{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:28:28Z","timestamp":1722943708588},"reference-count":19,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2018]]},"DOI":"10.12720\/jcm.13.7.350-356","type":"journal-article","created":{"date-parts":[[2019,10,29]],"date-time":"2019-10-29T05:51:18Z","timestamp":1572328278000},"page":"350-356","source":"Crossref","is-referenced-by-count":5,"title":["F-EEAODV: Fuzzy Based Energy Efficient Reactive Routing Protocol in Wireless Ad-hoc Networks"],"prefix":"10.12720","author":[{"name":"Hyderabad Institute of Technology and Management, Hyderabad-501401, India","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Pushpender","family":"Sarao","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"4977","published-online":{"date-parts":[[2018]]},"reference":[{"key":"ref0","unstructured":"[1] P. Sarao, \"Efficiency evaluation of routing techniques in wireless networks,\" International Journal in Multidisciplinary and Academic Research, vol. 6, no. 1, pp. 1-10, February 2017."},{"key":"ref1","doi-asserted-by":"publisher","unstructured":"[2] C. Bhatia, M. Nandwani, and Nidhi, \"Implementing and comparing DSR and DSDV routing protocols of mobile ad-hoc networks using NS2 simulator,\" International Journal of Computer Applications, vol. 92, no. 6, pp. 18-24, April 2014.","DOI":"10.5120\/16013-4990"},{"key":"ref2","unstructured":"[3] J. Sathiyajothi, \"Performance analysis of routing protocols for manet using NS2 simulator,\" Advances in Natural and Applied Sciences, vol. 11, no. 8, pp. 381-388, June 2017."},{"key":"ref3","doi-asserted-by":"publisher","unstructured":"[4] M. M. Javidi and M. V. Baseri, \"Fuzzy selfish detection ad hoc on-demand distance vector routing protocol (FSDAODV),\" Journal of Computer Science & Computational Mathematics, vol. 7, no. 1, pp. 7-12, March 2017.","DOI":"10.20967\/jcscm.2017.01.002"},{"key":"ref4","doi-asserted-by":"publisher","unstructured":"[5] G. Aldabbagh, P. A. Shah, H. B. Hasbullah, F. Aadil, and K. M. Awan, \"Fuzzy logic based enhanced AOMDV with link status classification for efficient multi-path routing in multi-hop wireless networks,\" Journal of Computational and Theoretical Nanoscience, vol. 13, pp. 1-11, January 2017.","DOI":"10.1166\/jctn.2017.6252"},{"key":"ref5","doi-asserted-by":"publisher","unstructured":"[6] M. O. Johnson, A. Siddiqui, and A. Karani, \"A wormhole attack detection and prevention technique in wireless sensor networks,\" International Journal of Computer Applications, vol. 174, no. 4, pp. 1-8, September 2017.","DOI":"10.5120\/ijca2017915376"},{"key":"ref6","doi-asserted-by":"publisher","unstructured":"[7] N. I. Abbas and M. Ilkan, \"Fuzzy approach to improving route stability of the AODV routing protocol,\" Eurasip Journal on Wireless Communications and Networking, vol. 2015, no. 235, pp. 1-11, December 2015.","DOI":"10.1186\/s13638-015-0464-5"},{"key":"ref7","doi-asserted-by":"publisher","unstructured":"[8] V. Sharma, B. Alam, and M. N. Doja, \"ANFIS aided AODV routing protocolfor mobile ad hoc networks,\" Journal of Computer Science, 2017, pp. 1-10.","DOI":"10.3844\/jcssp.2017.514.523"},{"key":"ref8","doi-asserted-by":"publisher","unstructured":"[9] K. Singh and S. Moh, \"An energy-efficient and robust multipath routing protocol for cognitive radio ad hoc networks,\" Sensors, 2017, pp. 1-17.","DOI":"10.3390\/s17092027"},{"key":"ref9","unstructured":"[10] M. Uddin, A. A. Rahman, A. A. M. Talha, A. Shah, M. Iftikhar, and A. Zomaya, \"Improving performance of mobile ad hoc networks using efficient tactical on demand distance vector (TAODV) routing algorithm,\" International Journal of Innovative Computing, Information and Control, vol. 8, no. 6 pp. 4375-4389, June 2012."},{"key":"ref10","doi-asserted-by":"publisher","unstructured":"[11] A. Touzene and I. Al-Yahyai, \"Performance analysis of grid based AODV routing algorithm for AD hoc wireless networks,\" Int. J. Communications, Network and System Sciences, vol. 8, pp. 523-532, December 2015.","DOI":"10.4236\/ijcns.2015.813047"},{"key":"ref11","doi-asserted-by":"publisher","unstructured":"[12] M. S. Islam, M. N. Hider, M. T. Haque, and L. miah, \"An extensive comparison among DSDV, DSR and AODV protocols in MANET,\" International Journal of Computer Applications, vol. 15, no. 2, pp. 22-24, February 2011.","DOI":"10.5120\/1919-2562"},{"key":"ref12","unstructured":"[13] J. Agarkhed, \"Study of security enhancement in AODV routing protocol in ad hoc networks,\" International Journal of Computer Engineering & Technology, vol. 8, no. 5, pp. 99-106, Sep.-Oct. 2017."},{"key":"ref13","unstructured":"[14] A. Kumar and P. S. Manocha, \"Enhanced M-AODV: modified ad hoc on-demand distance vector routing scheme,\" International Journal of Engineering Science and Computing, vol. 7, no. 7, pp. 13806-13608, July 2017."},{"key":"ref14","unstructured":"[15] G. Pattun and V. Sireesha, \"A reaction based approach to detect black hole attacj using modified AODV protocol in MANETs,\" International Journal of Wireless Communication and Networking, vol. 6, no. 1, pp. 1-5, 2016."},{"key":"ref15","doi-asserted-by":"publisher","unstructured":"[16] V. T. Tu and L. T. Ngoc, \"SMA2AODV: Routing protocol reduces the harm of flooding attacks in mobile ad hoc network,\" Journal of Communications, vol. 12, no. 7, pp. 371-378, 2017.","DOI":"10.12720\/jcm.12.7.371-378"},{"key":"ref16","doi-asserted-by":"publisher","unstructured":"[17] N. Li, B. Gong, and Z. Deng, \"A handoff algorithm based on parallel fuzzy neural network in mobile satellite networks,\" Journal of Communications, vol. 12, no. 7, pp. 395-404, 2017.","DOI":"10.12720\/jcm.12.7.395-404."},{"key":"ref17","doi-asserted-by":"publisher","unstructured":"[18] W. Duch, \"Uncertainty of data, fuzzy membership functions, and multi-layer perceptrons,\" IEEE Transaction on Neural Networks, vol. 20, pp. 1-12, 2004.","DOI":"10.1109\/TNN.2004.836200"},{"key":"ref18","doi-asserted-by":"publisher","unstructured":"[19] T. P. Hong and C. Y. Leeb, \"Induction of fuzzy rules and membership functions from training examples,\" Fuzzy Sets and Systems, vol. 84, pp. 33-47, 1996.","DOI":"10.1016\/0165-0114(95)00305-3"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2018\/0626\/20180626110701670.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,29]],"date-time":"2020-12-29T08:38:35Z","timestamp":1609231115000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/index.php?m=content&c=index&a=show&catid=193&id=1229"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":19,"URL":"https:\/\/doi.org\/10.12720\/jcm.13.7.350-356","relation":{},"ISSN":["2374-4367"],"issn-type":[{"type":"print","value":"2374-4367"}],"subject":[],"published":{"date-parts":[[2018]]}}}