{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:43:19Z","timestamp":1774719799338,"version":"3.50.1"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council under Discovery Project","doi-asserted-by":"publisher","award":["DP210100743"],"award-info":[{"award-number":["DP210100743"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3468377","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T17:48:56Z","timestamp":1727372936000},"page":"148090-148110","source":"Crossref","is-referenced-by-count":9,"title":["Reinforcement Learning for Tackling Energy-Saving and Energy-Balance Dilemma of Cluster-Based Routing Protocols in WSNs"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6367-5935","authenticated-orcid":false,"given":"Yan","family":"Wang","sequence":"first","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1008-2498","authenticated-orcid":false,"given":"Ke","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3137-9653","authenticated-orcid":false,"given":"Yongli","family":"Ren","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7865-072X","authenticated-orcid":false,"given":"Jeffrey","family":"Chan","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Melbourne, VIC, Australia"}]},{"given":"Guangjian","family":"Tian","sequence":"additional","affiliation":[{"name":"Huawei Noah&#x2019;s Ark Laboratory, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9697-7670","authenticated-orcid":false,"given":"Christian S.","family":"Jensen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Aalborg University, Aalborg, Denmark"}]}],"member":"263","reference":[{"key":"ref1","first-page":"200","article-title":"A survey on energy efficient routing techniques in wireless sensor network","volume-title":"Proc. 15th Int. Conf. Adv. Commun. Technol. (ICACT)","author":"Rahman"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-020-01523-5"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.09.005"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s120811113"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2018.09.013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942321"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.09.067"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2002.804190"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10226"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2015.7145650"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2013.242"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/pccc.2005.1460630"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IWSCA.2008.14"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICACS.2018.8333486"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1299-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RADIO.2015.7323378"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0681-8"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2013.67"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICENCO.2017.8289762"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/s19235281"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01704-w"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/s20051540"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2020.100342"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2997066"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3055178"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1404592"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RoEduNet.2016.7753231"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/IACS.2017.7921979"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCS.2017.8034874"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ROEDUNET.2017.8123753"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.101913"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2517084"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2017.08.005"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.07.007"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-014-0817-8"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2594758"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2017.2669996"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1111\/mice.12522"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2606541"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2727050"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.02.002"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-014-0438-1"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52988-8_7"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.3390\/s21124060"},{"issue":"4","key":"ref47","doi-asserted-by":"crossref","first-page":"3133","DOI":"10.1109\/COMST.2019.2916583","article-title":"Applications of deep reinforcement learning in communications and networking: A survey","volume":"21","author":"Luong","year":"2019","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2018.2809722"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647611"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2018.8362276"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2017.7952524"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2024.3381712"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933973"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/316"},{"key":"ref55","article-title":"Proximal policy optimization algorithms","author":"Schulman","year":"2017","journal-title":"arXiv:1707.06347"},{"key":"ref56","article-title":"High-dimensional continuous control using generalized advantage estimation","author":"Schulman","year":"2015","journal-title":"arXiv:1506.02438"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.05.036"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/CESA.2006.4281977"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2002.1016600"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2001.925197"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2017.2671847"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.43"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.3390\/s19204579"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2007.358883"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2002.1035242"},{"issue":"4","key":"ref66","first-page":"4920","article-title":"Dynamic clustering in sensor networks using HMM and neuro computation","volume":"3","author":"Veena","year":"2012","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"issue":"5","key":"ref67","first-page":"249","article-title":"Wireless sensor network simulators a survey and comparisons","volume":"2","author":"Sundani","year":"2011","journal-title":"Int. J. Comput. Netw."},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.9790\/2834-0525460"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CIMCA.2008.170"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2020.0046"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2008.97"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343195"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10695051.pdf?arnumber=10695051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T17:39:06Z","timestamp":1729273146000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10695051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":72,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3468377","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}