{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:08:42Z","timestamp":1776280122524,"version":"3.50.1"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T00:00:00Z","timestamp":1727395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T00:00:00Z","timestamp":1727395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Makerere University Research and Innovations Fund","award":["RIF4"],"award-info":[{"award-number":["RIF4"]}]},{"name":"Carnegie Corporation of New York through the Regional Universities Forum for Capacity Building in Agriculture","award":["RU\/2020\/Carnegie\/DRG\/002"],"award-info":[{"award-number":["RU\/2020\/Carnegie\/DRG\/002"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The burgeoning realm of Machine Type Communications (MTC) has ushered in a paradigm shift in wireless communication, necessitating innovative strategies to efficiently manage diverse application requirements. This paper presents a pioneering Dynamic Priority-based Bandwidth Allocation (DPBA) scheme tailored specifically for MTC scenarios, encompassing both MTC and Human Type Communications (HTC) coexistence. DPBA employs an adaptive framework addressing dynamic MTC traffic, optimizing resource use while meeting latency constraints and sporadic data patterns. By dynamically prioritizing MTC applications based on requirements, the scheme allocates bandwidth for reliable data delivery. DPBA extends to MTC and HTC coexistence, managing diverse quality demands. This underlines its versatility and capacity to serve distinct needs in a shared spectrum. To substantiate its performance, the DPBA scheme is rigorously evaluated against a spectrum of related allocation methods like Proportional Fairness (PF), Static Priority Scheduling (SPS), and the Machine Learning-based Scheme (MLS), DPBA excels in simulations, minimizing packet loss, latency, enhancing throughput and ensuring fairness, surpassing benchmarks. This research underscores the critical importance of tailored bandwidth allocation strategies in advancing MTC and HTC coexistent environments. With its adaptability, efficiency, and remarkable performance, the DPBA scheme emerges as a cornerstone in the trajectory of wireless communication networks, catering to the distinct requirements of both MTC and HTC applications.<\/jats:p>","DOI":"10.1186\/s13638-024-02400-5","type":"journal-article","created":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T13:03:35Z","timestamp":1727442215000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Dynamic priority-based bandwidth allocation scheme for machine type communications"],"prefix":"10.1186","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7281-4482","authenticated-orcid":false,"given":"David Martin","family":"Amitu","sequence":"first","affiliation":[]},{"given":"Roseline N","family":"Akol","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Serugunda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,9,27]]},"reference":[{"issue":"11","key":"2400_CR1","doi-asserted-by":"publisher","first-page":"12951","DOI":"10.1109\/TVT.2020.3016239","volume":"69","author":"N Alhussien","year":"2020","unstructured":"N. Alhussien, T.A. Gulliver, Optimal resource allocation in cellular networks with h2h\/m2m coexistence. IEEE Trans. Veh. Technol. 69(11), 12951\u201312962 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"2400_CR2","doi-asserted-by":"publisher","first-page":"1830","DOI":"10.3390\/s19081830","volume":"19","author":"A Ali","year":"2019","unstructured":"A. Ali, G.A. Shah, J. Arshad, Energy efficient resource allocation for m2m devices in 5g. Sensors 19(8), 1830 (2019)","journal-title":"Sensors"},{"issue":"5","key":"2400_CR3","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1049\/iet-com.2016.0469","volume":"11","author":"SA AlQahtani","year":"2017","unstructured":"S.A. AlQahtani, Performance analysis of cognitive-based radio resource allocation in multi-channel lte-a networks with m2m\/h2h coexistence. IET Commun. 11(5), 655\u2013663 (2017)","journal-title":"IET Commun."},{"key":"2400_CR4","doi-asserted-by":"crossref","unstructured":"A.M. Atchome, H.H.R. Sherazi, R. Alahassa, F. Tossa, T.O. Edoh, L.A. Grieco, A.C. Vianou, A hybrid network model embracing NB-IoT and d2d communications: stochastic geometry analysis. e-infrastructure and e-services for Developing Countries: 11th EAI International Conference, Africomm 2019, porto-novo, benin, December 3\u20134, 2019, Proceedings (2020) pp. 154\u2013165","DOI":"10.1007\/978-3-030-41593-8_11"},{"issue":"5","key":"2400_CR5","doi-asserted-by":"publisher","first-page":"9112","DOI":"10.1109\/JIOT.2019.2927812","volume":"6","author":"G Bartoli","year":"2019","unstructured":"G. Bartoli, R. Fantacci, D. Marabissi, Resource allocation approaches for two-tiers machine-to-machine communications in an interference limited environment. IEEE Internet Things J. 6(5), 9112\u20139122 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"12","key":"2400_CR6","doi-asserted-by":"publisher","first-page":"2433","DOI":"10.1109\/TMC.2015.2398447","volume":"14","author":"J Brown","year":"2015","unstructured":"J. Brown, J.Y. Khan, A predictive resource allocation algorithm in the lte uplink for event based m2m applications. IEEE Trans. Mob. Comput. 14(12), 2433\u20132446 (2015)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"2400_CR7","doi-asserted-by":"crossref","unstructured":"Dewan, F., & Fisher, N. (2010). Approximate bandwidth allocation for fixed-priority-scheduled periodic resources. 2010 16th IEEE Real-time and Embedded Technology and Applications Symposium pp. 247\u2013256","DOI":"10.1109\/RTAS.2010.28"},{"issue":"7","key":"2400_CR8","doi-asserted-by":"publisher","first-page":"6160","DOI":"10.1109\/TVT.2016.2635262","volume":"66","author":"F Ghavimi","year":"2016","unstructured":"F. Ghavimi, Y.