<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Simulation of a Telecommunications Channel with UAV-Based Q-Learning Network</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Damodarin Udhaya Mugil</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Cristian Valenti</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrea Villani</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Electronic Engineering, Tor Vergata University of Rome</institution>
          ,
          <addr-line>00133 Rome</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>26</fpage>
      <lpage>31</lpage>
      <abstract>
        <p>In this paper , we present a simulator that replicates a communication channel between terrestrial users using low-altitude airborne mobile stations (Unmanned Aerial Vehicles). Through a Q-Learning network, the UAVs determine the optimal position to occupy to improve transmission between users and converge towards these optimal states. This system lends itself to various applications, including the restoration of the telephone network in areas without coverage or afected by natural disasters, and the establishment of mobile radio bridges to connect remotely controlled vehicles in conflict scenarios, making communications dificult to intercept. The results presented were obtained by tailoring the model in diferent scenarios, according to a realistic concentration and distribution of buildings in the four analyzed environments</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Q-Learning</kwd>
        <kwd>UAV communications</kwd>
        <kwd>telecommunications</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>parameters of wireless communication, including (i)
connection throughput and (ii) number of failed connections.</p>
      <p>
        Recent developments in international conflicts have It is worth noting that there are already studies
focusshown how the use of drones has influenced the course ing on modeling a telecommunications system with
lowof the most significant war scenarios. Even in this con- altitude mobile repeaters. These systems aim to find the
text, machine learning is finding increasing applications, optimal altitude of the aircraft given a fixed transmission
enhancing the capabilities and precision of drone opera- power [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], optimize the ratio between power eficiency
tions [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7">1, 2, 3, 4, 5, 6, 7</xref>
        ]. and throughput [17], or estimate the maximum ground
      </p>
      <p>
        This article proposes an application of UAVs in the coverage area [
        <xref ref-type="bibr" rid="ref4">4, 18</xref>
        ].
ifeld of communications. In particular, a model for radio
communication between users through mobile stations
has been developed. 2. Materials and methods
      </p>
      <p>
        In accordance with recent studies, future
communicatio networks are anticipated to integrate non-terrestrial 2.1. Parameters and their description
networks, including Low Earth Orbit (LEO) satellites and The descriptive parameters of the simulated model are
High Altitude Platform Systems (HAPS) utilizing Un- divided into the following three macro groups:
manned Aerial Vehicles (UAVs) [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref8 ref9">8, 9, 10, 11, 12</xref>
        ]
      </p>
      <p>Among the studies present in the literature, various
systems for managing the movement of UAVs have been
experimented with: centralized and distributed systems.</p>
      <p>
        The centralized system consists of a terrestrial radio
station for estimating channel parameters and
controlling the telemetry signals of the UAVs [
        <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
        ] while
the distributed system is characterized by independent
drones that autonomously estimate the channel
parameters [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. This study focuses on the modeling and
simulation of a centralized system. To achieve
maximum telephone coverage, the system implements a
QLearning network for selecting the optimal position of
the drones. The efectiveness of using air-to-ground
telecommunications systems with UAV-type transmitting
stations is estimated by extracting some characteristic
1. Channel statistical characteristics
      </p>
      <p>
        It consists of a set of parameters that describe the
statistical characteristics of the environment in
which the system operates, including:
Environment: It is composed of four categories
(Rural, Suburban, Dense Urban, and Highrise
Urban) that difer in the concentration, density, and
height distribution of buildings. The
determination of the environment establishes the
Gaussian distribution parameters of Excessive Path
Loss, a parameter for estimating additional losses
[
        <xref ref-type="bibr" rid="ref4">4, 19, 20, 21, 22, 23</xref>
        ].
2. Connection parameters
      </p>
      <p>That is, the specific characteristics of the channel:
Transmission powers: are the power levels of the
repeaters and the transmission devices of the
users.</p>
      <p>Transmission band: including the parameters of
occupied bandwidth and carrier frequency.
