{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:54:13Z","timestamp":1772063653702,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T00:00:00Z","timestamp":1445990400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1186\/s13638-015-0464-5","type":"journal-article","created":{"date-parts":[[2015,10,28]],"date-time":"2015-10-28T09:06:10Z","timestamp":1446023170000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Fuzzy approach to improving route stability of the AODV routing protocol"],"prefix":"10.1186","volume":"2015","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3537-3248","authenticated-orcid":false,"given":"Nihad I.","family":"Abbas","sequence":"first","affiliation":[]},{"given":"Mustafa","family":"Ilkan","sequence":"additional","affiliation":[]},{"given":"Emre","family":"Ozen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"key":"464_CR1","series-title":"ACWR \u201911","volume-title":"30 years of wireless ad hoc networking research: what about humanitarian and disaster relief solutions? What are we still missing?","author":"F Legendre","year":"2011","unstructured":"F Legendre, T Hossmann, F Sutton, B Plattner, 30 years of wireless ad hoc networking research: what about humanitarian and disaster relief solutions? What are we still missing? ACWR \u201911 (ACM, Amritapuri, 2011)"},{"issue":"6","key":"464_CR2","first-page":"344","volume":"9","author":"S Verma","year":"2012","unstructured":"S Verma, P Nayak, R Agarwa, Energy efficient routing in mobile adhoc networks based on AODV protocol. Int J Comp Sci Issues 9(6), 344 (2012)","journal-title":"Int J Comp Sci Issues"},{"key":"464_CR3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2003.5342226","author":"O Younis","year":"2003","unstructured":"O Younis, S Fahmy, Constraint-based routing in the internet basic principles and recent research. IEEE CFlMSOC Surveys Tumrial (2003). doi:\n                    10.1109\/COMST.2003.5342226","journal-title":"IEEE CFlMSOC Surveys Tumrial"},{"issue":"12","key":"464_CR4","doi-asserted-by":"publisher","first-page":"3264","DOI":"10.1109\/TPDS.2013.2297105","volume":"25","author":"P Li","year":"2014","unstructured":"P Li, S Guo, S Yu, AV Vasilakos, Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Trans Parallel Distri Sys 25(12), 3264\u20133273 (2014)","journal-title":"IEEE Trans Parallel Distri Sys"},{"key":"464_CR5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2003.819319","author":"W Pedrycz","year":"2003","unstructured":"W Pedrycz, A Vasilakos, S Karnouskos, Special issue on computational intelligence in telecommunications networks and internet services\u2014part II. IEEE Trans Sys Man Cybernetics\u2014Part C: App Rev (2003). doi:\n                    10.1109\/TSMCC.2003.819319","journal-title":"IEEE Trans Sys Man Cybernetics\u2014Part C: App Rev"},{"issue":"1","key":"464_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S1570-8705(03)00043-X","volume":"2","author":"M Abolhasan","year":"2004","unstructured":"M Abolhasan, T Wysocki, E Dutkiewicz, A review of routing protocols for mobile ad hoc networks. Ad Hoc Netw 2(1), 1\u201322 (2004)","journal-title":"Ad Hoc Netw"},{"issue":"9","key":"464_CR7","first-page":"1","volume":"2","author":"VP Patil","year":"2012","unstructured":"VP Patil, Reactive and proactive routing protocol performance evaluation for qualitative and quantitative analysis in mobile ad hoc network. Int J Sci Res Pub 2(9), 1\u20138 (2012)","journal-title":"Int J Sci Res Pub"},{"key":"464_CR8","volume-title":"Comparative study of routing protocols for mobile ad-hoc NETworks","author":"TH Clausen","year":"2002","unstructured":"TH Clausen, P Jacquet, L Viennot, Comparative study of routing protocols for mobile ad-hoc NETworks (INRIA Rocquencourt, Projet Hipercom, Domaine de Voluceau, 2002)"},{"issue":"4","key":"464_CR9","first-page":"566","volume":"31","author":"A Abd Rahman","year":"2009","unstructured":"A Abd Rahman, ZA Zukarnain, Performance comparison of AODV, DSDV and I-DSDV routing protocols in mobile ad hoc networks. Eur J Sci Res 31(4), 566\u2013576 (2009)","journal-title":"Eur J Sci Res"},{"key":"464_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417543","author":"T Meng","year":"2015","unstructured":"T Meng, F Wu, Z Yang, G Chen, AV Vasilakos, Spatial reusability-aware routing in multi-Hop wireless networks. IEEE Trans