﻿<?xml version="1.0" encoding="utf-8"?><doi_batch xmlns="http://www.crossref.org/schema/4.3.7" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.crossref.org/schema/4.3.7 http://www.crossref.org/schema/deposit/crossref4.3.7.xsd"><head><doi_batch_id>ijece-1405022920</doi_batch_id><timestamp>14050229202752</timestamp><depositor><depositor_name>CMV Verlag</depositor_name><email_address>khoffmann@cmv-verlag.com</email_address></depositor><registrant>CMV Verlag</registrant></head><body><journal><journal_metadata language="fa"><full_title>Nashriyyah -i Muhandisi -i Barq va Muhandisi -i Kampyutar -i Iran</full_title><abbrev_title>ijece</abbrev_title><issn media_type="electronic">16823745</issn></journal_metadata><journal_issue><publication_date media_type="online"><month>12</month><day>31</day><year>2024</year></publication_date><journal_volume><volume>22</volume></journal_volume><issue>3</issue></journal_issue><journal_article publication_type="full_text"><titles><title>Improvement of Integrated Wireless Networks by Markov Games</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Payam</given_name><surname>Porkar Rezaeiye</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Hamid</given_name><surname>Shokrzadeh</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Dehghan</given_name><surname>Mehdi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Amir Masoud</given_name><surname>Rahmani</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>31</day><year>2024</year></publication_date><pages><first_page>169</first_page><last_page>182</last_page></pages><doi_data><doi>10.66224/ijece.39801.22.3.169</doi><resource>http://ijece.org/fa/Article/39801</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/39801</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/39801</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/39801</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/39801</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/39801</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/39801</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/39801</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	W. Yunlu, X. Wu, and H. Haas, "Distributed load balancing for Internet of Things by using Li-Fi and RF hybrid network," in Proc. IEEE 26th Annual Int. Symp. on Personal, Indoor, and Mobile Radio Communications, PIMRC'15, pp. 1289-1294, Hong Kong, China, 3 Aug.-2 Sept. 2015.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	W. Yunlu and H. Haas, "Dynamic load balancing with handover in hybrid Li-Fi and Wi-Fi networks," J. of Lightwave Technology, vol. 33, no. 22, pp. 4671-4682, Nov. 2015.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	D. Tsonev, S. Videv, and H. Haas, "Light fidelity (Li-Fi): towards all-optical networking", Proc. SPIE 9007, Broadband Access Communication Technologies VIII, 2014.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Haas, L. Yin, Y. Wang, and C. Chen, "What is Li-Fi?" J. of Lightwave Technology, vol. 34, pp. 1533-1544, 2016.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	T. Dobroslav, S. Videv, and H. Haas, "Light fidelity (Li-Fi): towards all-optical networking," Proc. SPIE 9007, Broadband Access Communication Technologies VIII, 11 pp., 2014.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	W. Xiping, M. Safari, and H. Haas, "Access point selection for hybrid Li-Fi and Wi-Fi networks," IEEE Trans. on Communications, vol. 65, no. 12, pp. 5375-5385, Dec. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	L. Xuan, R. Zhang, and L. Hanzo, "Cooperative load balancing in hybrid visible light communications and Wi-Fi," IEEE Trans. on Communications, vol. 63, no. 4, pp. 1319-1329, Apr. 2015.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	W. Yunlu, D. Ushyantha, A. Basnayaka, and H. Haas, "Dynamic load balancing for hybrid Li-Fi and RF indoor networks," in Proc. IEEE Int. Conf. on Communication Workshop, ICCW'15, pp. 1422-1427, London, UK, 8-12 Jun. 2015.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	H. Christopher and J. Yang, "WiGiG: multi-gigabit wireless communications in the 60 GHz band," IEEE Wireless Communications, vol. 18, no. 6, pp. 6-7, Dec. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	W. Xiping, "Two-stage access point selection for hybrid VLC and RF networks," in Proc. IEEE 27th Annual Int. Symp. on Personal, Indoor, and Mobile Radio Communications, PIMRC'16, 6 pp., Valencia, Spain, 4-8 Sept. 2016.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	I. Stefan, H. Burchardt, and H. Haas, "Area spectral efficiency performance comparison between VLC and RF femtocell networks," in Proc. IEEE Int. Conf. on, Communications, ICC'13, pp. 3825-3829, Budapest, Hungary, 9-13 Jun. 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	W. Xiping, M. Safari, and H. Haas, "Joint optimization of load balancing and handover for hybrid Li-Fi and Wi-Fi networks," in Proc. IEEE Wireless Communications and Networking Conf., WCNC'17, 5 pp., San Francisco, CA, USA, 19-22 Mar. 2017.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	S. Sihua, et al., "An indoor hybrid Wi-Fi-VLC internet access system," in Proc. IEEE 11th Int. Conf. on Mobile Ad Hoc and Sensor Systems, pp. 569-574, Philadelphia, PA, USA, 28-30 Oct.. 2014.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	A. Basnayaka, D. Ushyantha, and H. Haas, "Hybrid RF and VLC systems: improving user data rate performance of VLC systems," in Proc. IEEE 81st Vehicular Technology Conf. (VTC Spring), 5 pp., Glasgow, UK, 11-14 May 2015.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	L. Lu, Y. Zhang, B. Fan, and H. Tian, "Mobility-aware load balancing scheme in hybrid VLC-LTE networks," IEEE Communications Letters, vol. 20, no. 11, pp. 2276-2279, Nov. 2016.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	K. Abdallah, et al., "A hybrid RF-VLC system for energy efficient wireless access," IEEE Trans. on Green Communications and Networking, vol. 2, no. 4, pp. 932-944, Dec. 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	A. Omar and R. Hingst, "Improving the retailer industry performance through RFID technology: a case study of wal-mart and metro group," Cases on Quality Initiatives for Organizational Longevity. IGI Global, pp. 196-220, 2018.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	S. Kapp, "802.11a: More bandwidth without the wire," IEEE Internet Computing, vol. 6, pp. 75-79, Jul./Aug. 2002.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	W. Francesc, S. Barrachina-Muñoz, C. Cano, I. Selinis, and B. Bellalta, "Spatial reuse in IEEE 802.11 ax WLANs," Computer Communications, vol. 170, pp. 65-83, Mar. 2021.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	Y. Perwej, "The next generation of wireless communication using Li-Fi (light fidelity) technology," J. of Computer Networks, vol. 4, no. 1, pp. 20-29, 2017.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	D. Tsonev, S. Videv, and H. Haas, " Towards a 100 Gb/s visible light wireless access network," Optics Express, vol. 23, no. 2, pp. 1627-1637, 26 Jan. 2015.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	-، وایمکس (WiMAX)،  https://noktestan.blogfa.com/post/22</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	W. Yunlu, et al., "Optimization of load balancing in hybrid LiFi/RF networks," IEEE Trans. on Communications, vol. 65, no. 4, pp. 1708-1720, Apr. 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	W. Xiping, C. Chen, and H. Haas, "Mobility management for hybrid Li-Fi and Wi-Fi networks in the presence of light-path blockage," in Proc. IEEE 88th Vehicular Technology Conf. (VTC-Fall), 5 pp. 1-5, Chicago, IL, USA, 27-28 Aug. 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	O. Mohanad, A. M. Salhab, S. A. Zummo, and M. S. Alouini, "Joint load balancing and power allocation for hybrid VLC/RF networks," in Proc. IEEE Global Communications Conf., GLOBECOM '17, 6 pp., Singapore, 4-8 Dec. 2017.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	Z. L. Jie, J. I. Hong, L. I. Xi, and Y. W. Tang, "Optimal resource allocation scheme for cognitive radio networks with relay selection based on game theory," The J. of China Universities of Posts and Telecommunications, vol. 19, no. 6, pp. 25-62, Dec. 2012.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	C. Tsao, Y. T. Wu, W. Liao, and J. C. Kuo, "Link duration of the random way point model in mobile ad hoc networks," in Proc. IEEE Wireless Communications and Networking Conf., WCNC'06, pp. 367-371, Las Vegas, NV, USA, 3-6Apr. 2006.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	A. Souri, A. Hussien, M. Hoseyninezhad, and M. Norouzi, "A systematic review of IoT communication strategies for an efficient smart environment," Trans. on Emerging Telecommunications Technologies, vol. 33, no. 3, Article ID:  e3736, Mar. 2019.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	S. Murugaveni and K. Mahalakshmi, "Optimal frequency reuse scheme based on cuckoo search algorithm in Li-Fi fifth-generation bidirectional communication," IET Communications, vol. 14, no. 15, pp. 2554-2563, Sept. 2020.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	E. Masoumeh, M. Ghobaei-Arani, and A. Shahidinejad, "Resource provisioning for IoT services in the fog computing environment: an autonomic approach," Computer Communications, vol. 161, pp. 109-131, Sept. 2020.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	L. Si-Phu, et al., "Enabling wireless power transfer and multiple antennas selection to IoT network relying on NOMA," Elektronika ir Elektrotechnika, vol. 26, no. 5, pp. 59-65, 2020.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	O. Mohanad, A. N. Salhab, S. A. Zummo, and M. S. Alouini, "Joint optimization of power allocation and 
load balancing for hybrid VLC/RF networks," J. of Optical Communications and Networking, vol. 10, no. 5, pp. 553-562, May 2018.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	A. Sudha, et al., "SDN-assisted efficient LTE-Wi-Fi aggregation in next generation IoT networks," Future Generation Computer Systems, vol. 107, pp. 898-908, Jun. 2020.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	Z. Wei, et al., "A self-adaptive AP selection algorithm based on multi-objective optimization for indoor Wi-Fi positioning," IEEE Internet of Things J., vol. 8, no. 3, pp. 1406-1416, 1 Feb. 2020.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	M. Soraya, et al., "Wireless system selection with spectrum database for IoT," in Proc. IEEE Int. Conf. on Information Networking, ICOIN'21, pp. 203-208, Jeju Island, South Korea, 13-16 Jan. 2021.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	P. Bhanu and J. Malhotra, "QAAs: QoS provisioned artificial intelligence framework for AP selection in next-generation wireless networks," Telecommunication Systems, vol. 76, pp. 233-249, Aug. 2021.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	R. Ahmad and A. Srivastava, "Optimized user association for indoor hybrid Li-Fi Wi-Fi network," in Proc. IEEE 21st Int. Conf. on Transparent Optical Networks, ICTON'19, 5 pp., Angers, France, 9-13 Jul. 2019.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	N. Omar, "IoT and RFID in supply chain: benefits, barriers and analysis," International Journal of Research Publication and Reviews, vol. 3, no 2., pp 334-358, Feb 2022.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	M. Ahrabi, et al., "Mobility aware load balancing using Kho-Kho optimization algorithm for hybrid Li-Fi and Wi-Fi network," Wireless Networks, vol. 30, pp. 5111-5125, 2024.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	M. L. Littman, "Markov games as a framework for multi-agent reinforcement learning," in Proc. of the Eleventh International Conference, Rutgers University, pp. 157-163, New Brunswick, NJ, USA, 10-13 Jul. 1994.