{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:32:04Z","timestamp":1762522324324,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T00:00:00Z","timestamp":1562544000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T00:00:00Z","timestamp":1562544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002649","name":"Yeungnam University","doi-asserted-by":"publisher","award":["This work was supported by the 2019 Yeungnam University Research Grant."],"award-info":[{"award-number":["This work was supported by the 2019 Yeungnam University Research Grant."]}],"id":[{"id":"10.13039\/501100002649","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1498-x","type":"journal-article","created":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T12:03:19Z","timestamp":1562587399000},"update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Q-learning-enabled channel access in next-generation dense wireless networks for IoT-based eHealth systems"],"prefix":"10.1186","volume":"2019","author":[{"given":"Rashid","family":"Ali","sequence":"first","affiliation":[]},{"given":"Yazdan Ahmad","family":"Qadri","sequence":"additional","affiliation":[]},{"given":"Yousaf","family":"Bin Zikria","sequence":"additional","affiliation":[]},{"given":"Tariq","family":"Umer","sequence":"additional","affiliation":[]},{"given":"Byung-Seo","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0001-8454-6980","authenticated-orcid":false,"given":"Sung Won","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,8]]},"reference":[{"issue":"6183732","key":"1498_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6183732","volume":"2018","author":"M. Pasha","year":"2018","unstructured":"M. Pasha, W. SMShah, Framework for e-health systems in IoT-based environments. Wirel. Commun. Mob. Comput.2018(6183732), 1\u201311 (2018). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1155\/2018\/6183732\n                    \n                  .","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"4","key":"1498_CR2","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1109\/JIOT.2015.2504487","volume":"3","author":"G. T. Singh","year":"2016","unstructured":"G. T. Singh, F. Al-Turjman, Learning data delivery paths in QoI-aware information-centric sensor networks. IEEE Internet Things J.3(4), 572\u2013580 (2016). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/JIOT.2015.2504487\n                    \n                  .","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"1498_CR3","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1186\/s13638-017-0882-7","volume":"2017","author":"M. Z. Hasan","year":"2017","unstructured":"M. Z. Hasan, F. Al-Turjman, Evaluation of a duty-cycled asynchronous X-MAC protocol for vehicular sensor networks. EURASIP J. Wirel. Commun. Netw.2017(1), 95 (2017). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1186\/s13638-017-0882-7\n                    \n                  .","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"1498_CR4","unstructured":"World Health Organization, Global health workforce shortage to reach 12.9 million in coming decades. \n                    https:\/\/linproxy.fan.workers.dev:443\/http\/www.who.int\/mediacentre\/news\/releases\/2013\/health--workforce-shortage\/en\/\n                    \n                  . Accessed 10 Dec 2018."},{"key":"1498_CR5","doi-asserted-by":"publisher","first-page":"36611","DOI":"10.1109\/ACCESS.2018.2853148","volume":"6","author":"H. M Alam","year":"2018","unstructured":"H. M Alam, M. I. Malik, T. Khan, A. Pardy, Y. L. Kuusik, A. Moullec, Survey on the roles of communication technologies in IoT-based personalized healthcare applications. IEEE Access. 6:, 36611\u201336631 (2018). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ACCESS.2018.2853148\n                    \n                  .","journal-title":"IEEE Access"},{"key":"1498_CR6","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1016\/j.jnca.2015.08.002","volume":"58","author":"M. Faheem","year":"2015","unstructured":"M. Faheem, M. Zahid Abbas, G. Tuna, V. C. Gungor, EDHRP: Energy efficient event driven hybrid routing protocol for densely deployed wireless sensor networks. J. Netw. Comput. Appl.58:, 309\u2013326 (2015). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.jnca.2015.08.002\n                    \n                  .","journal-title":"J. Netw. Comput. Appl."},{"key":"1498_CR7","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1016\/j.asoc.2017.07.045","volume":"68","author":"M. Faheem","year":"2018","unstructured":"M. Faheem, V. C. Gungor, Energy efficient and QoS-aware routing protocol for wireless sensor network-based smart grid applications in the context of industry 4.0. Appl. Soft Comput.68:, 910\u2013922 (2018). