{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T14:56:38Z","timestamp":1753887398844,"version":"3.41.2"},"reference-count":22,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T00:00:00Z","timestamp":1572739200000},"content-version":"vor","delay-in-days":306,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2018YFC1504403-03","2017GJJG091"],"award-info":[{"award-number":["2018YFC1504403-03","2017GJJG091"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Research and Practice Project of Higher Education Teaching Reform in Hebei Province","award":["2018YFC1504403-03","2017GJJG091"],"award-info":[{"award-number":["2018YFC1504403-03","2017GJJG091"]}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2019,1]]},"abstract":"<jats:p>The present study proposes a new algorithm for device\u2010to\u2010device (D2D) user density identification in a 5G network based on resource allocation. The method initially established a multiobjective optimization function that calculates system throughput and quality of service (QoS) of D2D users. The optimal resource allocation result of the multiobjective function is obtained via the improved whale optimization algorithm (IWOA). System throughput after resource allocation exhibits a linear relationship with the number of users. Therefore, the D2D user density areas are accurately identified via the throughput value. The simulation result reveals that the accuracy of D2D user density identification reaches 95%.<\/jats:p>","DOI":"10.1155\/2019\/8147289","type":"journal-article","created":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T23:33:22Z","timestamp":1572824002000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Study on the User Density Identification via Improved Whale Optimization Algorithm in Device\u2010to\u2010Device Communication"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5679-1644","authenticated-orcid":false,"given":"Yao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhongliang","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Aihua","family":"Hu","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2019,11,3]]},"reference":[{"volume-title":"A Survey of 5G Network: Architecture and Emerging Technologies","year":"2015","author":"Gupta A.","key":"e_1_2_9_1_2"},{"key":"e_1_2_9_2_2","doi-asserted-by":"crossref","unstructured":"AliS. RajathevaN. andLatva-ahoM. Full duplex device-to-device communication in cellular networks Proceedings of the 2014 European Conference on Networks and Communications (EuCNC) June 2014 Bologna Italy 1\u20135.","DOI":"10.1109\/EuCNC.2014.6882650"},{"key":"e_1_2_9_3_2","doi-asserted-by":"crossref","unstructured":"ChengW. ZhangX. andZhangH. Optimal power allocation for full-duplex D2D communications over wireless cellular networks Proceedings of the 2014 IEEE Global Communications Conference (GLOBECOM) December 2014 Austin TX USA.","DOI":"10.1109\/GLOCOM.2014.7037560"},{"key":"e_1_2_9_4_2","unstructured":"BagheriH. BonomiF. A. M. andKatzM. Spectral efficiency and throughput enhancement by full-duplex D2D communication in mobile clouds Proceedings of the 21st European Wireless Conference May 2015 Budapest Hungary."},{"key":"e_1_2_9_5_2","doi-asserted-by":"crossref","unstructured":"SunJ. ZhangT. LiangX. ZhangZ. andChenY. Uplink resource allocation in interference limited area for D2D-based underlaying cellular networks Proceedings of the 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring) May 2016 Nanjing China 1\u20136.","DOI":"10.1109\/VTCSpring.2016.7504521"},{"key":"e_1_2_9_6_2","doi-asserted-by":"crossref","unstructured":"OduolaW. O. LiX. QianL. andHanZ. Power control for device-to-device communications as an underlay to cellular system Proceedings of the 2014 IEEE International Conference on Communications (ICC) June 2014 Sydney Australia 5257\u20135262.","DOI":"10.1109\/ICC.2014.6884156"},{"key":"e_1_2_9_7_2","doi-asserted-by":"crossref","unstructured":"GuizaniZ.andHamdiN. Spectrum resource management and interference mitigation for D2D communications with awareness of BER constraint in mm wave 5G underlay network Proceedings of the IEEE Symposium on Computers and Communications June 2016 Messina Italy 855\u2013860.","DOI":"10.1109\/ISCC.2016.7543843"},{"key":"e_1_2_9_8_2","doi-asserted-by":"crossref","unstructured":"NaqviS. A. R. HassanS. A. PervaizH. NiQ. andMusavianL. Self-adaptive power control mechanism in D2D enabled hybrid cellular network with mm wave small cells: an optimization approach Proceedings of the 2016 IEEE Globecom Workshops (GC Workshops) December 2016 Washington DC USA 1\u20136.","DOI":"10.1109\/GLOCOMW.2016.7849042"},{"key":"e_1_2_9_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/lcomm.2019.2908152"},{"key":"e_1_2_9_10_2","doi-asserted-by":"crossref","unstructured":"AliS. GhazanfariA. RajathevaN. andLatva-ahoM. Effect of residual of self-interference in performance of full-duplex D2D communication Proceedings of the 1st International Conference on 5G for Ubiquitous Connectivity November 2014 Akaslompolo Finland 46\u201351.","DOI":"10.4108\/icst.5gu.2014.258100"},{"key":"e_1_2_9_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2017.2773616"},{"key":"e_1_2_9_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2014.6815897"},{"key":"e_1_2_9_13_2","doi-asserted-by":"crossref","unstructured":"LinS.andTianH. Clustering based interference management for QoS guarantees in OFDMA femtocell Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC) April 2013 Shanghai China 649\u2013654.","DOI":"10.1109\/WCNC.2013.6554640"},{"key":"e_1_2_9_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2550765"},{"key":"e_1_2_9_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.011514.130710"},{"key":"e_1_2_9_16_2","doi-asserted-by":"crossref","unstructured":"KammounA. TabbaneN. DiazG. DandoushA. andAchirN. End-to-end efficient heuristic algorithm for 5G network slicing Proceedings of the International Conference on Advanced Information Networking and Applications (AINA) May 2018 Krakow Poland 386\u2013392.","DOI":"10.1109\/AINA.2018.00065"},{"key":"e_1_2_9_17_2","doi-asserted-by":"crossref","unstructured":"NakamuraK. TashiroT. YamamotoK. andOhnoK. Transmit power control and channel assignment for femto cells in HetNet systems using genetic algorithm Proceedings of the 2015 IEEE 26th Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC) September 2015 Hong Kong China 1669\u20131674.","DOI":"10.1109\/PIMRC.2015.7343567"},{"key":"e_1_2_9_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2016.01.008"},{"key":"e_1_2_9_19_2","first-page":"371","article-title":"Advances in intelligent information hiding and multimedia signal processing","volume":"82","author":"Horng M. F.","year":"2018","journal-title":"Intelligent Information Hiding and Multimedia Signal Processing"},{"key":"e_1_2_9_20_2","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9i38\/101939"},{"key":"e_1_2_9_21_2","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2016\/v9is1\/101941"},{"key":"e_1_2_9_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2016.2644664"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/8147289.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/complexity\/2019\/8147289.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2019\/8147289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T12:01:48Z","timestamp":1723032108000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2019\/8147289"}},"subtitle":[],"editor":[{"given":"Ra\u00fal","family":"Ba\u00f1os","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,1]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["10.1155\/2019\/8147289"],"URL":"https:\/\/doi.org\/10.1155\/2019\/8147289","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2019,1]]},"assertion":[{"value":"2019-05-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-09-13","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"8147289"}}