{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T09:04:05Z","timestamp":1770541445872,"version":"3.49.0"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T00:00:00Z","timestamp":1708041600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T00:00:00Z","timestamp":1708041600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s10586-023-04252-y","type":"journal-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T09:03:25Z","timestamp":1708074205000},"page":"5893-5911","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Three-layer data center-based intelligent slice admission control algorithm for C-RAN using approximate reinforcement learning"],"prefix":"10.1007","volume":"27","author":[{"given":"Mohsen","family":"Khani","sequence":"first","affiliation":[]},{"given":"Shahram","family":"Jamali","sequence":"additional","affiliation":[]},{"given":"Mohammad Karim","family":"Sohrabi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,16]]},"reference":[{"key":"4252_CR1","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-2645843\/v1","author":"M Khani","year":"2023","unstructured":"Khani, M., Jamali, S., Sohrabi, M.K.: Approximate Q-learning-based (AQL) network slicing in mobile edge-cloud for delay-sensitive services. J. Supercomput. (2023). https:\/\/doi.org\/10.21203\/rs.3.rs-2645843\/v1","journal-title":"J. Supercomput."},{"key":"4252_CR2","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2022.3165076","author":"C Liu","year":"2022","unstructured":"Liu, C., et al.: Robust online tensor completion for IoT streaming data recovery. IEEE Trans. Neural Netw. Learn. Syst. (2022). https:\/\/doi.org\/10.1109\/TNNLS.2022.3165076","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"17","key":"4252_CR3","doi-asserted-by":"publisher","first-page":"15618","DOI":"10.1109\/JIOT.2022.3152634","volume":"9","author":"Z Lv","year":"2022","unstructured":"Lv, Z., et al.: Cross-layer optimization for industrial internet of things in real scene digital twins. IEEE Internet Things J. 9(17), 15618\u201315629 (2022)","journal-title":"IEEE Internet Things J."},{"key":"4252_CR4","doi-asserted-by":"publisher","first-page":"102188","DOI":"10.1016\/j.phycom.2023.102188","volume":"61","author":"M Khani","year":"2023","unstructured":"Khani, M., Jamali, S., Sohrabi, M.K.: An enhanced deep reinforcement learning-based slice acceptance control system (EDRL-SACS) for Cloud-Radio Access Network. Phys. Commun. 61, 102188 (2023)","journal-title":"Phys. Commun."},{"issue":"20","key":"4252_CR5","doi-asserted-by":"publisher","first-page":"5161","DOI":"10.1109\/JLT.2019.2924345","volume":"37","author":"MR Raza","year":"2019","unstructured":"Raza, M.R., et al.: Reinforcement learning for slicing in a 5G flexible RAN. J. Lightwave Technol. 37(20), 5161\u20135169 (2019)","journal-title":"J. Lightwave Technol."},{"key":"4252_CR6","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-1272462\/v1","author":"J Zhang","year":"2023","unstructured":"Zhang, J., et al.: Forecast-assisted service function chain dynamic deployment for SDN\/NFV-enabled cloud management systems. IEEE Syst. J. (2023). https:\/\/doi.org\/10.21203\/rs.3.rs-1272462\/v1","journal-title":"IEEE Syst. J."},{"key":"4252_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2023.3261940","author":"Z Jiang","year":"2023","unstructured":"Jiang, Z., Xu, C.: Disrupting the technology innovation efficiency of manufacturing enterprises through digital technology promotion: an evidence of 5G technology construction in China. IEEE Trans. Eng. Manag. (2023). https:\/\/doi.org\/10.1109\/TEM.2023.3261940","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"2","key":"4252_CR8","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1109\/TCCN.2020.2982886","volume":"6","author":"C Zhang","year":"2020","unstructured":"Zhang, C., Dong, M., Ota, K.: Fine-grained management in 5G: DQL based intelligent resource allocation for network function virtualization in C-RAN. IEEE Trans. Cognitive Commun. Netw. 6(2), 428\u2013435 (2020)","journal-title":"IEEE Trans. Cognitive Commun. Netw."},{"issue":"3","key":"4252_CR9","doi-asserted-by":"publisher","first-page":"2429","DOI":"10.1109\/COMST.2018.2815638","volume":"20","author":"I Afolabi","year":"2018","unstructured":"Afolabi, I., et al.: Network slicing and softwarization: a survey on principles, enabling technologies, and solutions. IEEE Commun. Surveys Tutor. 