{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T22:38:11Z","timestamp":1776292691746,"version":"3.50.1"},"reference-count":176,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-024-19054-6","type":"journal-article","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T03:29:12Z","timestamp":1712719752000},"page":"5741-5792","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Techniques employed in distributed cognitive radio networks: a survey on routing intelligence"],"prefix":"10.1007","volume":"84","author":[{"given":"Rahul","family":"Priyadarshi","sequence":"first","affiliation":[]},{"given":"Ravi Ranjan","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Ying","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"issue":"1","key":"19054_CR1","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s11277-018-5700-y","volume":"101","author":"M Soheil Shamaee","year":"2018","unstructured":"Soheil Shamaee M, Shiri ME, Sabaei M (2018) A reinforcement learning based routing in cognitive radio networks for primary users with multi-stage periodicity. Wireless Pers Commun 101(1):465\u2013490. https:\/\/doi.org\/10.1007\/s11277-018-5700-y","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"19054_CR2","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/COMST.2016.2539923","volume":"18","author":"W Wang","year":"2016","unstructured":"Wang W, Kwasinski A, Niyato D, Han Z (2016) A survey on applications of model-free strategy learning in cognitive wireless networks. IEEE Commun Surv Tutorials 18(3):1717\u20131757. https:\/\/doi.org\/10.1109\/COMST.2016.2539923","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"3","key":"19054_CR3","doi-asserted-by":"publisher","first-page":"1160","DOI":"10.1109\/SURV.2013.010413.00175","volume":"15","author":"C Zheng","year":"2013","unstructured":"Zheng C, Sicker DC (2013) A survey on biologically inspired algorithms for computer networking. IEEE Commun Surv Tutorials 15(3):1160\u20131191. https:\/\/doi.org\/10.1109\/SURV.2013.010413.00175","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"4","key":"19054_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-020-00249-1","volume":"1","author":"IS Ahmad","year":"2020","unstructured":"Ahmad IS, Bakar AA, Yaakub MR, Muhammad SH (2020) A survey on machine learning techniques in movie revenue prediction. SN Comput Sci 1(4):235. https:\/\/doi.org\/10.1007\/s42979-020-00249-1","journal-title":"SN Comput Sci"},{"issue":"4","key":"19054_CR5","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1007\/s11277-015-2921-1","volume":"85","author":"D Das","year":"2015","unstructured":"Das D, Das S (2015) A survey on spectrum occupancy measurement for cognitive radio. Wireless Pers Commun 85(4):2581\u20132598. https:\/\/doi.org\/10.1007\/s11277-015-2921-1","journal-title":"Wireless Pers Commun"},{"key":"19054_CR6","doi-asserted-by":"publisher","unstructured":"Patil VM, Patil SR (2016) A survey on spectrum sensing algorithms for cognitive radio. 2016 International Conference on Advances in Human Machine Interaction, HMI 2016, 11, pp 149\u2013153. https:\/\/doi.org\/10.1109\/HMI.2016.7449196","DOI":"10.1109\/HMI.2016.7449196"},{"issue":"3","key":"19054_CR7","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/JSAC.2010.100403","volume":"28","author":"F Fu","year":"2010","unstructured":"Fu F, Van Der Schaar M (2010) A systematic framework for dynamically optimizing multi-user wireless video transmission. IEEE J Sel Areas Commun 28(3):308\u2013320. https:\/\/doi.org\/10.1109\/JSAC.2010.100403","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"19054_CR8","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1007\/s11277-023-10777-7","volume":"133","author":"R Priyadarshi","year":"2023","unstructured":"Priyadarshi R, Vikram R (2023) A triangle-based localization scheme in wireless multimedia sensor network. Wireless Pers Commun 133(1):525\u2013546. https:\/\/doi.org\/10.1007\/s11277-023-10777-7","journal-title":"Wireless Pers Commun"},{"issue":"8","key":"19054_CR9","doi-asserted-by":"publisher","first-page":"1439","DOI":"10.1109\/JSAC.2006.879350","volume":"24","author":"DP Palomar","year":"2006","unstructured":"Palomar DP, Chiang M (2006) A tutorial on decomposition methods for network utility maximization. IEEE J Sel Areas Commun 24(8):1439\u20131451. https:\/\/doi.org\/10.1109\/JSAC.2006.879350","journal-title":"IEEE J Sel Areas Commun"},{"issue":"1","key":"19054_CR10","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1109\/90.554730","volume":"5","author":"YA Korilis","year":"1997","unstructured":"Korilis YA, Lazar AA, Orda A (1997) Achieving network optima using Stackelberg routing strategies. IEEE\/ACM Trans Networking 5(1):161\u2013173. https:\/\/doi.org\/10.1109\/90.554730","journal-title":"IEEE\/ACM Trans Networking"},{"issue":"2","key":"19054_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MWC.2011.5751299","volume":"18","author":"P Nicopolitidis","year":"2011","unstructured":"Nicopolitidis P, Papadimitriou GI, Pomportsis AS, Sarigiannidis P, Obaidat MS (2011) Adaptive wireless networks using learning automata. IEEE Wirel Commun 18(2):75\u201381. https:\/\/doi.org\/10.1109\/MWC.2011.5751299","journal-title":"IEEE Wirel Commun"},{"issue":"2","key":"19054_CR12","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1109\/COMST.2014.2380998","volume":"17","author":"RK Sharma","year":"2015","unstructured":"Sharma RK, Rawat DB (2015) Advances on security threats and countermeasures for cognitive radio networks: a survey. IEEE Commun Surv Tutorials 17(2):1023\u20131043. https:\/\/doi.org\/10.1109\/COMST.2014.2380998","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"2","key":"19054_CR13","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1109\/COMST.2016.2631080","volume":"19","author":"A Ali","year":"2017","unstructured":"Ali A, Hamouda W (2017) Advances on spectrum sensing for cognitive radio networks: theory and applications. IEEE Commun Surv Tutorials 19(2):1277\u20131304. https:\/\/doi.org\/10.1109\/COMST.2016.2631080","journal-title":"IEEE Commun Surv Tutorials"},{"key":"19054_CR14","doi-asserted-by":"publisher","unstructured":"Priyadarshi R, Kumar RR (2021) An energy-efficient leach routing protocol for wireless sensor networks. In: Nath V, Mandal JK (eds) Lecture Notes in Electrical Engineering (Vol. 673, pp. 423\u2013430). Springer Singapore. https:\/\/doi.org\/10.1007\/978-981-15-5546-6_35","DOI":"10.1007\/978-981-15-5546-6_35"},{"key":"19054_CR15","doi-asserted-by":"publisher","unstructured":"Yin F, Lin Z, Kong Q, Xu Y, Li D, Theodoridis S,\u2026, Cui SR (2020) FedLoc:Federated Learning Framework for Data-Driven Cooperative Localization and Location Data Processing. IEEE Open J Signal Process 1:187\u2013215. https:\/\/doi.org\/10.1109\/OJSP.2020.3036276","DOI":"10.1109\/OJSP.2020.3036276"},{"issue":"6","key":"19054_CR16","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.1109\/TSP.2015.2394300","volume":"63","author":"F Yin","year":"2015","unstructured":"Yin F, Fritsche C, Jin D, Gustafsson F, Zoubir AM (2015) Cooperative localization in WSNs using Gaussian mixture modeling: distributed ECM algorithms. IEEE Trans Signal Process 63(6):1448\u20131463. https:\/\/doi.org\/10.1109\/TSP.2015.2394300","journal-title":"IEEE Trans Signal Process"},{"key":"19054_CR17","doi-asserted-by":"publisher","unstructured":"Chen Z, Gao L (2023) CURSOR: Configuration Update Synthesis Using Order Rules. Paper presented at the IEEE INFOCOM 2023 - IEEE Conference on Computer Communications. https:\/\/doi.org\/10.1109\/INFOCOM53939.2023.10228930","DOI":"10.1109\/INFOCOM53939.2023.10228930"},{"key":"19054_CR18","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1016\/j.ins.2022.06.073","volume":"608","author":"X Xu","year":"2022","unstructured":"Xu X, Liu W, Yu L (2022) Trajectory prediction for heterogeneous traffic-agents using knowledge correction data-driven model. Inf Sci 608:375\u2013391. https:\/\/doi.org\/10.1016\/j.ins.2022.06.073","journal-title":"Inf Sci"},{"key":"19054_CR19","doi-asserted-by":"publisher","unstructured":"Sun G, Xu Z, Yu H, Chen X, Chang V,\u2026, Vasilakos AV (2020) Low-latency and resource-efficient service function chaining orchestration in network function virtualization. IEEE Internet Things J 7(7):5760\u20135772. https:\/\/doi.org\/10.1109\/JIOT.2019.2937110","DOI":"10.1109\/JIOT.2019.2937110"},{"issue":"5","key":"19054_CR20","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1016\/j.comnet.2009.10.007","volume":"54","author":"J Akbari Torkestani","year":"2010","unstructured":"Akbari Torkestani J, Meybodi MR (2010) An intelligent backbone formation algorithm for wireless ad hoc networks based on distributed learning automata. Comput Netw 54(5):826\u2013843. https:\/\/doi.org\/10.1016\/j.comnet.2009.10.007","journal-title":"Comput Netw"},{"issue":"1","key":"19054_CR21","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MASSP.1986.1165342","volume":"3","author":"LR