{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:43:21Z","timestamp":1773888201298,"version":"3.50.1"},"reference-count":163,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003093","name":"Ministry of Higher Education, Malaysia","doi-asserted-by":"publisher","award":["FRGS\/1\/2019\/ICT05\/MMU01\/1"],"award-info":[{"award-number":["FRGS\/1\/2019\/ICT05\/MMU01\/1"]}],"id":[{"id":"10.13039\/501100003093","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100012024","name":"Research Grant of TM Research and Development and Multimedia University, Cyberjaya, Malaysia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012024","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3022291","type":"journal-article","created":{"date-parts":[[2020,9,14]],"date-time":"2020-09-14T21:10:39Z","timestamp":1600117839000},"page":"166384-166441","source":"Crossref","is-referenced-by-count":24,"title":["AI-Assisted Framework for Green-Routing and Load Balancing in Hybrid Software-Defined Networking: Proposal, Challenges and Future Perspective"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7312-5678","authenticated-orcid":false,"given":"Richard","family":"Etengu","sequence":"first","affiliation":[]},{"given":"Saw Chin","family":"Tan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6708-3654","authenticated-orcid":false,"given":"Lee Ching","family":"Kwang","sequence":"additional","affiliation":[]},{"given":"Fouad Mohammed","family":"Abbou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6285-9481","authenticated-orcid":false,"given":"Teong Chee","family":"Chuah","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602216"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.09.013"},{"key":"ref33","article-title":"Traffic scheduling in software-defined backhaul network","author":"li","year":"2018"},{"key":"ref32","year":"2005","journal-title":"IP Routing OSPF Configuration Guide"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC.2018.8488041"},{"key":"ref30","first-page":"6379","article-title":"Multi-agent actor-critic for mixed cooperative-competitive environments","author":"lowe","year":"2017","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890959"},{"key":"ref36","article-title":"MPLS label stack encoding","author":"farinacci","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.06.002"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2633579"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3138808.3138810"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2707140"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking.2018.8696820"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2879353"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2018.2847296"},{"key":"ref21","article-title":"Traffic scheduling in software-defined backhaul network","author":"li","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916583"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2741944"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/PHOSST.2018.8456750"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1186\/s13174-018-0087-2"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838574"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928564"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140324"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218482"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1039\/c3ay41907j"},{"key":"ref153","doi-asserted-by":"crossref","first-page":"3660","DOI":"10.3923\/itj.2013.3660.3664","article-title":"Principal component analysis","volume":"16","author":"wei","year":"2013","journal-title":"Inf Technol J"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/375735.376469"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845154"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2016.2585759"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.1900365"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366298"},{"key":"ref146","first-page":"1","article-title":"Predicting future traffic using hidden Markov models","author":"chen","year":"2016","journal-title":"Proc IEEE 24th Int Conf Netw Protocols (ICNP)"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700200"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/ICCMC.2017.8282551"},{"key":"ref149","first-page":"1","article-title":"Inclusion of artificial intelligence in communication networks and services","volume":"1","author":"xu","year":"2017","journal-title":"ITU J ICT Discoveries Special"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60435-0_12"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.12.012"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2016.11.003"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2946045"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.091"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841819"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/IFIPNetworking.2015.7145321"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7417144"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2871061"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/ICCAD.2017.8203866"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845276"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9013134"},{"key":"ref160","article-title":"Short-term traffic flow forecasting with spatial-temporal correlation in a hybrid deep learning framework","author":"wu","year":"2016","journal-title":"arXiv 1612 01022"},{"key":"ref4","article-title":"Saving the climate@ the speed of light. First roadmap for reduced CO2 emissions in the EU and beyond","author":"pamlin","year":"2006"},{"key":"ref3","first-page":"1.1","article-title":"SMART 2020: Enabling the low carbon economy in the information age","volume":"1","author":"webb","year":"2008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683203"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.06.012"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2877686"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2018.2808701"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.90"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199404"},{"key":"ref157","first-page":"489","article-title":"Learning to cooperate via policy search","author":"peshkin","year":"2000","journal-title":"Proc 16th Conf Uncertainty Artif Intell"},{"key":"ref158","article-title":"Continuous control with deep reinforcement learning","author":"lillicrap","year":"2015","journal-title":"arXiv 1509 02971"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.071410.00073"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IEMCON.2017.8117206"},{"key":"ref45","author":"farinacci","year":"2018","journal-title":"MPLS Label Stack Encoding"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987287"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/NaNA.2016.74"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1038\/nature10011"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218413"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.003"},{"key":"ref43","year":"2011","journal-title":"IP Routing OSPF Configuration Guide"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004198"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993839"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.9.00A271"},{"key":"ref124","article-title":"An artificial neural network approach to power consumption model construction for servers in cloud data centers","author":"lin","year":"2019","journal-title":"IEEE Trans Sustain Comput"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2709742"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2913448"},{"key":"ref129","first-page":"14","article-title":"Deep reinforcement learning based QoS-aware routing in knowledge-defined networking","author":"pham","year":"2018","journal-title":"Proc 7th Int Conf Heterogeneous Netw Qual Rel Security Robustness"},{"key":"ref71","author":"sutton","year":"2019","journal-title":"Reinforcement Learning An