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	W. Y. Liu, K. Yue, T. Y. Wu, and M. J. Wei, "An approach for multi-objective categorization based on the game theory and Markov process," Applied Soft Computing, vol. 11, no. 6, pp. 4087-4096, Sept. 2011.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	J. Hao, Y. Xue, M. Chandramohan, Y. Liu, and J. Sun, "An adaptive Markov strategy for effective network intrusion detection," in Proc. IEEE 27th Int. Conf. on Tools with Artificial Intelligence, ICTAI'15, pp. 1085-1092, Vietri sul Mare, Italy, 9-11 Nov. 2015.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	W. Xiaofeng and T. Sandholm, "Reinforcement learning to play an optimal Nash equilibrium in team Markov games," in Proc. Advances in Neural Information Processing Systems, NIPS'02, 2002.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	L. Cheng, D. Ma, and H. Zhang, "Optimal strategy selection for moving target defense based on Markov game," IEEE Access, vol. 5, pp. 156-169, 2017.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Development of an Enhanced Multi-Objective Algorithm for Optimal Quality-aware Web Service Composition in the Internet of Things</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Narges</given_name><surname>Zahiri</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Fereshte</given_name><surname>Dehghani</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Salman</given_name><surname>Goli</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>31</day><year>2024</year></publication_date><pages><first_page>217</first_page><last_page>225</last_page></pages><doi_data><doi>10.66224/ijece.42589.22.3.217</doi><resource>http://ijece.org/fa/Article/42589</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/42589</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/42589</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/42589</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/42589</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/42589</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/42589</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/42589</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	D. Prajapati and K. Bhargavi, "Old-age health risk prediction and maintenance via IoT devices and artificial neural network," in Proc. of the 6th Int. Conference on FICTA, pp. 373-381 Bhubaneswar, India, 14-16 Oct. 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	Y. Wu, W. Jin, J. Ren, and Z. Sun, "A multi-perspective architecture for high-speed train fault diagnosis based on variational mode decomposition and enhanced multi-scale structure," Applied Intelligence, vol. 49, no. 11, pp. 3923-3937, 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	P. Asghari, A. M. Rahmani, and H. H. S. Javadi, "Service composition approaches in IoT: a systematic review," J. of Network and Computer Applications, vol. 120, pp. 61-77, Oct. 2018.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	N. Kashyap, A. C. Kumari, and R. Chhikara, "Multi-objective optimization using NSGA II for service composition in IoT," Procedia Computer Science, vol. 167, pp. 1928-1933, 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	A. C. Kumari, K. Srinivas, and M. P. Gupta, "Multi-objective test suite minimisation using quantum-inspired multi-objective differential evolution algorithm," in Proc. IEEE Int. Conf. on Computational Intelligence and Computing Research, 7 pp., Coimbatore, India, 18-20 Dec. 2012.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. E. Khanouche, Y. Amirat, A. Chibani, M. Kerkar, and A. Yachir, "Energy-centered and QoS-aware services selection for Internet 
of Things," IEEE Trans. on Automation Science and Engineering, vol. 13, no. 3, pp. 1256-1269, Jul. 2016.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	Q. Li, R. Dou, F. Chen, and G. Nan, "A QoS-oriented web service composition approach based on multi-population genetic algorithm for Internet of Things," International J. of Computational Intelligence Systems, vol. 7, no. sup. 2, pp. 26-34, Jul. 2014.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	A. Souri, A. M. Rahmani, N. J. Navimipour, and R. Rezaei, "Formal modeling and verification of a service composition approach in 
the social customer relationship management system," Information Technology &amp; People, vol. 32, no. 6, pp. 1591-1607, Nov. 2019.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	L. J. Zhang, J. Zhang, and H. Cai, "Service-oriented architecture," In: Services Computing, pp. 89-113, Springer, Berlin, Heidelberg, 2007.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	A. Strunk, "QoS-aware service composition: a survey," in Proc. 8th IEEE European Conf. on Web Services, pp. 67-74, Ayia Napa, Cyprus, 1-3 Dec. 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	Z. Brahmi and M. M. Gammoudi, "QoS-aware automatic web service composition based on cooperative agents," in Proc. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 27-32, Hammamet, Tunisia, 17-20 Jun. 2013.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	P. Asghari, A. M. Rahmani, and H. H. S. Javadi, "Privacy-aware cloud service composition based on QoS optimization in Internet 
of Things," J. of Ambient Intelligence and Humanized Computing, vol. 13, no. 11, pp. 5295-5320, 2022.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	D. B. Claro, P. Albers, and J. K. Hao, "Selecting web services for optimal composition," in Proc. Second Int. Workshop on Semantic and Dynamic Web Processes, 14 pp., Orlando, FL, USA, 11-11 Jul. 2005.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	L. Li, P. Yang, L. Ou, Z. Zhang, and P. Cheng, "Genetic algorithm-based multi-objective optimisation for QoS-aware web services composition," in Proc. 4th Int. Conf. on Knowledge Science, Engineering and Management, pp. 549-554, Belfast, Northern Ireland, UK, 1-3 Sept. 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	Y. Yao and H. Chen, "A rule-based web service composition approach," in Proc. 6th Int. Conf. on Autonomic and Autonomous Systems, pp. 150-155, Cancun, Mexico, 7-13 Mar. 2010.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	K. Hashmi, A. Alhosban, E. Najmi, and Z. Malik, "Automated web service quality component negotiation using NSGA-2," in Proc. ACS Int. Conf. on Computer Systems and Applications, 6 pp., Ifrane, Morocco, 27-30 May 2013.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	Y. Yao and H. Chen, "QoS-aware service composition using NSGA-II1," in Proc. of the 2nd Int. Conf. on Interaction Sciences: Information Technology, Culture and Human, pp. 358-363, Seoul, Korea, 24-26, Nov. 2009.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	P. Sharifara, A. Yari, and M. M. R. Kashani, "An evolutionary algorithmic based web service composition with quality of service," in Proc. 7th Int. Symp. on Telecommunications, pp. 61-65, Tehran, Iran, 9-11 Sept. 2014.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	L. Liu and M. Zhang, "Multi-objective optimization model with AHP decision-making for cloud service composition," KSII Trans. on Internet and Information Systems, vol. 9, no. 9, pp. 3293-3311, Sept. 2015.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	L. B. Said, S. Bechikh, and K. Ghédira, "The r-dominance: a new dominance relation for interactive evolutionary multicriteria decision making," IEEE Trans. on Evolutionary Computation, vol. 14, no. 5, pp. 801-818, Oct. 2010.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. Molina, L. V. Santana, A. G. Hernández-Díaz, C. A. C. Coello, and R. Caballero, "g-dominance: reference point based dominance for multiobjective metaheuristics," European J. of Operational Research, vol. 197, no. 2, pp. 685-692, Sept. 2009.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	J. H. Zheng and Z. Z. Xie, "A study on how to use angle information to include decision maker's preferences," Acta Electonica Sinica, vol. 42, no. 11, pp. 2239-2246, 2014.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	T. Ecarot, D. Zeghlache, and C. Brandily, "Consumer-and-provider-oriented efficient IaaS resource allocation," in Proc. IEEE Int. Parallel and Distributed Processing Symp. Workshops, pp. 77-85, Lake Buena Vista, FL, USA. 29 May- 2 Jun. 2017.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	Y. Li, Y. Kou, and Z. Li, "An improved nondominated sorting genetic algorithm III method for solving multiobjective weapon-target assignment part i: the value of fighter combat," International J. of Aerospace Engineering, Article ID: 8302324, 23 pp., 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	P. Thangaraj and P. Balasubramanie, "Meta heuristic QoS based service composition for service computing," J. of Ambient Intelligence and Humanized Computing, vol. 12, no. 5, pp. 5619-5625, May 2021.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	F. Dahan, W. Binsaeedan, M. Altaf, M. S. Al-Asaly, and M. M. Hassan, "An efficient hybrid metaheuristic algorithm for QoS-aware cloud service composition problem," IEEE Access, vol. 9, pp. 95208-95217, 2021.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	B. Santoshkumar, K. Deb, and L. Chen, "Eliminating non-dominated sorting from NSGA-III," in Proc. 12th Int. Conf. on Evolutionary Multi-Criterion Optimization, pp. 71-85, Leiden, the Netherlands, Mar. 2023, 20-24 Mar. 2023.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	H. Nazif, M. Nassr, H. M. R. Al-Khafaji, N. Jafari Navimipour, and M. Unal, "A cloud service composition method using a fuzzy-based particle swarm optimization algorithm," Multimedia Tools and Applications, vol. 83, no. 19, pp. 1-28, Dec. 2023.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	Z. Brahmi and A. Selmi, "Coordinate system-based trust-aware web services composition in edge and cloud environment," The Computer J., vol. 66, no. 9, pp. 2102-2117, Sept. 2023.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Content Sharing Using D2D communications over 5G Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>meisam</given_name><surname>kargar</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Marzieh</given_name><surname>Varposhti</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Leila</given_name><surname>Samimi</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>31</day><year>2024</year></publication_date><pages><first_page>226</first_page><last_page>234</last_page></pages><doi_data><doi>10.66224/ijece.43039.22.3.226</doi><resource>http://ijece.org/fa/Article/43039</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/43039</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/43039</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/43039</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/43039</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/43039</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/43039</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/43039</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	Y. Liu, M. Peng, G. Shou, Y. Chen, and S. Chen, "Toward edge intelligence: multiaccess edge computing for 5G and Internet of Things," IEEE Internet of Things J., vol. 7, no. 8, pp. 6722-6747, Aug. 2020.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	X. Sun and N. Ansari, "Latency aware workload offloading in the cloudlet network," IEEE Communications Letters, vol. 21, no. 7, pp. 1481-1484, Jul. 2017.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Z. Hu, Z. Zheng, T. Wang, L. Song, and X. Li, "Caching as a service: small-cell caching mechanism design for service providers," IEEE Trans. on Wireless Communications, vol. 15, no. 10, pp. 6992-7004, Oct. 2016.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	D. Liu and C. Yang, "Caching at base stations with heterogeneous user demands and spatial locality," IEEE Trans. on Communications, vol. 67, no. 2, pp. 1554-1569, Feb. 2019.