Rabiner","year":"1986","unstructured":"Rabiner LR, Juang BH (1986) An introduction to hidden Markov models. IEEE ASSP Mag 3(1):4\u201316. https:\/\/doi.org\/10.1109\/MASSP.1986.1165342","journal-title":"IEEE ASSP Mag"},{"key":"19054_CR22","doi-asserted-by":"publisher","unstructured":"Ahmad AJ, Hassan SD, Priyadarshi R, Nath V (2023) Analysis on Image Compression for Multimedia Communication Using Hybrid of DWT and DCT. In: Nath V, Mandal JK (eds) Lecture Notes in Electrical Engineering (Vol. 887, pp. 667\u2013672). Springer Nature Singapore. https:\/\/doi.org\/10.1007\/978-981-19-1906-0_54","DOI":"10.1007\/978-981-19-1906-0_54"},{"issue":"4","key":"19054_CR23","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MWC.2007.4300983","volume":"14","author":"C Clancy","year":"2007","unstructured":"Clancy C, Hecker J, Stuntebeck E, O\u2019Shea T (2007) Applications of machine learning to cognitive radio networks. IEEE Wirel Commun 14(4):47\u201352. https:\/\/doi.org\/10.1109\/MWC.2007.4300983","journal-title":"IEEE Wirel Commun"},{"issue":"9","key":"19054_CR24","doi-asserted-by":"publisher","first-page":"1270","DOI":"10.1109\/TC.2011.145","volume":"61","author":"C Busch","year":"2012","unstructured":"Busch C, Kannan R, Vasilakos AV (2012) Approximating congestion\u2009+\u2009dilation in networks via quality of routing games. IEEE Trans Comput 61(9):1270\u20131283. https:\/\/doi.org\/10.1109\/TC.2011.145","journal-title":"IEEE Trans Comput"},{"issue":"2","key":"19054_CR25","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s11277-020-07899-7","volume":"117","author":"R Priyadarshi","year":"2021","unstructured":"Priyadarshi R, Gupta B (2021) Area coverage optimization in three-dimensional wireless sensor network. Wireless Pers Commun 117(2):843\u2013865. https:\/\/doi.org\/10.1007\/s11277-020-07899-7","journal-title":"Wireless Pers Commun"},{"issue":"1","key":"19054_CR26","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10462-015-9438-6","volume":"45","author":"J Qadir","year":"2016","unstructured":"Qadir J (2016) Artificial intelligence based cognitive routing for cognitive radio networks. Artif Intell Rev 45(1):25\u201396. https:\/\/doi.org\/10.1007\/s10462-015-9438-6","journal-title":"Artif Intell Rev"},{"issue":"5","key":"19054_CR27","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1109\/TNET.2011.2181864","volume":"20","author":"Y Gai","year":"2012","unstructured":"Gai Y, Krishnamachari B, Jain R (2012) Combinatorial network optimization with unknown variables: multi-armed bandits with linear rewards and individual observations. IEEE\/ACM Trans Netw 20(5):1466\u20131478. https:\/\/doi.org\/10.1109\/TNET.2011.2181864","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"2","key":"19054_CR28","first-page":"29","volume":"3","author":"FK Purian","year":"2013","unstructured":"Purian FK, Farokhi F, Nadooshan RS (2013) Comparing the performance of genetic algorithm and ant colony optimization algorithm for Mobile Robot path planning in the dynamic environments with different complexities. J Acad Appl Stud 3(2):29\u201344","journal-title":"J Acad Appl Stud"},{"issue":"2","key":"19054_CR29","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1287\/moor.24.2.293","volume":"24","author":"CH Papadimitriou","year":"1999","unstructured":"Papadimitriou CH, Tsitsiklis JN (1999) Complexity of optimal queuing network control. Math Oper Res 24(2):293\u2013305. https:\/\/doi.org\/10.1287\/moor.24.2.293","journal-title":"Math Oper Res"},{"key":"19054_CR30","doi-asserted-by":"crossref","unstructured":"Macaluso I, Finn D, Ozgul B, DaSilva LA (2013) Complexity of spectrum activity and benefits of learning for dynamic channel selection. IEEE\u00a0J Sel Areas Commun 31(11):2237\u20132248","DOI":"10.1109\/JSAC.2013.131115"},{"issue":"11","key":"19054_CR31","doi-asserted-by":"publisher","first-page":"2237","DOI":"10.1109\/JSAC.2013.131115","volume":"31","author":"I Macaluso","year":"2013","unstructured":"Macaluso I, Finn D, Ozgul B, Dasilva LA (2013) Complexity of spectrum activity and benefits of reinforcement learning for dynamic channel selection. IEEE J Sel Areas Commun 31(11):2237\u20132248. https:\/\/doi.org\/10.1109\/JSAC.2013.131115","journal-title":"IEEE J Sel Areas Commun"},{"issue":"2","key":"19054_CR32","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1109\/TC.2012.211","volume":"63","author":"SS Byun","year":"2014","unstructured":"Byun SS, Balashingham I, Vasilakos AV, Lee HN (2014) Computation of an equilibrium in spectrum markets for cognitive radio networks. IEEE Trans Comput 63(2):304\u2013316. https:\/\/doi.org\/10.1109\/TC.2012.211","journal-title":"IEEE Trans Comput"},{"issue":"4","key":"19054_CR33","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s005000100099","volume":"5","author":"YA Sekercio\u011flu","year":"2001","unstructured":"Sekercio\u011flu YA, Pitsillides A, Vasilakos A (2001) Computational intelligence in management of ATM networks. Soft Comput 5(4):257\u2013263. https:\/\/doi.org\/10.1007\/s005000100099","journal-title":"Soft Comput"},{"issue":"9","key":"19054_CR34","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1109\/9.35806","volume":"34","author":"S Verdu","year":"1989","unstructured":"Verdu S (1989) Control and optimization methods in communication network problems. IEEE Trans Autom Control 34(9):930\u2013942. https:\/\/doi.org\/10.1109\/9.35806","journal-title":"IEEE Trans Autom Control"},{"key":"19054_CR35","doi-asserted-by":"publisher","first-page":"5550","DOI":"10.1109\/ACCESS.2019.2963223","volume":"8","author":"P Wang","year":"2020","unstructured":"Wang P, Zhang J, Zhang X, Yan Z, Evans BG, Wang W (2020) Convergence of satellite and terrestrial networks: a comprehensive survey. IEEE Access 8:5550\u20135588. https:\/\/doi.org\/10.1109\/ACCESS.2019.2963223","journal-title":"IEEE Access"},{"issue":"1","key":"19054_CR36","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.phycom.2010.12.003","volume":"4","author":"IF Akyildiz","year":"2011","unstructured":"Akyildiz IF, Lo BF, Balakrishnan R (2011) Cooperative spectrum sensing in cognitive radio networks: a survey. Phys Commun 4(1):40\u201362. https:\/\/doi.org\/10.1016\/j.phycom.2010.12.003","journal-title":"Phys Commun"},{"issue":"6","key":"19054_CR37","doi-asserted-by":"publisher","first-page":"4101","DOI":"10.1109\/TNSE.2022.3195862","volume":"9","author":"M Dai","year":"2022","unstructured":"Dai M, Luo L, Ren J, Yu H, Sun G (2022) PSACCF: prioritized online slice admission control considering fairness in 5G\/B5G networks. IEEE Trans Netw Sci Eng 9(6):4101\u20134114. https:\/\/doi.org\/10.1109\/TNSE.2022.3195862","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"10","key":"19054_CR38","doi-asserted-by":"publisher","first-page":"7155","DOI":"10.1109\/TII.2020.3042872","volume":"17","author":"G Sun","year":"2021","unstructured":"Sun G, Xu Z, Yu H, Chang V (2021) Dynamic network function provisioning to enable network in box for industrial applications. IEEE Trans Industr Inf 17(10):7155\u20137164. https:\/\/doi.org\/10.1109\/TII.2020.3042872","journal-title":"IEEE Trans Industr Inf"},{"key":"19054_CR39","doi-asserted-by":"publisher","first-page":"109930","DOI":"10.1016\/j.ymssp.2022.109930","volume":"187","author":"X Ma","year":"2023","unstructured":"Ma X, Dong Z, Quan W, Dong Y, Tan Y (2023) Real-time assessment of asphalt pavement moduli and traffic loads using monitoring data from built-in sensors: optimal sensor placement and identification algorithm. Mech Syst Signal Process 187:109930. https:\/\/doi.org\/10.1016\/j.ymssp.2022.109930","journal-title":"Mech Syst Signal Process"},{"key":"19054_CR40","doi-asserted-by":"publisher","unstructured":"Qu J, Mao B, Li Z, Xu Y, Zhou K, Cao X,\u2026, Wang X (2023) Recent progress in advanced tactile sensing technologies for soft grippers. Adv Funct Mater 33(41):2306249. https:\/\/doi.org\/10.1002\/adfm.202306249","DOI":"10.1002\/adfm.202306249"},{"key":"19054_CR41","doi-asserted-by":"publisher","unstructured":"Ma B, Liu Z, Dang Q, Zhao W, Wang J, Cheng Y,\u2026, Yuan Z (2023) Deep reinforcement learning of UAV tracking control under wind disturbances environments. IEEE Transactions on Instrumentation and Measurement, pp 72. https:\/\/doi.org\/10.1109\/TIM.2023.3265741","DOI":"10.1109\/TIM.2023.3265741"},{"key":"19054_CR42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3363044","author":"J Zhang","year":"2024","unstructured":"Zhang J, Ren J, Cui Y, Fu D, Cong J (2024) Multi-USV task planning method based on improved deep reinforcement learning. