{"id":"https://openalex.org/W1623434819","doi":"https://doi.org/10.1109/icitcs.2015.7293023","title":"Survey on MANET Based Communication Scenarios for Search and Rescue Operations","display_name":"Survey on MANET Based Communication Scenarios for Search and Rescue Operations","publication_year":2015,"publication_date":"2015-08-01","ids":{"openalex":"https://openalex.org/W1623434819","doi":"https://doi.org/10.1109/icitcs.2015.7293023","mag":"1623434819"},"language":"en","primary_location":{"id":"doi:10.1109/icitcs.2015.7293023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitcs.2015.7293023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 5th International Conference on IT Convergence and Security (ICITCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069766259","display_name":"Shaik Shabana Anjum","orcid":"https://orcid.org/0000-0002-3144-8989"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]},{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]}],"countries":["MY","PK"],"is_corresponding":true,"raw_author_name":"Shaik Shabana Anjum","raw_affiliation_strings":["Faculty of Computer Science and Information, Technology University of Malaya, Kuala Lumpur, Malaysia","Information Technology University, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science and Information, Technology University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Information Technology University, Lahore, Pakistan","institution_ids":["https://openalex.org/I1323252656"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017116281","display_name":"Rafidah Md Noor","orcid":"https://orcid.org/0000-0001-6266-2390"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Rafidah Md Noor","raw_affiliation_strings":["Fac. of Comput. Sci. & Inf. Technol., Univ. of Malaya Kuala Lumpur, Kuala Lumpur, Malaysia","University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Fac. of Comput. Sci. & Inf. Technol., Univ. of Malaya Kuala Lumpur, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054251799","display_name":"Mohammad Hossein Anisi","orcid":"https://orcid.org/0000-0001-8414-2708"},"institutions":[{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]},{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY","PK"],"is_corresponding":false,"raw_author_name":"Mohammad Hossein Anisi","raw_affiliation_strings":["Fac. of Comput. Sci. & Inf. Technol., Univ. of Malaya Kuala Lumpur, Kuala Lumpur, Malaysia","Information Technology University, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Fac. of Comput. Sci. & Inf. Technol., Univ. of Malaya Kuala Lumpur, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Information Technology University, Lahore, Pakistan","institution_ids":["https://openalex.org/I1323252656"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069766259"],"corresponding_institution_ids":["https://openalex.org/I1323252656","https://openalex.org/I33849332"],"apc_list":null,"apc_paid":null,"fwci":2.9954,"has_fulltext":false,"cited_by_count":29,"citation_normalized_percentile":{"value":0.91785979,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"xxxiii","issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.744515597820282},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.7082261443138123},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6078536510467529},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5998006463050842},{"id":"https://openalex.org/keywords/search-and-rescue","display_name":"Search and rescue","score":0.48729240894317627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.43105459213256836},{"id":"https://openalex.org/keywords/disaster-recovery","display_name":"Disaster recovery","score":0.4299187660217285},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4188619554042816},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4174739420413971},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.36878103017807007},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.22244271636009216},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.11180022358894348}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.744515597820282},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.7082261443138123},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6078536510467529},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5998006463050842},{"id":"https://openalex.org/C2775935494","wikidata":"https://www.wikidata.org/wiki/Q741964","display_name":"Search and rescue","level":3,"score":0.48729240894317627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.43105459213256836},{"id":"https://openalex.org/C129230348","wikidata":"https://www.wikidata.org/wiki/Q1140205","display_name":"Disaster