20(3), 2429\u20132453 (2018)","journal-title":"IEEE Commun. Surveys Tutor."},{"issue":"3","key":"4252_CR10","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/TCCN.2021.3066619","volume":"7","author":"L Ale","year":"2021","unstructured":"Ale, L., et al.: Delay-aware and energy-efficient computation offloading in mobile-edge computing using deep reinforcement learning. IEEE Trans. Cognitive Commun. Netw. 7(3), 881\u2013892 (2021)","journal-title":"IEEE Trans. Cognitive Commun. Netw."},{"key":"4252_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3289798","author":"Q Wang","year":"2023","unstructured":"Wang, Q., et al.: A compact constraint incremental method for random weight networks and its application. IEEE Trans. Neural Netw. Learn. Syst. (2023). https:\/\/doi.org\/10.1109\/TNNLS.2023.3289798","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"10","key":"4252_CR12","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.3390\/jmse10101399","volume":"10","author":"Y Zheng","year":"2022","unstructured":"Zheng, Y., et al.: An optimal bp neural network track prediction method based on a ga\u2013aco hybrid algorithm. J. Mar. Sci. Eng. 10(10), 1399 (2022)","journal-title":"J. Mar. Sci. Eng."},{"key":"4252_CR13","doi-asserted-by":"publisher","DOI":"10.22070\/JCE.2023.17967.1251","author":"M Khani","year":"2023","unstructured":"Khani, M., Jamali, S., Sohrabi, M.K.: ARL-RA: efficient resource allocation in 5G edge networks: a novel intelligent solution using approximate reinforcement learning algorithm. J. Commun. Eng. (2023). https:\/\/doi.org\/10.22070\/JCE.2023.17967.1251","journal-title":"J. Commun. Eng."},{"issue":"1","key":"4252_CR14","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1109\/TII.2022.3158974","volume":"19","author":"X Dai","year":"2022","unstructured":"Dai, X., et al.: Task co-offloading for d2d-assisted mobile edge computing in industrial internet of things. IEEE Trans. Industr. Inf. 19(1), 480\u2013490 (2022)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"4252_CR15","doi-asserted-by":"publisher","first-page":"14977","DOI":"10.1109\/ACCESS.2020.2967626","volume":"8","author":"MO Ojijo","year":"2020","unstructured":"Ojijo, M.O., Falowo, O.E.: A survey on slice admission control strategies and optimization schemes in 5G network. IEEE Access 8, 14977\u201314990 (2020)","journal-title":"IEEE Access"},{"key":"4252_CR16","volume-title":"Advances in internet, data and web technologies: the 9th international conference on Emerging Internet, Data & Web Technologies (EIDWT-2021)","author":"P Ampririt","year":"2021","unstructured":"Ampririt, P., et al.: Effect of slice overloading cost on admission control for 5G wireless networks: a fuzzy-based system and its performance evaluation. In: Advances in internet, data and web technologies: the 9th international conference on Emerging Internet, Data & Web Technologies (EIDWT-2021). Springer, Berlin (2021)"},{"issue":"4","key":"4252_CR17","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1109\/JSAC.2019.2898745","volume":"37","author":"J Tang","year":"2019","unstructured":"Tang, J., Shim, B., Quek, T.Q.: Service multiplexing and revenue maximization in sliced C-RAN incorporated with URLLC and multicast eMBB. IEEE J. Sel. Areas Commun. 37(4), 881\u2013895 (2019)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"4252_CR18","doi-asserted-by":"publisher","first-page":"33137","DOI":"10.1109\/ACCESS.2018.2846543","volume":"6","author":"B Han","year":"2018","unstructured":"Han, B., Lianghai, J., Schotten, H.D.: Slice as an evolutionary service: genetic optimization for inter-slice resource management in 5G networks. IEEE Access 6, 33137\u201333147 (2018)","journal-title":"IEEE Access"},{"issue":"7","key":"4252_CR19","doi-asserted-by":"publisher","first-page":"1690","DOI":"10.1109\/JLT.2019.2896138","volume":"37","author":"MR Raza","year":"2019","unstructured":"Raza, M.R., et al.: A slice admission policy based on big data analytics for multi-tenant 5G networks. J. Lightwave Technol. 37(7), 1690\u20131697 (2019)","journal-title":"J. Lightwave Technol."},{"issue":"1","key":"4252_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/LNET.2018.2873978","volume":"1","author":"B Han","year":"2018","unstructured":"Han, B., Feng, D., Schotten, H.D.: A Markov model of slice admission control. IEEE Netw. Lett. 1(1), 2\u20135 (2018)","journal-title":"IEEE Netw. Lett."