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2024.3363044","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"19054_CR43","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1007\/s00542-019-04674-y","volume":"26","author":"R Priyadarshi","year":"2020","unstructured":"Priyadarshi R, Gupta B (2020) Coverage area enhancement in wireless sensor network. Microsyst Technol 26(5):1417\u20131426. https:\/\/doi.org\/10.1007\/s00542-019-04674-y","journal-title":"Microsyst Technol"},{"issue":"5","key":"19054_CR44","doi-asserted-by":"publisher","first-page":"810","DOI":"10.1016\/j.adhoc.2009.01.001","volume":"7","author":"IF Akyildiz","year":"2009","unstructured":"Akyildiz IF, Lee WY, Chowdhury KR (2009) CRAHNs: cognitive radio ad hoc networks. Ad Hoc Netw 7(5):810\u2013836. https:\/\/doi.org\/10.1016\/j.adhoc.2009.01.001","journal-title":"Ad Hoc Netw"},{"issue":"4","key":"19054_CR45","doi-asserted-by":"publisher","first-page":"1969","DOI":"10.1109\/TVT.2010.2045403","volume":"59","author":"L Ding","year":"2010","unstructured":"Ding L, Melodia T, Batalama SN, Matyjas JD, Medley MJ (2010) Cross-layer routing and dynamic spectrum allocation in cognitive radio ad hoc networks. IEEE Trans Veh Technol 59(4):1969\u20131979. https:\/\/doi.org\/10.1109\/TVT.2010.2045403","journal-title":"IEEE Trans Veh Technol"},{"issue":"4","key":"19054_CR46","doi-asserted-by":"publisher","first-page":"794","DOI":"10.1109\/JSAC.2011.110411","volume":"29","author":"KR Chowdhury","year":"2011","unstructured":"Chowdhury KR, Akyildiz IF (2011) CRP: a routing protocol for cognitive radio ad hoc networks. IEEE J Sel Areas Commun 29(4):794\u2013804. https:\/\/doi.org\/10.1109\/JSAC.2011.110411","journal-title":"IEEE J Sel Areas Commun"},{"issue":"3","key":"19054_CR47","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/JSAC.2007.070409","volume":"25","author":"Q Zhao","year":"2007","unstructured":"Zhao Q, Tong L, Swami A, Chen Y (2007) Decentralized cognitive MAC for opportunistic spectrum access in ad hoc networks: a POMDP framework. IEEE J Sel Areas Commun 25(3):589\u2013599. https:\/\/doi.org\/10.1109\/JSAC.2007.070409","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"19054_CR48","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1109\/SURV.2013.030713.00189","volume":"15","author":"Y Xu","year":"2013","unstructured":"Xu Y, Anpalagan A, Wu Q, Shen L, Gao Z, Wang J (2013) Decision-theoretic distributed channel selection for opportunistic spectrum access: strategies, challenges and solutions. IEEE Commun Surv Tutorials 15(4):1689\u20131713. https:\/\/doi.org\/10.1109\/SURV.2013.030713.00189","journal-title":"IEEE Commun Surv Tutorials"},{"issue":"9","key":"19054_CR49","doi-asserted-by":"publisher","first-page":"7333","DOI":"10.1007\/s11227-020-03166-5","volume":"76","author":"R Priyadarshi","year":"2020","unstructured":"Priyadarshi R, Gupta B, Anurag A (2020) Deployment techniques in wireless sensor networks: a survey, classification, challenges, and future research issues. J Supercomputing 76(9):7333\u20137373. https:\/\/doi.org\/10.1007\/s11227-020-03166-5","journal-title":"J Supercomputing"},{"key":"19054_CR50","doi-asserted-by":"publisher","unstructured":"Pandey A, Kumar D, Priyadarshi R, Nath V (2023) Development of Smart Village for Better Lifestyle of Farmers by Crop and Health Monitoring System. In: Nath V, Mandal JK (eds) Lecture Notes in Electrical Engineering (Vol. 887, pp. 689\u2013694). Springer Nature Singapore. https:\/\/doi.org\/10.1007\/978-981-19-1906-0_57","DOI":"10.1007\/978-981-19-1906-0_57"},{"issue":"2","key":"19054_CR51","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s11276-012-0457-9","volume":"19","author":"Y Zeng","year":"2013","unstructured":"Zeng Y, Xiang K, Li D, Vasilakos AV (2013) Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Netw 19(2):161\u2013173. https:\/\/doi.org\/10.1007\/s11276-012-0457-9","journal-title":"Wireless Netw"},{"issue":"6","key":"19054_CR52","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1109\/TSMCB.2005.850180","volume":"35","author":"S Misra","year":"2005","unstructured":"Misra S, Oommen BJ (2005) Dynamic algorithms for the shortest path routing problem: learning automata-based solutions. IEEE Trans Syst Man Cybern Part B: Cybern 35(6):1179\u20131192. https:\/\/doi.org\/10.1109\/TSMCB.2005.850180","journal-title":"IEEE Trans Syst Man Cybern Part B: Cybern"},{"issue":"5","key":"19054_CR53","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCOM.2007.358851","volume":"45","author":"S Geirhofer","year":"2007","unstructured":"Geirhofer S, Tong L, Sadler BM (2007) Dynamic spectrum access in the time domain: modeling and exploiting white space. IEEE Commun Mag 45(5):66\u201372. https:\/\/doi.org\/10.1109\/MCOM.2007.358851","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"19054_CR54","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s11277-010-0005-9","volume":"57","author":"S Maharjan","year":"2011","unstructured":"Maharjan S, Zhang Y, Gjessing S (2011) Economic approaches for cognitive radio networks: a survey. Wireless Pers Commun 57(1):33\u201351. https:\/\/doi.org\/10.1007\/s11277-010-0005-9","journal-title":"Wireless Pers Commun"},{"issue":"3","key":"19054_CR55","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2011.5723803","volume":"49","author":"J Wang","year":"2011","unstructured":"Wang J, Ghosh M, Challapali K (2011) Emerging cognitive radio applications: a survey. IEEE Commun Mag 49(3):74\u201381. https:\/\/doi.org\/10.1109\/MCOM.2011.5723803","journal-title":"IEEE Commun Mag"},{"key":"19054_CR56","doi-asserted-by":"publisher","unstructured":"Priyadarshi R, Singh A, Agarwal D, Verma UC, Singh A (2023) Emerging Smart Manufactory: Industry 4.0 and Manufacturing in India: The Next Wave. In: Nath V, Mandal JK (eds) Lecture Notes in Electrical Engineering (vol 887, pp 353\u2013363). Springer Nature Singapore. https:\/\/doi.org\/10.1007\/978-981-19-1906-0_32","DOI":"10.1007\/978-981-19-1906-0_32"},{"issue":"1\u20132","key":"19054_CR57","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.phycom.2009.03.001","volume":"2","author":"M Wellens","year":"2009","unstructured":"Wellens M, Riihij\u00e4rvi J, M\u00e4h\u00f6nen P (2009) Empirical time and frequency domain models of spectrum use. Phys Commun 2(1\u20132):10\u201332. https:\/\/doi.org\/10.1016\/j.phycom.2009.03.001","journal-title":"Phys Commun"},{"key":"19054_CR58","doi-asserted-by":"publisher","unstructured":"Sammut C, Webb GI (2010) Encyclopedia of machine learning. Encyclopedia of machine learning. Springer. https:\/\/doi.org\/10.1007\/978-0-387-30164-8","DOI":"10.1007\/978-0-387-30164-8"},{"issue":"9","key":"19054_CR59","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1016\/j.peva.2010.11.005","volume":"68","author":"M Di Felice","year":"2011","unstructured":"Di Felice M, Chowdhury KR, Kim W, Kassler A, Bononi L (2011) End-to-end protocols for cognitive radio Ad Hoc networks: an evaluation study. Perform Evaluation 68(9):859\u2013875. https:\/\/doi.org\/10.1016\/j.peva.2010.11.005","journal-title":"Perform Evaluation"},{"issue":"8","key":"19054_CR60","doi-asserted-by":"publisher","DOI":"10.3390\/drones6080215","volume":"6","author":"Y Yin","year":"2022","unstructured":"Yin Y, Guo Y, Su Q, Wang Z (2022) Task allocation of multiple unmanned aerial vehicles based on deep transfer reinforcement learning. Drones 6(8):215. https:\/\/doi.org\/10.3390\/drones6080215","journal-title":"Drones"},{"key":"19054_CR61","doi-asserted-by":"publisher","unstructured":"Fang Z, Wang J, Liang J, Yan Y, Pi D, Zhang H,\u2026, Yin G (2024). Authority allocation strategy for shared steering control considering human-machine mutual trust level. IEEE Trans Intell Veh 9(1):2002\u20132015. https:\/\/doi.org\/10.1109\/TIV.2023.3300152","DOI":"10.1109\/TIV.2023.3300152"},{"issue":"12","key":"19054_CR62","doi-asserted-by":"publisher","first-page":"4905","DOI":"10.1109\/TSMC.2018.2884510","volume":"50","author":"Q Li","year":"2020","unstructured":"Li Q, Lin H, Tan X, Du S (2020) H\u2009\u221e\u2009consensus for multiagent-based supply chain systems under switching topology and uncertain demands. IEEE Trans Syst Man Cybernetics: Syst 50(12):4905\u20134918. https:\/\/doi.org\/10.1109\/TSMC.2018.2884510","journal-title":"IEEE Trans Syst Man Cybernetics: Syst"},{"key":"19054_CR63","doi-asserted-by":"publisher","unstructured":"Cai L, Yan S, Ouyang C, Zhang T, Zhu J, Chen L,\u2026, Liu H (2023) Muscle synergies in joystick manipulation. Front Physiol 14. https:\/\/doi.org\/10.3389\/fphys.2023.1282295","DOI":"10.3389\/fphys.2023.1282295"},{"issue":"14","key":"19054_CR64","doi-asserted-by":"publisher","first-page":"8227","DOI":"10.1007\/s00521-020-04958-9","volume":"33","author":"X Li","year":"2021","unstructured":"Li X, Sun Y (2021) Application of RBF neural network optimal segmentation algorithm in credit rating. Neural Comput Appl 33(14):8227\u20138235. https:\/\/doi.org\/10.1007\/s00521-020-04958-9","journal-title":"Neural Comput Appl"},{"issue":"6","key":"19054_CR65","doi-asserted-by":"publisher","first-page":"4183","DOI":"10.1109\/TSC.2023.3311785","volume":"16","author":"Y Xie","year":"2023","unstructured":"Xie Y, Wang X, Shen Z, Sheng Y, Wu G (2023) A two-stage estimation of distribution algorithm with heuristics for energy-aware cloud workflow scheduling. IEEE Trans Serv Comput 16(6):4183\u20134197. https:\/\/doi.org\/10.1109\/TSC.2023.3311785","journal-title":"IEEE