2023
DOI: 10.1007/s11276-023-03257-0
|View full text |Cite
|
Sign up to set email alerts
|

An adaptive backoff selection scheme based on Q-learning for CSMA/CA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Their approach integrates Q-learning to effectively identify the optimal backoff values, thereby substantially reducing the frequency of collisions. In addition, Zheng et al [17] suggested a Qlearning scheme modification to improve the performance of the MAC protocol by adjusting the learning rate and exploring different 𝜀-greedy exploration rates.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Their approach integrates Q-learning to effectively identify the optimal backoff values, thereby substantially reducing the frequency of collisions. In addition, Zheng et al [17] suggested a Qlearning scheme modification to improve the performance of the MAC protocol by adjusting the learning rate and exploring different 𝜀-greedy exploration rates.…”
Section: Related Workmentioning
confidence: 99%
“…In the field of machine learning (ML), reinforcement learning (RL) [11] is particularly influential for tasks like choosing optimal CW values. Key researchers in this field, i.e., Kim & Hwang [12], Zerguine et al [13], Kwon et al [14], Pan et al [15], Lee et al [16], and Zheng et al [17] have leveraged the Q-learning algorithm, as a core of the fundamental RL mechanism, to determine the appropriate CW value according to the consecutive successes or collisions transmitted packets. Nevertheless, Q-learning has the drawback which expensive for the agent, whereas in the earlier stages of the learning phase, each pair of states and actions must be exhaustively explored to converge towards the optimal policy.…”
Section: Introductionmentioning
confidence: 99%
“…Zheng, Z. et al [29] When data are passed through an intermediary, there is always the risk that it could be intercepted or that a third party could gain access to it. When devices communicate directly with each other, that risk is eliminated.…”
Section: Alani T O Et Al [19]mentioning
confidence: 99%
“…This can be especially helpful when dealing with large amounts of data, or when time is of the essence. Zheng, Z. et al [29] expressed that an advantage of device-to-device communication is that it can be more secure than other methods. When data are passed through an intermediary, there is always the risk that it could be intercepted or that a third party could gain access to it.…”
Section: Introductionmentioning
confidence: 99%