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.asoc.2017.07.045\n                    \n                  .","journal-title":"Appl. Soft Comput."},{"key":"1498_CR8","doi-asserted-by":"publisher","unstructured":"M. Faheem, R. A. Butt, B. Raza, M. W. Ashraf, S. Begum, Md. A. Ngadi, V. C. Gungor, in Transactions on Emerging Telecommunications Technologies. Bio-inspired routing protocol for WSN-based smart grid applications in the context of Industry 4.0, (2018). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1002\/ett.3503\n                    \n                  .","DOI":"10.1002\/ett.3503"},{"key":"1498_CR9","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.csi.2017.03.003","volume":"53","author":"M. Faheem","year":"2017","unstructured":"M. Faheem, V. C. Gungor, Capacity and spectrum-aware communication framework for wireless sensor network-based smart grid applications. Comput. Stand. Interfaces. 53:, 48\u201358 (2017). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.csi.2017.03.003\n                    \n                  .","journal-title":"Comput. Stand. Interfaces"},{"issue":"16","key":"1498_CR10","doi-asserted-by":"publisher","first-page":"6477","DOI":"10.1109\/JSEN.2018.2851187","volume":"18","author":"S. Demir","year":"2018","unstructured":"S. Demir, F. Al-Turjman, Energy scavenging methods for WBAN applications: a review. IEEE Sensors J.18(16), 6477\u20136488 (2018). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/JSEN.2018.2851187\n                    \n                  .","journal-title":"IEEE Sensors J."},{"issue":"1","key":"1498_CR11","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1080\/02564602.2016.1242387","volume":"35","author":"R. Ali","year":"2018","unstructured":"R. Ali, S. W. Kim, B. Kim, Y. Park, Design of MAC layer resource allocation schemes for IEEE 802.11ax: future directions. IETE Tech. Rev.35(1), 28\u201352 (2018). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1080\/02564602.2016.1242387\n                    \n                  .","journal-title":"IETE Tech. Rev."},{"issue":"1","key":"1498_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/COMST.2018.2864779","volume":"21","author":"F. Al-Turjman","year":"2019","unstructured":"F. Al-Turjman, E. Ever, H. Zahmatkesh, Small cells in the forthcoming 5G\/IoT: traffic modelling and deployment overview. IEEE Commun. Surv. Tutor.21(1), 28\u201365 (2019). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/COMST.2018.2864779\n                    \n                  .","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"1498_CR13","doi-asserted-by":"publisher","first-page":"3500","DOI":"10.1109\/ACCESS.2018.2886216","volume":"7","author":"R. Ali","year":"2019","unstructured":"R. Ali, N. Shahin, Y. B. Zikria, B. Kim, S. W. Kim, Deep reinforcement learning paradigm for performance optimization of channel observation-based MAC protocols in dense WLANs. IEEE Access. 7:, 3500\u20133511 (2019). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ACCESS.2018.2886216\n                    \n                  .","journal-title":"IEEE Access"},{"key":"1498_CR14","doi-asserted-by":"publisher","unstructured":"C. Zhang, P. Patras, H. Haddadi, Deep learning in mobile and wireless networking: a survey. IEEE Commun. Surv. Tutor. Early Access (2019). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/COMST.2019.2904897\n                    \n                  .","DOI":"10.1109\/COMST.2019.2904897"},{"key":"1498_CR15","unstructured":"Y. Sun, M. Peng, Y. Zhou, Y. Huang, S. Mao, Application of machine learning in wireless networks: key techniques and open issues. ArXiv e-prints (2018). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/arxiv.org\/abs\/1809.08707\n                    \n                  ."},{"key":"1498_CR16","doi-asserted-by":"publisher","DOI":"10.5772\/56681","volume-title":"Theory and novel applications of machine learning. 12\u201316","author":"E. M. Joo","year":"2009","unstructured":"E. M. Joo, Theory and novel applications of machine learning. 12\u201316 (IntechOpen, London, 2009). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.5772\/56681\n                    \n                  ."},{"key":"1498_CR17","volume-title":"Reinforcement learning: an introduction","author":"R. S. Sutton","year":"1998","unstructured":"R. S. Sutton, A. G. Barto, Reinforcement learning: an introduction, Second ed. (MIT Press, Cambridge, 1998). isbn:0262193981."