Trans Serv Comput"},{"issue":"6","key":"19054_CR66","doi-asserted-by":"publisher","first-page":"4907","DOI":"10.1109\/TCYB.2020.3024551","volume":"52","author":"K Li","year":"2022","unstructured":"Li K, Ji L, Yang S, Li H, Liao X (2022) Couple-group consensus of cooperative\u2013competitive heterogeneous multiagent systems: a fully distributed event-triggered and pinning control method. IEEE Trans Cybernetics 52(6):4907\u20134915. https:\/\/doi.org\/10.1109\/TCYB.2020.3024551","journal-title":"IEEE Trans Cybernetics"},{"issue":"6","key":"19054_CR67","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1007\/s00542-018-4116-7","volume":"25","author":"R Priyadarshi","year":"2019","unstructured":"Priyadarshi R, Rawat P, Nath V (2019) Energy dependent cluster formation in heterogeneous wireless sensor network. Microsyst Technol 25(6):2313\u20132321. https:\/\/doi.org\/10.1007\/s00542-018-4116-7","journal-title":"Microsyst Technol"},{"issue":"12","key":"19054_CR68","doi-asserted-by":"publisher","first-page":"4775","DOI":"10.1007\/s00542-018-3873-7","volume":"24","author":"R Priyadarshi","year":"2018","unstructured":"Priyadarshi R, Soni SK, Nath V (2018) Energy efficient cluster head formation in wireless sensor network. Microsyst Technol 24(12):4775\u20134784. https:\/\/doi.org\/10.1007\/s00542-018-3873-7","journal-title":"Microsyst Technol"},{"key":"19054_CR69","doi-asserted-by":"crossref","unstructured":"Randheer, Soni SK, Kumar S, Priyadarshi R (2020) Energy-Aware clustering in Wireless Sensor Networks BT - Nanoelectronics, Circuits and Communication systems. In: Nath V, Mandal JK (eds) Springer Singapore, pp 453\u2013461","DOI":"10.1007\/978-981-15-2854-5_39"},{"issue":"13","key":"19054_CR70","doi-asserted-by":"publisher","first-page":"2050204","DOI":"10.1142\/S0218126620502047","volume":"29","author":"P Rawat","year":"2020","unstructured":"Rawat P, Chauhan S, Priyadarshi R (2020) Energy-efficient clusterhead selection scheme in heterogeneous wireless sensor network. J Circuits Syst Computers 29(13):2050204. https:\/\/doi.org\/10.1142\/S0218126620502047","journal-title":"J Circuits Syst Computers"},{"issue":"3","key":"19054_CR71","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MSP.2007.361602","volume":"24","author":"F Meshkati","year":"2007","unstructured":"Meshkati F, Poor HV, Schwartz SC (2007) Energy-efficient resource allocation in wireless networks. IEEE Signal Process Mag 24(3):58\u201368. https:\/\/doi.org\/10.1109\/MSP.2007.361602","journal-title":"IEEE Signal Process Mag"},{"key":"19054_CR72","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-023-10039-6","author":"R Priyadarshi","year":"2024","unstructured":"Priyadarshi R (2024) Energy-efficient routing in wireless sensor networks: a meta-heuristic and artificial intelligence-based approach: a comprehensive review. Arch Comput Methods Eng. https:\/\/doi.org\/10.1007\/s11831-023-10039-6","journal-title":"Arch Comput Methods Eng"},{"issue":"3","key":"19054_CR73","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1002\/dac.898","volume":"21","author":"E Adamopoulou","year":"2008","unstructured":"Adamopoulou E, Demestichas K, Demestichas P, Theologou M (2008) Enhancing cognitive radio systems with robust reasoning. Int J Commun Syst 21(3):311\u2013330. https:\/\/doi.org\/10.1002\/dac.898","journal-title":"Int J Commun Syst"},{"issue":"1","key":"19054_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/s00108ed1v01y200802aim003","volume":"2","author":"K Leyton-Brown","year":"2008","unstructured":"Leyton-Brown K, Shoham Y (2008) Essentials of game theory: a concise multidisciplinary introduction. Synthesis Lectures Artif Intell Mach Learn 2(1):1\u201388. https:\/\/doi.org\/10.2200\/s00108ed1v01y200802aim003","journal-title":"Synthesis Lectures Artif Intell Mach Learn"},{"key":"19054_CR75","doi-asserted-by":"publisher","unstructured":"Crepinsek M, Liu SH, Mernik M (2013) Exploration and exploitation in evolutionary algorithms: a survey. ACM-CSUR 45(3) https:\/\/doi.org\/10.1145\/2480741.2480752","DOI":"10.1145\/2480741.2480752"},{"key":"19054_CR76","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-024-03697-2","author":"R Priyadarshi","year":"2024","unstructured":"Priyadarshi R (2024) Exploring machine learning solutions for overcoming challenges in IoT-based wireless sensor network routing: a comprehensive review. Wireless Netw. https:\/\/doi.org\/10.1007\/s11276-024-03697-2","journal-title":"Wireless Netw"},{"issue":"2\u20133","key":"19054_CR77","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1023\/A:1013689704352","volume":"47","author":"P Auer","year":"2002","unstructured":"Auer P, Cesa-Bianchi N, Fischer P (2002) Finite-time analysis of the multiarmed bandit problem. Mach Learn 47(2\u20133):235\u2013256. https:\/\/doi.org\/10.1023\/A:1013689704352","journal-title":"Mach Learn"},{"key":"19054_CR78","doi-asserted-by":"crossref","unstructured":"Sateesh VA, Dutta I, Priyadarshi R, Nath V (2021) Fractional frequency reuse scheme for noise-limited cellular networks BT - Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems. In: Nath V, Mandal JK (eds). Springer Singapore, pp. 995\u20131004","DOI":"10.1007\/978-981-15-5546-6_83"},{"issue":"14","key":"19054_CR79","doi-asserted-by":"publisher","first-page":"2537","DOI":"10.1016\/j.comnet.2010.04.004","volume":"54","author":"B Wang","year":"2010","unstructured":"Wang B, Wu Y, Liu KJR (2010) Game theory for cognitive radio networks: an overview. Comput Netw 54(14):2537\u20132561. https:\/\/doi.org\/10.1016\/j.comnet.2010.04.004","journal-title":"Comput Netw"},{"issue":"3","key":"19054_CR80","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/JCN.2008.6388348","volume":"10","author":"FN Pavlidou","year":"2008","unstructured":"Pavlidou FN, Koltsidas G (2008) Game theory for routing modeling in communication networks - a survey. J Commun Netw 10(3):268\u2013286. https:\/\/doi.org\/10.1109\/JCN.2008.6388348","journal-title":"J Commun Netw"},{"key":"19054_CR81","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2200\/S00014ED1V01Y200508COM001","volume":"1","author":"AB MacKenzie","year":"2005","unstructured":"MacKenzie AB, Dasilva LA (2005) Game theory for wireless engineers. Synthesis Lectures Commun 1:1\u201386. https:\/\/doi.org\/10.2200\/S00014ED1V01Y200508COM001","journal-title":"Synthesis Lectures Commun"},{"issue":"4","key":"19054_CR82","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TMC.2003.1255648","volume":"2","author":"M Zorzi","year":"2003","unstructured":"Zorzi M, Rao RR (2003) Geographic random forwarding (GeRaF) for ad hoc and sensor networks: multihop performance. IEEE Trans Mob Comput 2(4):337\u2013348. https:\/\/doi.org\/10.1109\/TMC.2003.1255648","journal-title":"IEEE Trans Mob Comput"},{"issue":"1","key":"19054_CR83","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/98.904899","volume":"8","author":"R Jain","year":"2001","unstructured":"Jain R, Puri A, Sengupta R (2001) Geographical routing using partial information for wireless ad hoc networks. IEEE Pers Commun 8(1):48\u201357. https:\/\/doi.org\/10.1109\/98.904899","journal-title":"IEEE Pers Commun"},{"issue":"6","key":"19054_CR84","doi-asserted-by":"publisher","first-page":"2567","DOI":"10.1109\/TCSI.2022.3151464","volume":"69","author":"J Yu","year":"2022","unstructured":"Yu J, Dong X, Li Q, L\u00fc J, Ren Z (2022) Adaptive practical optimal time-varying formation tracking control for disturbed high-order multi-agent systems. IEEE Transactions on Circuits and Systems I: Regular Papers 69(6):2567\u20132578. https:\/\/doi.org\/10.1109\/TCSI.2022.3151464","journal-title":"IEEE Transactions on Circuits and Systems I: Regular Papers"},{"key":"19054_CR85","doi-asserted-by":"publisher","unstructured":"Liu D, Cao Z, Jiang H, Zhou S, Xiao Z,\u2026, Zeng F (2022) Concurrent low-power listening: a new design paradigm for duty-cycling communication. ACM Trans Sen Netw 19(1). https:\/\/doi.org\/10.1145\/3517013","DOI":"10.1145\/3517013"},{"key":"19054_CR86","doi-asserted-by":"publisher","unstructured":"Dai X, Xiao Z, Jiang H, Alazab M, Lui JCS, Dustdar S,\u2026, Liu J (2023)Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things. IEEE Trans Ind Inform 19(1):480\u2013490. https:\/\/doi.org\/10.1109\/TII.2022.3158974","DOI":"10.1109\/TII.2022.3158974"},{"key":"19054_CR87","doi-asserted-by":"publisher","unstructured":"Jiang H, Xiao Z, Li Z, Xu J, Zeng F,\u2026, Wang D (2022) An energy-efficient framework for internet of things underlaying heterogeneous small cell networks. IEEE Trans Mob Comput 21(1):31\u201343. https:\/\/doi.org\/10.1109\/TMC.2020.3005908","DOI":"10.1109\/TMC.2020.3005908"},{"key":"19054_CR88","doi-asserted-by":"publisher","unstructured":"Jiang H, Chen S, Xiao Z, Hu J, Liu J,\u2026, Dustdar S (2023) Pa-Count: passenger counting in vehicles using Wi-Fi signals. IEEE Trans Mob Comput. https:\/\/doi.org\/10.1109\/TMC.2023.3263229","DOI":"10.1109\/TMC.2023.3263229"},{"key":"19054_CR89","doi-asserted-by":"publisher","unstructured":"Min