{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:07:25Z","timestamp":1772824045077,"version":"3.50.1"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004787","name":"Research Council of Finland","doi-asserted-by":"publisher","award":["362782"],"award-info":[{"award-number":["362782"]}],"id":[{"id":"10.13039\/501100004787","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004787","name":"Research Council of Finland","doi-asserted-by":"publisher","award":["369116 (6G Flagship)"],"award-info":[{"award-number":["369116 (6G Flagship)"]}],"id":[{"id":"10.13039\/501100004787","id-type":"DOI","asserted-by":"publisher"}]},{"name":"European Commission through the Horizon Europe\/JU SNS Project Hexa-X-II","award":["101095759"],"award-info":[{"award-number":["101095759"]}]},{"name":"ANID FONDECYT, Chile","award":["1241977"],"award-info":[{"award-number":["1241977"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Open J. Commun. Soc."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/ojcoms.2025.3583867","type":"journal-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T13:48:35Z","timestamp":1751032115000},"page":"5490-5508","source":"Crossref","is-referenced-by-count":1,"title":["Configuring Transmission Thresholds in IIoT Alarm Scenarios for Energy-Efficient Event Reporting"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2096-8890","authenticated-orcid":false,"given":"David E.","family":"Ru\u00edz-Guirola","sequence":"first","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1838-5183","authenticated-orcid":false,"given":"Onel L. A.","family":"L\u00f3pez","sequence":"additional","affiliation":[{"name":"Centre for Wireless Communications, University of Oulu, Oulu, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1622-3180","authenticated-orcid":false,"given":"Samuel","family":"Montejo-S\u00e1nchez","sequence":"additional","affiliation":[{"name":"Instituto Universitario de Investigaci&#x00F3;n y Desarrollo Tecnol&#x00F3;gico, Universidad Tecnol&#x00F3;gica Metropolitana, Santiago, Chile"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.102935"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3390\/app14052160"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2024.3455010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2022.3181733"},{"key":"ref5","article-title":"A comprehensive review of sensor node deployment strategies for maximized coverage and energy efficiency in wireless sensor networks","volume":"10","author":"Anusuya","year":"2024","journal-title":"PeerJ Comput. Sci."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-024-85076-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2024.3369480"},{"issue":"17","key":"ref8","doi-asserted-by":"crossref","first-page":"5851","DOI":"10.3390\/s24175851","article-title":"RDSC: Range-based device spatial clustering for IoT networks","volume":"24","author":"Achkouty","year":"2024","journal-title":"Sensors"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3379394"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3055937"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/IOTSMS48152.2019.8939220"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3179320"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3553288"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3106736"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF60004.2024.10942799"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3181889"},{"key":"ref17","article-title":"Modeling IoT traffic patterns: Insights from a statistical analysis of an MTC dataset","volume-title":"arXiv:2409.01932","author":"Ru\u00edz-Guirola","year":"2024"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/9781119718703"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2871368"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2988512"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.04.065"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2023.3323832"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/9781118032701"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3230796"},{"key":"ref26","volume-title":"The CVX Users\u2019 Guide-Release 2.2","author":"Boyd","year":"2020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3177784"},{"key":"ref28","volume-title":"Fmincon-find minimum of constrained nonlinear multivariable function","year":"2024"},{"issue":"3","key":"ref29","first-page":"155","article-title":"Genetic algorithm for optimization using MATLAB","volume":"4","author":"Saraswat","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8455065"},{"key":"ref31","volume-title":"Reinforcement Learning and Optimal Control","author":"Bertsekas","year":"2019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-79995-2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1002\/9781118786352.wbieg0601"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3120744"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23719-5_7"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2019.12.012"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3035431"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2992349"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2022.3216353"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102559"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/3872214"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/REEDCON57544.2023.10151100"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-022-03609-z"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27645-3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3024860"},{"key":"ref46","article-title":"Iterated Q-network: Beyond one-step bellman updates in deep reinforcement learning","volume-title":"arXiv:2403.02107","author":"Vincent","year":"2024"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1115\/1.4066999"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3312546"},{"key":"ref49","volume-title":"Advances in interior point methods for large-scale linear programming","author":"Colombo","year":"2007"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.01.005"},{"issue":"2","key":"ref51","first-page":"17","article-title":"The role of dependability in IOT systems","volume":"1","author":"Ibraigheeth","year":"2023","journal-title":"J. Intell. Syst. Appl. Data Sci."},{"key":"ref52","volume-title":"Study on NR positioning support; (Release 17)","year":"2021"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MCOMSTD.0001.2400006"},{"key":"ref54","volume-title":"Ericsson Mobility Report: Realizing Smart Manufacturing IoT","year":"2025"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.cities.2022.103794"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.2000660"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1086\/341527"},{"key":"ref58","volume-title":"Probability and Random Processes: With Applications to Signal Processing and Communications","author":"Miller","year":"2012"}],"container-title":["IEEE Open Journal of the Communications Society"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8782661\/10829557\/11054051.pdf?arnumber=11054051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T05:04:04Z","timestamp":1752210244000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11054051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":58,"URL":"https:\/\/doi.org\/10.1109\/ojcoms.2025.3583867","relation":{},"ISSN":["2644-125X"],"issn-type":[{"value":"2644-125X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}