[5]	M. Reiss-Mirzaei, M. Ghobaei-Arani, and L. Esmaeili, "A review on the edge caching mechanisms in the mobile edge computing: a social-aware perspective," Internet of Things, vol. 22, Article ID:  100690, Jul. 2023.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[6]	M. Waqas, et al., "A comprehensive survey on mobility-aware D2D communications: principles, practice and challenges," IEEE Communications Surveys &amp; Tutorials, vol. 22, no. 3, pp. 1863-1886, Third Quarter 2019.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[7]	J. Yao, T. Han, and N. Ansari, "On mobile edge caching," IEEE Communications Surveys &amp; Tutorials, vol. 21, no. 3, pp. 2525-2553, Third Quarter 2019.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	U. N. Kar and D. K. Sanyal, "An overview of device-to-device communication in cellular networks," ICT Express, vol. 4, no. 4, pp. 203-208, Dec. 2018.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	S. Jayakumar, "A review on resource allocation techniques in D2D communication for 5G and B5G technology," Peer-to-Peer Networking and Applications, vol. 14, pp. 243-269, 2021.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	R. Rathi and N. Gupta, "Game theoretic and non-game theoretic resource allocation approaches for D2D communication," Ain Shams Engineering J., vol. 12, no. 2, pp. 2385-2393, Jun. 2021.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	K. Pandey and R. Arya, "Lyapunov optimization machine learning resource allocation approach for uplink underlaid D2D communication in 5G networks," IET Communications, vol. 16, no. 5, pp. 476-484, Mar. 2022.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	M. H. Zafar, I. Khan, and M. O. Alassafi, "An efficient resource optimization scheme for D2D communication," Digital Communications and Networks, vol. 8, no. 6, pp. 1122-1129, Dec. 2022.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	I. Ioannou, V. Vassiliou, C. Christophorou, and A. Pitsillides, "Distributed artificial intelligence solution for D2D communication in 5G networks," IEEE Systems J., vol. 14, no. 3, pp. 4232-4241, Sept. 2020.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	W. Jiang, et al., "Joint computation offloading and resource allocation for D2D-assisted mobile edge computing," IEEE Trans. on Services Computing, vol. 16, no. 3, pp. 1949-1963, May/Jun. 2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	L. L. H. Xing, J. Xu, and A. Nallanathan, "Joint task assignment and resource allocation for D2D-enabled mobile-edge computing," IEEE Trans. on Communications, vol. 67, no. 6, pp. 4193-4207, Jun. 2019.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	W. Song, Y. Zhao, and W. Zhuang, "Stable device pairing for collaborative data dissemination with device-to-device communications," IEEE Internet of Things J., vol. 5, no. 2, pp. 1251-1264, Apr. 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	J. Jiang, S. Zhang, B. Li, and B. Li, "Maximized cellular traffic offloading via device-to-device content sharing," IEEE J. on Selected Areas in Communications, vol. 34, no. 1, pp. 82-91, Jan. 2015.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	D. Zhai, et al., "Joint user pairing, mode selection, and power control for D2D-capable cellular networks enhanced by nonorthogonal multiple access," IEEE Internet of Things J., vol. 6, no. 5, pp. 8919-8932, Oct. 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	N. Sawyer and D. B. Smith, "A nash stable cross-layer coalitional game for resource utilization in device-to-device communications," IEEE Trans. on Vehicular Technology, vol. 67, no. 9, pp. 8608-8622, Sept. 2018.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	N. Sawyer and D. B. Smith, "Flexible resource allocation in device-to-device communications using Stackelberg game theory," IEEE Trans. on Communications, vol. 67, no. 1, pp. 653-667, Jan. 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	Y. Li and A. S. Morse, "The power allocation game on a network: a paradox," IEEE/CAA J. of Automatica Sinica, vol. 5, no. 4, pp. 771-776, Jul. 2018.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	T. Fang, D. Wu, J. Chen, and D. Liu, "Cooperative task offloading and content delivery for heterogeneous demands: a matching game-theoretic approach," IEEE Trans. on Cognitive Communications and Networking, vol. 8, no. 2, pp. 1092-1103, Jun. 2022.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	T. Fang, D. Wu, J. Chen, C. Yue, and M. Wang, "Joint distributed cache and power control in haptic communications: a potential game approach," IEEE Internet of Things J., vol. 8, no. 18, pp. 14418-14430, 15 Sept. 2021.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	J. Zhang and J. Wang, "Deep adversarial reinforcement learning based incentive mechanism for content delivery in D2D-enabled mobile networks," Neurocomputing, vol. 544, Article ID:126258, Aug. 2023.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	B. Wang, Y. Sun, S. Li, and Q. Cao, "Hierarchical matching with peer effect for low-latency and high-reliable caching in social IoT," IEEE Internet of Things J., vol. 6, no. 1, pp. 1193-1209, Feb. 2018.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	D. Wu, L. Zhou, Y. Cai, H. C. Chao, and Y. Qian, "Physical-social-aware D2D content sharing networks: a provider-demander matching game," IEEE Trans. on Vehicular Technology, vol. 67, no. 8, pp. 7538-7549, Aug. 2018.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	S. A. Kazmi, et al., "Mode selection and resource allocation in device-to-device communications: a matching game approach," IEEE Trans. on Mobile Computing, vol. 16, no. 11, pp. 3126-3141, Nov. 2017.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	D. Wu, L. Zhou, and P. Lu, "Win-win-driven D2D content sharing," IEEE Internet of Things J., vol. 8, no. 9, pp. 7346-7359, 1 May 2021.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	L. Wang and H. Wu, "Fast pairing of device-to-device link underlay for spectrum sharing with cellular users," IEEE Communications Letters, vol. 18, no. 10, pp. 1803-1806, Oct. 2014.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	L. Wang, H. Wu, Y. Ding, W. Chen, and H. V. Poor, "Hypergraph-based wireless distributed storage optimization for cellular D2D underlays," IEEE J. on Selected Areas in Communications, vol. 34, no. 10, pp. 2650-2666, Oct. 2016.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	D. Wu, L. Zhou, and Y. Cai, "Social-aware rate based content sharing mode selection for D2D content sharing scenarios," IEEE Trans. on Multimedia, vol. 19, no. 11, pp. 2571-2582, Nov. 2017.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	D. Fudenberg and J. Tirole, Game Theory, MIT Press Books, vol. 1, 1991.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	D. Monderer and L. S. Shapley, "Potential games," Games and Economic Behavior, vol. 14, no. 1, pp. 124-143, May 1996.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	J. Nash, "Non-cooperative games," Annals of Mathematics, vol. 54, no.2 pp. 286-295, Sept. 1951.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	D. López-Pérez, et al., "A survey on 5G radio access network energy efficiency: massive MIMO, lean carrier design, sleep modes, and machine learning," IEEE Communications Surveys &amp; Tutorials, vol. 24, no. 1, pp. 653-697, First Quarter 2022.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	H. Holtkamp, G. Auer, S. Bazzi, and H. Haas, "Minimizing base station power consumption," IEEE J. on Selected Areas in Communications, vol. 32, no. 2, pp. 297-306, Feb. 2013.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	G. Auer, et al., "D2.3: energy efficiency analysis of the reference systems, areas of improvements and target breakdown," Earth, vol. 20, 68 pp., 2010.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	J. Huang, et al., "A close examination of performance and power characteristics of 4G LTE networks," in Proc. of the 10th Int. Conf. on Mobile systems, Applications, and Services, pp. 225-238, Low Wood Bay, UK, 25-29 Jun. 2012.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	M. Höyhtyä, O. Apilo, and M. Lasanen, "Review of latest advances in 3GPP standardization: D2D communication in 5G systems and its energy consumption models," Future Internet, vol. 10, no. 1, Article ID: 3, 18 pp., Jan. 2018.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Improving Offloading in IIoT with Awareness of Energy and the Age of Information by Reinforcement Genetic Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>seyed ebrahim</given_name><surname>dashti</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>fatemeh</given_name><surname>moayedi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>adel</given_name><surname>salemi</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>31</day><year>2024</year></publication_date><pages><first_page>183</first_page><last_page>196</last_page></pages><doi_data><doi>10.66224/ijece.43859.22.3.183</doi><resource>http://ijece.org/fa/Article/43859</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/43859</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/43859</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/43859</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/43859</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/43859</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/43859</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/43859</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	K. Peng, et al., "Intelligent computation offloading and resource allocation in IIoT with end-edge-cloud computing using NSGA-III," IEEE Trans. on Network Science and Engineering, vol. 10, no. 5, pp. 3032-3046, Sept./Oct. 2022.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Huang, H. Gao, S. Wan, and Y. Chen, "AoI-aware energy control and computation offloading for industrial IoT," Future Generation Computer Systems, vol. 139, pp. 29-37, Feb. 2023.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	H. Hu, T. Wang, and F. Feng, "Research on the deep deterministic policy algorithm based on the first-order inverted pendulum," Applied Sciences, vol. 13, no. 13, Article ID: 7594, 15 pp., 1 Jul. 2023.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	W. Huo, T. Zhao, F. Yang, and Y. Cheng, "An improved soft actor-critic based energy management strategy of fuel cell hybrid electric vehicle," J. of Energy Storage, pt. A, vol. 72, Article ID: 108243, Nov. 2023.