},{"issue":"1","key":"4252_CR21","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1109\/TVT.2019.2951322","volume":"69","author":"J P\u00e9rez-Romero","year":"2019","unstructured":"P\u00e9rez-Romero, J., Sallent, O.: Optimization of multitenant radio admission control through a semi-Markov decision process. IEEE Trans. Veh. Technol. 69(1), 862\u2013875 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"1","key":"4252_CR22","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1109\/JSYST.2019.2904667","volume":"14","author":"R Challa","year":"2019","unstructured":"Challa, R., et al.: Network slice admission model: tradeoff between monetization and rejections. IEEE Syst. J. 14(1), 657\u2013660 (2019)","journal-title":"IEEE Syst. J."},{"key":"4252_CR23","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1007\/s11235-019-00600-9","volume":"72","author":"A Othman","year":"2019","unstructured":"Othman, A., Nayan, N.A.: Efficient admission control and resource allocation mechanisms for public safety communications over 5G network slice. Telecommun. Syst. 72, 595\u2013607 (2019)","journal-title":"Telecommun. Syst."},{"issue":"3","key":"4252_CR24","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/TMC.2019.2896950","volume":"19","author":"D Bega","year":"2019","unstructured":"Bega, D., et al.: A machine learning approach to 5G infrastructure market optimization. IEEE Trans. Mob. Comput. 19(3), 498\u2013512 (2019)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"4252_CR25","doi-asserted-by":"publisher","first-page":"74429","DOI":"10.1109\/ACCESS.2018.2881964","volume":"6","author":"R Li","year":"2018","unstructured":"Li, R., et al.: Deep reinforcement learning for resource management in network slicing. IEEE Access 6, 74429\u201374441 (2018)","journal-title":"IEEE Access"},{"issue":"4","key":"4252_CR26","doi-asserted-by":"publisher","first-page":"1543","DOI":"10.1109\/TNET.2019.2924471","volume":"27","author":"V Sciancalepore","year":"2019","unstructured":"Sciancalepore, V., Costa-Perez, X., Banchs, A.: RL-NSB: Reinforcement learning-based 5G network slice broker. IEEE\/ACM Trans. Netw. 27(4), 1543\u20131557 (2019)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"4252_CR27","doi-asserted-by":"publisher","first-page":"127595","DOI":"10.1109\/ACCESS.2021.3111143","volume":"9","author":"M Vincenzi","year":"2021","unstructured":"Vincenzi, M., Lopez-Aguilera, E., Garcia-Villegas, E.: Timely admission control for network slicing in 5G with machine learning. IEEE Access 9, 127595\u2013127610 (2021)","journal-title":"IEEE Access"},{"key":"4252_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3222589","author":"M Sulaiman","year":"2022","unstructured":"Sulaiman, M., et al.: Coordinated slicing and admission control using multi-agent deep reinforcement learning. IEEE Trans. Netw. Serv. Manag. (2022). https:\/\/doi.org\/10.1109\/TNSM.2022.3222589","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"3","key":"4252_CR29","doi-asserted-by":"publisher","first-page":"4686","DOI":"10.1109\/JSYST.2022.3172658","volume":"16","author":"WF Villota-Jacome","year":"2022","unstructured":"Villota-Jacome, W.F., Rendon, O.M.C., da Fonseca, N.L.: Admission control for 5G core network slicing based on deep reinforcement learning. IEEE Syst. J. 16(3), 4686\u20134697 (2022)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"4252_CR30","doi-asserted-by":"publisher","first-page":"112","DOI":"10.26599\/TST.2022.9010065","volume":"29","author":"Q Wu","year":"2023","unstructured":"Wu, Q., et al.: Monte Carlo simulation-based robust workflow scheduling for spot instances in cloud environments. Tsinghua Sci. Technol. 29(1), 112\u2013126 (2023)","journal-title":"Tsinghua Sci. Technol."},{"issue":"2","key":"4252_CR31","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1109\/TNSM.2016.2541171","volume":"13","author":"B Cheng","year":"2016","unstructured":"Cheng, B., et al.: Situation-aware IoT service coordination using the event-driven SOA paradigm. IEEE Trans. Netw. Serv. Manag. 