2022
DOI: 10.1109/jiot.2021.3112211
|View full text |Cite
|
Sign up to set email alerts
|

Sleep–Wake Sensor Scheduling for Minimizing AoI-Penalty in Industrial Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(2 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…A genetic algorithm was proposed to solve the decision-making process for flight path planning of UAVs in [21]. The author in [22] analyzed scheduling in a sleep-wake sensor network and proposed a max-weight-based scheduling policy to achieve the asymptotically optimal AoI lower limit while reducing energy consumption. As a promising method, deep reinforcement learning has been applied to network resource management many times.…”
Section: Related Workmentioning
confidence: 99%
“…A genetic algorithm was proposed to solve the decision-making process for flight path planning of UAVs in [21]. The author in [22] analyzed scheduling in a sleep-wake sensor network and proposed a max-weight-based scheduling policy to achieve the asymptotically optimal AoI lower limit while reducing energy consumption. As a promising method, deep reinforcement learning has been applied to network resource management many times.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, information timeliness has become a novel and very critical metric for the newly emerged status update applications, including hazard monitoring, autonomous driving, and AR services, because outdated information may result in serious impacts, such as production accidents and economic loss or even casualties. In order to enhance the information timeliness for IIoT, age of information (AoI), which is defined as the time interval from the time a data packet is generated to the current time, has been presented and widely studied in various systems network scenarios [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15].…”
Section: Introductionmentioning
confidence: 99%