{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:38:51Z","timestamp":1776926331666,"version":"3.51.2"},"reference-count":38,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.066899","type":"journal-article","created":{"date-parts":[[2025,7,17]],"date-time":"2025-07-17T08:35:46Z","timestamp":1752741346000},"page":"4563-4582","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["A Deep Reinforcement Learning with Gumbel Distribution Approach for Contention Window Optimization in IEEE 802.11 Networks"],"prefix":"10.32604","volume":"84","author":[{"given":"Yi-Hao","family":"Tu","sequence":"first","affiliation":[]},{"given":"Yi-Wei","family":"Ma","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"45","article-title":"Interference mitigation in D2D communication underlying cellular networks: towards green energy","volume":"68","author":"Ahamad","year":"2021","journal-title":"Comput Mater Contin"},{"key":"ref2","first-page":"435","article-title":"Improved enhanced DBTMA with contention-aware admission control to improve the network performance in MANETs","volume":"60","author":"Sivaram","year":"2019","journal-title":"Comput Mater Contin"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"7347","DOI":"10.1007\/s11276-023-03604-1","article-title":"Energy efficient multi-carrier NOMA and power controlled resource allocation for B5G\/6G networks","volume":"30","author":"Binzagr","year":"2024","journal-title":"Wire Net"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/35.620533","article-title":"IEEE 802.11 wireless local area networks","volume":"35","author":"Crow","year":"1997","journal-title":"IEEE Commun Mag"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1062","DOI":"10.1109\/LCOMM.2018.2813361","volume":"22","author":"Lee","year":"2018","journal-title":"IEEE Commun Letters"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2019.06.011","article-title":"Probability-based opportunity dynamic adaptation (PODA) of contention window for home M2M networks","volume":"144","author":"Liew","year":"2019","journal-title":"J Net Comp App"},{"key":"ref7","series-title":"Proceedings of the 57th IEEE Semiannual Vehicular Technology Conference","article-title":"Enhancement of IEEE 802.11 distributed coordination function with exponential increase exponential decrease backoff algorithm","author":"Song","year":"2003 Apr 22\u201325"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1145\/190809.190334","article-title":"MACAW: a media access protocol for wireless LANs","volume":"24","author":"Bharghavan","year":"1994","journal-title":"ACM SIGCOMM Comp Commun Rev"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1007\/s11276-006-0012-7","article-title":"An effective medium contention method to improve the performance of IEEE 802.11","volume":"14","author":"Chen","year":"2008","journal-title":"Wire Net"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"1033","DOI":"10.1002\/dac.1210","article-title":"A smart exponential-threshold-linear backoff mechanism for IEEE 802.11 WLANs","volume":"24","author":"Ke","year":"2011","journal-title":"Inter J Commun Sys"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"120495","DOI":"10.1016\/j.eswa.2023.120495","article-title":"Reinforcement learning algorithms: a brief survey","volume":"231","author":"Shakya","year":"2023","journal-title":"Expert Sys App"},{"key":"ref12","first-page":"1","article-title":"Performance enhancement of CSMA\/CA MAC protocol based on reinforcement learning","volume":"19","author":"Kim","year":"2021","journal-title":"J Info Commun Conv Eng"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"803","DOI":"10.18280\/isi.250610","article-title":"Intelligent CW selection mechanism based on Q-learning (MISQ)","volume":"25","author":"Zerguine","year":"2020","journal-title":"Ing\u00e9nierie Des Syst\u00e8mes D\u2019Inf"},{"key":"ref14","series-title":"Proceedings of the 4th International Conference on Big Data Analytics and Practices; 2023 Aug 25\u201327","article-title":"Reinforcement learning-based contention window adjustment for wireless body area networks","author":"Kwon"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1504\/IJWMC.2023.133061","article-title":"A Q-learning approach for adjusting CWS and TxOP in LAA for Wi-Fi and LAA coexisting networks","volume":"25","author":"Pan","year":"2023","journal-title":"Inter J Wire Mobile Comp"},{"key":"ref16","first-page":"1035","article-title":"Q-learning-based collision avoidance for 802.11 stations with maximum requirements","volume":"17","author":"Lee","year":"2023","journal-title":"KSII Trans Int Info Sys (TIIS)"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1899","DOI":"10.1007\/s11276-023-03257-0","article-title":"An adaptive backoff selection scheme based on Q-learning for CSMA\/CA","volume":"29","author":"Zheng","year":"2023","journal-title":"Wire Net"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1038\/nature14236","article-title":"Human-level control through deep reinforcement learning","volume":"518","author":"Mnih","year":"2015","journal-title":"Nature"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"14237","DOI":"10.1109\/JIOT.2020.3023588","article-title":"A