H, Li Y, Wu X, Wang W, Chen L,\u2026, Zhao X (2023) A measurement scheduling method for multi-vehicle cooperative localization considering state correlation. Veh Commun. https:\/\/doi.org\/10.1016\/j.vehcom.2023.100682","DOI":"10.1016\/j.vehcom.2023.100682"},{"issue":"4","key":"19054_CR90","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/509506.509514","volume":"5","author":"D Ganesan","year":"2001","unstructured":"Ganesan D, Govindan R, Shenker S, Estrin D (2001) Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mob Comput Commun Rev 5(4):11\u201325. https:\/\/doi.org\/10.1145\/509506.509514","journal-title":"ACM SIGMOBILE Mob Comput Commun Rev"},{"issue":"1","key":"19054_CR91","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MCOM.2009.4752688","volume":"47","author":"CR Stevenson","year":"2009","unstructured":"Stevenson CR, Chouinard G, Lei Z, Hu W, Shellhammer SJ, Caldwell W (2009) IEEE 802.22: the first cognitive radio wireless regional area network standard. IEEE Commun Mag 47(1):130\u2013138. https:\/\/doi.org\/10.1109\/MCOM.2009.4752688","journal-title":"IEEE Commun Mag"},{"key":"19054_CR92","doi-asserted-by":"publisher","DOI":"10.1007\/s11831-024-10079-6","author":"Y Qiu","year":"2024","unstructured":"Qiu Y, Ma L, Priyadarshi R (2024) Deep learning challenges and prospects in wireless sensor network deployment. Arch Comput Methods Eng. https:\/\/doi.org\/10.1007\/s11831-024-10079-6","journal-title":"Arch Comput Methods Eng"},{"issue":"3","key":"19054_CR93","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/s11036-009-0199-9","volume":"15","author":"M Wellens","year":"2010","unstructured":"Wellens M, M\u00e4h\u00f6nen P (2010) Lessons learned from an extensive spectrum occupancy measurement campaign and a stochastic duty cycle model. Mob Networks Appl 15(3):461\u2013474. https:\/\/doi.org\/10.1007\/s11036-009-0199-9","journal-title":"Mob Networks Appl"},{"issue":"1\u20132","key":"19054_CR94","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s11036-008-0025-9","volume":"13","author":"Z Yang","year":"2008","unstructured":"Yang Z, Cheng G, Liu W, Yuan W, Cheng W (2008) Local coordination based routing and spectrum assignment in multi-hop cognitive radio networks. Mob Networks Appl 13(1\u20132):67\u201381. https:\/\/doi.org\/10.1007\/s11036-008-0025-9","journal-title":"Mob Networks Appl"},{"issue":"4","key":"19054_CR95","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TNET.2006.880179","volume":"14","author":"L Qiu","year":"2006","unstructured":"Qiu L, Yang R, Zhang Y, Shenker S (2006) On selfish routing in internet-like environments. IEEE\/ACM Trans Networking 14(4):725\u2013738. https:\/\/doi.org\/10.1109\/TNET.2006.880179","journal-title":"IEEE\/ACM Trans Networking"},{"key":"19054_CR96","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1613\/jair.2523","volume":"33","author":"I Rezek","year":"2008","unstructured":"Rezek I, Leslie DS, Reece S, Roberts SJ, Rogers A, Dash RK, Jennings NR (2008) On similarities between inference in game theory and machine learning. J Artif Intell Res 33:259\u2013283. https:\/\/doi.org\/10.1613\/jair.2523","journal-title":"J Artif Intell Res"},{"issue":"1","key":"19054_CR97","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/JSAC.2012.120111","volume":"30","author":"PBF Duarte","year":"2012","unstructured":"Duarte PBF, Md. Fadlullah Z, Vasilakos AV, Kato N (2012) On the partially overlapped channel assignment on wireless mesh network backbone: a game theoretic approach. IEEE J Sel Areas Commun 30(1):119\u2013127. https:\/\/doi.org\/10.1109\/JSAC.2012.120111","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"19054_CR98","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/MCOM.2013.6495776","volume":"51","author":"S Sengupta","year":"2013","unstructured":"Sengupta S, Subbalakshmi K (2013) Open research issues in multi-hop cognitive radio networks. IEEE Commun Mag 51(4):168\u2013176. https:\/\/doi.org\/10.1109\/MCOM.2013.6495776","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"19054_CR99","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow. ACM SIGCOMM Comput Communication Rev 38(2):69\u201374. https:\/\/doi.org\/10.1145\/1355734.1355746","journal-title":"ACM SIGCOMM Comput Communication Rev"},{"issue":"8","key":"19054_CR100","doi-asserted-by":"publisher","first-page":"2884","DOI":"10.1109\/TWC.2012.061912.111479","volume":"11","author":"M Caleffi","year":"2012","unstructured":"Caleffi M, Akyildiz IF, Paura L (2012) OPERA: optimal routing metric for cognitive radio ad hoc networks. IEEE Trans Wireless Commun 11(8):2884\u20132894. https:\/\/doi.org\/10.1109\/TWC.2012.061912.111479","journal-title":"IEEE Trans Wireless Commun"},{"issue":"8","key":"19054_CR101","doi-asserted-by":"publisher","first-page":"2497","DOI":"10.1109\/TWC.2011.060711.100154","volume":"10","author":"KW Choi","year":"2011","unstructured":"Choi KW, Hossain E (2011) Opportunistic access to spectrum holes between packet bursts: a learning-based approach. IEEE Trans Wireless Commun 10(8):2497\u20132509. https:\/\/doi.org\/10.1109\/TWC.2011.060711.100154","journal-title":"IEEE Trans Wireless Commun"},{"issue":"10","key":"19054_CR102","doi-asserted-by":"publisher","first-page":"3845","DOI":"10.1109\/T-WC.2008.070391","volume":"7","author":"WY Lee","year":"2008","unstructured":"Lee WY, Akyildiz IF (2008) Optimal spectrum sensing framework for cognitive radio networks. IEEE Trans Wireless Commun 7(10):3845\u20133857. https:\/\/doi.org\/10.1109\/T-WC.2008.070391","journal-title":"IEEE Trans Wireless Commun"},{"key":"19054_CR103","doi-asserted-by":"publisher","unstructured":"Priyadarshi R, Yadav S, Bilyan D (2019) Performance analysis of adapted selection based protocol over LEACH protocol. In: Luhach AK, Hawari KBG, Mihai IC, Hsiung P-A, Mishra RB (eds) Smart Computational Strategies: Theoretical and Practical Aspects, pp 247\u2013256. Springer Singapore. https:\/\/doi.org\/10.1007\/978-981-13-6295-8_21","DOI":"10.1007\/978-981-13-6295-8_21"},{"issue":"6","key":"19054_CR104","doi-asserted-by":"publisher","first-page":"2529","DOI":"10.1007\/s00542-017-3625-0","volume":"24","author":"R Priyadarshi","year":"2018","unstructured":"Priyadarshi R, Soni SK, Bhadu R, Nath V (2018) Performance analysis of diamond search algorithm over full search algorithm. Microsyst Technol 24(6):2529\u20132537. https:\/\/doi.org\/10.1007\/s00542-017-3625-0","journal-title":"Microsyst Technol"},{"key":"19054_CR105","doi-asserted-by":"publisher","unstructured":"Kumar S, Soni SK, Randheer, Priyadarshi R (2020) Performance Analysis of Novel Energy Aware Routing in Wireless Sensor Network. In: Nath V, Mandal JK (eds) Lecture Notes in Electrical Engineering (Vol. 642, pp. 503\u2013511). Springer Singapore. https:\/\/doi.org\/10.1007\/978-981-15-2854-5_44","DOI":"10.1007\/978-981-15-2854-5_44"},{"key":"19054_CR106","doi-asserted-by":"publisher","unstructured":"Singh L, Kumar A, Priyadarshi R (2020) Performance and comparison analysis of image processing based forest fire detection. In: Nath V, Mandal J (eds) Nanoelectronics, circuits and communication systems. NCCS 2018. Lecture notes in electrical engineering, vol 642. Springer, Singapore, pp 473\u2013479. https:\/\/doi.org\/10.1007\/978-981-15-2854-5_41","DOI":"10.1007\/978-981-15-2854-5_41"},{"key":"19054_CR107","doi-asserted-by":"publisher","unstructured":"Min H, Lei X, Wu X, Fang Y, Chen S, Wang W,\u2026, Zhao X (2024) Toward interpretable anomaly detection for autonomous vehicles with denoising variational transformer. Eng Appl Artif Intell 129:107601. https:\/\/doi.org\/10.1016\/j.engappai.2023.107601","DOI":"10.1016\/j.engappai.2023.107601"},{"issue":"2","key":"19054_CR108","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/TMC.2019.2947468","volume":"20","author":"J Yu","year":"2021","unstructured":"Yu J, Lu L, Chen Y, Zhu Y, Kong L (2021) An indirect eavesdropping attack of keystrokes on touch screen through acoustic sensing. IEEE Trans Mob Comput 20(2):337\u2013351. https:\/\/doi.org\/10.1109\/TMC.2019.2947468","journal-title":"IEEE Trans Mob Comput"},{"key":"19054_CR109","doi-asserted-by":"publisher","unstructured":"Mao Y, Sun R, Wang J, Cheng Q, Kiong LC,\u2026, Ochieng WY (2022) New time-differenced carrier phase approach to GNSS\/INS integration. GPS Solutions 26(4):122. https:\/\/doi.org\/10.1007\/s10291-022-01314-3","DOI":"10.1007\/s10291-022-01314-3"},{"issue":"18","key":"19054_CR110","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11182950","volume":"11","author":"Y Mao","year":"2022","unstructured":"Mao Y, Zhu Y, Tang Z, Chen Z (2022) A novel airspace planning algorithm for cooperative target localization. Electronics 11(18):2950. https:\/\/doi.org\/10.3390\/electronics11182950","journal-title":"Electronics"},{"key":"19054_CR111","doi-asserted-by":"publisher","first-page":"7389","DOI":"10.1109\/TIP.2022.3222918","volume":"31","author":"H