{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:08Z","timestamp":1740148868349,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T00:00:00Z","timestamp":1701907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T00:00:00Z","timestamp":1701907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Funda\u00e7\u00e3o de Amparo a Ci\u00eancia e Tecnologia do Estado de Pernambuco"},{"name":"NVIDIA Academic Hardware Grant Program"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s12243-023-01004-2","type":"journal-article","created":{"date-parts":[[2023,12,7]],"date-time":"2023-12-07T09:03:16Z","timestamp":1701939796000},"page":"1-15","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A multi-protocol energy optimization method for an adaptable wireless MAC system through machine learning"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0608-1123","authenticated-orcid":false,"given":"Paulo F. C.","family":"Barbosa","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bruna A.","family":"da Silva","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Cleber","family":"Zanchettin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Renato M.","family":"de Moraes","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2023,12,7]]},"reference":[{"issue":"4","key":"1004_CR1","doi-asserted-by":"publisher","first-page":"3133","DOI":"10.1109\/COMST.2019.2916583","volume":"21","author":"NC Luong","year":"2019","unstructured":"Luong NC, Hoang DT, Gong S, Niyato D, Wang P, Liang Y, Kim DI (2019) Applications of deep reinforcement learning in communications and networking: a survey. IEEE Commun Surveys Tutorials 21(4):3133\u20133174. https:\/\/doi.org\/10.1109\/COMST.2019.2916583","journal-title":"IEEE Commun Surveys Tutorials"},{"issue":"1","key":"1004_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3485130","volume":"55","author":"A Hazra","year":"2021","unstructured":"Hazra A, Adhikari M, Amgoth T, Srirama SN (2021) A comprehensive survey on interoperability for IIoT: taxonomy, standards, and future directions. ACM Comput Surveys (CSUR) 55(1):1\u201335. https:\/\/doi.org\/10.1145\/3485130","journal-title":"ACM Comput Surveys (CSUR)"},{"key":"1004_CR3","doi-asserted-by":"publisher","unstructured":"Kotstein S, Decker C (2019) Reinforcement learning for IoT interoperability. In: 2019 IEEE international conference on software architecture companion (ICSA-C), pp 11\u201318. https:\/\/doi.org\/10.1109\/ICSA-C.2019.00010","DOI":"10.1109\/ICSA-C.2019.00010"},{"key":"1004_CR4","doi-asserted-by":"publisher","unstructured":"Sun H, Chen X, Shi Q, Hong M, Fu X, Sidiropoulos ND (2017) Learning to optimize: training deep neural networks for wireless resource management. In: Proc. of IEEE SPAWC, Sapporo, Japan. https:\/\/doi.org\/10.48550\/arXiv.1705.09412","DOI":"10.48550\/arXiv.1705.09412"},{"issue":"4","key":"1004_CR5","doi-asserted-by":"publisher","first-page":"2595","DOI":"10.1109\/COMST.2018.2846401","volume":"20","author":"Q Mao","year":"2018","unstructured":"Mao Q, Hu F, Hao Q (2018) Deep learning for intelligent wireless networks: a comprehensive survey. IEEE Commun Surveys Tuts 20(4):2595\u20132621. https:\/\/doi.org\/10.1109\/COMST.2018.2846401","journal-title":"IEEE Commun Surveys Tuts"},{"issue":"2","key":"1004_CR6","doi-asserted-by":"publisher","first-page":"1168","DOI":"10.1109\/COMST.2019.2943087","volume":"22","author":"S Sinche","year":"2020","unstructured":"Sinche S, Raposo D, Armando N, Rodrigues A, Boavida F, Pereira V, Silva JS (2020) A survey of IoT management protocols and frameworks. IEEE Commun Surveys Tuts 22(2):1168\u20131190. https:\/\/doi.org\/10.1109\/COMST.2019.2943087","journal-title":"IEEE Commun Surveys Tuts"},{"key":"1004_CR7","doi-asserted-by":"publisher","unstructured":"Deng Y, Ohtsuki T (2020) Low-complexity subspace MMSE channel estimation in massive MU-MIMO system. IEEE Access 