{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:08:36Z","timestamp":1749874116929,"version":"3.41.0"},"reference-count":17,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2016]]},"DOI":"10.12720\/jcm.11.11.1012-1019","type":"journal-article","created":{"date-parts":[[2016,12,26]],"date-time":"2016-12-26T02:59:09Z","timestamp":1482721149000},"source":"Crossref","is-referenced-by-count":1,"title":["Bloom Filter Based Load Balancing Mechanis for Mobile Ad Hoc Networks"],"prefix":"10.12720","author":[{"name":"Electronic Material Evidence Forensic Center, Chongqing Municipal Public Security Bureau, China","sequence":"first","affiliation":[]},{"given":"Peiyun","family":"Luo","sequence":"first","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2016]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"[1] M. Conti and S. Giordano, \"Multihop ad hoc networking: The theory,\" IEEE Communications Magazine, vol. 45, no. 4, pp. 78-86, 2007.","key":"ref0","DOI":"10.1109\/MCOM.2007.343616"},{"unstructured":"[2] D. P. Wu, Y. Y. Wang, H. G. Wang, B. R. Yang, C. G. Wang, and R. Y. Wang, \"Dynamic coding control in social intermittent connectivity wireless networks,\" IEEE Trans. Veh. Technol., no. 99, pp. 1-13, 2005.","key":"ref1"},{"doi-asserted-by":"crossref","unstructured":"[3] M. S. Antesar, P. D. Keshav, K. B. Sanat, and U. A. Irfan, \"Recommendation based trust model with an effective defence scheme for MANETs,\" IEEE Trans. Mobile Comput., vol. 14, no. 10, pp. 2101-2115, 2015.","key":"ref2","DOI":"10.1109\/TMC.2014.2374154"},{"doi-asserted-by":"crossref","unstructured":"[4] H. Y. Kim, H. Kim, Y. H. Cho, and S. H. Lee, \"Self- Organizing spectrum breathing and user association for load balancing in wireless networks,\" IEEE Transactions on Wireless Communications, vol. 15, no. 5, pp. 3409\u2013 3421, 2016.","key":"ref3","DOI":"10.1109\/TWC.2016.2520938"},{"doi-asserted-by":"crossref","unstructured":"[5] D. P. Wu, H. P. Zhang, H. G. Wang, C. G. Wang, and R. Y. Wang, \"Quality-of-protection-driven data forwarding for intermittently connected wireless networks,\" IEEE Wireless Communications, vol. 22, no. 4, pp. 66-73, 2015.","key":"ref4","DOI":"10.1109\/MWC.2015.7224729"},{"doi-asserted-by":"crossref","unstructured":"[6] T. Murakami, I. Sasase, and M. Bandai, \"Split multi-path routing protocol with load balancing policy (SMR-LB) to improve TCP performance in mobile ad hoc networks,\" in Proc. 16th IEEE International Symposium on PIMRC, Berlin, 2005, pp. 1424-1428.","key":"ref5","DOI":"10.1109\/PIMRC.2005.1651680"},{"doi-asserted-by":"crossref","unstructured":"[7] B. Karaoglu and W. Heinzelman, \"Cooperative load balancing and dynamic channel allocation for clusterbased mobile ad hoc networks,\" IEEE Trans. Mobile Comput., vol. 14, no. 5, pp. 951-963, 2015.","key":"ref6","DOI":"10.1109\/TMC.2014.2339215"},{"doi-asserted-by":"crossref","unstructured":"[8] V. Loscri and S. Marano, \"A new geographic multipath protocol for ad hoc networks to reduce the route coupling phenomenon,\" in Proc. 63th IEEE Vehicular Technology Conference, Melbourne, Vic., 2006, pp. 1102-1106.","key":"ref7","DOI":"10.1109\/VETECS.2006.1683005"},{"doi-asserted-by":"crossref","unstructured":"[9] D. P. Wu, J. He, H. G. Wang, C. G. Wang, and R. Y. Wang, \"A hierarchical packet forwarding mechanism for energy harvesting wireless sensor networks,\" IEEE Communications Magazine, vol. 53, no. 8, pp. 92-98, 2015.","key":"ref8","DOI":"10.1109\/MCOM.2015.7180514"},{"doi-asserted-by":"crossref","unstructured":"[10] B. H. Bloom, \"Space\/time trade-offs in hash coding with allowable errors,\" ACM Commun., vol. 13, no. 7, pp. 442-426, 1970.","key":"ref9","DOI":"10.1145\/362686.362692"},{"doi-asserted-by":"crossref","unstructured":"[11] L. Pelusi, A. Passarella, and M. Conti, \"Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks,\" IEEE Communications Magazine, vol. 44, no. 11, pp. 134\u2013141, 2006.","key":"ref10","DOI":"10.1109\/MCOM.2006.248176"},{"doi-asserted-by":"crossref","unstructured":"[12] Y. Li, Y. Jiang, D. Jin, L. Su, L. Zeng, and D. O. Wu, \"Energyefficient optimal opportunistic forwarding for delay-tolerant networks,\" IEEE Transactions on Vehicular Technology, vol. 59, no. 9, pp. 4500\u20134512, 2010.","key":"ref11","DOI":"10.1109\/TVT.2010.2070521"},{"doi-asserted-by":"crossref","unstructured":"[13] S. J. Lee and M. Gerla, \"Dynamic load-aware routing in ad hoc networks,\" in Proc. IEEE International Conference on Communications, Helsinki, 2001, pp. 3206-3210.","key":"ref12","DOI":"10.1109\/ICC.2001.937263"},{"doi-asserted-by":"crossref","unstructured":"[14] Y. J. Lee and G. F. Riley, \"A workload-based adaptive load-balancing technique for mobile ad hoc networks,\" in Proc. IEEE Wireless Communications and Networking Conference, 2005, pp. 2002-2007.","key":"ref13","DOI":"10.1109\/WCNC.2005.1424826"},{"unstructured":"[15] S. Y. Yin and X. K. Lin, \"Adaptive load balancing in mobile ad hoc networks,\" in Proc. IEEE Wireless Communications and Networking Conference, 2005, pp. 1982-1987.","key":"ref14"},{"doi-asserted-by":"crossref","unstructured":"[16] P. Engelstad, Y. Zheng, T. Jonvik, and D. Van Thanh, \"Trust based secure on demand routing protocol (TSDRP) for MANETs,\" in Proc. 4th IEEE International Conference on Advanced Computing & Communication Technologies, Rohtak, 2014, pp. 432-438.","key":"ref15","DOI":"10.1109\/ACCT.2014.95"},{"doi-asserted-by":"crossref","unstructured":"[17] C. Perkins, E Royer, and S. Das, \"Ad hoc on-demand distance vector (AODV) routing,\" RFC 3561, July 2003.","key":"ref16","DOI":"10.17487\/rfc3561"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2016\/1125\/20161125053952601.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T22:02:03Z","timestamp":1749852123000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=168&id=1053"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":17,"URL":"https:\/\/doi.org\/10.12720\/jcm.11.11.1012-1019","relation":{},"ISSN":["2374-4367"],"issn-type":[{"type":"print","value":"2374-4367"}],"subject":[],"published":{"date-parts":[[2016]]}}}