Liu","year":"2022","unstructured":"Liu H, Yuan H, Hou J, Hamzaoui R, Gao W (2022) PUFA-GAN: a frequency-aware generative adversarial network for 3D point cloud upsampling. IEEE Trans Image Process 31:7389\u20137402. https:\/\/doi.org\/10.1109\/TIP.2022.3222918","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"19054_CR112","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1109\/TC.2013.229","volume":"64","author":"L Liu","year":"2015","unstructured":"Liu L, Song Y, Zhang H, Ma H, Vasilakos AV (2015) Physarum optimization: a biology-inspired algorithm for the steiner tree problem in networks. IEEE Trans Comput 64(3):819\u2013832. https:\/\/doi.org\/10.1109\/TC.2013.229","journal-title":"IEEE Trans Comput"},{"issue":"6","key":"19054_CR113","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1016\/j.comcom.2010.10.003","volume":"34","author":"G Wei","year":"2011","unstructured":"Wei G, Ling Y, Guo B, Xiao B, Vasilakos AV (2011) Prediction-based data aggregation in wireless sensor networks: combining grey model and Kalman filter. Comput Commun 34(6):793\u2013802. https:\/\/doi.org\/10.1016\/j.comcom.2010.10.003","journal-title":"Comput Commun"},{"key":"19054_CR114","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jnca.2014.04.001","volume":"43","author":"Y Saleem","year":"2014","unstructured":"Saleem Y, Rehmani MH (2014) Primary radio user activity models for cognitive radio networks: a survey. J Netw Comput Appl 43:1\u201316. https:\/\/doi.org\/10.1016\/j.jnca.2014.04.001","journal-title":"J Netw Comput Appl"},{"issue":"4","key":"19054_CR115","doi-asserted-by":"publisher","first-page":"1854","DOI":"10.1109\/T-WC.2008.080031","volume":"8","author":"B Wang","year":"2009","unstructured":"Wang B, Ji Z, Liu KJR, Clancy TC (2009) Primary-prioritized Markov approach for dynamic spectrum allocation. IEEE Trans Wireless Commun 8(4):1854\u20131865. https:\/\/doi.org\/10.1109\/T-WC.2008.080031","journal-title":"IEEE Trans Wireless Commun"},{"issue":"1\u20132","key":"19054_CR116","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/S0004-3702(01)00110-2","volume":"134","author":"G Tesauro","year":"2002","unstructured":"Tesauro G (2002) Programming backgammon using self-teaching neural nets. Artif Intell 134(1\u20132):181\u2013199. https:\/\/doi.org\/10.1016\/S0004-3702(01)00110-2","journal-title":"Artif Intell"},{"key":"19054_CR117","doi-asserted-by":"publisher","unstructured":"Watkins CJCH, Dayan P (1992)\u00a0Q-learning. Mach Learn 8:279\u2013292. https:\/\/doi.org\/10.1007\/BF00992698","DOI":"10.1007\/BF00992698"},{"issue":"7","key":"19054_CR118","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1109\/JSAC.2012.120807","volume":"30","author":"T Jiang","year":"2012","unstructured":"Jiang T, Wang H, Vasilakos AV (2012) QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE J Sel Areas Commun 30(7):1215\u20131224. https:\/\/doi.org\/10.1109\/JSAC.2012.120807","journal-title":"IEEE J Sel Areas Commun"},{"key":"19054_CR119","doi-asserted-by":"publisher","unstructured":"Fu C, Yuan H, Xu H, Zhang H, Shen L (2023) TMSO-Net: texture adaptive multi-scale observation for light field image depth estimation. J Vis Commun Image Represent 90:103731. https:\/\/doi.org\/10.1016\/j.jvcir.2022.103731","DOI":"10.1016\/j.jvcir.2022.103731"},{"issue":"5","key":"19054_CR120","doi-asserted-by":"publisher","first-page":"854","DOI":"10.1080\/00207217.2021.1941295","volume":"109","author":"Y Jiang","year":"2022","unstructured":"Jiang Y, Li X (2022) Broadband cancellation method in an adaptive co-site interference cancellation system. Int J Electron 109(5):854\u2013874. https:\/\/doi.org\/10.1080\/00207217.2021.1941295","journal-title":"Int J Electron"},{"issue":"5","key":"19054_CR121","doi-asserted-by":"publisher","first-page":"2122","DOI":"10.1109\/TAC.2018.2872197","volume":"64","author":"J Hu","year":"2019","unstructured":"Hu J, Wu Y, Li T, Ghosh BK (2019) Consensus control of general linear multiagent systems with antagonistic interactions and communication noises. IEEE Trans Autom Control 64(5):2122\u20132127. https:\/\/doi.org\/10.1109\/TAC.2018.2872197","journal-title":"IEEE Trans Autom Control"},{"issue":"10","key":"19054_CR122","doi-asserted-by":"publisher","first-page":"6618","DOI":"10.1109\/TSMC.2022.3148295","volume":"52","author":"B Chen","year":"2022","unstructured":"Chen B, Hu J, Zhao Y, Ghosh BK (2022) Finite-time velocity-free Rendezvous control of multiple AUV systems with intermittent communication. IEEE Trans Syst Man Cybernetics: Syst 52(10):6618\u20136629. https:\/\/doi.org\/10.1109\/TSMC.2022.3148295","journal-title":"IEEE Trans Syst Man Cybernetics: Syst"},{"key":"19054_CR123","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.ins.2022.11.035","volume":"619","author":"Q Wang","year":"2023","unstructured":"Wang Q, Hu J, Wu Y, Zhao Y (2023) Output synchronization of wide-area heterogeneous multi-agent systems over intermittent clustered networks. Inf Sci 619:263\u2013275. https:\/\/doi.org\/10.1016\/j.ins.2022.11.035","journal-title":"Inf Sci"},{"key":"19054_CR124","doi-asserted-by":"publisher","unstructured":"Zhang X, Deng H, Xiong Z, Liu Y, Rao Y, Lyu Y,\u2026, Li Y (2024) Secure routing strategy based on attribute-based trust access control in social-aware networks. J Signal Process Syst. https:\/\/doi.org\/10.1007\/s11265-023-01908-1","DOI":"10.1007\/s11265-023-01908-1"},{"issue":"5","key":"19054_CR125","doi-asserted-by":"publisher","first-page":"8973","DOI":"10.1109\/JIOT.2023.3321673","volume":"11","author":"T Lyu","year":"2024","unstructured":"Lyu T, Xu H, Zhang L, Han Z (2024) Source selection and resource allocation in wireless-powered relay networks: an adaptive dynamic programming-based approach. IEEE Internet Things J 11(5):8973\u20138988. https:\/\/doi.org\/10.1109\/JIOT.2023.3321673","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"19054_CR126","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/MCOM.001.2000921","volume":"59","author":"G Liu","year":"2021","unstructured":"Liu G (2021) Data collection in MI-assisted wireless powered underground sensor networks: directions, recent advances, and challenges. IEEE Commun Mag 59(4):132\u2013138. https:\/\/doi.org\/10.1109\/MCOM.001.2000921","journal-title":"IEEE Commun Mag"},{"key":"19054_CR127","doi-asserted-by":"publisher","first-page":"110760","DOI":"10.1016\/j.automatica.2022.110760","volume":"148","author":"X Liu","year":"2023","unstructured":"Liu X, Lou S, Dai W (2023) Further results on system identification of nonlinear state-space models. Automatica 148:110760. https:\/\/doi.org\/10.1016\/j.automatica.2022.110760","journal-title":"Automatica"},{"key":"19054_CR128","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2023.3289798","author":"Q Wang","year":"2023","unstructured":"Wang Q, Dai W, Zhang C, Zhu J, Ma X (2023) A compact constraint incremental method for random weight networks and its application. IEEE transactions on neural networks and Learning systems. https:\/\/doi.org\/10.1109\/TNNLS.2023.3289798","journal-title":"IEEE transactions on neural networks and Learning systems"},{"issue":"16","key":"19054_CR129","doi-asserted-by":"publisher","first-page":"11462","DOI":"10.1016\/j.jfranklin.2023.08.042","volume":"360","author":"X Yang","year":"2023","unstructured":"Yang X, Wang X, Wang S, Puig V (2023) Switching-based adaptive fault-tolerant control for uncertain nonlinear systems against actuator and sensor faults. J Franklin Inst 360(16):11462\u201311488. https:\/\/doi.org\/10.1016\/j.jfranklin.2023.08.042","journal-title":"J Franklin Inst"},{"key":"19054_CR130","doi-asserted-by":"publisher","unstructured":"Hu F, Qiu L, Wei S, Zhou H, Bathuure IA,\u2026, Hu H (2023) The spatiotemporal evolution of global innovation networks and the changing position of China: a social network analysis based on cooperative patents. R&D Management. https:\/\/doi.org\/10.1111\/radm.12662","DOI":"10.1111\/radm.12662"},{"key":"19054_CR131","doi-asserted-by":"publisher","unstructured":"Hu F, Mou S, Wei S, Qiu L, Hu H,\u2026, Zhou H (2024) Research on the evolution of China\u2019s photovoltaic technology innovation network from the perspective of patents. Energy Strat Rev 51:101309. https:\/\/doi.org\/10.1016\/j.esr.2024.101309","DOI":"10.1016\/j.esr.2024.101309"},{"key":"19054_CR132","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2023.3261940","author":"Z Jiang","year":"2023","unstructured":"Jiang Z, Xu C (2023) Disrupting the technology innovation efficiency of manufacturing enterprises through digital technology promotion: an evidence of 5G technology construction in China. IEEE Trans Eng Manage. https:\/\/doi.org\/10.1109\/TEM.2023.3261940","journal-title":"IEEE Trans Eng Manage"},{"key":"19054_CR133","doi-asserted-by":"publisher","unstructured":"Cao K, Ding H, Li W, Lv L, Gao M, Gong F,\u2026, Wang B (2022) On the Ergodic Secrecy Capacity of Intelligent Reflecting Surface Aided Wireless Powered Communication Systems. IEEE Wireless