8:124371\u2013124381. https:\/\/doi.org\/10.1109\/ACCESS.2020.3006242","DOI":"10.1109\/ACCESS.2020.3006242"},{"key":"1004_CR8","doi-asserted-by":"publisher","unstructured":"Silva B, de Moraes R (2020) Optimized energy consumption for slotted aloha and CSMA\/CA multihop ad hoc networks. J Commun Inf Syst 35(1):189\u2013197. https:\/\/doi.org\/10.14209\/jcis.2020.20","DOI":"10.14209\/jcis.2020.20"},{"issue":"20","key":"1004_CR9","doi-asserted-by":"publisher","first-page":"16167","DOI":"10.1007\/s00521-020-04813-x","volume":"32","author":"H Osouli Tabrizi","year":"2020","unstructured":"Osouli Tabrizi H, Al-Turjman F (2020) Ai for dynamic packet size optimization of batteryless IoT nodes: a case study for wireless body area sensor networks. Neural Comput Appl 32(20):16167\u201316178. https:\/\/doi.org\/10.1007\/s00521-020-04813-x","journal-title":"Neural Comput Appl"},{"key":"1004_CR10","doi-asserted-by":"publisher","unstructured":"Dash L, Khuntia M (2020) Energy efficient techniques for 5G mobile networks in WSN: a survey. In: 2020 international conference on computer science, engineering and applications (ICCSEA), pp 1\u20135. https:\/\/doi.org\/10.1109\/ICCSEA49143.2020.9132941","DOI":"10.1109\/ICCSEA49143.2020.9132941"},{"issue":"3","key":"1004_CR11","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1080\/1206212X.2018.1558511","volume":"42","author":"MS Mekala","year":"2020","unstructured":"Mekala MS, Viswanathan P (2020) A survey: energy-efficient sensor and VM selection approaches in green computing for X-IoT applications. Int J Comput Appl 42(3):290\u2013305. https:\/\/doi.org\/10.1080\/1206212X.2018.1558511","journal-title":"Int J Comput Appl"},{"key":"1004_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2021.10.004","author":"PK Donta","year":"2021","unstructured":"Donta PK, Srirama SN, Amgoth T, Annavarapu CSR (2021) Survey on recent advances in IoT application layer protocols and machine learning scope for research directions. Digital Commun Netw. https:\/\/doi.org\/10.1016\/j.dcan.2021.10.004","journal-title":"Digital Commun Netw"},{"issue":"2","key":"1004_CR13","doi-asserted-by":"publisher","first-page":"685","DOI":"10.1109\/TGCN.2022.3143991","volume":"6","author":"K Dev","year":"2022","unstructured":"Dev K, Maddikunta PKR, Gadekallu TR, Bhattacharya S, Hegde P, Singh S (2022) Energy optimization for green communication in IoT using Harris hawks optimization. IEEE Transactions on Green Communications and Networking 6(2):685\u2013694. https:\/\/doi.org\/10.1109\/TGCN.2022.3143991","journal-title":"IEEE Transactions on Green Communications and Networking"},{"key":"1004_CR14","doi-asserted-by":"publisher","unstructured":"Piran MJ, Verma S, Menon VG, Suh DY (2021) Energy-efficient transmission range optimization model for WSN-based internet of things. Comput Mater Continua 67(3). https:\/\/doi.org\/10.32604\/cmc.2021.015426","DOI":"10.32604\/cmc.2021.015426"},{"key":"1004_CR15","doi-asserted-by":"publisher","unstructured":"Zikria YB, Afzal MK, Kim SW, Marin A, Guizani M (2020) Deep learning for intelligent IoT: opportunities, challenges and solutions. Elsevier. https:\/\/doi.org\/10.1016\/j.comcom.2020.08.017","DOI":"10.1016\/j.comcom.2020.08.017"},{"key":"1004_CR16","doi-asserted-by":"publisher","unstructured":"Baraneetharan E (2020) Role of machine learning algorithms intrusion detection in WSNS: a survey. J Inf Technol 2(03):161\u2013173. https:\/\/doi.org\/10.36548\/jitdw.2020.3.004","DOI":"10.36548\/jitdw.2020.3.004"},{"issue":"4","key":"1004_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSDA.20211001.oa21","volume":"10","author":"V Rishiwal","year":"2021","unstructured":"Rishiwal V, Yadav P, Singh O, Prasad B (2021) Optimizing energy consumption in IoT-based scalable wireless sensor networks. Int J Syst Dynamics Appl (IJSDA) 10(4):1\u201320. https:\/\/doi.org\/10.4018\/IJSDA.20211001.oa21","journal-title":"Int J Syst Dynamics Appl (IJSDA)"},{"key":"1004_CR18","doi-asserted-by":"publisher","unstructured":"Javaid A, Niyaz Q, Sun W, Alam M (2016) A deep learning approach for network intrusion detection system. In: Proceedings of the 9th EAI international conference on bio-inspired information and communications technologies (formerly BIONETICS), pp 21\u201326. https:\/\/doi.org\/10.1109\/TETCI.2017.2772792","DOI":"10.1109\/TETCI.2017.2772792"},{"key":"1004_CR19","doi-asserted-by":"publisher","unstructured":"Wang J, Tang J, Xu Z, Wang Y, Xue G, Zhang X, Yang D (2017) Spatiotemporal modeling and prediction in cellular networks: a big data enabled deep learning approach. In: IEEE INFOCOM 2017-IEEE conference on computer communications, pp 1\u20139. https:\/\/doi.org\/10.1109\/INFOCOM.2017.8057090","DOI":"10.1109\/INFOCOM.2017.8057090"},{"key":"1004_CR20","doi-asserted-by":"publisher","unstructured":"Chen J, Yatnalli U, Gesbert D (2017) Learning radio maps for UAV-aided wireless networks: a segmented regression approach. In: 2017 IEEE international conference on communications (ICC), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICC.2017.7997333","DOI":"10.1109\/ICC.2017.7997333"},{"key":"1004_CR21","doi-asserted-by":"publisher","unstructured":"Huan Y, Qin Y, You Y, Zheng L, Zou Z (2016) A multiplication reduction technique with near-zero approximation for embedded learning in IoT devices. In: Proc. of IEEE SOCC, Seattle, USA. https:\/\/doi.org\/10.1109\/SOCC.2016.7905445","DOI":"10.1109\/SOCC.2016.7905445"},{"key":"1004_CR22","doi-asserted-by":"publisher","unstructured":"Khattab A, Youssry N (2020) Machine learning for IoT systems. Springer International Publishing, 105\u2013127. https:\/\/doi.org\/10.1007\/978-3-030-37468-6_6","DOI":"10.1007\/978-3-030-37468-6_6"},{"key":"1004_CR23","doi-asserted-by":"publisher","unstructured":"Barbosa PF, da Silva BA, Mac\u00eado D, Zanchettin C, de Moraes RM (2019) Otimiza\u00e7\u00e3o do consumo de energia em redes ad hoc aloha empregando deep learning. In: Anais do XVIII Workshop em Desempenho de Sistemas Computacionais e de Comunica\u00e7\u00e3o. https:\/\/doi.org\/10.5753\/wperformance.2019.6462","DOI":"10.5753\/wperformance.2019.6462"},{"key":"1004_CR24","doi-asserted-by":"publisher","unstructured":"Barbosa PFC, d Silva BA, Zanchettin C, de Moraes RM (2020) Energy consumption optimization for CSMA\/CA protocol employing machine learning. In: 2020 IEEE 91st Vehicular technology conference (VTC2020-Spring), pp 1\u20135. https:\/\/doi.org\/10.1109\/VTC2020-Spring48590.2020.9128450","DOI":"10.1109\/VTC2020-Spring48590.2020.9128450"},{"key":"1004_CR25","unstructured":"Dragion: Loramote specification v1.0.2 (Accessed 18 April 2022)"},{"key":"1004_CR26","doi-asserted-by":"publisher","unstructured":"Zhang R, Gorce J-M (2008) Optimal transmission range for minimum energy consumption in wireless sensor networks. In: Proc. of IEEE WCNC, Las Vegas, USA. https:\/\/doi.org\/10.1109\/WCNC.2008.139","DOI":"10.1109\/WCNC.2008.139"},{"key":"1004_CR27","doi-asserted-by":"publisher","unstructured":"Tinnirello I, Bianchi G, Xiao Y (2010) Refinements on IEEE 802.11 distributed coordination function modeling approaches. IEEE Trans Veh Technol 59(3):1055\u20131067. https:\/\/doi.org\/10.1109\/TVT.2009.2029118","DOI":"10.1109\/TVT.2009.2029118"},{"key":"1004_CR28","doi-asserted-by":"publisher","unstructured":"Roberts L (1975) Aloha packet system with and without slots and capture. ACM SIGCOMM Comput Commun Rev 5(2):28\u201342. https:\/\/doi.org\/10.1145\/1024916.1024920","DOI":"10.1145\/1024916.1024920"},{"key":"1004_CR29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841224","author":"A Goldsmith","year":"2005","unstructured":"Goldsmith A (2005). Wireless communications Cambridge University Press. https:\/\/doi.org\/10.1017\/CBO9780511841224","journal-title":"Wireless communications. Cambridge University