{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T07:09:52Z","timestamp":1766732992332,"version":"3.37.3"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004787","name":"Research Council of Finland","doi-asserted-by":"publisher","award":["346208 (6G Flagship Programme)","362782"],"award-info":[{"award-number":["346208 (6G Flagship Programme)","362782"]}],"id":[{"id":"10.13039\/501100004787","id-type":"DOI","asserted-by":"publisher"}]},{"name":"INDIFICORE Project","award":["24650101111"],"award-info":[{"award-number":["24650101111"]}]},{"DOI":"10.13039\/501100005637","name":"Tekniikan Edist\u00e4miss\u00e4\u00e4ti\u00f6","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005637","id-type":"DOI","asserted-by":"publisher"}]},{"name":"J. C. Bose Fellowship","award":["JCB\/2023\/000028"],"award-info":[{"award-number":["JCB\/2023\/000028"]}]},{"name":"Riitta ja Jorma J. Takasen s\u00e4\u00e4ti\u00f6","award":["20240358"],"award-info":[{"award-number":["20240358"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/ojcoms.2024.3506033","type":"journal-article","created":{"date-parts":[[2024,11,25]],"date-time":"2024-11-25T18:56:12Z","timestamp":1732560972000},"page":"7511-7524","source":"Crossref","is-referenced-by-count":1,"title":["Neural Network-Based Bandit: A Medium Access Control for the IIoT Alarm Scenario"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9629-9742","authenticated-orcid":false,"given":"Prasoon","family":"Raghuwanshi","sequence":"first","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1838-5183","authenticated-orcid":false,"given":"Onel Luis Alcaraz","family":"L\u00f3pez","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3614-049X","authenticated-orcid":false,"given":"Neelesh B.","family":"Mehta","sequence":"additional","affiliation":[{"name":"Department of Electrical Communication Engineering, Indian Institute of Science, Bengaluru, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8689-5313","authenticated-orcid":false,"given":"Hirley","family":"Alves","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6261-0969","authenticated-orcid":false,"given":"Matti","family":"Latva-Aho","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]}],"member":"263","reference":[{"volume-title":"The European market potential for (Industrial) Internet of Things","year":"2022","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/978-3-031-09357-9_10"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TCOMM.2024.3357627"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/LCOMM.2024.3369480"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/JPROC.2023.3328920"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/LCOMM.2022.3181733"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TMLCN.2023.3345273"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/OJCOMS.2023.3323832"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s11042-023-16740-9"},{"key":"ref10","article-title":"The story of 1\/e: ALOHA-based and reinforcement-learning-based random access for delay-constrained communications","author":"Deng","year":"2022","journal-title":"arXiv:2206.09779"},{"key":"ref11","article-title":"Reinforcement learning for improved random access in delay-constrained heterogeneous wireless networks","author":"Deng","year":"2022","journal-title":"arXiv:2205.02057"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICAIIC51459.2021.9415281"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/GCWkshps52748.2021.9682141"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ICC.2019.8761488"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.3390\/electronics12234845"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/JSAC.2019.2904329"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/WCNC51071.2022.9771953"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.3390\/s21093210"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/GLOCOM.2017.8254101"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/TCOMM.2023.3337242"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/TSSC.1969.300228"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1162\/neco.2006.18.12.2936"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-3-319-71682-4_5"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/VTC2022-Spring54318.2022.9860949"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.3390\/s24082554"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/INFOCOM.2019.8737373"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1109\/TWC.2022.3171264"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TMC.2023.3347580"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TMC.2024.3356178"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.neucom.2024.128015"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1109\/TPAMI.2023.3261988"},{"key":"ref32","article-title":"Configuring transmission thresholds in IIoT alarm scenarios for energy-efficient event reporting","volume-title":"arXiv:2407.03982","author":"Ru\u00edz-Guirola","year":"2024"},{"volume-title":"Introduction to Neural Networks for Java","year":"2008","author":"Heaton","key":"ref33"},{"volume-title":"Tensorflow","year":"2024","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TII.2018.2829899"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/TCOMM.2023.3282256"},{"key":"ref37","first-page":"1","article-title":"Why gradient clipping accelerates training: A theoretical justification for adaptivity","volume-title":"Proc. Int. Conf. Learn. Represent. (ICLR)","author":"Zhang"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/tnn.1998.712192"},{"key":"ref39","first-page":"7905","article-title":"Online limited memory neural-linear bandits with likelihood matching","volume-title":"Proc. Int. Conf. Mach. Learn. (ICML)","author":"Nabati"},{"volume-title":"How to decide the number of hidden layers and nodes in a hidden layer?","year":"2013","author":"Petersen","key":"ref40"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10362961\/10767384.pdf?arnumber=10767384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T03:42:55Z","timestamp":1733888575000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10767384\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2024.3506033","relation":{},"ISSN":["2644-125X"],"issn-type":[{"type":"electronic","value":"2644-125X"}],"subject":[],"published":{"date-parts":[[2024]]}}}