Commun Lett pp 1. https:\/\/doi.org\/10.1109\/LWC.2022.3199593","DOI":"10.1109\/LWC.2022.3199593"},{"key":"19054_CR134","doi-asserted-by":"publisher","unstructured":"Cheng B, Wang M, Zhao S, Zhai Z, Zhu D,\u2026, Chen J (2017) Situation-aware dynamic service coordination in an IoT environment. IEEE\/ACM Trans Netw 25(4):2082\u20132095. https:\/\/doi.org\/10.1109\/TNET.2017.2705239","DOI":"10.1109\/TNET.2017.2705239"},{"key":"19054_CR135","doi-asserted-by":"publisher","unstructured":"Zheng W, Lu S, Yang Y, Yin Z, Yin L,\u2026, Ali H (2024) Lightweight transformer image feature extraction network. PeerJ Comput Sci 10:e1755. https:\/\/doi.org\/10.7717\/peerj-cs.1755","DOI":"10.7717\/peerj-cs.1755"},{"key":"19054_CR136","doi-asserted-by":"publisher","unstructured":"Zheng W, Lu S, Cai Z, Wang R, Wang L,\u2026, Yin L (2023) PAL-BERT: An Improved Question Answering Model. Comput Model Eng Sci. https:\/\/doi.org\/10.32604\/cmes.2023.046692","DOI":"10.32604\/cmes.2023.046692"},{"key":"19054_CR137","doi-asserted-by":"publisher","unstructured":"Cao B, Zhao J, Lv Z, Gu Y, Yang P,\u2026, Halgamuge SK (2020) Multiobjective Evolution of Fuzzy Rough Neural Network via Distributed Parallelism for Stock Prediction. IEEE Trans Fuzzy Syst 28(5): 939\u2013952. https:\/\/doi.org\/10.1109\/TFUZZ.2020.2972207","DOI":"10.1109\/TFUZZ.2020.2972207"},{"key":"19054_CR138","doi-asserted-by":"publisher","unstructured":"Cao B, Gu Y, Lv Z, Yang S, Zhao J,\u2026, Li Y (2021) RFID reader anticollision based on distributed parallel particle swarm optimization. IEEE Int Things J 8(5):3099\u20133107. https:\/\/doi.org\/10.1109\/JIOT.2020.3033473","DOI":"10.1109\/JIOT.2020.3033473"},{"key":"19054_CR139","doi-asserted-by":"publisher","unstructured":"Shen J, Sheng H, Wang S, Cong R, Yang D,\u2026, Zhang Y (2024). Blockchain-based distributed multiagent reinforcement learning for collaborative multiobject tracking framework. IEEE Trans Comput 73(3):778\u2013788. https:\/\/doi.org\/10.1109\/TC.2023.3343102","DOI":"10.1109\/TC.2023.3343102"},{"issue":"8","key":"19054_CR140","doi-asserted-by":"publisher","first-page":"5309","DOI":"10.1109\/TII.2019.2961340","volume":"16","author":"B Cao","year":"2020","unstructured":"Cao B, Zhao J, Gu Y, Fan S, Yang P (2020) Security-aware industrial wireless sensor network deployment optimization. IEEE Trans Industr Inf 16(8):5309\u20135316. https:\/\/doi.org\/10.1109\/TII.2019.2961340","journal-title":"IEEE Trans Industr Inf"},{"key":"19054_CR141","doi-asserted-by":"publisher","unstructured":"Huang W, Li T, Cao Y, Lyu Z, Liang Y, Yu L,\u2026, Li Y (2023) Safe-NORA:Safe Reinforcement Learning-Based Mobile Network Resource Allocation for Diverse User Demands. Paper presented at the CIKM \u201823, New York. https:\/\/doi.org\/10.1145\/3583780.3615043","DOI":"10.1145\/3583780.3615043"},{"issue":"5","key":"19054_CR142","doi-asserted-by":"publisher","first-page":"4847","DOI":"10.1007\/s11227-022-04832-6","volume":"79","author":"R Priyadarshi","year":"2023","unstructured":"Priyadarshi R, Gupta B (2023) 2-D coverage optimization in obstacle-based FOI in WSN using modified PSO. J Supercomputing 79(5):4847\u20134869. https:\/\/doi.org\/10.1007\/s11227-022-04832-6","journal-title":"J Supercomputing"},{"key":"19054_CR143","doi-asserted-by":"publisher","unstructured":"Anurag A, Priyadarshi R, Goel A, Gupta B (2020) 2-D coverage optimization in WSN using a novel variant of particle swarm optimisation. 2020 7th International Conference on Signal Processing and Integrated Networks, SPIN 2020, 663\u2013668. https:\/\/doi.org\/10.1109\/SPIN48934.2020.9070978","DOI":"10.1109\/SPIN48934.2020.9070978"},{"issue":"2","key":"19054_CR144","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1109\/TSMCC.2007.913919","volume":"38","author":"L Bu\u015foniu","year":"2008","unstructured":"Bu\u015foniu L, Babu\u0161ka R, De Schutter B (2008) A comprehensive survey of multiagent reinforcement learning. IEEE Trans Syst Man Cybernetics Part C: Appl Reviews 38(2):156\u2013172. https:\/\/doi.org\/10.1109\/TSMCC.2007.913919","journal-title":"IEEE Trans Syst Man Cybernetics Part C: Appl Reviews"},{"key":"19054_CR145","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6848641","volume":"2018","author":"Y Wang","year":"2018","unstructured":"Wang Y, Zheng G, Ma H, Li Y, Li J (2018) A joint channel selection and routing protocol for cognitive radio network. Wirel Commun Mob Comput 2018:1. https:\/\/doi.org\/10.1155\/2018\/6848641","journal-title":"Wirel Commun Mob Comput"},{"issue":"1","key":"19054_CR146","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/TCOM.1977.1093711","volume":"25","author":"RG Gallager","year":"1977","unstructured":"Gallager RG (1977) A minimum delay routing algorithm using distributed computation. IEEE Trans Commun 25(1):73\u201385. https:\/\/doi.org\/10.1109\/TCOM.1977.1093711","journal-title":"IEEE Trans Commun"},{"issue":"3","key":"19054_CR147","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/0925-2312(94)00027-P","volume":"7","author":"AV Vasilakos","year":"1995","unstructured":"Vasilakos AV, Papadimitriou GI (1995) A new approach to the design of reinforcement schemes for learning automata: stochastic estimator learning algorithm. Neurocomputing 7(3):275\u2013297. https:\/\/doi.org\/10.1016\/0925-2312(94)00027-P","journal-title":"Neurocomputing"},{"key":"19054_CR148","doi-asserted-by":"publisher","unstructured":"Priyadarshi R, Rana H, Srivastava A, Nath V (2023) A Novel Approach for Sink Route in Wireless Sensor Network. In: Nath V, Mandal JK (eds) Lecture Notes in Electrical Engineering (Vol. 887, pp. 695\u2013703). Springer Nature Singapore. https:\/\/doi.org\/10.1007\/978-981-19-1906-0_58","DOI":"10.1007\/978-981-19-1906-0_58"},{"key":"19054_CR149","doi-asserted-by":"publisher","unstructured":"Sateesh VA, Kumar A, Priyadarshi R, Nath V (2021) A Novel Deployment Scheme to Enhance the Coverage in Wireless Sensor Network. In: Nath V, Mandal JK (eds) Lecture Notes in Electrical Engineering (Vol. 673, pp. 985\u2013993). Springer Singapore. https:\/\/doi.org\/10.1007\/978-981-15-5546-6_82","DOI":"10.1007\/978-981-15-5546-6_82"},{"issue":"12","key":"19054_CR150","doi-asserted-by":"publisher","first-page":"4587","DOI":"10.1007\/s00542-019-04376-5","volume":"25","author":"R Priyadarshi","year":"2019","unstructured":"Priyadarshi R, Nath V (2019) A novel diamond\u2013hexagon search algorithm for motion estimation. Microsyst Technol 25(12):4587\u20134591. https:\/\/doi.org\/10.1007\/s00542-019-04376-5","journal-title":"Microsyst Technol"},{"key":"19054_CR151","doi-asserted-by":"publisher","unstructured":"Priyadarshi R, Singh L, Randheer, Singh A (2018) A Novel HEED Protocol for Wireless Sensor Networks. 2018 5th International Conference on Signal Processing and Integrated Networks, SPIN 2018, 296\u2013300. https:\/\/doi.org\/10.1109\/SPIN.2018.8474286","DOI":"10.1109\/SPIN.2018.8474286"},{"issue":"2","key":"19054_CR152","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s11277-020-07898-8","volume":"117","author":"P Rawat","year":"2021","unstructured":"Rawat P, Chauhan S, Priyadarshi R (2021) A novel heterogeneous clustering protocol for lifetime maximization of wireless sensor network. Wireless Pers Commun 117(2):825\u2013841. https:\/\/doi.org\/10.1007\/s11277-020-07898-8","journal-title":"Wireless Pers Commun"},{"key":"19054_CR153","doi-asserted-by":"publisher","unstructured":"Gupta T, Kumar A, Priyadarshi R (2020) A Novel Hybrid Precoding Technique for Millimeter Wave. In: Nath V, Mandal JK (eds) Lecture Notes in Electrical Engineering (Vol. 642, pp. 481\u2013493). Springer Singapore. https:\/\/doi.org\/10.1007\/978-981-15-2854-5_42","DOI":"10.1007\/978-981-15-2854-5_42"},{"key":"19054_CR154","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/03772063.2023.2220667","volume":"1\u20139","author":"S Desai","year":"2023","unstructured":"Desai S, Kanphade R, Priyadarshi R, Rayudu KVBV, Nath V (2023) A novel technique for detecting crop diseases with efficient feature extraction. IETE J Res 1\u20139:1. https:\/\/doi.org\/10.1080\/03772063.2023.2220667","journal-title":"IETE J Res"},{"key":"19054_CR155","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1146\/annurev-psych-122414-033625","volume":"68","author":"SJ Gershman","year":"2017","unstructured":"Gershman SJ, Daw ND (2017) Reinforcement learning and episodic memory in humans and animals: an integrative framework. Ann Rev Psychol 68:101\u2013128. https:\/\/doi.org\/10.1146\/annurev-psych-122414-033625","journal-title":"Ann Rev Psychol"},{"issue":"1","key":"19054_CR156","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.jnca.2011.08.007","volume":"35","author":"KLA Yau","year":"2012","unstructured":"Yau KLA, Komisarczuk P, Teal PD (2012) Reinforcement learning for context awareness and intelligence in wireless networks: review, new features and open issues. J Netw Comput Appl 35(1):253\u2013267. https:\/\/doi.org\/10.1016\/j.jnca.2011.08.007","journal-title":"J