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	R. Liu, C. Wang, A. Tang, Y. Zhang, and Q. Yu, "A twin delayed deep deterministic policy gradient-based energy management strategy for a battery-ultracapacitor electric vehicle considering driving condition recognition with learning vector quantization neural network," J. of Energy Storage, vol. 41, Article ID: 108147, Nov. 2023.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	M. Pan, Z. Li, and J. Qian, "Energy-efficient multiuser and multitask computation offloading optimization method," Intelligent and Converged Networks, vol. 4, no. 1, pp. 76-92, Mar. 2023.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	S. Tang, et al., "Computational intelligence and deep learning for next-generation edge-enabled industrial IoT," IEEE Trans. on Network Science and Engineering, vol. 10, no. 5, pp. 2881-2893, Sept./Oct. 2022.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	Z. Wang, Y. Ding, X. Jin, Y. Chen, and C. Gao, "Task offloading for edge computing in industrial Internet with joint data compression and security protection," The J. of Supercomputing, vol. 79, pp. 4291-4317, 2023.[1]	K. Peng, et al., "Intelligent computation offloading and resource allocation in IIoT with end-edge-cloud computing using NSGA-III," IEEE Trans. on Network Science and Engineering, vol. 10, no. 5, pp. 3032-3046, Sept./Oct. 2022.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[2]	J. Huang, H. Gao, S. Wan, and Y. Chen, "AoI-aware energy control and computation offloading for industrial IoT," Future Generation Computer Systems, vol. 139, pp. 29-37, Feb. 2023.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[3]	H. Hu, T. Wang, and F. Feng, "Research on the deep deterministic policy algorithm based on the first-order inverted pendulum," Applied Sciences, vol. 13, no. 13, Article ID: 7594, 15 pp., 1 Jul. 2023.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[4]	W. Huo, T. Zhao, F. Yang, and Y. Cheng, "An improved soft actor-critic based energy management strategy of fuel cell hybrid electric vehicle," J. of Energy Storage, pt. A, vol. 72, Article ID: 108243, Nov. 2023.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[5]	R. Liu, C. Wang, A. Tang, Y. Zhang, and Q. Yu, "A twin delayed deep deterministic policy gradient-based energy management strategy for a battery-ultracapacitor electric vehicle considering driving condition recognition with learning vector quantization neural network," J. of Energy Storage, vol. 41, Article ID: 108147, Nov. 2023.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[6]	M. Pan, Z. Li, and J. Qian, "Energy-efficient multiuser and multitask computation offloading optimization method," Intelligent and Converged Networks, vol. 4, no. 1, pp. 76-92, Mar. 2023.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[7]	S. Tang, et al., "Computational intelligence and deep learning for next-generation edge-enabled industrial IoT," IEEE Trans. on Network Science and Engineering, vol. 10, no. 5, pp. 2881-2893, Sept./Oct. 2022.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[8]	Z. Wang, Y. Ding, X. Jin, Y. Chen, and C. Gao, "Task offloading for edge computing in industrial Internet with joint data compression and security protection," The J. of Supercomputing, vol. 79, pp. 4291-4317, 2023.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[9]	J. Xu, B. Yang, Y. Liu, C. Chen, and X. Guan, "Joint task offloading and resource allocation for multihop Industrial Internet of Things," IEEE Internet of Things J., vol. 9, no. 21, pp. 22022-22033, 1 Nov. 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[10]	J. Gao, et al., "A task offloading algorithm for cloud-edge collaborative system based on Lyapunov optimization," Cluster Computing, vol. 26, no. 1, pp. 337-348, Feb. 2023.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[11]	س. ا. دشتی و ح. زارع، "افزایش کارایی الگوریتم تخلیه در محاسبات مه با کمک الگوریتم بهینه سازی ازدحام ذرات"، فصلنامه روشهای هوشمند در صنعت برق، سال 16، شماره 61، صص. 96-79، تابستان 1404.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[12]	S. E. Dashti and A. M. Rahmani, "Dynamic VMs placement for energy efficiency by PSO in cloud computing," J. of Experimental &amp; Theoretical Artificial Intelligence, vol. 28, no. 1-2, pp. 97-112, 2016.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[13]	M. Sharma, et al., "Enabling security for the Industrial Internet of Things using deep learning, blockchain, and coalitions," Trans. on Emerging Telecommunications Technologies, vol. 32, no. 7, Article ID: e4137, Jul. 2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[14]	D. Jiang, Y. Wang, Z. Lv, W. Wang, and H. Wang, "An energy-efficient networking approach in cloud services for IIoT networks," IEEE J. on Selected Areas in Communications, vol. 38, no. 5, pp. 928-941, May 2020.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[15]	H. Kurniawati, "Partially observable Markov decision processes and robotics," Annual Review of Control, Robotics, and Autonomous Systems, vol. 5, pp. 253-277, 2022.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[16]	Y. Song, et al., "RL-GA: a reinforcement learning-based genetic algorithm for electromagnetic detection satellite scheduling problem," Swarm and Evolutionary Computation, vol. 77, Article ID: 101236, Mar. 2023.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Automatic Test-Case Generation Based on Rule-Based Behavioral Specification</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ali</given_name><surname>Habibi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Ramtin</given_name><surname>Khosravi</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>31</day><year>2024</year></publication_date><pages><first_page>197</first_page><last_page>206</last_page></pages><doi_data><doi>10.66224/ijece.44039.22.3.197</doi><resource>http://ijece.org/fa/Article/44039</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/44039</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/44039</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/44039</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/44039</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/44039</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/44039</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/44039</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	J. Zander, Model-Based Testing of Real-Time Embedded Systems in the Automotive Domain, Ph.D Thesis, Technical University of Berlin, 2009.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	R. N. Charette, "This car runs on code," IEEE Spectrum, vol. 46, no. 3, p. 3, Feb. 2009.
[3]	J. Babic, M. Siniša, and I. Petrovic, "Introducing model-based techniques into development of real-time embedded applications," Automatika, vol. 52, no. 4, pp. 329-338, Oct. 2011.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[4]	A. Kramer and B. Legeard, 2019 Model-Based Testing User Survey: Results, Technical Report, Comité Français des Tests Logiciels, Jan. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[5]	W. Li, F. Le Gall, and N. Spaseski, "A survey on model-based testing tools for test case generation," in Proc. 4th Int. Conf. on Tools and Methods of Program Analysis, pp. 77-89, Moscow, Russia, 3-4 Mar. 2017.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[6]	A. Shaout and S. Pattela, "Model based approach for automotive embedded systems," in Proc. 22nd Int. Arab Conf. on Information Technology, 7 pp., Muscat, Oman, 21-23 Dec. 2021.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[7]	M. N. Zafar, W. Afzal, and E. Enoiu, "Evaluating system-level test generation for industrial software: a comparison between manual, combinatorial and model-based testing," in Proc. of the 3rd ACM/IEEE Int. Conf. on Automation of Software Test, pp. 148-159, Pittsburgh, PA, USA, 21-22 May 2022.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	V. Garousi, A. B. Keleş, Y. Balaman, Z. Özdemir Güler, and A. Arcuri, "Model-based testing in practice: an experience report from the web applications domain," J. of Systems and Software, vol. 180, Article ID: 111032, Oct. 2021.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	A. Zakeriyan, R. Khosravi, H. Safari, E. Khamespanah, and S. M. Shamsabadi, "Automated testing of an industrial stock market trading platform based on functional specification," Science of Computer Programming, vol. 225, Article ID: 102908, Jan. 2023.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	H. R. Asaadi, R. Khosravi, M. Mousavi, and N. Noroozi, "Towards model-based testing of electronic funds transfer systems," in Proc. Int. Conf. on Fundamentals of Software Engineering, pp. 253-267, Tehran, Iran, 20-22 Apr. 2011.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	J. Tretmans, "Test generation with inputs, outputs and repetitive quiescence," Software-Concepts and Tools, vol. 17, no. 3, pp. 103-120, 1996.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	M. van der Bijl, A. Resnik, and J. Tretmans, "Compositional testing with ioco," in Proc. Third Int. Workshop on Formal Approaches to Testing of Software, pp. 86-100, Montreal, Canada, 6-6 Oct. 2003.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	P. Daca, T. Henzinger, W. Krenn, and D. Nickovic, "Compositional specifications for ioco testing," in Proc. IEEE 7th Int. Conf. on Software Testing, Verification and Validationpp. 373-382, Cleveland, OH, USA, 31 Mar.-4 Apr. 2014.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	M. L. Mohd-Shafie, et al., "An EFSM-based test data generation approach in model-based testing," Computers, Materials &amp; Continua, vol. 71, no. 3, pp. 4337-4354, Jan. 2022.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	W. Huang, N. Krafczyk, and J. Peleska, "Exhaustive property-oriented model-based testing with symbolic finite state machines," Science of Computer Programming, vol. 231, Article ID: 103005, Aug. 2023.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	N. Van Kelecom, S. Silverans, and M. Dutre, "A traceable development and testing methodology for embedded software," in Proc. 12th Graz Symp. on Virtual Vehicle, 8 pp., Graz, Austria, 7-8 May 2019.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	M. L. Mohd-Shafie, W. M. N. Wan-Kadir, H. Lichter, M. Khatibsyarbini, and M. Adham-Isa, "Model-based test case generation and prioritization: a systematic literature review," Software and Systems Modeling, vol. 21, no. 2, pp. 751-753, Apr. 2022.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	R. Ferdous, C. Hung, F. Kifetew, D. Prandi, and A. Susi, "EvoMBT: evolutionary model-based testing," Science of Computer Programming, vol. 227, Article ID: 102942, Mar. 2023.