{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T16:10:10Z","timestamp":1727539810581},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T00:00:00Z","timestamp":1657065600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T00:00:00Z","timestamp":1657065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s00500-022-07317-z","type":"journal-article","created":{"date-parts":[[2022,7,6]],"date-time":"2022-07-06T10:02:41Z","timestamp":1657101761000},"page":"10981-10992","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Joint training method for transmission defects based on component hierarchy"],"prefix":"10.1007","volume":"26","author":[{"given":"Wang","family":"Chao","sequence":"first","affiliation":[]},{"given":"Tian","family":"Yangyang","sequence":"additional","affiliation":[]},{"given":"Guo","family":"Zhimin","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Shaoguang","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Xiaofei","sequence":"additional","affiliation":[]},{"given":"Gao","family":"Xiaowei","sequence":"additional","affiliation":[]},{"given":"Tan","family":"Qiyun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,6]]},"reference":[{"issue":"4","key":"7317_CR1","doi-asserted-by":"publisher","first-page":"8143","DOI":"10.1016\/j.eswa.2008.10.016","volume":"36","author":"M Da\u011fdeviren","year":"2009","unstructured":"Da\u011fdeviren M, Yavuz S, K\u0131l\u0131n\u00e7 N (2009) Weapon selection using the AHP and TOPSIS methods under fuzzy environment. Expert Syst Appl 36(4):8143\u20138151","journal-title":"Expert Syst Appl"},{"key":"7317_CR2","doi-asserted-by":"crossref","unstructured":"Ding M, Li J, Ma M, Fan X (2021) SNR-adaptive deep joint source-channel coding for wireless image transmission. In: ICASSP 2021\u20132021 IEEE international conference on acoustics, speech and signal processing (ICASSP), 2021, pp. 1555\u20131559: IEEE","DOI":"10.1109\/ICASSP39728.2021.9414037"},{"key":"7317_CR3","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.asoc.2015.06.051","volume":"36","author":"JH Ezzabadi","year":"2015","unstructured":"Ezzabadi JH, Saryazdi MD, Mostafaeipour A (2015) Implementing Fuzzy Logic and AHP into the EFQM model for performance improvement: a case study. Appl Soft Comput 36:165\u2013176","journal-title":"Appl Soft Comput"},{"issue":"10","key":"7317_CR4","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/LCOMM.2020.3005138","volume":"24","author":"J Gao","year":"2020","unstructured":"Gao J, Zhong C, Chen X, Lin H, Zhang Z (2020) Deep reinforcement learning for joint beamwidth and power optimization in mmWave systems. IEEE Commun Lett 24(10):2201\u20132205","journal-title":"IEEE Commun Lett"},{"issue":"6","key":"7317_CR5","doi-asserted-by":"publisher","first-page":"2674","DOI":"10.1109\/TVT.2012.2196061","volume":"61","author":"Q Guan","year":"2012","unstructured":"Guan Q, Yu FR, Jiang S, Leung VC (2012) Joint topology control and authentication design in mobile ad hoc networks with cooperative communications. IEEE Trans Veh Technol 61(6):2674\u20132685","journal-title":"IEEE Trans Veh Technol"},{"issue":"11","key":"7317_CR6","doi-asserted-by":"publisher","first-page":"13124","DOI":"10.1109\/TVT.2020.3020400","volume":"69","author":"D Guo","year":"2020","unstructured":"Guo D, Tang L, Zhang X, Liang Y-C (2020) Joint optimization of handover control and power allocation based on multi-agent deep reinforcement learning. IEEE Trans Veh Technol 69(11):13124\u201313138","journal-title":"IEEE Trans Veh Technol"},{"key":"7317_CR7","doi-asserted-by":"crossref","unstructured":"Hadj-Kacem I, Sellami N, Fijalkow I, Roumy A (2009) Joint training interval length and power allocation optimization for MIMO flat fading channels,\" In: 2009 6th international symposium