{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:05Z","timestamp":1750309565562,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:00:00Z","timestamp":1740096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,2,21]]},"DOI":"10.1145\/3728199.3728248","type":"proceedings-article","created":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T16:35:44Z","timestamp":1748450144000},"page":"298-303","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The AODV Routing Protocol Based on Probabilistic Flooding and Multi-constraint Fusion Strategy"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-5945-4922","authenticated-orcid":false,"given":"Xingbiao","family":"Cai","sequence":"first","affiliation":[{"name":"Science and Technology on Micro-system Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China"},{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9937-6101","authenticated-orcid":false,"given":"Hanwang","family":"Qian","sequence":"additional","affiliation":[{"name":"Science and Technology on Micro-system Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China"},{"name":"University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6269-3231","authenticated-orcid":false,"given":"Jiang","family":"Wang","sequence":"additional","affiliation":[{"name":"Science and Technology on Micro-system Laboratory, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China"},{"name":"University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,5,28]]},"reference":[{"key":"e_1_3_3_1_1_2","volume-title":"Proceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017)","author":"Saudi N. A. M.","year":"2019","unstructured":"Saudi, N. A. M., Arshad, M. A., Buja, A. G., Fadzil, A. F. A., & Saidi, R. M. 2019. Mobile ad-hoc network (MANET) routing protocols: A performance assessment. In Proceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017) Transcending Boundaries, Embracing Multidisciplinary Diversities (pp. 53-59). Springer Singapore."},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-022-09722-x"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-08705-8"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.3390\/s19040930"},{"issue":"1","key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.icte.2023.07.002","article-title":"An improved method of AODV routing protocol using reinforcement learning for ensuring QoS in 5G-based mobile ad-hoc networks","volume":"10","author":"Duong T. V. T.","year":"2024","unstructured":"Duong, T. V. T. 2024. An improved method of AODV routing protocol using reinforcement learning for ensuring QoS in 5G-based mobile ad-hoc networks. ICT Express, 10(1), 97-103.","journal-title":"ICT Express"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Khan H. Kushwah K. K. Thakur J. S. Soni G. G. & Tripathi A. 2024. Improving Mobile Ad hoc Networks through an investigation of AODV DSR and MP-OLSR Routing Protocols. EAI Endorsed Transactions on Scalable Information Systems.","DOI":"10.4108\/eetsis.5686"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3277817"},{"key":"e_1_3_3_1_8_2","volume-title":"2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 5868-5877)","author":"de Melo Pires R.","year":"2016","unstructured":"de Melo Pires, R., Arnosti, S. Z., Pinto, A. S. R., & Branco, K. R. C. 2016, January. Experimenting broadcast storm mitigation techniques in FANETs. In 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 5868-5877). IEEE."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.10.001"},{"key":"e_1_3_3_1_10_2","volume-title":"2009 2nd International Conference on Adaptive Science & Technology (ICAST) (pp. 120-127)","author":"Mohammed A.","year":"2009","unstructured":"Mohammed, A., Ould-Khaoua, M., Mackenzie, L. M., & Abdulai, J. D. 2009, January. Dynamic probabilistic counter-based broadcasting in mobile ad hoc networks. In 2009 2nd International Conference on Adaptive Science & Technology (ICAST) (pp. 120-127). IEEE."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.012213.121505"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.59324\/ejtas.2023.1(5).80"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102148"},{"key":"e_1_3_3_1_14_2","volume-title":"2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) (pp. 156-161)","author":"Ardianto B.","year":"2022","unstructured":"Ardianto, B., Nurcahyo, H. S. D., Mufti\u0107, H., Harwahyu, R., & Sari, R. F. 2022, June. Performance Comparison of AODV, AODV-ETX and Modified AODV-ETX in VANET using NS3. In 2022 IEEE International Conference on Cybernetics and Computational Intelligence (CyberneticsCom) (pp. 156-161). IEEE."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.08.013"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2017.0015"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1515-0"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.07.003"}],"event":{"name":"CNML 2025: 2025 3rd International Conference on Communication Networks and Machine Learning","acronym":"CNML 2025","location":"Nanjing China"},"container-title":["Proceedings of the 2025 3rd International Conference on Communication Networks and Machine Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728199.3728248","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3728199.3728248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:19:06Z","timestamp":1750295946000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3728199.3728248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,21]]},"references-count":18,"alternative-id":["10.1145\/3728199.3728248","10.1145\/3728199"],"URL":"https:\/\/doi.org\/10.1145\/3728199.3728248","relation":{},"subject":[],"published":{"date-parts":[[2025,2,21]]},"assertion":[{"value":"2025-05-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}