{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T08:47:19Z","timestamp":1759826839164,"version":"3.28.2"},"reference-count":57,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T00:00:00Z","timestamp":1719187200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,24]]},"DOI":"10.1109\/icccnt61001.2024.10724085","type":"proceedings-article","created":{"date-parts":[[2024,11,4]],"date-time":"2024-11-04T23:06:46Z","timestamp":1730761606000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Resource Optimization and Forecasting of Mobile Ad-hoc Network using Particle Swarm Optimization along with Ensemble ML Modeling in 6G"],"prefix":"10.1109","author":[{"given":"Swagat Kumar","family":"Dash","sequence":"first","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing Mysuru Campus,Department of Computer Science,India"}]},{"given":"Jayanthesh","family":"P","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing Mysuru Campus,Department of Computer Science,India"}]},{"given":"Rachaita","family":"Dutta","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing Mysuru Campus,Department of Computer Science,India"}]},{"given":"Adwitiya","family":"Mukhopadhyay","sequence":"additional","affiliation":[{"name":"Amrita Vishwa Vidyapeetham,Amrita School of Computing Mysuru Campus,Department of Computer Science,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993527"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3117902"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103308"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/0952813X.2020.1818291"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3079639"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2019.106025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1201\/9780367276706-4"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2987070"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3390\/drones5040148"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7627-z"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9071129"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2020.0209"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2020.101234"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.3390\/s21196474"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.030948"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900601"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2013.06.043"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057230"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144679"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3951"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2016.03.001"},{"key":"ref22","article-title":"Efficiently approximating the qos of composite services in mobile ad-hoc networks","volume-title":"Technical Report TR-14-01","author":"Efstathiou","year":"2014"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MysuruCon55714.2022.9972544"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.09.039"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-250-3.ch021"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-29026-5_5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/make1010010"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.01.010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2002.997009"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/2375702"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s41870-018-0164-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v15i14.22021"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-6346-1_16"},{"issue":"6","key":"ref34","article-title":"Black hole attack detection in mobile ad hoc networks using optimization techniques","volume":"18","author":"Sujatha","year":"2021","journal-title":"Webology"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.17762\/ijritcc.v11i2s.6038"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/drones6110334"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.48084\/etasr.4259"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.4018\/JOEUC.289435"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/computers12010021"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.34028\/iajit\/19\/2\/6"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6687189"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/fi16020052"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/GCAT55367.2022.9971951"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3451984"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-022-01340-5"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/en14196016"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3188679"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.24203\/ijcit.v11i4.234"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91149-2_5"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2023.028425"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-11950-z"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1051\/e3sconf\/202129701065"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03176-y"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144072"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/CSET58993.2023.10346888"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3390\/telecom3030022"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.006.2200730"}],"event":{"name":"2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2024,6,24]]},"location":"Kamand, India","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10723818\/10723316\/10724085.pdf?arnumber=10724085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T22:38:43Z","timestamp":1732660723000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10724085\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,24]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/icccnt61001.2024.10724085","relation":{},"subject":[],"published":{"date-parts":[[2024,6,24]]}}}