12.005"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IECON43393.2020.9255254"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2022-Spring54318.2022.9860535"},{"issue":"1","key":"ref12","article-title":"A Low Cost ZigBee Sensor Network Architecture for Indoor Air Quality Monitoring","volume":"15","author":"Alhmiedat","year":"2017","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"issue":"2","key":"ref13","article-title":"Performance Analysis of Dynamic Source Routing Protocol","volume":"5","author":"Salem","year":"2014","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"issue":"8","key":"ref14","article-title":"Cache Discovery Policies of MANET","volume":"3","author":"Salem","year":"2013","journal-title":"World of Computer Science & Information Technology Journal"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v9i1.pp496-504"},{"issue":"1","key":"ref16","first-page":"100","article-title":"Increasing Network Visibility Using Coded Repetition Beacon Piggybacking","volume":"13","author":"Samara","year":"2011","journal-title":"World Applied Sciences Journal"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICITECH.2017.8079980"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.30534\/ijatcse\/2020\/127912020"},{"issue":"3A","key":"ref19","first-page":"592","article-title":"Aware-routing protocol using best first search algorithm in wireless sensor","volume":"15","author":"Samara","year":"2018","journal-title":"International Arab Journal of Information Technology."},{"issue":"1","key":"ref20","first-page":"4415","article-title":"Energy-efficiency routing algorithms in wireless sensor networks: A survey","volume":"9","author":"Samara","year":"2020","journal-title":"International Journal of Scientific and Technology Research"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT50332.2020.9300065"},{"issue":"8","key":"ref22","first-page":"180","article-title":"Congestion control approach based on effective random early detection and fuzzy logic","volume":"3","author":"Khatari","year":"2015","journal-title":"MAGNT Research Report"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT53391.2021.9677341"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v9i5.2848"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS49469.2020.239501"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JEEIT.2019.8717412"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/18\/2\/5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.34028\/18\/4\/5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108433"},{"issue":"14","key":"ref30","first-page":"2777","article-title":"Implementation of Cellular IoT over VANETs for Efficient Communication of Safety Messages","volume":"12","author":"Channakeshava","year":"2021","journal-title":"Turkish Journal of Computer and Mathematics Education (TURCOMAT)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICETCI53161.2021.9563483"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.25046\/aj050110"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899x\/870\/1\/012122"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981397"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101876"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISACV.2018.8354025"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICITBS.2018.00048"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/CIST.2018.8596531"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2670363"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7880946"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT53391.2021.9677453"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69548-8_2"}],"event":{"name":"2022 International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2022,11,22]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2022,11,24]]}},"container-title":["2022 International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9994070\/9994081\/09994179.pdf?arnumber=9994179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:37:28Z","timestamp":1706791048000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9994179\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,22]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/acit57182.2022.9994179","relation":{},"subject":[],"published":{"date-parts":[[2022,11,22]]}}}