{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:53:32Z","timestamp":1766602412850,"version":"3.48.0"},"reference-count":71,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62472264"],"award-info":[{"award-number":["62472264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Distinguished Youth Foundation of Shandong Province","doi-asserted-by":"publisher","award":["ZR2025QA13"],"award-info":[{"award-number":["ZR2025QA13"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2026,1,1]]},"DOI":"10.1109\/jiot.2025.3629406","type":"journal-article","created":{"date-parts":[[2025,11,5]],"date-time":"2025-11-05T18:41:26Z","timestamp":1762368086000},"page":"1423-1439","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Energy Transmission Combination Approach for Charging Smart Wearable Devices"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-7792-9163","authenticated-orcid":false,"given":"Haotian","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology, Zibo, China"}]},{"given":"Ming","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology, Zibo, China"}]},{"given":"Wenting","family":"Wu","sequence":"additional","affiliation":[{"name":"China Communications Information Technology Group, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2031-0615","authenticated-orcid":false,"given":"Guodong","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Information Science and Engineering, Shandong Agriculture and Engineering University, Jinan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3265-014X","authenticated-orcid":false,"given":"Jing","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Shandong University of Technology, Zibo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6994-0146","authenticated-orcid":false,"given":"Chun","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute for Information Systems Engineering, Concordia University, Montreal, QC, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i1.7.9377"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21125\/inted.2016.0445"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2677199.2683584"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.trechm.2021.01.001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.matt.2019.12.025"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.esr.2023.101124"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1126\/science.1143254"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.161"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1201\/b10081-17"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.18178\/ijmmm.2020.8.3.499"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-33-4305-4_22"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.06.067"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2020.07.063"},{"key":"ref14","article-title":"Neural combinatorial optimization with reinforcement learning","author":"Bello","year":"2016","journal-title":"arXiv:1611.09940"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025270"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.nanoen.2023.108715"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/er.7394"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/s22114144"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3149276"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3298264"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2980258"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2772318"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.25"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2391119"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3255980"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790092"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MELE.2013.2273228"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CIC50333.2020.00013"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68279-0_8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03596-9_24"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2022.3214979"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2023.114248"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2023.3277768"},{"key":"ref34","first-page":"21188","article-title":"POMO: Policy optimization with multiple optima for reinforcement learning","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","volume":"33","author":"Kwon"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.3233\/FI-2013-822"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4154742"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICRAIE51050.2020.9358351"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TASLP.2022.3178227"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2010.10.001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3390\/s22228765"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2010.2046002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005605"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2021.3084827"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1162\/neco_a_01199"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s10601-022-09327-y"},{"key":"ref46","first-page":"25531","article-title":"DIMES: A differentiable meta solver for combinatorial optimization problems","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Qiu"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2017.12.012"},{"key":"ref48","first-page":"448","article-title":"Batch normalization: Accelerating deep network training by reducing internal covariate shift","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Ioffe"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/BF00992696"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.1998.712192"},{"key":"ref51","first-page":"1471","article-title":"Variance reduction techniques for gradient estimates in reinforcement learning","volume":"5","author":"Greensmith","year":"2004","journal-title":"J. Mach. Learn. Res."},{"key":"ref52","first-page":"1999","article-title":"Beyond variance reduction: Understanding the true impact of baselines on policy optimization","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Chung"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2872615"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/RFID.2008.4519381"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/s00186-019-00696-4"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.3390\/s120911734"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.3390\/s16091466"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TBCAS.2019.2930215"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2705720"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2020.100675"},{"key":"ref61","first-page":"3706","article-title":"DIFUSCO: Graph-based diffusion solvers for combinatorial optimization","volume-title":"Proc. Adv. Neural Inf. Process. Syst.","author":"Sun"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1049\/cim2.12072"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/3477.484436"},{"issue":"8","key":"ref64","doi-asserted-by":"crossref","first-page":"889","DOI":"10.1016\/S0167-739X(00)00043-1","article-title":"Max\u2013min ant system","volume":"16","author":"St\u00fctzle","year":"2000","journal-title":"Future Gener. Comput. Syst."},{"key":"ref65","article-title":"Attention, learn to solve routing problems!","author":"Kool","year":"2018","journal-title":"arXiv:1803.08475"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93025-1_4"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-54621-2_617-1"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ICNN.1995.488968"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329691"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.061413.121703"},{"key":"ref71","volume":"840","author":"Reinelt","year":"2003","journal-title":"The Traveling Salesman: Computational Solutions for TSP Applications"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/11313656\/11227124.pdf?arnumber=11227124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:47:18Z","timestamp":1766602038000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11227124\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,1]]},"references-count":71,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2025.3629406","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2026,1,1]]}}}