{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:43:08Z","timestamp":1774021388762,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"18","license":[{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,15]],"date-time":"2022-09-15T00:00:00Z","timestamp":1663200000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001691","name":"JSPS KAKENHI","doi-asserted-by":"publisher","award":["JP19H04174"],"award-info":[{"award-number":["JP19H04174"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"JSPS KAKENHI","doi-asserted-by":"publisher","award":["JP21K14162"],"award-info":[{"award-number":["JP21K14162"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2022,9,15]]},"DOI":"10.1109\/jiot.2022.3162135","type":"journal-article","created":{"date-parts":[[2022,3,24]],"date-time":"2022-03-24T21:51:04Z","timestamp":1648158664000},"page":"18002-18014","source":"Crossref","is-referenced-by-count":34,"title":["Energy-Aware Hybrid RF-VLC Multiband Selection in D2D Communication: A Stochastic Multiarmed Bandit Approach"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4443-7066","authenticated-orcid":false,"given":"Sherief","family":"Hashima","sequence":"first","affiliation":[{"name":"Computational Learning Theory Team, RIKENAdvanced Intelligent Project, Fukuoka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1790-8640","authenticated-orcid":false,"given":"Mostafa M.","family":"Fouda","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, College of Science and Engineering, Idaho State University, Pocatello, ID, USA"}]},{"given":"Sadman","family":"Sakib","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Lakehead University, Thunder Bay, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4785-2425","authenticated-orcid":false,"given":"Zubair Md.","family":"Fadlullah","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Lakehead University, Thunder Bay, ON, Canada"}]},{"given":"Kohei","family":"Hatano","sequence":"additional","affiliation":[{"name":"Faculty of Arts and Science, Kyushu University, Fukuoka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5443-9711","authenticated-orcid":false,"given":"Ehab Mahmoud","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Electrical Engineering Department, College of Engineering, Prince Sattam Bin Abdulaziz University, Wadi Addwasir, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4140-287X","authenticated-orcid":false,"given":"Xuemin","family":"Shen","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2999618"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2942390"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2912022"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7498076"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3015986"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048365"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2841"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7402263"},{"key":"ref9","article-title":"Hybrid RF\/VLC systems: A comprehensive survey on network topologies, performance analyses, applications, and future directions","author":"Abuella","year":"2020","journal-title":"arXiv:2007.02466"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2799204"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2018.2802937"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2018.8450350"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1154-4"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2933867"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.3000839"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3037408"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950778"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908872"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2020.3003786"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000301"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3032516"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2933973"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149397"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322556"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.2987421"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3016019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2020.2991535"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s21082835"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s20143947"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.011816"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155408"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3306309.3306315"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2018.8690592"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2019.01.006"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2019.2908371"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3014427"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2844882"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1051\/matecconf\/201817303014"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2870614"},{"key":"ref40","article-title":"6G for vehicle-to-everything (V2X) communications: Enabling technologies, challenges, and opportunities","author":"Noor-A-Rahim","year":"2020","journal-title":"arXiv:2012.07753"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918583"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2007.897513"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2018.8580695"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2552239"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2787990"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892238"},{"key":"ref47","article-title":"An empirical evaluation of thompson sampling","volume-title":"Advances in Neural Information Processing Systems","volume":"24","author":"Chapelle","year":"2011"},{"key":"ref48","first-page":"5114","article-title":"Thompson sampling for combinatorial semi-bandits","volume-title":"Proc. 35th Int. Conf. Mach. Learn.","volume":"80","author":"Wang"},{"issue":"2","key":"ref49","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1023\/A:1013689704352","article-title":"Finite-time analysis of the multiarmed bandit problem","volume":"47","author":"Auer","year":"2002","journal-title":"Mach. Learn."},{"key":"ref50","first-page":"1","article-title":"Analysis of thompson sampling for the multi-armed bandit problem","volume-title":"Proc. 25th Annu. Conf. Learn. Theory","volume":"23","author":"Agrawal"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3088510"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC50192.2020.9309495"},{"key":"ref53","first-page":"217","article-title":"Minimax policies for adversarial and stochastic bandits","volume-title":"Proc. 22nd Annu. Conf. Learn. Theory (COLT)","author":"Audibert"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1080\/03610918.2014.950872"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2013.2260813"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/9881201\/09741307.pdf?arnumber=9741307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:40:10Z","timestamp":1705538410000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9741307\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,15]]},"references-count":55,"journal-issue":{"issue":"18"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2022.3162135","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,15]]}}}