Introduction"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/NCC.2017.8077095"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/4067135"},{"key":"ref76","first-page":"1057","article-title":"Policy gradient methods for reinforcement learning with function approximation","author":"sutton","year":"1999","journal-title":"Proc Adv Neural Inf Process Syst (NIPS)"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2859480"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2941458"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1700244"},{"key":"ref75","article-title":"A critical review of recurrent neural networks for sequence learning","author":"lipton","year":"2015","journal-title":"arXiv 1506 00019"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2019.8766634"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/STICT.2019.8789375"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/BMSB.2018.8436781"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.04.001"},{"key":"ref79","author":"goodfellow","year":"2016","journal-title":"Deep Learning"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2017.8094160"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.25046\/aj020379"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2019.2937609"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/BlackSeaCom.2018.8433618"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2507789"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2017.1700200"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2451662"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841561"},{"key":"ref63","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/JCN.2016.000079","article-title":"Energy-aware traffic engineering in hybrid SDN\/IP backbone networks","volume":"18","author":"wei","year":"2016","journal-title":"J Commun Netw"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2018.2842123"},{"key":"ref140","article-title":"A machine learning approach to routing","author":"valadarsky","year":"2017","journal-title":"arXiv 1708 03074"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.12.004"},{"key":"ref141","year":"2020","journal-title":"Cliff Walking"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2018.2832658"},{"key":"ref142","year":"2020","journal-title":"Cliff Walking A Case Study to Compare Sarsa and Q-Learning"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2866942"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2018.2808701"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2018.5082"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7785324"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2018.2810445"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919493"},{"key":"ref145","article-title":"Deep reinforcement learning meets graph neural networks: Exploring a routing optimization use case","author":"almasan","year":"2019","journal-title":"arXiv 1910 07421"},{"key":"ref1","year":"0","journal-title":"Cisco Visual Networking Index Forecast and Trends"},{"key":"ref109","article-title":"A deep-reinforcement learning approach for software-defined networking routing optimization","author":"stampa","year":"2017","journal-title":"arXiv 1709 07080"},{"key":"ref95","first-page":"415","author":"negnevitsky","year":"2005","journal-title":"Artificial Intelligence A Guide to Intelligent Systems"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2017.7962735"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9127-4"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292737"},{"key":"ref93","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.asoc.2013.01.025","article-title":"Honey bee behavior inspired load balancing of tasks in cloud computing environments","volume":"13","author":"dhinesh","year":"2013","journal-title":"Appl Soft Comput"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7123-3_48"},{"key":"ref92","first-page":"116","article-title":"Optimization of distribution network configuration for loss reduction using artificial bee colony algorithm","volume":"1","author":"rao","year":"2008","journal-title":"Int J Elect Power and Energy Syst Eng"},{"key":"ref105","first-page":"261","article-title":"Deep convolutional LSTM network-based traffic matrix prediction with partial information","author":"le","year":"2019","journal-title":"Proc IFIP\/IEEE Symp Integr Netw Service Manage (IM)"},{"key":"ref91","doi-asserted-by":"crossref","first-page":"670","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"kirkpatrick","year":"1983","journal-title":"Science"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012669"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO.2018.8748386"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800104"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3229607.3229613"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2018.1700417"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM.2017.8256059"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2018.8406199"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2018.2875747"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1504\/IJBDI.2016.073903"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1049\/el.2018.0336"},{"key":"ref10","first-page":"163","article-title":"Routing and G-networks to optimise energy and quality of service in packet networks","author":"gelenbe","year":"2010","journal-title":"Proc 1st International ICST Conf on E-Energy"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5425886"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2014.2313735"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/nem.565"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.1998.673356"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567024"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2020.02.013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416357"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553453"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC47284.2019.8969579"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2837161"},{"key":"ref81","first-page":"1237","article-title":"Flexible, high performance convolutional neural networks for image classification","author":"cire?an","year":"2011","journal-title":"Proc IJCAI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2582748"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.02.041"},{"key":"ref119","article-title":"Hierarchical deep double Q-routing","author":"ali","year":"2019","journal-title":"arXiv 1910 04041"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.879350"},{"key":"ref83","first-page":"214","article-title":"Wasserstein GAN","volume":"70","author":"arjovsky","year":"2017","journal-title":"Proc of the 34th ICML"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/GlobalSIP45357.2019.8969320"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.014"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016529"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1179"},{"key":"ref115","article-title":"Deep reinforcement learning meets graph neural networks: Exploring a routing optimization use case","author":"almasan","year":"2019","journal-title":"arXiv 1910 07421"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3342280.3342317"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/2.294849"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2995511"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000371"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2016.7818437"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20662-7_2"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-015-1592-8"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(01)00123-0"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329691"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09195890.pdf?arnumber=9195890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T20:02:54Z","timestamp":1639771374000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9195890\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":163,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3022291","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}