secure data aggregation strategy in edge computing and blockchain-empowered Internet of Things","volume":"9","author":"Wang","year":"2022","journal-title":"IEEE Internet Things J"},{"key":"ref20","first-page":"2074","article-title":"Heterogeneous blockchain and AI-driven hierarchical trust evaluation for 5G-enabled intelligent transportation systems","volume":"24","author":"Wang","year":"2023","journal-title":"IEEE Trans Intel Transport Syst"},{"key":"ref21","first-page":"167","article-title":"Dynamic adaptation of contention window boundaries using deep Q networks in UAV swarms","volume":"46","author":"Subash","year":"2024","journal-title":"Inter J Comp App"},{"key":"ref22","series-title":"Proceedings of the 2021 IEEE Wireless Communications and Networking Conference; 2021 Mar 29\u2013Apr 1","article-title":"Contention window optimization in IEEE 802.11 ax networks with deep reinforcement learning","author":"Wydma\u0144ski"},{"key":"ref23","first-page":"128","article-title":"Reinforcement learning-based Wi-Fi contention window optimization","volume":"38","author":"Sheila de","year":"2023","journal-title":"J Commun Info Sys"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"103357","DOI":"10.1016\/j.adhoc.2023.103357","article-title":"Reinforcement learning-based multi-parameter joint optimization in dense multi-hop wireless networks","volume":"154","author":"Lei","year":"2024","journal-title":"Ad Hoc Net"},{"key":"ref25","first-page":"334","article-title":"Applying deep reinforcement learning to improve throughput and reduce collision rate in IEEE 802.11 networks","volume":"16","author":"Ke","year":"2022","journal-title":"KSII Trans Int Info Syst"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"776","DOI":"10.1016\/j.icte.2022.07.009","article-title":"Applying multi-agent deep reinforcement learning for contention window optimization to enhance wireless network performance","volume":"9","author":"Ke","year":"2023","journal-title":"ICT Exp"},{"key":"ref27","series-title":"Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence; 2016 Feb 12\u201317","article-title":"Deep reinforcement learning with double Q-learning","author":"Van Hasselt"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"4145","DOI":"10.3390\/app12094145","article-title":"Wireless LAN performance enhancement using double deep Q-networks","volume":"12","author":"Asaf","year":"2022","journal-title":"Appl Sci"},{"key":"ref29","unstructured":"Chakraborty S, Chakravarty D. A discrete Gumbel distribution. arXiv:1410.7568. 2014."},{"key":"ref30","doi-asserted-by":"crossref","first-page":"8043","DOI":"10.1109\/TASE.2024.3476382","article-title":"Predicting vulnerable road user behavior with Transformer-based Gumbel distribution networks","volume":"22","author":"Astuti","year":"2025","journal-title":"IEEE Trans Auto Sci Eng"},{"key":"ref31","first-page":"101055","article-title":"A new extension of the Gumbel distribution with biomedical data analysis","volume":"17","author":"Daud","year":"2024","journal-title":"J Radiat Res Appl Sci"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"1064","DOI":"10.1109\/TWC.2021.3101422","article-title":"Wireless channel modeling based on extreme value theory for ultra-reliable communications","volume":"21","author":"Mehrnia","year":"2022","journal-title":"IEEE Trans Wire Commun"},{"key":"ref33","unstructured":"Strypsteen T, Bertrand A. Conditional Gumbel-Softmax for constrained feature selection with application to node selection in wireless sensor networks. arXiv:2406.01162. 2024."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/LWC.2022.3146389","article-title":"Extreme age of information for wireless-powered communication systems","volume":"11","author":"Miridakis","year":"2022","journal-title":"IEEE Wire Commun Letters"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/TRO.2022.3200138","article-title":"Partially observable markov decision processes in robotics: a survey","volume":"39","author":"Lauri","year":"2022","journal-title":"IEEE Trans Robot"},{"key":"ref36","doi-asserted-by":"crossref","unstructured":"Xie SM, Ermon S. Reparameterizable subset sampling via continuous relaxations. arXiv:1901.10517. 2019.","DOI":"10.24963\/ijcai.2019\/544"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"2608","DOI":"10.1080\/02664763.2016.1142945","article-title":"The Weibull Fr\u00e9chet distribution and its applications","volume":"43","author":"Afify","year":"2016","journal-title":"J Appl Stat"},{"key":"ref38","series-title":"Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition; 2018 Jun 19\u201321","article-title":"Squeeze-and-excitation networks","author":"Hu"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_66899\/TSP_CMC_66899.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:23Z","timestamp":1776923123000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63200"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":38,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.066899","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-04-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-25","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}