{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T16:41:48Z","timestamp":1773506508599,"version":"3.50.1"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China \u201cThe Study on Load-Bearing and Moving Support Exoskeleton Robot Key Technology and Typical Application\u201d","award":["2017YFB1300502"],"award-info":[{"award-number":["2017YFB1300502"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3604143","type":"journal-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:43:14Z","timestamp":1756489394000},"page":"153171-153188","source":"Crossref","is-referenced-by-count":1,"title":["Optimization of Multi-Agent Scheduling Based on MA-ID3QN for the Riveting and Welding Work Cell"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5714-1969","authenticated-orcid":false,"given":"Jianbin","family":"Zheng","sequence":"first","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, Hubei, China"}]},{"given":"Yizhuo","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6518-4766","authenticated-orcid":false,"given":"Yang","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5641-4988","authenticated-orcid":false,"given":"Ziyao","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, Hubei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3232-0757","authenticated-orcid":false,"given":"Yifan","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, Hubei, China"}]},{"given":"Chuyi","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, Hubei, China"}]},{"given":"Xinyu","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Information Engineering, Wuhan University of Technology, Wuhan, Hubei, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2020.06.010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/app12010135"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2020.02.002"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2018.2840971"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2021.102202"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165198"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2020.2972894"},{"key":"ref8","article-title":"An introduction to centralized training for decentralized execution in cooperative multi-agent reinforcement learning","author":"Amato","year":"2024","journal-title":"arXiv:2409.03052"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60990-0_12"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14435-6_7"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3038605"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3124466"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2022.1027340"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v36i9.21236"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2019.2903261"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3206537"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.aei.2024.102646"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2022.102412"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2023.106294"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3210248"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2933417"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmsy.2022.11.001"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2020.04.005"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISPDS62779.2024.10667584"},{"key":"ref25","first-page":"13064","article-title":"On the convergence and sample complexity analysis of deep Q-networks with \u03b5-greedy exploration","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Zhang"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MIE.2007.357183"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2873186"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.rcim.2022.102515"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirpj.2020.02.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2021.113524"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1038\/nature14236"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v30i1.10295"},{"key":"ref33","first-page":"1995","article-title":"Dueling network architectures for deep reinforcement learning","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Wang"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0172395"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-024-10794-3"},{"key":"ref36","article-title":"Prioritized experience replay","author":"Schaul","year":"2015","journal-title":"arXiv:1511.05952"},{"key":"ref37","first-page":"4666","article-title":"Guarantees for epsilon-greedy reinforcement learning with function approximation","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Dann"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2023.3275989"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2023.109436"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11145045.pdf?arnumber=11145045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T17:47:46Z","timestamp":1757353666000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11145045\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3604143","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}