Netw Comput Appl"},{"key":"19054_CR157","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/960584","volume":"2014","author":"HAA Al-Rawi","year":"2014","unstructured":"Al-Rawi HAA, Yau KLA, Mohamad H, Ramli N, Hashim W (2014) Reinforcement learning for routing in cognitive radio ad hoc networks. Sci World J 2014:1. https:\/\/doi.org\/10.1155\/2014\/960584","journal-title":"Sci World J"},{"key":"19054_CR158","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.comcom.2018.07.035","volume":"129","author":"M Musavi","year":"2018","unstructured":"Musavi M, Yau KLA, Syed AR, Mohamad H, Ramli N (2018) Route selection over clustered cognitive radio networks: an experimental evaluation. Comput Commun 129:138\u2013151. https:\/\/doi.org\/10.1016\/j.comcom.2018.07.035","journal-title":"Comput Commun"},{"issue":"3","key":"19054_CR159","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1016\/j.adhoc.2010.06.009","volume":"9","author":"M Cesana","year":"2011","unstructured":"Cesana M, Cuomo F, Ekici E (2011) Routing in cognitive radio networks: challenges and solutions. Ad Hoc Netw 9(3):228\u2013248. https:\/\/doi.org\/10.1016\/j.adhoc.2010.06.009","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"19054_CR160","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2008.4435897","volume":"22","author":"MEM Campista","year":"2008","unstructured":"Campista MEM, Esposito PM, Moraes IM, Costa LHMK, Duarte OCMB, Passos DG, de Albuquerque CVN, Saade DCM, Rubinstein MG (2008) Routing metrics and protocols for wireless mesh networks. IEEE Network 22(1):6\u201312. https:\/\/doi.org\/10.1109\/MNET.2008.4435897","journal-title":"IEEE Network"},{"issue":"1","key":"19054_CR161","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/SURV.2013.082713.00184","volume":"16","author":"M Youssef","year":"2014","unstructured":"Youssef M, Ibrahim M, Abdelatif M, Chen L, Vasilakos AV (2014) Routing metrics of cognitive radio networks: a survey. IEEE Commun Surv Tutorials 16(1):92\u2013109. https:\/\/doi.org\/10.1109\/SURV.2013.082713.00184","journal-title":"IEEE Commun Surv Tutorials"},{"key":"19054_CR162","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.jnca.2016.07.006","volume":"72","author":"K Singh","year":"2016","unstructured":"Singh K, Moh S (2016) Routing protocols in cognitive radio ad hoc networks: a comprehensive review. J Netw Comput Appl 72:28\u201337. https:\/\/doi.org\/10.1016\/j.jnca.2016.07.006","journal-title":"J Netw Comput Appl"},{"issue":"18","key":"19054_CR163","doi-asserted-by":"publisher","first-page":"1983","DOI":"10.1016\/j.comcom.2009.06.011","volume":"32","author":"KR Chowdhury","year":"2009","unstructured":"Chowdhury KR, Felice MD (2009) Search: a routing protocol for mobile cognitive radio ad-hoc networks. Comput Commun 32(18):1983\u20131997. https:\/\/doi.org\/10.1016\/j.comcom.2009.06.011","journal-title":"Comput Commun"},{"key":"19054_CR164","doi-asserted-by":"publisher","unstructured":"Priyadarshi R, Singh L, Singh A, Thakur A (2018) SEEN: stable energy efficient network for wireless sensor network. 2018 5th International Conference on Signal Processing and Integrated Networks, SPIN 2018, pp 338\u2013342. https:\/\/doi.org\/10.1109\/SPIN.2018.8474228","DOI":"10.1109\/SPIN.2018.8474228"},{"issue":"4","key":"19054_CR165","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1016\/j.jnca.2013.01.007","volume":"36","author":"AC Talay","year":"2013","unstructured":"Talay AC, Altilar DT (2013) Self adaptive routing for dynamic spectrum access in cognitive radio networks. J Netw Comput Appl 36(4):1140\u20131151. https:\/\/doi.org\/10.1016\/j.jnca.2013.01.007","journal-title":"J Netw Comput Appl"},{"issue":"12","key":"19054_CR166","doi-asserted-by":"publisher","first-page":"1936","DOI":"10.1109\/9.182479","volume":"37","author":"A Ephremides","year":"1992","unstructured":"Ephremides A (1992) Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks. IEEE Trans Autom Control 37(12):1936\u20131948. https:\/\/doi.org\/10.1109\/9.182479","journal-title":"IEEE Trans Autom Control"},{"issue":"1","key":"19054_CR167","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TAC.2005.860280","volume":"51","author":"C Lott","year":"2006","unstructured":"Lott C, Teneketzis D (2006) Stochastic routing in ad-hoc networks. IEEE Trans Autom Control 51(1):52\u201370. https:\/\/doi.org\/10.1109\/TAC.2005.860280","journal-title":"IEEE Trans Autom Control"},{"issue":"3","key":"19054_CR168","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1137\/0323023","volume":"23","author":"PR Kumar","year":"1985","unstructured":"Kumar PR (1985) Survey of some results in stochastic adaptive control. SIAM J Control Optim 23(3):329\u2013380. https:\/\/doi.org\/10.1137\/0323023","journal-title":"SIAM J Control Optim"},{"issue":"1","key":"19054_CR169","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1137\/S0097539701398375","volume":"32","author":"P Auer","year":"2003","unstructured":"Auer P, Cesa-Bianchi N, Freund Y, Schapire RE (2003) The nonstochastic multiarmed bandit problem. SIAM J Comput 32(1):48\u201377. https:\/\/doi.org\/10.1137\/S0097539701398375","journal-title":"SIAM J Comput"},{"issue":"12","key":"19054_CR170","doi-asserted-by":"publisher","first-page":"3855","DOI":"10.1007\/s00542-020-04874-x","volume":"26","author":"R Priyadarshi","year":"2020","unstructured":"Priyadarshi R, Rawat P, Nath V, Acharya B, Shylashree N (2020) Three level heterogeneous clustering protocol for wireless sensor network. Microsyst Technol 26(12):3855\u20133864. https:\/\/doi.org\/10.1007\/s00542-020-04874-x","journal-title":"Microsyst Technol"},{"issue":"10","key":"19054_CR171","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MCOM.2002.1039866","volume":"40","author":"B Fortz","year":"2002","unstructured":"Fortz B, Rexford J, Thorup M (2002) Traffic engineering with traditional IP routing protocols. IEEE Commun Mag 40(10):118\u2013124. https:\/\/doi.org\/10.1109\/MCOM.2002.1039866","journal-title":"IEEE Commun Mag"},{"issue":"9","key":"19054_CR172","doi-asserted-by":"publisher","first-page":"1354","DOI":"10.1016\/j.comnet.2009.01.002","volume":"53","author":"C Fortuna","year":"2009","unstructured":"Fortuna C, Mohorcic M (2009) Trends in the development of communication networks: cognitive networks. Comput Netw 53(9):1354\u20131376. https:\/\/doi.org\/10.1016\/j.comnet.2009.01.002","journal-title":"Comput Netw"},{"issue":"4","key":"19054_CR173","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/COMST.2005.1593279","volume":"7","author":"V Srivastava","year":"2005","unstructured":"Srivastava V, Neel J, Mackenzie AB, Menon R, Dasilva LA, Hicks JE, Reed JH, Gilles RP (2005) Using game theory to analyze wireless ad hoc networks. IEEE Commun Surv Tutorials 7(4):46\u201356. https:\/\/doi.org\/10.1109\/COMST.2005.1593279","journal-title":"IEEE Commun Surv Tutorials"},{"key":"19054_CR174","doi-asserted-by":"publisher","unstructured":"Priyadarshi R, Bhardwaj P, Gupta P, Nath V (2023) Utilization of smartphone-based wireless sensors in agricultural science: A State of Art. In: Nath V, Mandal JK (eds) Lecture Notes in Electrical Engineering (Vol. 887, pp. 681\u2013688). Springer Nature Singapore. https:\/\/doi.org\/10.1007\/978-981-19-1906-0_56","DOI":"10.1007\/978-981-19-1906-0_56"},{"issue":"5","key":"19054_CR175","doi-asserted-by":"publisher","first-page":"636","DOI":"10.1109\/TMC.2008.164","volume":"8","author":"V Raghunathan","year":"2009","unstructured":"Raghunathan V, Kumar PR (2009) Wardrop routing in wireless networks. IEEE Trans Mob Comput 8(5):636\u2013652. https:\/\/doi.org\/10.1109\/TMC.2008.164","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"19054_CR176","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1007\/s11277-020-07255-9","volume":"113","author":"R Priyadarshi","year":"2020","unstructured":"Priyadarshi R, Gupta B, Anurag A (2020) Wireless sensor networks deployment: a result oriented analysis. Wireless Pers Commun 113(2):843\u2013866. https:\/\/doi.org\/10.1007\/s11277-020-07255-9","journal-title":"Wireless Pers Commun"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19054-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-024-19054-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-024-19054-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,23]],"date-time":"2025-03-23T00:20:38Z","timestamp":1742689238000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-024-19054-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,10]]},"references-count":176,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["19054"],"URL":"https:\/\/doi.org\/10.1007\/s11042-024-19054-6","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,10]]},"assertion":[{"value":"16 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 March 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors have no conflict of interest to declare that are relevant to the content of this article.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}