{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,15]],"date-time":"2024-05-15T05:51:37Z","timestamp":1715752297988},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T00:00:00Z","timestamp":1585094400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T00:00:00Z","timestamp":1585094400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11277-020-07225-1","type":"journal-article","created":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T11:03:09Z","timestamp":1585134189000},"page":"481-498","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Cache-Aware Query-Broadcast to Improve QoS of Routing Protocols in MANETs"],"prefix":"10.1007","volume":"113","author":[{"given":"Naeem","family":"Ahmad","sequence":"first","affiliation":[]},{"given":"Shuchi","family":"Sethi","sequence":"additional","affiliation":[]},{"given":"Muqeem","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,25]]},"reference":[{"key":"7225_CR1","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.jksuci.2015.08.004","volume":"28","author":"N Ahmad","year":"2015","unstructured":"Ahmad, N., & Hussain, S. Z. (2015). Broadcast expenses controlling techniques in mobile ad-hoc networks: A survey. Journal of King Saud University-Computer and Information Sciences, 28, 248\u2013261.","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"issue":"1","key":"7225_CR2","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11235-018-0469-6","volume":"70","author":"N Ahmad","year":"2018","unstructured":"Ahmad, N., & Hussain, S. Z. (2018). Analytical comparisons of query-broadcast repealing schemes in MANETs. Telecommunication Systems (TELS), 70(1), 67\u201379.","journal-title":"Telecommunication Systems (TELS)"},{"key":"7225_CR3","first-page":"108","volume":"8","author":"N Aitha","year":"2009","unstructured":"Aitha, N., & Srinadas, R. (2009). A strategy to reduce the control packet load of AODV using weighted rough set model for MANET. The International Arab Journal of Information Technology, 8, 108\u2013116.","journal-title":"The International Arab Journal of Information Technology"},{"key":"7225_CR4","unstructured":"Al-Rodhaan, M. A., Mackenzie, L., & Ould-Khaoua, M. (2008). Improvement to blocking expanding ring search for manets. Department of Computing Science, University of Glasgow, Glasgow, UK, 2008, 1\u201313."},{"key":"7225_CR5","doi-asserted-by":"crossref","unstructured":"Basagni, S., Chlamtac, I., Syrotiuk, V. R., & Woodward, B. A. (1998). A distance routing effect algorithm for mobility (dream). In Proceedings of the 4th annual ACM\/IEEE international conference on mobile computing and networking, MobiCom \u201998 (pp. 76\u201384). ACM.","DOI":"10.1145\/288235.288254"},{"issue":"2\/3","key":"7225_CR6","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1023\/A:1013711808509","volume":"8","author":"R Casta\u00f1eda","year":"2002","unstructured":"Casta\u00f1eda, R., Das, S. R., & Marina, M. K. (2002). Query localization techniques for on-demand routing protocols in ad hoc networks. Wireless Networks, 8(2\/3), 137\u2013151.","journal-title":"Wireless Networks"},{"key":"7225_CR7","doi-asserted-by":"crossref","unstructured":"Chang, N., & Liu, M. (2004). Revisiting the TTL-based controlled flooding search: Optimality and randomization. In Proceedings of the 10th annual international conference on mobile computing and networking (pp. 85\u201399). ACM.","DOI":"10.1145\/1023720.1023730"},{"issue":"2","key":"7225_CR8","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1023\/A:1013941929408","volume":"5","author":"M Chatterjee","year":"2002","unstructured":"Chatterjee, M., Das, S., & Turgut, D. (2002). WCA: A weighted clustering algorithm for mobile ad hoc networks. Cluster Computing, 5(2), 193\u2013204.","journal-title":"Cluster Computing"},{"issue":"3","key":"7225_CR9","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1007\/s11277-019-06658-7","volume":"109","author":"SD