on wireless communication systems, pp 16\u201320, IEEE","DOI":"10.1109\/ISWCS.2009.5285251"},{"issue":"2","key":"7317_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.3390\/electronics10020169","volume":"10","author":"S Hashima","year":"2021","unstructured":"Hashima S, ElHalawany BM, Hatano K, Wu K, Mohamed EM (2021) Leveraging machine-learning for D2D communications in 5G\/beyond 5G networks. Electronics 10(2):169","journal-title":"Electronics"},{"issue":"10","key":"7317_CR9","doi-asserted-by":"publisher","first-page":"2200","DOI":"10.1109\/JSAC.2019.2933762","volume":"37","author":"C He","year":"2019","unstructured":"He C, Hu Y, Chen Y, Zeng B (2019) Joint power allocation and channel assignment for NOMA with deep reinforcement learning. IEEE J Sel Areas Commun 37(10):2200\u20132210","journal-title":"IEEE J Sel Areas Commun"},{"issue":"10","key":"7317_CR10","doi-asserted-by":"publisher","first-page":"3791","DOI":"10.1109\/TSP.2005.855398","volume":"53","author":"Y Jiang","year":"2005","unstructured":"Jiang Y, Li J, Hager WW (2005) Joint transceiver design for MIMO communications using geometric mean decomposition. IEEE Trans Signal Process 53(10):3791\u20133803","journal-title":"IEEE Trans Signal Process"},{"key":"7317_CR11","unstructured":"Kaleva J, T\u00f6lli A, Juntti M, Berry R, Honig M (2017) Joint transmission with limited backhaul connectivity. arXiv preprint arXiv:1705.05252"},{"key":"7317_CR12","doi-asserted-by":"crossref","unstructured":"Lei W, Zhang D, Ye Y, Lu C (2022) Joint beam training and data transmission control for mmwave delay-sensitive communications: a parallel reinforcement learning approach, In: IEEE Journal of selected topics in signal processing","DOI":"10.1109\/JSTSP.2022.3143488"},{"issue":"9","key":"7317_CR13","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1109\/LCOMM.2020.2999914","volume":"24","author":"L Li","year":"2020","unstructured":"Li L, Xu H, Ma J, Zhou A, Liu J (2020) Joint EH time and transmit power optimization based on DDPG for EH communications. IEEE Commun Lett 24(9):2043\u20132046","journal-title":"IEEE Commun Lett"},{"issue":"1","key":"7317_CR14","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1109\/JSAC.2004.837346","volume":"23","author":"M Madue\u00f1o","year":"2005","unstructured":"Madue\u00f1o M, Vidal J (2005) Joint physical-MAC layer design of the broadcast protocol in ad hoc networks. IEEE J Sel Areas Commun 23(1):65\u201375","journal-title":"IEEE J Sel Areas Commun"},{"issue":"11","key":"7317_CR15","doi-asserted-by":"publisher","first-page":"1946","DOI":"10.1109\/TC.2017.2709742","volume":"66","author":"B Mao","year":"2017","unstructured":"Mao B et al (2017) Routing or computing? The paradigm shift towards intelligent computer network packet transmission based on deep learning. IEEE Trans Comput 66(11):1946\u20131960","journal-title":"IEEE Trans Comput"},{"issue":"10","key":"7317_CR16","doi-asserted-by":"publisher","first-page":"142","DOI":"10.23919\/JCC.2020.10.010","volume":"17","author":"J Miao","year":"2020","unstructured":"Miao J, Wang P, Zhang Q, Wang Y (2020) Throughput maximization for multi-UAV enabled millimeter wave WPCN: Joint time and power allocation. China Commun 17(10):142\u2013156","journal-title":"China Commun"},{"issue":"12","key":"7317_CR17","doi-asserted-by":"publisher","first-page":"2775","DOI":"10.3390\/s19122775","volume":"19","author":"YY Munaye","year":"2019","unstructured":"Munaye YY, Lin H-P, Adege AB, Tarekegn GB (2019) UAV positioning for throughput maximization using deep learning approaches. Sensors 19(12):2775","journal-title":"Sensors"},{"issue":"10","key":"7317_CR18","doi-asserted-by":"publisher","first-page":"2052","DOI":"10.1109\/JSAC.2015.2435273","volume":"33","author":"Y Niu","year":"2015","unstructured":"Niu