{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:08:34Z","timestamp":1773655714001,"version":"3.50.1"},"reference-count":27,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,8,13]],"date-time":"2021-08-13T00:00:00Z","timestamp":1628812800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Project of Cooperation between SZTU and Enterprise","award":["2021010802015"],"award-info":[{"award-number":["2021010802015"]}]},{"name":"Project of Cooperation between SZTU and Enterprise","award":["20213108010030"],"award-info":[{"award-number":["20213108010030"]}]},{"name":"Project of Cooperation between SZTU and Enterprise","award":["20214027010032"],"award-info":[{"award-number":["20214027010032"]}]},{"name":"Experimental Equipment Development Foundation from SZTU","award":["2021010802015"],"award-info":[{"award-number":["2021010802015"]}]},{"name":"Experimental Equipment Development Foundation from SZTU","award":["20213108010030"],"award-info":[{"award-number":["20213108010030"]}]},{"name":"Experimental Equipment Development Foundation from SZTU","award":["20214027010032"],"award-info":[{"award-number":["20214027010032"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,8,13]]},"abstract":"<jats:p>Since the birth of narrowband Internet of Things (NB-IoT), the Internet of Things (IoT) industry has made a considerable progress in the application for smart cities, smart manufacturing, and healthcare. Therefore, the number of UEs is increasing exponentially, which brings considerable pressure to the efficient resource allocation for the bandwidth and power constrained NB-IoT networks. In view of the conventional algorithms that cannot dynamically adjust resource allocation, resulting in a low resource utilization and prone to resource fragmentation, this paper proposes a double deep Q-network (DDQN)-based NB-IoT dynamic resource allocation algorithm. It first builds an NB-IoT environment model based on the real environment. Then, the DDQN algorithm interacts with the NB-IoT environment model to learn and optimize resource allocation strategies until it converges to the optimum. Finally, the simulation results show that the DDQN-based NB-IoT dynamic resource allocation algorithm is better than the traditional algorithm in the resource utilization, average transmission rate, and UE average queuing time.<\/jats:p>","DOI":"10.1155\/2021\/5263726","type":"journal-article","created":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T05:28:03Z","timestamp":1629091683000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Deep Grid Scheduler for 5G NB-IoT Uplink Transmission"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4374-817X","authenticated-orcid":true,"given":"Han","family":"Zhong","sequence":"first","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, Shenzhen, China"},{"name":"College of Applied Technology, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7014-6270","authenticated-orcid":true,"given":"Ruize","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0411-8551","authenticated-orcid":true,"given":"Fengcheng","family":"Mei","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0921-8415","authenticated-orcid":true,"given":"Yong","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6356-8512","authenticated-orcid":true,"given":"Fan","family":"Jin","sequence":"additional","affiliation":[{"name":"Shenzhen Winoble Technology Co., Ltd, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0019-9761","authenticated-orcid":true,"given":"Lei","family":"Ning","sequence":"additional","affiliation":[{"name":"College of Big Data and Internet, Shenzhen Technology University, Shenzhen, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2652320"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/3292384.3292386"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2017.2739181"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/3337941.3337944"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/5356193"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2021.3087726"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3026730"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2019.1800020"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2863267"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2951728"},{"key":"11","first-page":"989","article-title":"Evaluation of latency-aware scheduling techniques for M2M traffic over LTE","author":"I. M. Delgado-Luque"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/glocomw.2013.6825111"},{"key":"13","first-page":"929","article-title":"On setting reverse link target SIR in a CDMA system","author":"A. Sampath"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/vtcspring.2013.6692492"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2477084"},{"key":"16","first-page":"1","article-title":"Dynamic outer loop link adaptation for the 5G centimeter-wave concept","author":"M. Gatnau Sarret"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2020.06.022"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2020.05.024"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2632128"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.2018.1700386"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/vtc2020-fall49728.2020.9348779"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/globecom42002.2020.9322150"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/wcsp.2019.8927898"},{"key":"24","article-title":"Optimization of NB-IoT uplink resource allocation via double deep Q-learning","author":"Z. Han"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2943087"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2951822"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.290436"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5263726.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5263726.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5263726.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,16]],"date-time":"2021-08-16T05:28:10Z","timestamp":1629091690000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5263726\/"}},"subtitle":[],"editor":[{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,8,13]]},"references-count":27,"alternative-id":["5263726","5263726"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5263726","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,8,13]]}}}