Press"},{"key":"1004_CR30","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1007\/s11276-018-1843-8","volume":"26","author":"Q Miao","year":"2020","unstructured":"Miao Q, Huang B, Jia B (2020) Estimating distances via received signal strength and connectivity in wireless sensor networks. Wireless Netw 26:971\u2013982","journal-title":"Wireless Netw"},{"issue":"10","key":"1004_CR31","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1016\/j.comnet.2006.11.007","volume":"51","author":"G Mao","year":"2007","unstructured":"Mao G, Anderson B, Fidan B (2007) Path loss exponent estimation for wireless sensor network localization. Comput Netw 51(10):2467\u20132483. https:\/\/doi.org\/10.1016\/j.comnet.2006.11.007","journal-title":"Comput Netw"},{"key":"1004_CR32","doi-asserted-by":"publisher","unstructured":"Barbosa PFC, d Silva BA, Zanchettin C, de Moraes RM (2020) Energy consumption CSMA\/CA and slotted aloha (m-amps). In: IEEE Dataport. https:\/\/doi.org\/10.21227\/99vd-vh94","DOI":"10.21227\/99vd-vh94"},{"key":"1004_CR33","doi-asserted-by":"publisher","unstructured":"Li S (2020) Tensorflow lite: on-device machine learning framework. J Comput Res Develop 57(2020-9-1839):1839. https:\/\/doi.org\/10.7544\/issn1000-1239.2020.20200291","DOI":"10.7544\/issn1000-1239.2020.20200291"},{"key":"1004_CR34","doi-asserted-by":"publisher","unstructured":"Zou F, Shen L, Jie Z, Zhang W, Liu W (2019) A sufficient condition for convergences of Adam and RMSProp. In: 2019 IEEE\/CVF Conference on computer vision and pattern recognition (CVPR), pp 11119\u201311127. https:\/\/doi.org\/10.48550\/arXiv.1811.09358","DOI":"10.48550\/arXiv.1811.09358"},{"key":"1004_CR35","doi-asserted-by":"publisher","unstructured":"Dogo EM, Afolabi OJ, Nwulu NI, Twala B, Aigbavboa CO (2018) A comparative analysis of gradient descent-based optimization algorithms on convolutional neural networks. In: 2018 international conference on computational techniques, electronics and mechanical systems (CTEMS), pp 92\u201399. https:\/\/doi.org\/10.1109\/CTEMS.2018.8769211","DOI":"10.1109\/CTEMS.2018.8769211"},{"key":"1004_CR36","doi-asserted-by":"publisher","unstructured":"Eckle K, Schmidt-Hieber J (2019) A comparison of deep networks with ReLU activation function and linear spline-type methods. Neural Netw 110:232\u2013242. https:\/\/doi.org\/10.48550\/arXiv.1804.02253","DOI":"10.48550\/arXiv.1804.02253"},{"key":"1004_CR37","doi-asserted-by":"publisher","unstructured":"Noji H, Oseki Y (2021) Effective batching for recurrent neural network grammars. arXiv:2105.14822. https:\/\/doi.org\/10.48550\/arXiv.2105.14822","DOI":"10.48550\/arXiv.2105.14822"},{"key":"1004_CR38","doi-asserted-by":"publisher","unstructured":"Labach A, Salehinejad H, Valaee S (2019) Survey of dropout methods for deep neural networks. arXiv:1904.13310. https:\/\/doi.org\/10.48550\/arXiv.1904.13310","DOI":"10.48550\/arXiv.1904.13310"},{"key":"1004_CR39","doi-asserted-by":"publisher","unstructured":"Telford RJ, Birks HJB (2005) The secret assumption of transfer functions: problems with spatial autocorrelation in evaluating model performance. Quaternary Sci Rev 24(20):2173\u20132179. https:\/\/doi.org\/10.1016\/j.quascirev.2005.05.001","DOI":"10.1016\/j.quascirev.2005.05.001"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-01004-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-023-01004-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-023-01004-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,23]],"date-time":"2025-01-23T07:46:41Z","timestamp":1737618401000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-023-01004-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,7]]},"references-count":39,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["1004"],"URL":"https:\/\/doi.org\/10.1007\/s12243-023-01004-2","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2023,12,7]]},"assertion":[{"value":"30 September 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}]}}