},{"key":"1498_CR18","volume-title":"Introduction to machine learning","author":"E. Alpaydin","year":"2014","unstructured":"E. Alpaydin, Introduction to machine learning, Third ed. (MIT Press, Cambridge, 2014). isbn:978-0-262-028189."},{"key":"1498_CR19","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.3390\/su10041201","volume":"10","author":"R. Ali","year":"2018","unstructured":"R. Ali, N. Shahin, R. Bajracharya, B. S. Kim, S. W. Kim, A self-scrutinized backoff mechanism for IEEE 802.11ax in 5G unlicensed networks. Sustainability. 10:, 1201 (2018). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.3390\/su10041201\n                    \n                  .","journal-title":"Sustainability"},{"key":"1498_CR20","doi-asserted-by":"publisher","unstructured":"Q. H. Abbasi, S. Liaqat, L. Ali, A. Alomainy, in 2013 First International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech). An improved radio channel characterisation for ultra wideband on-body communications using regression method (Jinhua, 2013), pp. 1\u20134. \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/Ubi-HealthTech.2013.6708063\n                    \n                  .","DOI":"10.1109\/Ubi-HealthTech.2013.6708063"},{"issue":"12","key":"1498_CR21","doi-asserted-by":"publisher","first-page":"2861","DOI":"10.1016\/j.sigpro.2007.05.013","volume":"87","author":"Y. Xu","year":"2007","unstructured":"Y. Xu, T. Y. Fu, W. C. Lee, J. Winter, Processing k nearest neighbor queries in location-aware sensor networks. Signal Process.87(12), 2861\u20132881 (2007). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.sigpro.2007.05.013\n                    \n                  .","journal-title":"Signal Process."},{"key":"1498_CR22","doi-asserted-by":"publisher","unstructured":"Z. Dong, Y. Zhao, Z. Chen, in IEEE MTT-S International Wireless Symposium (IWS), 2018. Support vector machine for channel prediction in high-speed railway communication systems (Chengdu, 2018), pp. 1\u20133. \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/IEEE-IWS.2018.8400912\n                    \n                  .","DOI":"10.1109\/IEEE-IWS.2018.8400912"},{"issue":"3","key":"1498_CR23","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TPDS.2011.156","volume":"23","author":"V. S. Feng","year":"2012","unstructured":"V. S. Feng, S. Y. Chang, Determination of wireless networks parameters through parallel hierarchical support vector machines. IEEE Trans. Parallel Distrib. Syst.23(3), 505\u201312 (2012). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TPDS.2011.156\n                    \n                  .","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"3","key":"1498_CR24","doi-asserted-by":"publisher","first-page":"1356","DOI":"10.1109\/TWC.2014.2365813","volume":"14","author":"C. -K. Wen","year":"2015","unstructured":"C. -K. Wen, S. Jin, K. -K. Wong, J. -C. Chen, P. Ting, Channel estimation for massive MIMO using Gaussian-mixture Bayesian learning. IEEE Trans. Wirel. Commun.14(3), 1356\u201368 (2015). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TWC.2014.2365813\n                    \n                  .","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"4","key":"1498_CR25","doi-asserted-by":"publisher","first-page":"1980","DOI":"10.1109\/TVT.2010.2044906","volume":"59","author":"C. -K. Yu","year":"2010","unstructured":"C. -K. Yu, K. -C. Chen, S. -M. Cheng, Cognitive radio network tomography. IEEE Trans. Veh. Technol.59(4), 1980\u201397 (2010). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TVT.2010.2044906\n                    \n                  .","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1498_CR26","doi-asserted-by":"publisher","unstructured":"M. C. Raja, M. M. A. Rabbani, in 2016 International Conference on Communication and Electronics Systems (ICCES). Combined analysis of support vector machine and principle component analysis for IDS (Coimbatore, 2016), pp. 1\u20135. \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/CESYS.2016.7889868\n                    \n                  .","DOI":"10.1109\/CESYS.2016.7889868"},{"key":"1498_CR27","doi-asserted-by":"publisher","first-page":"27065","DOI":"10.1109\/ACCESS.2019.2901815","volume":"7","author":"Z. Luo","year":"2019","unstructured":"Z. Luo, C. Li, L. Zhu, Full-duplex cognitive radio using guided independent component analysis and cumulant criterion. IEEE Access. 7:, 27065\u201327074 (2019). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/ACCESS.2019.2901815\n                    \n                  .","journal-title":"IEEE Access"},{"issue":"10","key":"1498_CR28","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1364\/JOCN.4.000749","volume":"4","author":"M. Xia","year":"2012","unstructured":"M. Xia, Y. Owada, M. Inoue, H. Harai, Optical and wireless hybrid access networks: design and optimization. IEEE\/OSA J. Opt. Commun. Netw.4(10), 749\u201359 (2012). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1364\/JOCN.4.000749\n                    \n                  .","journal-title":"IEEE\/OSA J. Opt. Commun. Netw."},{"issue":"4","key":"1498_CR29","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1109\/TSG.2011.2160101","volume":"2","author":"R. C. Qiu","year":"2011","unstructured":"R. C. Qiu, Z. Hu, Z. Chen, N. Guo, R. Ranganathan, S. Hou, G. Zheng, Cognitive radio network for the smart grid: experimental system architecture, control algorithms, security, and micro grid testbed. IEEE Trans. Smart Grid. 2(4), 724\u201340 (2011). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TSG.2011.2160101\n                    \n                  .","journal-title":"IEEE Trans. Smart Grid"},{"issue":"5","key":"1498_CR30","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1109\/MWC.2017.1600304WC","volume":"24","author":"R. Li","year":"2017","unstructured":"R. Li, Z. Zhao, X. Zhou, G. Ding, Y. Chen, Z. Wang, H. Zhang, Intelligent 5G: when cellular networks meet artificial intelligence. IEEE Wirel. Commun.24(5), 175\u2013183 (2017). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/MWC.2017.1600304WC\n                    \n                  .","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"1498_CR31","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1109\/TSMCB.2008.928224","volume":"38","author":"Y. Li","year":"2008","unstructured":"Y. Li, B. Yin, H. Xi, Partially observable Markov decision processes and performance sensitivity analysis. IEEE Trans. Syst Man Cybern. Part B Cybern.38(6), 1645\u20131651 (2008). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TSMCB.2008.927711\n                    \n                  .","journal-title":"IEEE Trans. Syst Man Cybern. Part B Cybern."},{"issue":"5","key":"1498_CR32","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1109\/JSTSP.2013.2258656","volume":"7","author":"A. Aprem","year":"2013","unstructured":"A. Aprem, C. R. Murthy, N. B. Mehta, Transmit power control policies for energy harvesting sensors with retransmissions. IEEE J. Sel. Top. Signal Process.7(5), 895\u2013906 (2013). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/JSTSP.2013.2258656\n                    \n                  .","journal-title":"IEEE J. Sel. Top. Signal Process."},{"issue":"4","key":"1498_CR33","doi-asserted-by":"publisher","first-page":"2294","DOI":"10.1109\/TWC.2014.2384510","volume":"14","author":"G. Alnwaimi","year":"2015","unstructured":"G. Alnwaimi, S. Vahid, K. Moessner, Dynamic heterogeneous learning games for opportunistic access in LTE-based macro\/femtocell deployments. IEEE Trans. Wirel. Commun.14(4), 2294\u20132308 (2015). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/TWC.2014.2384510\n                    \n                  .","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"10","key":"1498_CR34","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1049\/el.2018.0617","volume":"54","author":"R. Ali","year":"2018","unstructured":"R. Ali, N. Shahin, Y. T. Kim, B. S. Kim, S. W. Kim, Channel observation-based scaled backoff mechanism for high-efficiency WLANs. Electron. Lett.54(10), 663\u2013665 (2018). \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1049\/el.2018.0617\n                    \n                  .","journal-title":"Electron. Lett."},{"key":"1498_CR35","unstructured":"The network simulator-ns-3. \n                    https:\/\/linproxy.fan.workers.dev:443\/https\/www.nsnam.org\/\n                    \n                  . Accessed 01 Sept 2018."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1498-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/article\/10.1186\/s13638-019-1498-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1498-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,6]],"date-time":"2020-07-06T23:09:49Z","timestamp":1594076989000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1498-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,8]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1498"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1186\/s13638-019-1498-x","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2019,7,8]]},"assertion":[{"value":"3 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 July 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"178"}}