13(2), 349\u2013361 (2016)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"4252_CR32","volume-title":"2021 IFIP\/IEEE international symposium on integrated network management (IM)","author":"FB Lopes","year":"2021","unstructured":"Lopes, F.B., Nazar, G.L., Schaeffer-Filho, A.E.: VNFAccel: An FPGA-based platform for modular VNF components acceleration. In: 2021 IFIP\/IEEE international symposium on integrated network management (IM). IEEE, New Jersey (2021)"},{"key":"4252_CR33","doi-asserted-by":"publisher","first-page":"108711","DOI":"10.1016\/j.asoc.2022.108711","volume":"120","author":"C Bu","year":"2022","unstructured":"Bu, C., Wang, J., Wang, X.: Towards delay-optimized and resource-efficient network function dynamic deployment for VNF service chaining. Appl. Soft Comput. 120, 108711 (2022)","journal-title":"Appl. Soft Comput."},{"issue":"1","key":"4252_CR34","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/s11227-021-03898-y","volume":"78","author":"J Luo","year":"2022","unstructured":"Luo, J., et al.: Using deep belief network to construct the agricultural information system based on internet of things. J. Supercomput. 78(1), 379\u2013405 (2022)","journal-title":"J. Supercomput."},{"issue":"8","key":"4252_CR35","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MCOM.004.2100990","volume":"60","author":"Z Lv","year":"2022","unstructured":"Lv, Z., Qiao, L., Nowak, R.: Energy-efficient resource allocation of wireless energy transfer for the internet of everything in digital twins. IEEE Commun. Mag. 60(8), 68\u201373 (2022)","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"4252_CR36","doi-asserted-by":"publisher","first-page":"908","DOI":"10.1109\/TIV.2022.3200592","volume":"7","author":"J Xu","year":"2022","unstructured":"Xu, J., Guo, K., Sun, P.Z.: Driving performance under violations of traffic rules: novice vs. experienced drivers. IEEE Trans. Intell. Veh 7(4), 908\u2013917 (2022)","journal-title":"IEEE Trans. Intell. Veh"},{"key":"4252_CR37","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3271452","author":"Y Yao","year":"2023","unstructured":"Yao, Y., et al.: Secure transmission scheme based on joint radar and communication in mobile vehicular networks. IEEE Trans. Intell. Transp. Syst. (2023). https:\/\/doi.org\/10.1109\/TITS.2023.3271452","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"4252_CR38","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.neucom.2022.01.038","volume":"481","author":"B Chen","year":"2022","unstructured":"Chen, B., et al.: Finite-time observer based tracking control of uncertain heterogeneous underwater vehicles using adaptive sliding mode approach. Neurocomputing 481, 322\u2013332 (2022)","journal-title":"Neurocomputing"},{"key":"4252_CR39","doi-asserted-by":"publisher","DOI":"10.1002\/9781118867464","volume-title":"Fundamentals of 5G mobile networks","author":"J Rodriguez","year":"2015","unstructured":"Rodriguez, J.: Fundamentals of 5G mobile networks. Wiley, New Jersey (2015)"},{"issue":"6","key":"4252_CR40","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2017.2743240","volume":"34","author":"K Arulkumaran","year":"2017","unstructured":"Arulkumaran, K., et al.: Deep reinforcement learning: a brief survey. IEEE Signal Process. Mag. 34(6), 26\u201338 (2017)","journal-title":"IEEE Signal Process. Mag."},{"key":"4252_CR41","doi-asserted-by":"publisher","first-page":"122229","DOI":"10.1109\/ACCESS.2020.3006502","volume":"8","author":"T Li","year":"2020","unstructured":"Li, T., Zhu, X., Liu, X.: An end-to-end network slicing algorithm based on deep Q-learning for 5G network. IEEE Access 8, 122229\u2013122240 (2020)","journal-title":"IEEE Access"},{"key":"4252_CR42","volume-title":"2018 IEEE wireless communications and networking conference (WCNC)","author":"J Li","year":"2018","unstructured":"Li, J., et al.: Deep reinforcement learning based computation offloading and resource allocation for MEC. In: 2018 IEEE wireless communications and networking conference (WCNC). IEEE, New Jersey (2018)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04252-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-04252-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-04252-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T14:35:26Z","timestamp":1723473326000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-04252-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,16]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["4252"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-04252-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,16]]},"assertion":[{"value":"3 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}