Chavan","year":"2019","unstructured":"Chavan, S. D., & Kulkarni, A. V. (2019). Improved bio inspired energy efficient clustering algorithm to enhance QoS of WSNs. Wireless Personal Communications, 109(3), 1897\u20131910.","journal-title":"Wireless Personal Communications"},{"key":"7225_CR10","unstructured":"Choi, W., & Woo, M. (2006). A distributed weighted clustering algorithm for mobile ad hoc networks. In Proceeding of advanced international conference on telecommunications\/international conference on internet and web applications and services, AICT-ICIW\u201906 (pp. 73\u201373). IEEE."},{"key":"7225_CR11","unstructured":"Dogra, A. K., et al. (2018). Q-AODV: A flood control ad-hoc on demand distance vector routing protocol. In 2018 first international conference on secure cyber computing and communication (ICSCCC) (pp. 294\u2013299). IEEE."},{"key":"7225_CR12","doi-asserted-by":"crossref","unstructured":"Dubois-Ferriere, H., Grossglauser, M., & Vetterli, M. (2003). Age matters: Efficient route discovery in mobile ad hoc networks using encounter ages. In Proceedings of the 4th ACM international symposium on mobile ad hoc networking & computing (pp. 257\u2013266). ACM.","DOI":"10.1145\/778415.778446"},{"key":"7225_CR13","doi-asserted-by":"crossref","unstructured":"Gargano, L., & Hammar, M. (2004). Limiting flooding expenses in on-demand source-initiated protocols for mobile wireless networks. In Proceedings of 18th international parallel and distributed processing symposium, 2004 (p. 220). IEEE.","DOI":"10.1109\/IPDPS.2004.1303256"},{"key":"7225_CR14","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.jksuci.2016.05.001","volume":"30","author":"SZ Hussain","year":"2017","unstructured":"Hussain, S. Z., & Ahmad, N. (2017). Minimizing broadcast expenses in clustered ad-hoc networks. Journal of King Saud University\u2014Computer and Information Sciences, 30, 67\u201379.","journal-title":"Journal of King Saud University\u2014Computer and Information Sciences"},{"issue":"3","key":"7225_CR15","doi-asserted-by":"publisher","first-page":"1459","DOI":"10.1007\/s11277-019-06795-z","volume":"110","author":"A Jain","year":"2020","unstructured":"Jain, A., & Goel, A. K. (2020). Energy efficient fuzzy routing protocol for wireless sensor networks. Wireless Personal Communications, 110(3), 1459\u20131474.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"7225_CR16","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1007\/s11277-019-06494-9","volume":"108","author":"R Jain","year":"2019","unstructured":"Jain, R., & Kashyap, I. (2019). An QoS aware link defined OLSR (LD-OLSR) routing protocol for MANETs. Wireless Personal Communications, 108(3), 1745\u20131758.","journal-title":"Wireless Personal Communications"},{"key":"7225_CR17","first-page":"1","volume":"110","author":"T Kalidoss","year":"2019","unstructured":"Kalidoss, T., Rajasekaran, L., Kanagasabai, K., Sannasi, G., & Kannan, A. (2019). QoS aware trust based routing algorithm for wireless sensor networks. Wireless Personal Communications, 110, 1\u201322.","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"7225_CR18","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1023\/A:1019106118419","volume":"6","author":"YB Ko","year":"2000","unstructured":"Ko, Y. B., & Vaidya, N. H. (2000). Location-aided routing (LAR) in mobile ad hoc networks. Wireless Networks, 6(4), 307\u2013321.","journal-title":"Wireless Networks"},{"key":"7225_CR19","doi-asserted-by":"crossref","unstructured":"Lima, R., Baquero, C., & Miranda, H. (2013). Broadcast cancellation in search mechanisms. In Proceedings of the 28th annual ACM symposium on applied computing, SAC \u201913 (pp. 548\u2013553). ACM, New York, NY, USA.","DOI":"10.1145\/2480362.2480467"},{"issue":"1","key":"7225_CR20","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11277-019-06853-6","volume":"111","author":"J Marietta","year":"2020","unstructured":"Marietta, J., & Mohan, B. C. (2020). A review on routing in internet of things. Wireless Personal Communications, 111(1), 209\u2013233.