{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:18:26Z","timestamp":1764937106639,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"17","license":[{"start":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T00:00:00Z","timestamp":1565049600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T00:00:00Z","timestamp":1565049600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002649","name":"Yeungnam University","doi-asserted-by":"publisher","award":["2019 Yeungnam University Research Grant"],"award-info":[{"award-number":["2019 Yeungnam University Research Grant"]}],"id":[{"id":"10.13039\/501100002649","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s00521-019-04416-1","type":"journal-article","created":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T09:04:41Z","timestamp":1565082281000},"page":"13107-13115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Performance optimization of QoS-supported dense WLANs using machine-learning-enabled enhanced distributed channel access (MEDCA) mechanism"],"prefix":"10.1007","volume":"32","author":[{"given":"Rashid","family":"Ali","sequence":"first","affiliation":[]},{"given":"Ali","family":"Nauman","sequence":"additional","affiliation":[]},{"given":"Yousaf Bin","family":"Zikria","sequence":"additional","affiliation":[]},{"given":"Byung-Seo","family":"Kim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8454-6980","authenticated-orcid":false,"given":"Sung Won","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,6]]},"reference":[{"issue":"1","key":"4416_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1080\/02564602.2016.1242387","volume":"35","author":"R Ali","year":"2016","unstructured":"Ali R, Kim SW, Kim B-S, Park Y (2016) Design of MAC layer resource allocation schemes for IEEE 802.11ax: future directions. IETE Techn Rev 35(1):28\u201356. \nhttps:\/\/doi.org\/10.1080\/02564602.2016.1242387","journal-title":"IETE Techn Rev"},{"key":"4416_CR2","volume-title":"Introduction to machine learning","author":"E Alpaydm","year":"2014","unstructured":"Alpaydm E (2014) Introduction to machine learning, 3rd edn. The MIT Press, Cambridge","edition":"3"},{"key":"4416_CR3","unstructured":"Challita U, Dong L, Saad W (2017) Proactive resource management in LTE-U systems: a deep learning perspective. \narXiv:1702.07031\n\n. Accessed on 20 Dec 2018"},{"key":"4416_CR4","volume-title":"Reinforcement learning: an introduction","author":"RS Sutton","year":"1998","unstructured":"Sutton RS, Barto AG (1998) Reinforcement learning: an introduction, 2nd edn. MIT Press, Cambridge","edition":"2"},{"issue":"1","key":"4416_CR5","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-642-34883-9_9","volume":"8","author":"MK Afzal","year":"2014","unstructured":"Afzal MK, Kim B, Kim SW (2014) A leader-based reliable multicast MAC protocol for multimedia applications. KSII Trans Internet Inf Syst 8(1):183\u2013195. \nhttps:\/\/doi.org\/10.1007\/978-3-642-34883-9_9","journal-title":"KSII Trans Internet Inf Syst"},{"issue":"2","key":"4416_CR6","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/JCN.2019.000022","volume":"21","author":"N Shahin","year":"2019","unstructured":"Shahin N, Ali R, Kim SW, Kim Y (2019) Cognitive backoff mechanism for IEEE802.11ax high-efficiency WLANs. KICS J Commun Netw 21(2):158\u2013167. \nhttps:\/\/doi.org\/10.1109\/JCN.2019.000022","journal-title":"KICS J Commun Netw"},{"issue":"4","key":"4416_CR7","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MWC.2004.1325887","volume":"11","author":"H Zhu","year":"2004","unstructured":"Zhu H, Li M, Chlamtac I, Prabhakaran B (2004) A survey of quality of service in IEEE 802.11 networks. IEEE Wirel Commun 11(4):6\u201314. \nhttps:\/\/doi.org\/10.1109\/MWC.2004.1325887","journal-title":"IEEE Wirel Commun"},{"key":"4416_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/wcm.196","volume":"4","author":"Q Ni","year":"2004","unstructured":"Ni Q, Romdhani L, Turletti T (2004) A survey of QoS enhancements for IEEE 802.11 