-W. Lu, H.-H. Chen, Uplink scheduling and power allocation for m2m communications in sc-fdma-based lte-a networks with qos guarantees. IEEE Trans. Veh. Technol. 66(7), 6160\u20136170 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"2400_CR9","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1002\/ett.2629","volume":"24","author":"AG Gotsis","year":"2013","unstructured":"A.G. Gotsis, A.S. Lioumpas, A. Alexiou, Analytical modelling and performance evaluation of realistic time-controlled m2m scheduling over lte cellular networks. Trans. Emerg. Telecommun. Technol. 24(4), 378\u2013388 (2013)","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"2400_CR10","unstructured":"T. Holmberg, Analysis of epons under the static priority scheduling scheme with fixed transmission times. 2006 2nd Conference on Next Generation Internet Design and Engineering, 2006. ngi\u201906. (2006) p. 8"},{"key":"2400_CR11","doi-asserted-by":"crossref","unstructured":"D. Huang, Y. Gao, Y. Li, M. Hou, W. Tang, S. Cheng, Y. Sun, Deep learning based cooperative resource allocation in 5g wireless networks. Mobile Netw. Appl. 1\u20138 (2018)","DOI":"10.1007\/s11036-018-1178-9"},{"key":"2400_CR12","unstructured":"R. Jain, A. Durresi, G. Babic, Throughput fairness index: an explanation. Atm Forum Contribution (Vol.\u00a099) (1999)"},{"issue":"7","key":"2400_CR13","doi-asserted-by":"publisher","first-page":"6244","DOI":"10.1109\/TVT.2018.2817613","volume":"67","author":"X Li","year":"2018","unstructured":"X. Li, R. Shankaran, M.A. Orgun, G. Fang, Y. Xu, Resource allocation for underlay d2d communication with proportional fairness. IEEE Trans. Veh. Technol. 67(7), 6244\u20136258 (2018)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"3","key":"2400_CR14","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/LCOMM.2011.011811.101798","volume":"15","author":"S-Y Lien","year":"2011","unstructured":"S.-Y. Lien, K.-C. Chen, Massive access management for qos guarantees in 3g pp machine-to-machine communications. IEEE Commun. Lett. 15(3), 311\u2013313 (2011)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"2400_CR15","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TWC.2011.111611.110350","volume":"11","author":"S-Y Lien","year":"2011","unstructured":"S.-Y. Lien, T.-H. Liau, C.-Y. Kao, K.-C. Chen, Cooperative access class barring for machine-to-machine communications. IEEE Trans. Wirel. Commun. 11(1), 27\u201332 (2011)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"2400_CR16","doi-asserted-by":"crossref","unstructured":"A.S. Lioumpas, A. Alexiou, Uplink scheduling for machine-to-machine communications in lte-based cellular systems. 2011 IEEE Globecom Workshops (gc wkshps) (2011) pp. 353\u2013357","DOI":"10.1109\/GLOCOMW.2011.6162470"},{"key":"2400_CR17","unstructured":"S. Mandal, N. Shah, M. Agrawal, Global Cellular iot Connections Tracker Report. (2023)"},{"key":"2400_CR18","doi-asserted-by":"crossref","unstructured":"F. Pramudianto, J. Simon, M. Eisenhauer, H. Khaleel, C. Pastrone, M. Spirito, Prototyping the internet of things for the future factory using a soa-based middleware and reliable wsns. 2013 IEEE 18th Conference on Emerging Technologies & Factory Automation (etfa) (2013) pp. 1\u20134","DOI":"10.1109\/ETFA.2013.6648066"},{"key":"2400_CR19","doi-asserted-by":"crossref","unstructured":"J. Singh, P. Singh, M. Hedabou, N. Kumar, An efficient machine learning-based resource allocation scheme for sdn-enabled fog computing environment. IEEE Trans. Veh. Technol. (2023)","DOI":"10.1109\/TVT.2023.3242585"},{"key":"2400_CR20","unstructured":"S. Wang, D. Xuan, R. Bettati, W. Zhao, Differentiated services with statistical real-time guarantees in static-priority scheduling networks. Proceedings 22nd IEEE Real-time Systems Symposium (rtss 2001)(cat. no. 01pr1420) (2001) pp. 289\u2013298"},{"key":"2400_CR21","doi-asserted-by":"publisher","first-page":"27687","DOI":"10.1109\/ACCESS.2020.2972064","volume":"8","author":"Y Wu","year":"2020","unstructured":"Y. Wu, N. Zhang, K. Rong, Non-orthogonal random access and data transmission scheme for machine-to-machine communications in cellular networks. IEEE Access 8, 27687\u201327704 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"2400_CR22","doi-asserted-by":"publisher","first-page":"3163","DOI":"10.1109\/TVT.2019.2897134","volume":"68","author":"H Ye","year":"2019","unstructured":"H. Ye, G.Y. Li, B.-H.F. Juang, Deep reinforcement learning based resource allocation for v2v communications. IEEE Trans. Veh. Technol. 68(4), 3163\u20133173 (2019)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"2400_CR23","doi-asserted-by":"crossref","unstructured":"S. Zhenqi, Y. Haifeng, C. Xuefen, L. Hongxia, Research on uplink scheduling algorithm of massive m2m and h2h services in lte (2013)","DOI":"10.1049\/cp.2013.0070"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02400-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-024-02400-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-024-02400-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T13:05:33Z","timestamp":1727442333000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-024-02400-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,27]]},"references-count":23,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["2400"],"URL":"https:\/\/doi.org\/10.1186\/s13638-024-02400-5","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,27]]},"assertion":[{"value":"26 December 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No competing or conflicting interests exist.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"75"}}