{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,11]],"date-time":"2024-01-11T00:09:21Z","timestamp":1704931761486},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1587\/transcom.2017ebp3382","type":"journal-article","created":{"date-parts":[[2018,2,19]],"date-time":"2018-02-19T22:20:13Z","timestamp":1519078813000},"page":"1833-1844","source":"Crossref","is-referenced-by-count":3,"title":["Reachability Analysis of Multi-Hop D2D Communications at Disaster"],"prefix":"10.23919","volume":"E101.B","author":[{"given":"Noriaki","family":"KAMIYAMA","sequence":"first","affiliation":[{"name":"Faculty of Engineering, Fukuoka University"}]},{"given":"Keisuke","family":"ISHIBASHI","sequence":"additional","affiliation":[{"name":"NTT Network Technology Laboratories"}]},{"given":"Yoko","family":"HOSHIAI","sequence":"additional","affiliation":[{"name":"NTT Network Technology Laboratories"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] A. Damnjanovic, J. Montojo, Y. Wei, T. Ji, T. Luo, M. Vajapeyam, T. Yoo, O. Song, and D. Malladi, \u201cA survey on 3GPP heterogeneous networks,\u201d IEEE Wireless Commun., vol.18, no.3, pp.10-21, June 2011. 10.1109\/mwc.2011.5876496","DOI":"10.1109\/MWC.2011.5876496"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] H. Nishiyama, M. Ito, and N. Kato, \u201cRelay-by-smartphone: Realizing multi-hop device-to-device communications,\u201d IEEE Commun. Mag., vol.52, no.4, pp.56-65, April 2014. 10.1109\/mcom.2014.6807947","DOI":"10.1109\/MCOM.2014.6807947"},{"key":"3","unstructured":"[3] Report of Ministry of Internal Affairs and Communications, https:\/\/www.jaipa.or.jp\/IGF-J\/2011\/110721_soumu.pdf"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] A. Asadi, Q. Wang, and V. Mancuso, \u201cA survey on device-to-device communication in cellular networks,\u201d IEEE Commun. Surveys Tuts., vol.16, no.4, pp.1801-1819, Fourth Quarter 2014. 10.1109\/comst.2014.2319555","DOI":"10.1109\/COMST.2014.2319555"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] L. Lei, Z. Zhong, C. Lin, and X. Shen, \u201cOperator controlled device-to-device communications in LTE-advanced networks,\u201d IEEE Wireless Commun., vol.19, no.3, pp.96-104, June 2012. 10.1109\/mwc.2012.6231164","DOI":"10.1109\/MWC.2012.6231164"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] A. Al-Hourani, S. Kandeepan, and A. Jamalipour, \u201cStochastic geometry study on device-to-device communication as a disaster relief solution,\u201d IEEE IEEE Trans. Veh. Technol., vol.65, no.5, pp.3005-3017, May 2016. 10.1109\/tvt.2015.2450223","DOI":"10.1109\/TVT.2015.2450223"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] M. Tanha, D. Sajjadi, F. Tong, and J. Pan, \u201cDisaster management and response for modern cellular networks using flow-based multi-hop device-to-device communications,\u201d Proc. IEEE 84th Vehicular Technology Conference, Montreal, Sept. 2016. 10.1109\/vtcfall.2016.7880960","DOI":"10.1109\/VTCFall.2016.7880960"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] H. Yuan, W. Guo, and S. Wang, \u201cEmergency route selection for D2D cellular communications during an urban terrorist attack,\u201d Proc. IEEE International Conference on Communications, Sydney, June 2014. 10.1109\/iccw.2014.6881202","DOI":"10.1109\/ICCW.2014.6881202"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] S. Wang, W. Guo, Z. Zhou, Y. Wu, and X. Chu, \u201cOutage probability for multi-hop D2D communications with shortest path routing,\u201d IEEE Commun. Lett., vol.19, no.11, pp.1997-2000, Nov. 2015. 10.1109\/lcomm.2015.2475428","DOI":"10.1109\/LCOMM.2015.2475428"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] L. Wei, A. Papathanassiou, Q. Li, and G. Wu, \u201cSystem-level simulations for multi-hop D2D communications overlay LTE networks,\u201d Proc. International Conference on Computing, Networking and Communicationunications, Kauai, Feb. 2016. 10.1109\/iccnc.2016.7440659","DOI":"10.1109\/ICCNC.2016.7440659"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] L. Melki, S. Najeh, and H. Besbes, \u201cSystem performance of cellular network underlaying D2D multi-hop communication,\u201d Proc. 5th International Conference on Communications and Networking, Hammamet, Nov. 2015. 10.1109\/comnet.2015.7566629","DOI":"10.1109\/COMNET.2015.7566629"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] K. Doppler, M. Rinne, C. Wijting, C. Ribeiro, and K. Hugl, \u201cDevice-to-device communication as an underlay to LTE-advanced networks,\u201d IEEE Commun. Mag., vol.47, no.12, pp.42-49, Dec. 2009. 