wireless LAN. J Wirel Commun Mobile Comput 4:1\u201320. \nhttps:\/\/doi.org\/10.1002\/wcm.196","journal-title":"J Wirel Commun Mobile Comput"},{"key":"4416_CR9","doi-asserted-by":"publisher","unstructured":"Romdhani L, Ni Q, Turletti T (2003) Adaptive EDCF: enhanced service differentiation for IEEE 802.11 wireless ad-hoc networks. IEEE Wireless Communications and Networking (WCNC 2003). New Orleans, LA, USA 2:1373\u20131378. \nhttps:\/\/doi.org\/10.1109\/WCNC.2003.1200574","DOI":"10.1109\/WCNC.2003.1200574"},{"issue":"4","key":"4416_CR10","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1109\/TVT.2004.830951","volume":"53","author":"C Wang","year":"2004","unstructured":"Wang C, Li B, Li L (2004) A new collision resolution mechanism to enhance the performance of IEEE 802.11 DCF. IEEE Trans Veh Technol 53(4):1235\u20131246. \nhttps:\/\/doi.org\/10.1109\/TVT.2004.830951","journal-title":"IEEE Trans Veh Technol"},{"key":"4416_CR11","doi-asserted-by":"publisher","unstructured":"Zhu H, Cao G, Yener A, Mathias AD (2004) EDCF-DM: a novel enhanced distributed coordination function for wireless ad hoc networks. In: IEEE international conference on communications, Paris, France, vol 7, pp 3886\u20133890. \nhttps:\/\/doi.org\/10.1109\/ICC.2004.1313280","DOI":"10.1109\/ICC.2004.1313280"},{"key":"4416_CR12","doi-asserted-by":"publisher","unstructured":"Kwon Y, Fang Y, Latchman H (2003) A novel MAC protocol with fast collision resolution for wireless LANs. In: IEEE INFOCOM 2003, vol 2, San Francisco, CA, pp 853\u2013862. \nhttps:\/\/doi.org\/10.1109\/INFCOM.2003.1208923","DOI":"10.1109\/INFCOM.2003.1208923"},{"key":"4416_CR13","doi-asserted-by":"publisher","unstructured":"Malli M, Ni Q, Turletti T, Barakat C (2004) Adaptive fair channel allocation for QoS enhancement in IEEE 802.11 wireless LANs. In: IEEE international conference on communications (IEEE ICC), Paris, France, vol 6, pp 3470\u20133475. \nhttps:\/\/doi.org\/10.1109\/ICC.2004.1313189","DOI":"10.1109\/ICC.2004.1313189"},{"issue":"10","key":"4416_CR14","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1049\/el.2018.0617","volume":"54","author":"R Ali","year":"2018","unstructured":"Ali R, Shahin N, Kim Y, Kim B, Kim SW (2018) Channel observation-based scaled backoff mechanism for high-efficiency WLANs. IET Electron Lett 54(10):663\u2013665. \nhttps:\/\/doi.org\/10.1049\/el.2018.0617","journal-title":"IET Electron Lett"},{"issue":"4","key":"4416_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/su10041201","volume":"10","author":"R Ali","year":"2018","unstructured":"Ali R, Shahin N, Bajracharya R, Kim B, Kim SW (2018) A self-scrutinized backoff mechanism for IEEE 802.11ax in 5G unlicensed networks. Sustainability 10(4):1\u201315. \nhttps:\/\/doi.org\/10.3390\/su10041201","journal-title":"Sustainability"},{"key":"4416_CR16","unstructured":"The Network Simulator\u2014ns-3. Available: \nhttps:\/\/www.nsnam.org\/\n\n. Accessed on 10 Jan 2019"},{"key":"4416_CR17","first-page":"1","volume":"5","author":"E Even-Dar","year":"2003","unstructured":"Even-Dar E, Mansour Y (2003) Learning rates for Q-learning. J Mach Learn Res 5:1\u201325","journal-title":"J Mach Learn Res"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04416-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00521-019-04416-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-019-04416-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,5]],"date-time":"2020-10-05T20:13:21Z","timestamp":1601928801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00521-019-04416-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,6]]},"references-count":17,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["4416"],"URL":"https:\/\/doi.org\/10.1007\/s00521-019-04416-1","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"type":"print","value":"0941-0643"},{"type":"electronic","value":"1433-3058"}],"subject":[],"published":{"date-parts":[[2019,8,6]]},"assertion":[{"value":"22 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}