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	U. C. Türker, R. M. Hierons, K. El-Fakih, M. R. Mousavi, and I. Y. Tyukin, "Accelerating finite state machine-based testing using reinforcement learning," IEEE Trans. on Software Engineering, vol. 50, no. 3, pp. 574-597, Mar. 2024.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	-, intel/fMBT: Free Model Based tool. URL: https://github.com/intel/fMBT, accessed: Dec. 2022.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	M. N. Zafar, et al., "Model-based testing in practice: an industrial case study using graphwalker," in Proc. 14th Innovations in Software Engineering Conf., 11 pp., Bhubaneswar, India, 25-27 Feb. 2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	V. Aravantinos, S. Voss, S. Mavin, F. Hölzl, and B. Schätz, "AutoFOCUS 3: Tooling Concepts for Seamless, Model-based Development of Embedded Systems", in Joint Proc. of the 8th Int. Workshop on Model-based Architecting of Cyber-physical and Embedded Systems and 1st Int. Workshop on UML Consistency Rules, pp. 19-26, Ottawa, Canada, 28-28 Sept. 2015.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	J. Tretmans and P. van de Laar, "Model-based testing with torXakis," in Proc. 30th Central European Conf. on Information and Intelligent Systems, pp. 247-258, Varaždin, Croatia, 2-4 Oct. 2019.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	P. Kaur and G. Gupta, "Automated model-based test path generation from UML diagrams via graph coverage tech-niques," International J. of Computer Science and Mobile Computing, vol. 2, no. 7, pp. 302-311, Jul. 2013.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	A. Huima, "Implementing conformiq qtronic," in Joint Proc. of 19th IFIP TC 6/WG 6.1 Int. Conf., TestCom 2007, and 7th Int. Workshop Testing of Software and Communicating Systems, 12 pp., Tallin, Estonia, 26-29 Jun. 2007.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	G. J. Holzmann, The Spin Model Checker: Primer and Reference Manual, Addison-Wesley, 2004.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	Rebeca Modeling Language, https://rebeca-lang.org, accessed Feb. 2024.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	Event-B, https://www.event-b.org, accessed Feb. 2024.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	M. Atif and J. F. Groote, Understanding Behaviour of Distributed Systems Using mCRL2, Springer, 2023.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	A. Mavin, P. Wilkinson, A. Harwood, and M. Novak, "Easy approach to requirements syntax (EARS)," in Proc. 17th IEEE Int. Requirements Engineering Conf., pp. 317-322, Atlanta, GA, USA, 31 Aug.-4 Sep. 2009.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	P. McMinn, "Search-based software testing: past, present and future," in ¬Proc. IEEE 4th Int. Conf. on Software Testing, Verification and Validation Workshops, pp. 153-163, Berlin, Germany, 21-25 Mar. 2011.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	M. Khari and P. Kumar, "An extensive evaluation of search-based software testing: a review," Soft Computing, vol. 23, pp. 1933-1946, Mar. 2019.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	P. Ammann and J. Offutt, Introduction to Software Testing, 2nd Ed., Cambridge University Press, 2016.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	K. Forsberg and H. Mooz, "The relationship of systems engineering to the project cycle," Engineering Management J., vol. 4, no. 3, pp. 36-43, 1992.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Multi-Agent Deep Reinforcement Learning-Based Decentralized Computation Offloading in Mobile Edge Computing  </title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Atousa</given_name><surname>Daghayeghi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohsen</given_name><surname>Nickray</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>31</day><year>2024</year></publication_date><pages><first_page>151</first_page><last_page>168</last_page></pages><doi_data><doi>10.66224/ijece.44275.22.3.151</doi><resource>http://ijece.org/fa/Article/44275</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/44275</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/44275</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/44275</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/44275</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/44275</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/44275</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/44275</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	N. Abbas, Y. Zhang, A. Taherkordi, and T. Skeie, "Mobile edge computing: a survey," IEEE Internet of Things J., vol. 5, no. 1, pp. 450-465, Feb. 2018.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	J. Wang, J. Pan, F. Esposito, P. Calyam, Z. Yang, and P. Mohapatra, "Edge cloud offloading algorithms: issues, methods, and perspectives," ACM Computing Surveys, vol. 52, no. 1, pp. 1-23, Feb. 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	Q. H. Nguyen and F. Dressler, "A smartphone perspective on computation offloading-a survey," Computer Communications, vol. 159, pp. 133-154, Jun. 2020.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	H. Lin, S. Zeadally, Z. Chen, H. Labiod, and L. Wang, "A survey on computation offloading modeling for edge computing," J. of Network and Computer Applications, vol. 169, Article ID: 102781, Nov. 2020.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	P. Mach and Z. Becvar, "Mobile edge computing: a survey on architecture and computation offloading," IEEE Communications Surveys &amp; Tutorials, vol. 19, no. 3, pp. 1628-1656, Mar. 2017.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	Y. Mao, C. You, J. Zhang, K. Huang, and K. B. Letaief, "A survey on mobile edge computing: the communication perspective," IEEE Communications Surveys &amp; Tutorials, vol. 19, no. 4, pp. 2322-2358, Aug. 2017.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	X. Wang, et al., "Wireless powered mobile edge computing networks: a survey," ACM Computing Surveys, vol. 55, no. 13s, Article ID: 263, 37 pp., Dec. 2023.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	U. M. Malik, M. A. Javed, S. Zeadally, and S. ul Islam, "Energy-efficient fog computing for 6G-enabled massive IoT: recent trends and future opportunities," IEEE Internet of Things J., vol. 9, no. 16, pp. 14572-14594, Aug. 2022.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	Q. Luo, S. Hu, C. Li, G. Li, and W. Shi, "Resource scheduling in edge computing: a survey," IEEE Communications Surveys &amp; Tutorials, vol. 23, no. 4, pp. 2131-2165, Aug. 2021.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	Y. Fan, J. Ge, S. Zhang, J. Wu, and B. Luo, "Decentralized scheduling for concurrent tasks in mobile edge computing via deep reinforcement learning," IEEE Trans. on Mobile Computing, vol. 23, no. 4, pp. 2765-2779, Apr. 2023.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	P. Gazori, D. Rahbari, and M. Nickray, "Saving time and cost on the scheduling of fog-based IoT applications using deep reinforcement learning approach," Future Generation Computer Systems, vol. 110, pp. 1098-1115, Sept. 2020.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	H. Djigal, J. Xu, L. Liu, and Y. Zhang, "Machine and deep learning for resource allocation in multi-access edge computing: a survey," IEEE Communications Surveys &amp; Tutorials, vol. 24, no. 4, pp. 2449-2494, Aug. 2022.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	A. Feriani and E. Hossain, "Single and multi-agent deep reinforcement learning for AI-enabled wireless networks: a tutorial," IEEE Communications Surveys &amp; Tutorials, vol. 23, no. 2, pp. 1226-1252, Mar. 2021.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	T. Li, K. Zhu, N. C. Luong, D. Niyato, Q. Wu, Y. Zhang, and B. Chen, "Applications of multi-agent reinforcement learning in future internet: a comprehensive survey," IEEE Communications Surveys &amp; Tutorials, vol. 24, no. 2, pp. 1240-1279, Mar. 2022.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	T. T. Nguyen, N. D. Nguyen, and S. Nahavandi, "Deep reinforcement learning for multiagent systems: a review of challenges, solutions, and applications," IEEE Trans. on Cybernetics, vol. 50, no. 9, pp. 3826-3839, Sept. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	K. Zhang, Z. Yang, and T. Başar, "Multi-agent reinforcement learning: a selective overview of theories and algorithms," In: Vamvoudakis, K.G., Wan, Y., Lewis, F.L., Cansever, D. (eds) Handbook of Reinforcement Learning and Control. Studies in Systems, Decision and Control, vol. 325, pp. 321-384, 2021.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	R. Lowe, et al., "Multi-agent actor-critic for mixed cooperative-competitive environments," in Proc. 31st Conf. on Neural Information Processing Systems, NIPS'17, 12 pp., Long Beach, CA, USA, 4-9 Dec. 2017.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	T. P. Lillicrap, et al., Continuous Control with Deep Reinforcement Learning, arXiv preprint arXiv: 1509.02971, 2015.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	S. Fujimoto, H. Hoof, and D. Meger, "Addressing function approximation error in actor-critic methods," in Proc. of the 35th Int. Conf. on Machine Learning, PMLR'80, pp. 1587-1596, Stockholm Sweden, 10-15 Jul. 2018.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	O. K. Shahryari, H. Pedram, V. Khajehvand, and M. D. TakhtFooladi, "Energy and task completion time trade-off for task offloading in fog-enabled IoT networks," Pervasive and Mobile Computing, vol. 74, Article ID: 101395, Jul. 2021.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	J. Bi, H. Yuan, S. Duanmu, M. Zhou, and A. Abusorrah, "Energy-optimized partial computation offloading in mobile-edge computing with genetic simulated-annealing-based particle swarm optimization," IEEE Internet of Things J., vol. 8, no. 5, pp. 3774-3785, Sept. 2020.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	S. Fu, F. Zhou, and R. Q. Hu, "Resource allocation in a relay-aided mobile edge computing system," IEEE Internet of Things J., vol. 9, no. 23, pp. 23659-23669, Jul. 2022.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	G. Yang, L. Hou, X. He, D. He, S. Chan, and M. Guizani, "Offloading time optimization via markov decision process in mobile-edge computing," IEEE Internet of Things J., vol. 8, no. 4, pp. 2483-2493, Oct. 2020.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	B. Cao, L. Zhang, Y. Li, D. Feng, and W. Cao, "Intelligent offloading in multi-access edge computing: a state-of-the-art review and framework," IEEE Communications Magazine, vol. 57, no. 3, pp. 56-62, Mar. 2019.