recovery","level":2,"score":0.4299187660217285},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4188619554042816},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4174739420413971},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.36878103017807007},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.22244271636009216},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.11180022358894348},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C90509273","wikidata":"https://www.wikidata.org/wiki/Q11012","display_name":"Robot","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitcs.2015.7293023","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitcs.2015.7293023","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 5th International Conference on IT Convergence and Security (ICITCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W156690507","https://openalex.org/W1528357153","https://openalex.org/W1537207871","https://openalex.org/W1549841951","https://openalex.org/W1972248659","https://openalex.org/W1974305292","https://openalex.org/W1987255604","https://openalex.org/W1987404083","https://openalex.org/W1998747964","https://openalex.org/W2000828608","https://openalex.org/W2007217169","https://openalex.org/W2014032193","https://openalex.org/W2032234412","https://openalex.org/W2043050152","https://openalex.org/W2046179762","https://openalex.org/W2046789485","https://openalex.org/W2081275818","https://openalex.org/W2090527522","https://openalex.org/W2104375160","https://openalex.org/W2106655790","https://openalex.org/W2108823884","https://openalex.org/W2112248252","https://openalex.org/W2121618286","https://openalex.org/W2124432910","https://openalex.org/W2145462274","https://openalex.org/W2186369472","https://openalex.org/W2289441042","https://openalex.org/W2328079780","https://openalex.org/W2331300059","https://openalex.org/W2398529009","https://openalex.org/W2992922161","https://openalex.org/W6632891780","https://openalex.org/W6647318874","https://openalex.org/W6676464162","https://openalex.org/W6712885523","https://openalex.org/W6771048507"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W1511473871","https://openalex.org/W1581687089","https://openalex.org/W2003275014","https://openalex.org/W4210799434","https://openalex.org/W2282175249"],"abstract_inverted_index":{"Mobile":[0,22,148],"crowd":[1],"management":[2,84],"is":[3,57,163],"yet":[4],"an":[5,58],"emerging":[6],"new":[7,28],"research":[8,130],"area":[9],"for":[10,27,96,155,190,204],"Search":[11],"and":[12,19,41,52,62,90,104,132,157,174,196,206,209,225],"Rescue":[13],"(SAR)":[14],"operations.":[15],"The":[16,68,160],"dynamic":[17],"nature":[18],"mobility":[20,103],"of":[21,30,65,70,82,126,168,176,202,221,227],"Adhoc":[23,149],"Networks":[24,150],"(MANETs)":[25,151],"demand":[26],"set":[29],"networking":[31],"strategies":[32],"to":[33,38,113,123,164],"be":[34,114,124],"developed":[35],"in":[36,48,78,110,119,140],"order":[37],"provide":[39,165],"reliable":[40],"efficient":[42],"communication":[43,71,97,223],"during":[44],"catastrophe":[45],"such":[46,85],"as":[47,86,186],"battlefield,":[49],"terrorist":[50],"attacks":[51],"natural":[53],"disasters.":[54],"A":[55],"MANET":[56,120,169],"independent,":[59],"dynamic,":[60],"self-adaptive":[61],"infrastructure-less":[63],"connection":[64],"mobile":[66],"devices.":[67],"role":[69,77],"has":[72,133],"been":[73,184],"playing":[74],"a":[75,166,187],"major":[76],"all":[79],"the":[80,102,127,138,141,147,198,210,215,219],"aspects":[81],"catastrophic":[83],"circumspection":[87],"or":[88],"response":[89,181],"recovery.":[91],"MANETs":[92,203],"utilize":[93],"TCP/IP":[94,111],"protocol":[95],"between":[98],"end":[99],"nodes,":[100],"but":[101],"resource":[105],"overhead":[106],"makes":[107],"each":[108],"layer":[109],"model":[112],"modified":[115],"frequently.":[116],"Therefore":[117],"routing":[118,153],"drives":[121],"out":[122],"one":[125],"most":[128],"challenging":[129],"areas":[131],"received":[134],"enormous":[135],"attention":[136],"from":[137],"researchers":[139],"past":[142],"decades.":[143],"This":[144,192],"survey":[145],"investigates":[146],"based":[152,171,217],"protocols":[154,170,224],"search":[156,205],"rescue":[158,207],"scenario.":[159,229],"main":[161],"objective":[162],"categorization":[167],"on":[172],"infrastructure":[173],"phases":[175],"disaster":[177,228],"management.":[178],"Furthermore":[179],"emergency":[180],"operations":[182,208],"have":[183],"considered":[185],"promising":[188],"perspective":[189],"MANETs.":[191],"paper":[193],"also":[194],"examines":[195],"outlines":[197],"existing":[199],"employment":[200],"technologies":[201],"significant":[211],"contributions":[212],"made":[213],"by":[214],"authors":[216],"upon":[218],"criteria":[220],"infrastructure,":[222],"type":[226]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