10.1109\/mcom.2009.5350367","DOI":"10.1109\/MCOM.2009.5350367"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] N. Golrezaei, P. Mansourifard, A. Molisch, and A. Dimakis, \u201cBase-station assisted device-to-device communications for high-throughput wireless video networks,\u201d IEEE Trans. Wireless Commun., vol.13, no.7, pp.3665-3676, July 2014. 10.1109\/twc.2014.2316817","DOI":"10.1109\/TWC.2014.2316817"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] Q. Wang and B. Rengarajan, \u201cRecouping opportunistic gain in dense base station layouts through energy-aware user cooperation,\u201d Proc. IEEE 14 th International Symposium on a World of Wireless, Mobile and Multimedia Networks, Madrid, June 2013. 10.1109\/wowmom.2013.6583397","DOI":"10.1109\/WoWMoM.2013.6583397"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] B. Zhou, S. Ma, J. Xu, and Z. Li, \u201cGroup-wise channel sensing and resource pre-allocation for LTE D2D on ISM band,\u201d Proc. IEEE Wireless Communications and Networking Conference, Shanghai, April 2013. 10.1109\/wcnc.2013.6554549","DOI":"10.1109\/WCNC.2013.6554549"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] Y. Wu, W. Guo, H. Yuan, L. Li, S. Wang, X. Chu, and J. Zhang, \u201cDevice-to-device meets LTE-unlicensed,\u201d IEEE Commun. Mag., vol.54, no.5, pp.154-159, May 2016. 10.1109\/mcom.2016.7470950","DOI":"10.1109\/MCOM.2016.7470950"},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Miklos, and Z. Turanyi, \u201cDesign aspects of network assisted device-to-device communications,\u201d IEEE Commun. Mag., vol.50, no.3, pp.170-177, March 2012. 10.1109\/mcom.2012.6163598","DOI":"10.1109\/MCOM.2012.6163598"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] X. Lin, J. Andrews, A. Ghosh, and R. Ratasuk, \u201cAn overview of 3GPP device-to-device proximity services,\u201d IEEE Commun. Mag., vol.52, no.4, pp.40-48, April 2014. 10.1109\/mcom.2014.6807945","DOI":"10.1109\/MCOM.2014.6807945"},{"key":"19","unstructured":"[19] \u201cStudy on architecture enhancements to support proximity services (ProSe) (Release 12),\u201d 3GPP TR 23.703 V12.0.0, Feb. 2014."},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] P. Li and S. Guo, \u201cIncentive mechanisms for device-to-device communications,\u201d IEEE Netw., vol.29, no.4, pp.75-79, July\/Aug. 2015. 10.1109\/mnet.2015.7166194","DOI":"10.1109\/MNET.2015.7166194"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] L. Babun, A. Yurekli, and I. Guvenc, \u201cMulti-hop and D2D communications for extending coverage in public safety scenarios,\u201d Proc. 40th Annual IEEE Conference on Local Computer Networks, Florida, Oct. 2015. 10.1109\/lcnw.2015.7365946","DOI":"10.1109\/LCNW.2015.7365946"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] C. Barakat, P. Thiran, G. Iannaccone, C. Diot, P. Owezarski, \u201cA flow-based model for Internet backbone traffic,\u201d Proc. 2nd ACM SIGCOMM Workshop on Internet Measurement, 2002. 10.1145\/637205.637206","DOI":"10.1145\/637205.637206"},{"key":"23","unstructured":"[23] R.P. Brent, Algorithms for Minimization without Derivatives, Dover Publications, New York, 2013."},{"key":"24","unstructured":"[24] OpenStreetMap Japan, https:\/\/openstreetmap.jp"},{"key":"25","unstructured":"[25] NTT East, \u201cCover Area of Housing Station,\u201d https:\/\/www.ntt-east.co.jp\/info-st\/info_dsl\/area.html (in Japanese)."},{"key":"26","unstructured":"[26] M. Ben-Akiva and S.R. Lerman, Discrete Choice Analysis, The MIT Press, 1997."},{"key":"27","doi-asserted-by":"publisher","unstructured":"[27] M. Mori and H. Tsukaguchi, \u201cPedestrian movements on footways,\u201d Proc. Doboku Gakkai Ronbunshuu, vol.268, pp.99-108, Dec. 1977 (in Japanese). 10.2208\/jscej1969.1977.268_99","DOI":"10.2208\/jscej1969.1977.268_99"},{"key":"28","unstructured":"[28] Report of MIC, http:\/\/www.soumu.go.jp\/main_content\/000453687.pdf"},{"key":"29","unstructured":"[29] Report of MIC, http:\/\/www.soumu.go.jp\/main_content\/000117676.pdf"},{"key":"30","unstructured":"[30] R. Chen, T. Terriberry, J. Skoglund, G. Maxwell, and H. Nguyet, \u201cOpus testing,\u201d IETF 80, Prague, March 2011."}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E101.B\/8\/E101.B_2017EBP3382\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T15:01:36Z","timestamp":1704898896000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E101.B\/8\/E101.B_2017EBP3382\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,1]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2017ebp3382","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,1]]}}}