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	Z. Liu, Y. Yang, K. Wang, Z. Shao, and J. Zhang, "POST: parallel offloading of splittable tasks in heterogeneous fog networks," IEEE Internet of Things J., vol. 7, no. 4, pp. 3170-3183, Jan. 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	M. Guo, Q. Li, Z. Peng, X. Liu, and D. Cui, "Energy harvesting computation offloading game towards minimizing delay for mobile edge computing," Computer Networks, vol. 204, Article ID: 108678, Feb. 2022.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[27]	T. Zhang and W. Chen, "Computation offloading in heterogeneous mobile edge computing with energy harvesting," IEEE Trans. on Green Communications and Networking, vol. 5, no. 1, pp. 552-565, Jan. 2021.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[28]	H. Teng, Z. Li, K. Cao, S. Long, S. Guo, and A. Liu, "Game theoretical task offloading for profit maximization in mobile edge computing," IEEE Trans. on Mobile Computing, vol. 22, no. 9, pp. 5313-5329, May 2022.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[29]	H. Wu, Z. Zhang, C. Guan, K. Wolter, and M. Xu, "Collaborate edge and cloud computing with distributed deep learning for smart city Internet of Things," IEEE Internet of Things J., vol. 7, no. 9, pp. 8099-8110, May 2020.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[30]	L. Ale, N. Zhang, X. Fang, X. Chen, S. Wu, and L. Li, "Delay-aware and energy-efficient computation offloading in mobile-edge computing using deep reinforcement learning," IEEE Trans. on Cognitive Communications and Networking, vol. 7, no. 3, pp. 881-892, Mar. 2021.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[31]	C. Li, J. Xia, F. Liu, D. Li, L. Fan, G. K. Karagiannidis, and A. Nallanathan, "Dynamic offloading for multiuser muti-CAP MEC networks: a deep reinforcement learning approach," IEEE Trans. on Vehicular Technology, vol. 70, no. 3, pp. 2922-2927, Feb. 2021.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[32]	L. Wang and G. Zhang, "Deep reinforcement learning based joint partial computation offloading and resource allocation in mobility-aware MEC system," China Communications, vol. 19, no. 8, pp. 85-99, Aug. 2022.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[33]	J. Niu, S. Zhang, K. Chi, G. Shen, and W. Gao, "Deep learning for online computation offloading and resource allocation in NOMA," Computer Networks, vol. 216, Article ID: 109238, Oct. 2022.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[34]	H. Lu, X. He, M. Du, X. Ruan, Y. Sun, and K. Wang, "Edge QoE: computation offloading with deep reinforcement learning for Internet of Things," IEEE Internet of Things J., vol. 7, no. 10, pp. 9255-9265, Mar. 2020.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[35]	V. D. Tuong, T. P. Truong, T. V. Nguyen, W. Noh, and S. Cho, "Partial computation offloading in NOMA-assisted mobile-edge computing systems using deep reinforcement learning," IEEE Internet of Things J., vol. 8, no. 17, pp. 13196-13208, Mar. 2021.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[36]	Z. Hu, J. Niu, T. Ren, B. Dai, Q. Li, M. Xu, and S. K. Das, "An efficient online computation offloading approach for large-scale mobile edge computing via deep reinforcement learning," IEEE Trans. on Services Computing, vol. 15, no. 2, pp. 669-683, Sept. 2021.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[37]	J. Chen and Z. Wu, "Dynamic computation offloading with energy harvesting devices: a graph-based deep reinforcement learning approach," IEEE Communications Letters, vol. 25, no. 9, pp. 2968-2972, Jul. 2021.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[38]	X. He, H. Lu, M. Du, Y. Mao, and K. Wang, "QoE-based task offloading with deep reinforcement learning in edge-enabled Internet of Vehicles," IEEE Trans. on Intelligent Transportation Systems, vol. 22, no. 4, pp. 2252-2261, Aug. 2020,</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[39]	Z. Chen and X. Wang, "Decentralized computation offloading for multi-user mobile edge computing: a deep reinforcement learning approach," EURASIP J. on Wireless Communications and Networking, vol. 2020, Article ID: 188, 21 pp., 2020.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[40]	J. Chen, H. Xing, Z. Xiao, L. Xu, and T. Tao, "A DRL agent for jointly optimizing computation offloading and resource allocation in MEC," IEEE Internet of Things J., vol. 8, no. 24, pp. 17508-17524, May 2021.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[41]	Z. Cheng, M. Min, M. Liwang, L. Huang, and Z. Gao, "Multiagent DDPG-based joint task partitioning and power control in fog computing networks," IEEE Internet of Things J., vol. 9, no. 1, pp. 104-116, Jun. 2021.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[42]	Z. Chen, L. Zhang, Y. Pei, C. Jiang, and L. Yin, "NOMA-based multi-user mobile edge computation offloading via cooperative multi-agent deep reinforcement learning," IEEE Trans. on Cognitive Communications and Networking, vol. 8, no. 1, pp. 350-364, Jun. 2021.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[43]	X. Huang, S. Leng, S. Maharjan, and Y. Zhang, "Multi-agent deep reinforcement learning for computation offloading and interference coordination in small cell networks," IEEE Trans. on Vehicular Technology, vol. 70, no. 9, pp. 9282-9293, Jul. 2021.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[44]	N. Zhao, Z. Ye, Y. Pei, Y. C. Liang, and D. Niyato, "Multi-agent deep reinforcement learning for task offloading in UAV-assisted mobile edge computing," IEEE Trans. on Wireless Communications, vol. 21, no. 9, pp. 6949-6960, Mar. 2022.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[45]	M. Chen, A. Guo, and C. Song, "Multi-agent deep reinforcement learning for collaborative task offloading in mobile edge computing networks," Digital Signal Processing, vol. 140, Article ID: 104127, Aug. 2023.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[46]	Q. Tang, R. Xie, F. R. Yu, T. Huang, and Y. Liu, "Decentralized computation offloading in IoT fog computing system with energy harvesting: a Dec-POMDP approach," IEEE Internet of Things J., vol. 7, no. 6, pp. 4898-4911, Feb. 2020.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[47]	S. Zeng, X. Huang, and D. Li, "Joint communication and computation cooperation in wireless-powered mobile-edge computing networks with NOMA," IEEE Internet of Things J., vol. 10, no. 11, pp. 9849-9862, Jan. 2023.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[48]	L. Huang, S. Bi, and Y. J. A. Zhang, "Deep reinforcement learning for online computation offloading in wireless powered mobile-edge computing networks," IEEE Trans. on Mobile Computing, vol. 19, no. 11, pp. 2581-2593, Jul. 2019.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[49]	S. Bi and Y. J. Zhang, "Computation rate maximization for wireless powered mobile-edge computing with binary computation offloading," IEEE Trans. on Wireless Communications, vol. 17, no. 6, pp. 4177-4190, Apr. 2018.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[50]	M. Min, et al., "Learning-based computation offloading for IoT devices with energy harvesting," IEEE Trans. on Vehicular Technology, vol. 68, no. 2, pp. 1930-1941, Jan. 2019.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[51]	D. Silver et al., "Deterministic policy gradient algorithms," in Proc. of the 31st Int. Conf. on Machine Learning, PMLR'32, pp. 387-395, Beijing, China, 22-24 Jun. 2014.</unstructured_citation></citation><citation key="ref52"><unstructured_citation>
[52]	F. Zhang, J. Li, and Z. Li, "A TD3-based multi-agent deep reinforcement learning method in mixed cooperation-competition environment," Neurocomputing, vol. 411, pp. 206-215, Oct. 2020.</unstructured_citation></citation><citation key="ref53"><unstructured_citation>
[53]	P. Sun, W. Zhou, and H. Li, "Attentive experience replay," in Proc. of the AAAI Conf. on Artificial Intelligence, vol. 34, no. 04, pp. 5900-5907, Apr. 2020.</unstructured_citation></citation><citation key="ref54"><unstructured_citation>
[54]	Y. Hou, L. Liu, Q. Wei, X. Xu, and C. Chen, "A novel DDPG method with prioritized experience replay," in Proc. IEEE Int. Conf. on Systems, Man, and Cybernetics, SMC'17, pp. 316-321, Banff, Canada, 5-8 Oct. 2017.</unstructured_citation></citation><citation key="ref55"><unstructured_citation>
[55]	T. Schaul, J. Quan, I. Antonoglou, and D. Silver, Prioritized Experience Replay, arXiv preprint arXiv:1511.05952, 2015.</unstructured_citation></citation><citation key="ref56"><unstructured_citation>
[56]	P. Cheridito, H. Kawaguchi, and M. Maejima, "Fractional ornstein-uhlenbeck processes," Electron. J. Probab, vol. 8, Article ID: 3, 14 pp., 2003.</unstructured_citation></citation><citation key="ref57"><unstructured_citation>
[57]	http://www.powercastco.com</unstructured_citation></citation><citation key="ref58"><unstructured_citation>
[58]	D. P. Kingma and J. Ba, Adam: A Method for Stochastic Optimization, arXiv preprint arXiv:1412.6980, 2014.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>A Survey on Controller Placement in Software-Defined Networks</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Mahdi</given_name><surname>Sarbazi</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Mohammad</given_name><surname>Fathi</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>31</day><year>2024</year></publication_date><pages><first_page>235</first_page><last_page>242</last_page></pages><doi_data><doi>10.66224/ijece.44474.22.3.235</doi><resource>http://ijece.org/fa/Article/44474</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/44474</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/44474</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/44474</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/44474</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/44474</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/44474</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/44474</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	A. A. Qaffas, et al., "Adaptive population-based multi-objective optimization in SDN controllers for cost optimization," Physical Communication, vol. 58, Article ID: 102006, Jun. 2023.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	B. P. R. Killi and S. V. Rao, "Controller placement in software defined networks: a comprehensive survey," Computer Networks, vol. 163, Article ID: 106883, Nov. 2019.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	N. McKeown, et al., "Openflow: enabling innovation in campus networks," SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, Apr. 2008.