Y, Gao C, Li Y, Su L, Jin D, Vasilakos AV (2015) Exploiting device-to-device communications in joint scheduling of access and backhaul for mmWave small cells. IEEE J Sel Areas Commun 33(10):2052\u20132069","journal-title":"IEEE J Sel Areas Commun"},{"key":"7317_CR19","doi-asserted-by":"crossref","unstructured":"Spantideas ST, Giannopoulos AE, Kapsalis NC, Kalafatelis A, Capsalis CN, Trakadas P (2021) Joint Energy-efficient and throughput-sufficient transmissions in 5G cells with deep Q-learning. In: 2021 IEEE International Mediterranean Conference on Communications and Networking (MeditCom), pp 265\u2013270, IEEE","DOI":"10.1109\/MeditCom49071.2021.9647592"},{"key":"7317_CR20","unstructured":"Tang T, Park M, Heath R, Nettles SM (2004) A joint MIMO-OFDM transceiver and MAC design for mobile ad hoc networking. In: International Workshop on Wireless Ad-Hoc Networks, 2004, , pp 315\u2013319, IEEE"},{"key":"7317_CR21","doi-asserted-by":"crossref","unstructured":"Tenenbaum AJ, Adve RS (2004) Joint multiuser transmit-receive optimization using linear processing. In: 2004 IEEE International Conference on Communications (IEEE Cat. No. 04CH37577), vol 1, pp 588\u2013592, IEEE","DOI":"10.1109\/ICC.2004.1312557"},{"key":"7317_CR22","doi-asserted-by":"publisher","first-page":"13941","DOI":"10.1109\/ACCESS.2017.2726559","volume":"5","author":"L Yuan","year":"2017","unstructured":"Yuan L, Bi S, Zhang S, Lin X, Wang H (2017) Multi-antenna enabled cluster-based cooperation in wireless powered communication networks. IEEE Access 5:13941\u201313950","journal-title":"IEEE Access"},{"issue":"10","key":"7317_CR23","doi-asserted-by":"publisher","first-page":"2309","DOI":"10.1109\/LWC.2021.3100388","volume":"10","author":"M Zhang","year":"2021","unstructured":"Zhang M, Fu S, Fan Q (2021) Joint 3d deployment and power allocation for uav-bs: a deep reinforcement learning approach. IEEE Wirel Commun Lett 10(10):2309\u20132312","journal-title":"IEEE Wirel Commun Lett"},{"key":"7317_CR24","doi-asserted-by":"crossref","unstructured":"Zhang R, Tsatsanis MK, Sidiropoulos ND (2000) Performance analysis of a random access packet radio system with joint network-spatial diversity. In: 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No. 00CH37100), vol 5, pp 2593\u20132596, IEEE","DOI":"10.1109\/ICASSP.2000.860992"},{"key":"7317_CR25","doi-asserted-by":"publisher","first-page":"177254","DOI":"10.1109\/ACCESS.2019.2937438","volume":"7","author":"G Zhao","year":"2019","unstructured":"Zhao G, Li Y, Xu C, Han Z, Xing Y, Yu S (2019) Joint power control and channel allocation for interference mitigation based on reinforcement learning. IEEE Access 7:177254\u2013177265","journal-title":"IEEE Access"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07317-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00500-022-07317-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-022-07317-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,28]],"date-time":"2024-09-28T15:44:29Z","timestamp":1727538269000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00500-022-07317-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,6]]},"references-count":25,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["7317"],"URL":"https:\/\/doi.org\/10.1007\/s00500-022-07317-z","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2022,7,6]]},"assertion":[{"value":"13 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declared that they have no conflicts of interest to this work.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The paper does not deal with any ethical problems.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"We declare that all authors have informed Consent.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}