{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:40:59Z","timestamp":1730209259277,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1109\/coginfocom.2018.8639908","type":"proceedings-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T23:49:45Z","timestamp":1550188185000},"page":"000051-000056","source":"Crossref","is-referenced-by-count":3,"title":["Modified MANET protocol to extend the emergency network"],"prefix":"10.1109","author":[{"given":"Veronika","family":"Szucs","sequence":"first","affiliation":[]},{"given":"Mahmoud","family":"Wassouf","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1023\/A:1013941929408"},{"year":"0","key":"ref11","article-title":"The Network Simulator NS-2"},{"key":"ref12","first-page":"67","article-title":"Definition and Synergies of Cognitive Infocommunications","volume":"9","author":"baranyi","year":"2012","journal-title":"Acta Polytechnica Hungarica"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19608-4"},{"key":"ref14","article-title":"Performance Comparison of Manet Routing Protocols based on real-life scenarios","author":"chrysoula","year":"2012","journal-title":"University of Macedonia MIS thesis work"},{"key":"ref15","first-page":"781","article-title":"Analysis of Ad Hoc Routing Protocols for emergency and rescue scenarios","author":"quispe","year":"0"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CogInfoCom.2016.7804535"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CogInfoCom.2016.7804534"},{"key":"ref18","article-title":"Perception of Delay Tolerant Network Behavior with Cognitive Sonification Controller","author":"korteby","year":"2017","journal-title":"8th IEEE International Conference on Cognitive Infocommunications"},{"key":"ref19","first-page":"191","article-title":"Secure Unicast Position- based Routing Protocols for Ad-Hoc Networks","volume":"8","author":"qabajeh","year":"2011","journal-title":"Acta Polytechnica Hungarica"},{"key":"ref4","article-title":"A Framework supporting Extreme Emergency Services","author":"panaousis","year":"2009","journal-title":"Proc ICT-MobileSummit 2009"},{"article-title":"Mobile Ad Hoc Data Networks for Emergency Preparedness Telecommunications-Dynamic power -Conscious Routing Concepts","year":"2000","author":"subbarao","key":"ref3"},{"key":"ref6","first-page":"346","article-title":"Performance Analysis of AODV, DYMO and Bellman Routing Protocols in Mobile Ad-Hoc Network","volume":"41","author":"rahul","year":"2013","journal-title":"Conference on in Communication and Control Systems"},{"key":"ref5","article-title":"Performance analysis of AODV, DSR & TORA Routing Protocols","volume":"2","author":"gupta","year":"2010","journal-title":"IACSIT International Journal of Engineering and Technology"},{"key":"ref8","article-title":"CBRP: A Cluster-based Routing Protocol for Mobile Ad hoc Networks","author":"mingliang","year":"0","journal-title":"National University of Singapore"},{"key":"ref7","article-title":"Cluster Based Routing Protocol","author":"jiang","year":"1999","journal-title":"IETF Draft"},{"year":"2013","key":"ref2","article-title":"The Characteristics And Applications Of Manets Computer Science Essay"},{"key":"ref1","first-page":"31","volume":"52","author":"sharma","year":"2012","journal-title":"Mobile ad hoc networks&#x2014;A holistic overview"},{"key":"ref9","article-title":"Improving availability of mobile networks using a cluster routing protocol with redundant cluster head","author":"torres","year":"2012","journal-title":"Third Conference on Theoretical and Applied Computer Science Oklahoma State University Stillwater"},{"key":"ref20","first-page":"119","article-title":"Adaptive Flow QoS Management Model for Wireless Communication in Mobile Environments","volume":"13","author":"kim","year":"2016","journal-title":"Acta Polytechnica Hungarica"}],"event":{"name":"2018 IEEE 9th International Conference on Cognitive Infocommunications (CogInfoCom)","start":{"date-parts":[[2018,8,22]]},"location":"Budapest, Hungary","end":{"date-parts":[[2018,8,24]]}},"container-title":["2018 9th IEEE International Conference on Cognitive Infocommunications (CogInfoCom)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8637083\/8639700\/08639908.pdf?arnumber=8639908","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T06:32:45Z","timestamp":1643265165000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8639908\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/coginfocom.2018.8639908","relation":{},"subject":[],"published":{"date-parts":[[2018,8]]}}}