[4]	POX, [Online]. Available at: http://www.noxrepo.org/pox/about-pox/.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[5]	Ryu., [Online]. Available at: http://osrg.github.com/ryu/.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[6]	Maestro, [Online]. Available at: http://code.google.com/p/maestro-platform.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[7]	Floodlight. [Online]. Available at: http://www.projectfloodlight.org/.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[8]	K. K. Yap, et al., "OpenRoads: empowering research in mobile networks," SIG-COMM Comput. Commun. Rev., vol. 40,  no. 1, pp. 125-126, Jan. 2010.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[9]	A. K. Nayak, A. Reimers, N. Feamster, and R. Clark, "Resonance: dynamic access control for enterprise networks," in Proc. 1st ACM Workshop on Research on Enterprise Networking, pp. 11-18, Barcelona Spain, 21-21 Aug. 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[10]	B. Heller, et al., "ElasticTree: saving energy in data center networks," in Proc. 7th USENIX Conf. on Networked Systems Design and Implementation, 17 pp., San Jose, CA, USA, 28-30 Apr. 2010.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[11]	P. S. Pisa, et al., "OpenFlow and Xen-based virtual network migration," in Proc. Communications: Wireless in Developing Countries and Networks of the Future, pp 170-181, Brisbane, Australia, 20-23 Sept., 2010.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[12]	O. K. M. Koerner, "Multiple service load-balancing with openflow," in Proc. IEEE 13th Int. Conf. on High Performance Switching and Routing, pp. 210-214, Belgrade, Serbia, 24-27 Jun. 2012.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[13]	D. Kotani, K. Suzuki, and H. Shimonishi, "A design and implementation of OpenFlow controller handling IP multicast with fast tree switching," in Proc. IEEE/IPSJ 12th Int. Symp. on Applications and the Internet, pp. 60-67, Izmir, Turkey, 16-20 Jul. 2012.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[14]	R. Sherwood, et al., FlowVisor: A Network Virtualization Layer, Technical Report, 2009.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[15]	G. Lu, R. Miao, Y. Xiong, and C. Guo, "Using CPU as a traffic co-processing unit in commodity switches," in Proc. 1st Workshop on Hot Topics in Software Defined Networks, pp. 31-36, Helsinki, Finland, 13-13 Aug. 2012.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[16]	H. S. Chiang, A. K. Sangaiah, M. Y. Chen, and J. Y. Liu, "A novel artificial bee colony optimization algorithm with SVM for bio-inspired software-defined networking," Int. J. Parallel. Prog., vol. 48, pp. 310-328, Apr. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[17]	S. Chattopadhyaya and A. K. Shahoo, "Software defined networks: current problems and future solutions," in Materials Today: Proceedings, vol. 49, no. 8, pp. 2989-2993, 2020.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[18]	B. Heller, R. Sherwood, and N. McKeown, "The controller placement problem," in Proc. of the 1st Workshop on Hot Topics in Software Defined Networks, pp. 473-478, Helsinki, Finland, 13-13 Aug. 2012.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[19]	B. P. R. Killi and S. V. Rao, "Capacitated next controller placement in software defined networks," IEEE Trans. Netw. Serv. Manag., vol. 14, no. 3, pp. 514-527, Jun. 2017.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[20]	A. Sallahi and M. St-Hilaire, "Optimal model for the controller placement problem in software defined networks," IEEE Commun. Lett, vol. 19, no. 1, pp. 30-33, Jan. 2015.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[21]	T. Das, V. Sridharan, and M. Gurusamy, "A survey on controller placement in SDN," IEEE Communications Surveys &amp; Tutorials, vol. 22, no. 1, pp. 472-503, Aug. 2019.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[22]	M.A Gunavathie, S. Jacophine Susmi, S. S. Sivasankari, and M. Venkatesh, " Exploring the challenge of controller placement in software-defined networking: a comprehensive review," in Proc. 2nd Int. Conf. on Automation, Computing and Renewable Systems, pp. 1950-1955, Pudukkottai, India, 11-13 Dec. 2023.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[23]	B. Isong, R. R. S. Molose, A. M. Abu-Mahfouz, and N. Dladlu, "Comprehensive review of SDN controller placement strategies," IEEE Access, vol. 14, pp. 170070-170092, 2020.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[24]	A. Shirmarz and A. Ghaffari, "Taxonomy of controller placement problem (CPP) optimization in software defined network (SDN): a survey," J. of Ambient Intelligence and Humanized Computing, vol. 12, no. 12, pp. 10473-10498, Dec. 2021.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[25]	A. Kumari and A. S. Sairam, "Controller placement problem in software‐defined networking: a survey," Networks, vol. 78, no. 2, pp. 195-223, Sep. 2021.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[26]	B. Sapkota, B. R. Dawadi, and S. R. Joshi, "Controller placement problem during SDN deployment in the ISP/Telco networks: a survey," Engineering Reports, vol. 6, no. 2, Article ID: e12801, Feb. 2024.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[27]	G. Schütz and J. A. Martins, "A comprehensive approach for optimizing controller placement in software-defined networks," Computer Communications, vol. 159, pp. 198-205, Jun. 2020.</unstructured_citation></citation><citation key="ref27"><unstructured_citation>
[28]	M. Guo and P. Bhattacharya, "Controller placement for improving resilience of software-defined networks," in Proc. 4th Int. Conf. on Networking and Distributed Computing, pp. 23-27, Los Angeles, CA, USA, 21-24 Dec. 2013.</unstructured_citation></citation><citation key="ref28"><unstructured_citation>
[29]	D. Hock, et al., "Pareto-optimal resilient controller placement in SDN-based core networks," in Proc. of the 25th In. Teletraffic Congress, 9 pp., Shanghai, China, 10-12 Sept. 2013.</unstructured_citation></citation><citation key="ref29"><unstructured_citation>
[30]	Z. Yang and K. L. Yeung, "Minimum weight controller tree design in SDN," Computer Networks, vol. 165, Article ID: 106949, Dec. 2019.</unstructured_citation></citation><citation key="ref30"><unstructured_citation>
[31]	A. Mishra, N. Gupta, and B. B. Gupta, "Defense mechanisms against DDoS attack based on entropy in SDN-cloud using pox controller," Telecommun Syst, vol. 77, pp. 47-62, 2021.</unstructured_citation></citation><citation key="ref31"><unstructured_citation>
[32]	Y. N. Hu, W. D. Wang, X. Y. Gong, X. R. Que, and S. D. Cheng, "On the placement of controllers in software-defined networks," J. China Univ Posts Telecommun, vol. 19, sup. 2, pp. 92-171, Oct. 2012.</unstructured_citation></citation><citation key="ref32"><unstructured_citation>
[33]	Y. Hu, W. Wang, X. Gong, X. Que, and S. Cheng, "On reliability-optimized controller placement for software-defined networks," China Commun., vol. 11, no. 2, pp. 38-54, Feb. 2014.</unstructured_citation></citation><citation key="ref33"><unstructured_citation>
[34]	S. Yang, L. Cui, Z. Chen, and W. Xiao, "An efficient approach to robust SDN controller placement for security," IEEE Trans. on Network and Service Management, vol. 17, no. 3, pp. 1669-1682, May 2020.</unstructured_citation></citation><citation key="ref34"><unstructured_citation>
[35]	G. Ramya and R. Manoharan, "Traffic-aware dynamic controller placement in SDN using NFV," The J. of Supercomputing, vol. 79, no. 2, pp. 2082-2107, Feb. 2023.</unstructured_citation></citation><citation key="ref35"><unstructured_citation>
[36]	A. Naseri, M. Ahmadi, and L. PourKarimi, "Placement of SDN controllers based on network setup cost and latency of control packets," Computer Communications, vol. 208, pp. 15-28, Aug. 2023.</unstructured_citation></citation><citation key="ref36"><unstructured_citation>
[37]	S. Lange, S. Gebert, T. Zinner, P. Tran-Gia, D. Hock, M. Jarschel, and M. Hoffmann, "Heuristic approaches to the controller placement problem in large scale SDN network," IEEE Trans. Netw. Serv. Manag., vol. 12, no. 1, pp. 4-17, Feb. 2015.</unstructured_citation></citation><citation key="ref37"><unstructured_citation>
[38]	L. Müller, R. R. Oliveira, M. C. Luizelli, L. P. Gaspary, and M. P. Barcellos, "Survivor: an enhanced controller placement strategy for improving SDN survivability," in Proc. IEEE Global Communications Conf., pp. 1909-1915, Austin, TX, USA, 8-12 Dec. 2014.</unstructured_citation></citation><citation key="ref38"><unstructured_citation>
[39]	A Farshin and S. Sharifian, "A chaotic grey wolf controller allocator for software dependent mobile network (SDMN) for 5th generation 
of cloud-based cellular systems (5G)," Computer Communications, vol. 108, pp. 94-108, Aug. 2017.</unstructured_citation></citation><citation key="ref39"><unstructured_citation>
[40]	P. Vizarreta, et al., "Assessing the maturity of SDN controllers with software reliability growth models," IEEE Trans. on Network and Service Management, vol. 15, no. 3, pp. 1090-1104, Sept. 2018.</unstructured_citation></citation><citation key="ref40"><unstructured_citation>
[41]	F. Li and X. Xu, "A discrete cuckoo search algorithm for the controller placement problem in software defined networks," in Proc. IEEE 9th Annual Information Technology, Electronics and Mobilelectronics and Mobile Communication Conf., pp. 292-296, Vancouver, Canada, 1-3 Nov. 2018.</unstructured_citation></citation><citation key="ref41"><unstructured_citation>
[42]	A. A. Ateya, et al., "Chaotic salp swarm algorithm for SDN multi-controller networks," Engineering Science and Technology, an International J., vol. 22, no. 4, pp. 1001-1012, Aug. 2019.</unstructured_citation></citation><citation key="ref42"><unstructured_citation>
[43]	A. K. Tran, M. J. Piran, and C. Pham, "SDN controller placement in IoT networks: an optimized submodularity-based approach," Sensors, vol. 19, no. 24, pp. pp. 1-12, Dec. 2019.</unstructured_citation></citation><citation key="ref43"><unstructured_citation>
[44]	A. K. Singh, S. Maurya, N. Kumar, and S. Srivastava, "Heuristic approaches for the reliable SDN controller placement problem," Trans. on Emerging Telecommunications Technologies, vol. 31, no. 2, Article ID: e3761, Feb. 2019.</unstructured_citation></citation><citation key="ref44"><unstructured_citation>
[45]	G. Ramya and R. Manoharan, "Enhanced optimal placements of multicontrollers in SDN," J. of Ambient Intelligence and Humanized Computing, vol. 12, pp. 8187-8204, 2020.</unstructured_citation></citation><citation key="ref45"><unstructured_citation>