Comput (2015). doi:\n                    10.1109\/TC.2015.2417543","journal-title":"IEEE Trans Comput"},{"key":"464_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2331966","author":"XM Zhang","year":"2015","unstructured":"XM Zhang, Y Zhang, F Yan, AV Vasilakos, Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. IEEE Trans Mobile Comp (2015). doi:\n                    10.1109\/TMC.2014.2331966","journal-title":"IEEE Trans Mobile Comp"},{"key":"464_CR12","doi-asserted-by":"publisher","first-page":"1964","DOI":"10.1109\/CEC.2004.1331137","volume":"2","author":"S Marwaha","year":"2004","unstructured":"S Marwaha, D Srinivasan, CK Tham, A Vasilakos, Evolutionary fuzzy multi-objective routing for wireless mobile Ad Hoc networks. Evolutionary Computation, CEC2004 Congress 2, 1964\u20131971 (2004)","journal-title":"Evolutionary Computation, CEC2004 Congress"},{"key":"464_CR13","doi-asserted-by":"publisher","DOI":"10.14569\/IJARAI.2013.020901","author":"S Srivastava","year":"2013","unstructured":"S Srivastava, AK Daniel, An efficient routing protocol under noisy environment for mobile ad hoc networks using fuzzy logic. Int J Adv Res Artif Intell (2013). doi:\n                    10.14569\/IJARAI.2013.020901","journal-title":"Int J Adv Res Artif Intell"},{"issue":"4","key":"464_CR14","first-page":"2898","volume":"4","author":"GS Hundal","year":"2014","unstructured":"GS Hundal, SK Gupta, R Bedi, Adaptive approach to find a stable path between nodes in MANET. Int J Curr Eng Technol 4(4), 2898\u20132901 (2014)","journal-title":"Int J Curr Eng Technol"},{"issue":"9","key":"464_CR15","doi-asserted-by":"publisher","first-page":"706","DOI":"10.12720\/jcm.9.9.706-713","volume":"9","author":"B Xu","year":"2014","unstructured":"B Xu, Y Li, A novel link stability and energy aware routing with tradeoff strategy in mobile ad hoc networks. J Commun 9(9), 706\u2013713 (2014)","journal-title":"J Commun"},{"issue":"8","key":"464_CR16","doi-asserted-by":"publisher","first-page":"651","DOI":"10.12720\/jcm.9.8.651-657","volume":"9","author":"Z Zhang","year":"2014","unstructured":"Z Zhang, Z Li, J Chen, An enhanced AODV route repairing mechanism in wireless ad-hoc sensor network. J Commun 9(8), 651\u2013657 (2014)","journal-title":"J Commun"},{"issue":"22","key":"464_CR17","first-page":"3064","volume":"3","author":"M Ghorbani","year":"2013","unstructured":"M Ghorbani, AM Saghiri, MR Meybodi, A novel adaptive version of AODV routing protocol based on learning automata utilizing cognitive networks concept. Tech J Eng App Sci 3(22), 3064\u20133070 (2013)","journal-title":"Tech J Eng App Sci"},{"key":"464_CR18","series-title":"Communications & information technology marathon beach, Attica, Greece","first-page":"1","volume-title":"Improving link reliability in mobile ad hoc networks using fuzzy nodes","author":"SH Nasiri","year":"2008","unstructured":"SH Nasiri, M Fathy, EZ Khosrafi, A Shojaeifard, Improving link reliability in mobile ad hoc networks using fuzzy nodes. Communications & information technology marathon beach, Attica, Greece, 2008, pp. 1\u20133"},{"key":"464_CR19","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2002.1039720","author":"G Lim","year":"2002","unstructured":"G Lim, K Shin, S Lee, H Yoon, J Ma, Link stability and route lifetime in ad-hoc wireless networks. Proc Int Conf Paral Proc Workshops (2002). doi:\n                    10.1109\/ICPPW.2002.1039720","journal-title":"Proc Int Conf Paral Proc Workshops"},{"key":"464_CR20","volume-title":"Ad hoc on-demand distance vector (AODV) routing","author":"S Das","year":"2003","unstructured":"S Das, Ad hoc on-demand distance vector (AODV) routing (Santa Barbara, Network Working Group, Nokia Research Center, University of California, 2003)"},{"key":"464_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832168","author":"SR Das","year":"2000","unstructured":"SR Das, CE Perkins, EM Roycr, Performance comparison of Two on-demand routing protocols for ad hoc networks. IEEE Infocom (2000). doi:\n                    10.1109\/INFCOM.2000.832168","journal-title":"IEEE Infocom"},{"key":"464_CR22","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"LA Zadeh, Fuzzy sets. Inf Control 8, 338\u2013353 (1965)","journal-title":"Inf Control"},{"key":"464_CR23","volume-title":"Stability analysis of the simplest takagi-sugeno fuzzy control