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"7225_CR21","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1093\/ietcom\/e88-b.3.1017","volume":"88","author":"M Minematsu","year":"2005","unstructured":"Minematsu, M., Saito, M., Hiroto, A., & Tokuda, H. (2005). Efficient route discovery scheme in ad hoc networks using routing history. IEICE Transactions on Communications, 88(3), 1017\u20131025.","journal-title":"IEICE Transactions on Communications"},{"key":"7225_CR22","unstructured":"Park, I., Kim, J., Pu, I., et al. (2006). Blocking expanding ring search algorithm for efficient energy consumption in mobile ad hoc networks. In WONS 2006: Third annual conference on wireless on-demand network systems and services (pp. 191\u2013195)."},{"key":"7225_CR23","doi-asserted-by":"crossref","unstructured":"Prabhavat, S., Narongkhachavana, W., Thongthavorn, T., & Phankaew, C. (2019). Low overhead localized routing in mobile ad hoc networks. Wireless Communications and Mobile Computing.","DOI":"10.1155\/2019\/9652481"},{"key":"7225_CR24","first-page":"207","volume":"1204","author":"K Preetha","year":"1820","unstructured":"Preetha, K., Unnikrishnan, A., & Jacob, K. P. (1820). A probabilistic approach to reduce the route establishment overhead in AODV algorithm for MANET. CoRR, 1204, 207\u2013214.","journal-title":"CoRR"},{"key":"7225_CR25","doi-asserted-by":"crossref","unstructured":"Pu, I. M., & Shen, Y. (2009). Enhanced blocking expanding ring search in mobile ad hoc networks. In 2009 3rd international conference on new technologies, mobility and security (NTMS) (pp. 1\u20135). IEEE.","DOI":"10.1109\/NTMS.2009.5384676"},{"key":"7225_CR26","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.jda.2013.03.006","volume":"24","author":"IM Pu","year":"2014","unstructured":"Pu, I. M., Stamate, D., & Shen, Y. (2014). Improving time-efficiency in blocking expanding ring search for mobile ad hoc networks. Journal of Discrete Algorithms, 24, 59\u201367.","journal-title":"Journal of Discrete Algorithms"},{"key":"7225_CR27","doi-asserted-by":"crossref","unstructured":"Qayyum, A., Viennot, L., & Laouiti, A. (2002). Multipoint relaying for flooding broadcast messages in mobile wireless networks. In Proceedings of the 35th annual Hawaii international conference on system sciences, HICSS\u201902 (pp. 3866\u20133875). IEEE.","DOI":"10.1109\/HICSS.2002.994521"},{"key":"7225_CR28","doi-asserted-by":"crossref","unstructured":"Tonguz, O. K., Wisitpongphan, N., Parikh, J. S., Bai, F., Mudalige, P., & Sadekar, V. K. (2006). On the broadcast storm problem in ad hoc wireless networks. In 2006 3rd international conference on broadband communications, networks and systems, BROADNETS 2006 (pp. 1\u201311). IEEE.","DOI":"10.1109\/BROADNETS.2006.4374403"},{"key":"7225_CR29","unstructured":"Zeeshan, S. H., & Naeem, A. (2014). Cluster based controlling of route exploring packets in ad-hoc networks. In Proceedings of the 2nd international conference on advanced computing, networking, and informatics, ICACNI\u201914 (Vol. 28, pp. 103\u2013112). Smart Innovation, Systems and Technologies, Springer Verlag."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07225-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07225-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07225-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,25]],"date-time":"2021-03-25T00:09:49Z","timestamp":1616630989000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07225-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,25]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["7225"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07225-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,25]]},"assertion":[{"value":"25 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}