[46]	K. Choumas, D. Giatsios, P. Flegkas, and T. Korakis, "SDN controller placement and switch assignment for low power IoT," Electronics, vol. 9, no. 2, Article ID: 325, 2020.</unstructured_citation></citation><citation key="ref46"><unstructured_citation>
[47]	B. R. Killi and S. V. Rao, "Poly-stable matching based scalable controller placement with balancing constraints in SDN," Computer Communications, vol. 154, pp. 82-91, Mar. 2020.</unstructured_citation></citation><citation key="ref47"><unstructured_citation>
[48]	S. Torkamani-Azar and M. Jahanshahi, "A new GSO based method for SDN controller placement," Computer Communications, vol. 163, pp. 91-108, Nov. 2020.</unstructured_citation></citation><citation key="ref48"><unstructured_citation>
[49]	S. Taghavi Motlagh, A. Ibrahim, S. Shah Heydari, K. El-Khatib., "Multi-objective optimization for managing disruption risk in SDN," in Proc. 20th International Conference on the Design of Reliable Communication Networks, 8 pp., Montreal, Canada. 6-9 May 2024.</unstructured_citation></citation><citation key="ref49"><unstructured_citation>
[50]	M. Abedini Bagha, K. Majidzadeh, M. Masdari, and Y. Farhang, "Improving delay in SDNs by metaheuristic controller placement," International J. of Industrial Electronics Control &amp; Optimization, vol. 5, no. 3, pp. 286-296, Dec. 2022.</unstructured_citation></citation><citation key="ref50"><unstructured_citation>
[51]	M. Khojand, K. Majidzadeh, M. Masdari, and Y. Farhang, "Controller placement in SDN using game theory and a discrete hybrid metaheuristic algorithm," the J. of Supercomputing, vol. 80, no. 5, pp. 6552-6600, Mar. 2024.</unstructured_citation></citation><citation key="ref51"><unstructured_citation>
[52]	G. D. Singh, et al., "A novel framework for capacitated SDN controller placement: balancing latency and reliability with PSO algorithm," Alexandria Engineering, vol. 78, pp. 77-79, Jan. 2024.</unstructured_citation></citation></citation_list></journal_article><journal_article publication_type="full_text"><titles><title>Sensors Positioning in IoT-Based Smart Parking Systems with Grasshopper Optimization Algorithm</title></titles><contributors><person_name contributor_role="author" sequence="first"><given_name>Ahmad</given_name><surname>Baratian</surname></person_name><person_name contributor_role="author" sequence="additional"><given_name>Esmaeil</given_name><surname>Kheirkhah</surname></person_name></contributors><publication_date media_type="online"><month>12</month><day>31</day><year>2024</year></publication_date><pages><first_page>207</first_page><last_page>216</last_page></pages><doi_data><doi>10.66224/ijece.45070.22.3.207</doi><resource>http://ijece.org/fa/Article/45070</resource><collection property="crawler-based"><item crawler="iParadigms"><resource>http://ijece.org/fa/Article/Download/45070</resource></item><item crawler="google"><resource>http://ijece.org/fa/Article/Download/45070</resource></item><item crawler="msn"><resource>http://ijece.org/fa/Article/Download/45070</resource></item><item crawler="altavista"><resource>http://ijece.org/fa/Article/Download/45070</resource></item><item crawler="yahoo"><resource>http://ijece.org/fa/Article/Download/45070</resource></item><item crawler="scirus"><resource>http://ijece.org/fa/Article/Download/45070</resource></item></collection><collection property="text-mining"><item><resource mime_type="application/pdf">http://ijece.org/fa/Article/Download/45070</resource></item></collection></doi_data><citation_list><citation key="ref1"><unstructured_citation>[1]	P. Sadhukhan, "An IoT-based E-parking system for smart cities," in Proc. Int. Conf. on Advances in Computing, Communications and Informatics, pp. 1062-1066, Udupi, India, 13-16 Sept. 2017.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>
[2]	M. Ramasamy, S. G. Solanki, E. Natarajan, and T. M. Keat, "IoT based smart parking system for large parking lot," in Proc. IEEE 4th Int. Symp. in Robotics and Manufacturing Automation, 4 pp., Perambalur, India, 10-12 Dec. 2018.</unstructured_citation></citation><citation key="ref3"><unstructured_citation>
[3]	A. M. Said, A. E. Kamal, and H. Afifi, "An intelligent parking sharing system for green and smart cities based IoT," Computer Communications, vol. 172, pp. 10-18, Apr. 2021.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>
[4]	Y. Geng and C. G. Cassandras, "A new 'smart parking' system infrastructure and implementation," Procedia-Social Behav. Sci., vol. 54, pp. 1278-1287, Oct. 2012.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>
[5]	Y. He, L. R. Tang, X. J. Liu, and S. Y. Ji, "Decision theory-based localization algorithm in smart park," Wireless Pers. Commun., vol. 100, no. 3, pp. 1023-1046, 2018.</unstructured_citation></citation><citation key="ref6"><unstructured_citation>
[6]	A. Payal, C. S. Rai, and B. V. R. Reddy, "Artificial neural networks for developing localization framework in wireless sensor networks," in Proc. Int. Conf. on Data Mining and Intelligent Computing, 6 pp., Delhi, India, 5-6 Sept. 2014.</unstructured_citation></citation><citation key="ref7"><unstructured_citation>
[7]	P. H. Namin and M. A. Tinati, "Node localization using particle swarm optimization," in Proc. Int. Conf. on Intelligent Sensors, Sensor Networks and Information Processing, pp. 288-293, Adelaide, Australia, 6-9 Dec. 2011.</unstructured_citation></citation><citation key="ref8"><unstructured_citation>
[8]	S. Goyal and M. S. Patterh, "Modified bat algorithm for localization of wireless sensor network," Wireless Pers. Commun., vol. 86, no. 2, pp. 657-670, 2016.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>
[9]	S. Mumtaz, et al., "Massive Internet of Things for industrial applications: addressing wireless IIoT connectivity challenges and ecosystem fragmentation," IEEE Ind. Electron. Mag., vol. 11, no. 1, pp. 28-33, Mar. 2017.</unstructured_citation></citation><citation key="ref10"><unstructured_citation>
[10]	S. Sarem, S. Mirjalili, and A. Lewis, "Grasshopper optimisation algorithm: theory and application," Advances in Engineering Software, vol. 105, pp. 30-47, Mar. 2017.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>
[11]	س. م. ر. امامی میبدی، ب. تارویردی‌زاده، ع. هادی و معمارزاده طهران، "ارایه روشی نوین جهت مکان‌یابی اشیاء متحرک با استفاده از آنتن‌های مونوپل و ماتریس پراکندگی بمنظور افزایش کیفیت خدمت در هوشمندسازی پارکنیگ‌ها،" نشریه علمی پژوهشی مهندسی و مدیریت کیفیت، سال 7، شماره 4، صص. 286-271، اسفند 1396.‎ </unstructured_citation></citation><citation key="ref12"><unstructured_citation>
[12]	ج. جنتی و د. نظرپور،" مدیریت انرژی پارکینگ هوشمند خودروهای برقی در یک ریزشبکه با در نظر گرفتن اثرات برنامه پاسخ‌گویی بار،" مجله مهندسی برق دانشگاه تبریز، سال 47، شماره 2، صص. 467-455، شهریور 1396.‎</unstructured_citation></citation><citation key="ref13"><unstructured_citation>
[13]	M. H. Amini, M. P. Moghaddam, and O. Karabasoglu, "Simultaneous allocation of electric vehicles' parking lots and distributed renewable resources in smart power distribution networks," Sustainable Cities and Society, vol. 28, pp. 332-342, Jan. 2017.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>
[14]	ف. باشتنی، ر. احدی و ب. رضائی خبوشان،" زمان‌بندی شارژ خودروهای برقی در پارکینگ هوشمند با در نظر گرفتن رضایت صاحبان خودرو‌ها،" مجموعه مقالات دوازدهمین کنفرانس بین¬ المللی انجمن ایرانی تحقیق در عملیات، صص. 15-9، بابلسر، ایران، 12-11 اردیبهشت 1398.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>
[15]	S. R. Rizvi, S. Zehra, and S. Olariu, "Aspire: an agent-oriented smart parking recommendation system for smart cities," IEEE Intelligent Transportation Systems Magazine, vol. 11, no. 4, pp. 48-61, Winter 2018.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>
[16]	س. زینلیان و ن. فرزانه بهالگردی، "یک روش پیشنهاددهنده جای پارک خالی کنار خیابان چند معیاره مبتنی بر الگوریتم PSO ،" نشریه مهندسی برق و الکترونیک ایران، سال 18، شماره 3، صص. 26-18، پائیز 1400.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>
[17]	S. Djahel and F. Nait-Abdesselam, "Towards a smart parking management system for smart cities," in Proc. IEEE Int. Smart Cities Conf., pp. 542-546, Casablanca, Morocco, 14-17 Oct. 2019.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>
[18]	A. Athira, S. Lekshmi, P. Vijayan, and B. Kurian, "Smart parking system based on optical character recognition," in Proc. 3rd Int. Conf. on Trends in Electronics and Informatics, pp. 1184-1188, Tirunelveli, India, 23-25 Apr. 2019.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>
[19]	C. Tang, X. Wei, C. Zhu, W. Chen, and J. J. P. C. Rodrigues, "Towards smart parking based on fog computing," IEEE Access, vol. 6, pp. 70172-70185, 2019.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>
[20]	M. R. M. Veeramanickam, et al., "IoT based smart parking model using Arduino UNO with FCFS priority scheduling," Measurement: Sensors, vol. 24, Article ID: 100524, Dec. 2022.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>
[21]	G. Rocco, C. Pipino, and C. Pagano, "An overview of urban mobility: revolutionizing with innovative smart parking systems," Sustainability, vol. 15, Article ID: 13174, 17 pp., 2023.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>
[22]	T. Anusha and M. Pushpalatha, "Efficient communication model for a smart parking system with multiple data consumers," Smart Cities, vol. 5, no. 4, pp. 1536-1553, 2022.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>
[23]	A. Raj and S. D. Shetty, "Smart parking systems technologies, tools, and challenges for implementing in a smart city environment: a survey based on IoT &amp; ML perspective," Int. J. Mach. Learn. &amp; Cyber., vol. 15, pp. 2673-2694, 2024.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>
[24]	E. Karbab, D. Djenouri, S. Boulkaboul, and A. Bagula, "Car park management with networked wireless sensors and active RFID," in Proc. IEEE Int. Conf. Electro/Inf. Technol., pp. 373-378, DeKalb, IL, USA, 21-23 May 2015.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>
[25]	S. N. Ghorpade, M. Zennaro, and B. S. Chaudhari, "GWO model for optimal localization of IoT-enabled sensor nodes in smart parking systems," IEEE Trans. on Intelligent Transportation Systems, vol. 22, no. 2, pp. 1217-1224, Feb. 2020.</unstructured_citation></citation><citation key="ref26"><unstructured_citation>
[26]	ب. شایسته، و حکمی، س. ا. مصطفوی و ا. اکبری ازیرانی،" ارائه روشی نوین برای محاسبه اعتماد در کاربردهای اینترنت اشیاء،" مجله مهندسی برق دانشگاه تبریز، سال 50، شماره 2، صص. 455-437، شهریور 1399.‎</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>