system using circle criterion","author":"X Ban","year":"2006","unstructured":"X Ban, XZ Gao, X Huang, H Yin, Stability analysis of the simplest takagi-sugeno fuzzy control system using circle criterion (IEEE International Conference on Fuzzy Systems, Vancouver, 2006)"},{"issue":"3","key":"464_CR24","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1109\/TSMCC.2003.817354","volume":"33","author":"A Vasilakos","year":"2003","unstructured":"A Vasilakos, MP Saltouros, AF Atlassis, W Pedrycz, Optimizing QoS routing in hierarchical ATM networks using computational intelligence techniques. IEEE Trans Sys Man Cyber\u2014Part c: App Rev 33(3), 297\u2013312 (2003)","journal-title":"IEEE Trans Sys Man Cyber\u2014Part c: App Rev"},{"key":"464_CR25","first-page":"1488","volume":"2","author":"A Vasilakos","year":"1998","unstructured":"A Vasilakos, C Ricudis, K Anagnostakis, W Pedrycz, A Pitsillides, Evolutionary-fuzzy prediction for strategic QoS routing in broadband networks. Fuzzy systems proceedings, IEEE world congress on computational intelligence. IEEE Int Conf 2, 1488\u20131493 (1998)","journal-title":"IEEE Int Conf"},{"key":"464_CR26","volume-title":"Introduction to fuzzy logic","author":"F Dernoncourt","year":"2013","unstructured":"F Dernoncourt, Introduction to fuzzy logic (MIT, Massachusetts, 2013)"},{"key":"464_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.255628","author":"W El-Hajj","year":"2006","unstructured":"W El-Hajj, D Kountanis, A Al-Fuqaha, M Guizani, A fuzzy-based hierarchical energy efficient routing protocol for large scale mobile ad hoc networks (FEER). IEEE Commun Soc (2006). doi:\n                    10.1109\/ICC.2006.255628","journal-title":"IEEE Commun Soc"},{"issue":"1","key":"464_CR28","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"M Youssef, M Ibrahim, M Abdelatif, L Chen, AV Vasilakos, Routing metrics of cognitive radio networks: a survey. IEEE Commun Soc Tutor 16(1), 92\u2013109 (2014)","journal-title":"IEEE Commun Soc Tutor"},{"issue":"3","key":"464_CR29","first-page":"22","volume":"3","author":"GW Nurcahyo","year":"2003","unstructured":"GW Nurcahyo, SM Shamsuddin, RA Alias, MN Sap, Selection of defuzzification method to obtain crisp value for representing uncertain data in a modified sweep algorithm. JCT 3(3), 22\u201328 (2003)","journal-title":"JCT"},{"issue":"3","key":"464_CR30","first-page":"1992","volume":"51","author":"G Kalpana","year":"2013","unstructured":"G Kalpana, M Punithavalli, Fuzzy logic technique for gossip based reliable broadcasting in mobile ad hoc networks. J Theoretical App Info Tech 51(3), 1992\u20138645 (2013)","journal-title":"J Theoretical App Info Tech"},{"issue":"1","key":"464_CR31","first-page":"36","volume":"2","author":"R Saneifard","year":"2011","unstructured":"R Saneifard, R Saneifard, A method for defuzzification based on centroid point. Turkish J Fuzzy Sys 2(1), 36\u201344 (2011)","journal-title":"Turkish J Fuzzy Sys"},{"key":"464_CR32","unstructured":"Network Simulator, NS-2, \n                    http:\/\/www.isi.edu\/nsnam\/-ns\/\n                    \n                  ."},{"key":"464_CR33","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1109\/35.925682","volume":"39","author":"C-K Toh","year":"2001","unstructured":"C-K Toh, Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks. IEEE Commun Mag 39, 138\u2013147 (2001)","journal-title":"IEEE Commun Mag"}],"updated-by":[{"DOI":"10.1186\/s13638-016-0583-7","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2016,4,4]],"date-time":"2016-04-04T00:00:00Z","timestamp":1459728000000}}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0464-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-015-0464-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0464-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-015-0464-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T12:07:17Z","timestamp":1553602037000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-015-0464-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,28]]},"references-count":33,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["464"],"URL":"https:\/\/doi.org\/10.1186\/s13638-015-0464-5","relation":{"correction":[{"id-type":"doi","id":"10.1186\/s13638-016-0583-7","asserted-by":"object"}]},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,28]]},"article-number":"235"}}