{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:56:15Z","timestamp":1726037775943},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242732"},{"type":"electronic","value":"9783030242749"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24274-9_50","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:03:34Z","timestamp":1563404614000},"page":"548-560","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Optimal Resource Allocation for Energy Harvesting Cognitive Radio Network with Q Learning"],"prefix":"10.1007","author":[{"given":"Xiaoli","family":"He","sequence":"first","affiliation":[]},{"given":"Hong","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Xiufeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"He","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"2","key":"50_CR1","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1109\/COMST.2015.2497324","volume":"18","author":"M-L Ku","year":"2016","unstructured":"Ku, M.-L., Li, W., Chen, Y., Liu, K.J.R.: Advances in energy harvesting communications: past, present, and future challenges. IEEE Commun. Surv. Tutor. 18(2), 1384\u20131412 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Tran, H.V., Xuan, T.Q., Tran, H.V., et al.: Optimal energy harvesting time and power allocation policy in CRN under security constraints from eavesdroppers. In: IEEE International Symposium on Personal. IEEE (2018)","DOI":"10.1109\/PIMRC.2017.8292734"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Xie, R., Ji, H., Si, P., et al.: Optimal joint power and transmission time allocation in cognitive radio networks. In: IEEE Wireless Communication & Networking Conference. IEEE (2010)","DOI":"10.1109\/WCNC.2010.5506153"},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"He, X., Jiang, H., Song, Y., et al.: Joint optimization of channel allocation and power control for cognitive radio networks with multiple constraints. Wirel. Netw. 1\u201320 (2018)","DOI":"10.1007\/s11276-018-1785-1"},{"issue":"3","key":"50_CR5","doi-asserted-by":"publisher","first-page":"305","DOI":"10.3390\/s16030305","volume":"16","author":"Z Fanzi","year":"2016","unstructured":"Fanzi, Z., Jisheng, X.: Leasing-based performance analysis in energy harvesting cognitive radio networks. Sensors 16(3), 305\u2013320 (2016)","journal-title":"Sensors"},{"key":"50_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/978-3-030-00015-8_31","volume-title":"Cloud Computing and Security","author":"X He","year":"2018","unstructured":"He, X., Jiang, H., Song, Yu., Xiao, H.: Optimal resource allocation for underlay cognitive radio networks. In: Sun, X., Pan, Z., Bertino, E. (eds.) ICCCS 2018. LNCS, vol. 11066, pp. 358\u2013371. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00015-8_31"},{"issue":"4","key":"50_CR7","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1109\/TCOMM.2016.2533485","volume":"64","author":"YH Bae","year":"2016","unstructured":"Bae, Y.H., Baek, J.W.: Achievable throughput analysis of opportunistic spectrum access in cognitive radio networks with energy harvesting. IEEE Trans. Commun. 64(4), 1399\u20131410 (2016)","journal-title":"IEEE Trans. Commun."},{"key":"50_CR8","first-page":"827","volume":"17","author":"X Huang","year":"2015","unstructured":"Huang, X., Han, T., Ansari, N.: On green-energy-powered cognitive radio networks. IEEE Trans. Commun. 17, 827\u2013842 (2015)","journal-title":"IEEE Trans. Commun."},{"key":"50_CR9","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/COMST.2014.2368999","volume":"17","author":"X Lu","year":"2015","unstructured":"Lu, X., Wang, P., Niyato, D., Kim, D.I., Han, Z.: Wireless networks with RF energy harvesting: a contemporary survey. IEEE Commun. Surv. Tutor. 17, 757\u20138789 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"50_CR10","unstructured":"FCC: Notice of proposed rule making and order. ET Docket No03-322 (2003)"},{"issue":"5","key":"50_CR11","doi-asserted-by":"publisher","first-page":"1867","DOI":"10.1109\/TCOMM.2015.2411266","volume":"63","author":"AH Sakr","year":"2015","unstructured":"Sakr, A.H., Hossain, E.: Cognitive and energy harvesting-based D2D communication in cellular, networks: stochastic geometry modeling and analysis. IEEE Trans. Commun. 63(5), 1867\u20131880 (2015)","journal-title":"IEEE Trans. Commun."},{"issue":"1","key":"50_CR12","doi-asserted-by":"crossref","first-page":"79","DOI":"10.2174\/1566524019666191007104816","volume":"58","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Yang, Z., Yan, X., et al.: A novel multi-hop algorithm for wireless network with unevenly distributed nodes. CMC 58(1), 79\u2013100 (2019)","journal-title":"CMC"},{"issue":"3","key":"50_CR13","first-page":"433","volume":"56","author":"J Wang","year":"2018","unstructured":"Wang, J., Ju, C., Gao, Y., et al.: A PSO based energy efficient coverage control algorithm for wireless sensor networks. CMC 56(3), 433\u2013446 (2018)","journal-title":"CMC"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24274-9_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T04:07:28Z","timestamp":1610510848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24274-9_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242732","9783030242749"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24274-9_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}