1. The system creates a list of connections, so that
each user is assigned one with which to establish
the connection;
2. The system, starting from the first connection,
calculates all sender-drone and drone-receiver
throughputs (2* number of drones), assigning to
each drone the worst of the two values, using the
equation:
 =  * 2(1 +</p>
      <p>* 
)</p>
      <p>(2)
3. Since the system is centralized, for each pair of
users, the best UAV to establish the connection is
chosen, and only that throughput value is
considered;</p>
      <p>Modulation: The system, modulated in OFDM, 2.3. Calculation of Throughput and Failed
allows for the selection of the number of subcar- Messages:
riers and their respective modulation.</p>
      <p>Minimum rate: is the minimum throughput be- The algorithm for calculating throughput (T) and failed
low which the connection fails. connections consists of two phases:
3. Properties of the UAVs and users Initialization phase</p>
      <p>That is, those typical quantities of the movement • User and UAV positions are randomized;
of users and drones, including: • The system precomputes the maximum
chanVelocity: This refers to the speed of the users and nel capacity (C), given the input parameters as
the UAVs. Band(B), Subcarriers(S) and Modulation (M) [25]:
Number of users served and mobile repeaters:
iunsdeircsapteretsheenntuinmtbheer soifmmuolabtiiloenr.adio stations and  = 2 *  * 2( *  ) (1)
Simulation area: indicates the simulation area Estimation phase
considered, approximated with the base and
height of the equivalent rectangle.</p>
      <sec id="sec-1-1">
        <title>2.2. Robotarium</title>
        <p>Robotarium developed by the Georgia Institute of
Technology in collaboration with Heriot-Watt University in
Edinburgh allows for the simulation of the behavior of
robots and drones in a predefined area. It is possible to
display the movement of users and drones in the
environment as needed [24].
4. Based on the throughput value:
• if the value is equal to or greater than the
maximum channel capacity (1), this is
assigned as the result for the connection;
• if the value is below the established
threshold, the counter for failed messages is
incremented;
• for any other value, the connection is
successful, and the calculated throughput
value is assigned to the connection;
5. The simulator stores the data and starts the
iteration counter, assigning each UAV a new position
based on the Q-learning algorithm. 2.4;
6. At each iteration, the system checks if the drones
have reached their final positions, then returns
to the point 1.</p>
      </sec>
      <sec id="sec-1-2">
        <title>2.4. Q-learning</title>
        <p>Q-learning is a reinforcement learning algorithm that
helps an agent learn the best actions to take in
various states to maximize rewards. The Q-Learning
algorithm [26] involves associating each drone with a
two-dimensional matrix where rows indicate states and
columns indicate actions. The system states correspond
to the central position of the cells into which the drone’s
operating area is divided. The actions represent the
behaviors that a UAV can adopt in a given state. In the
context of this article, the environment is divided into 40
states (cells of 400 * 400) while the actions available
to the aircraft are 5: one for each cardinal direction and
a fifth action corresponding to no movement. It should
be noted that the aircraft can move a maximum of one
cell per cycle.</p>
        <p>The reward function, a parameter for updating the
Q-Table, is as follows:</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>4. Conclusion</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Al-Haddad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Jaber</surname>
          </string-name>
          ,
          <article-title>Applications of machine learning techniques for fault diagnosis of uavs (</article-title>
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , E. Tramontana,
          <string-name>
            <given-names>R.</given-names>
            <surname>Damaševičius</surname>
          </string-name>
          ,
          <article-title>Is the colony of ants able to recognize graphic objects?</article-title>
          ,
          <source>Communications in Computer and Information Science</source>
          <volume>538</volume>
          (
          <year>2015</year>
          )
          <fpage>376</fpage>
          -
          <lpage>387</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -24770-0_
          <fpage>33</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Al-Haddad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Jaber</surname>
          </string-name>
          ,
          <article-title>Improved uav blade unbalance prediction based on machine learning and relief supreme feature ranking method</article-title>
          ,
          <source>Journal of the Brazilian Society of Mechanical Sciences and Engineering</source>
          <volume>45</volume>
          (
          <year>2023</year>
          )
          <fpage>463</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Hourani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kandeepan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lardner</surname>
          </string-name>
          ,
          <article-title>Optimal lap altitude for maximum coverage</article-title>
          ,
          <source>IEEE Wireless Communications Letters</source>
          <volume>3</volume>
          (
          <year>2014</year>
          )
          <fpage>569</fpage>
          -
          <lpage>572</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Tramontana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Marszalek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Polap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wozniak</surname>
          </string-name>
          ,
          <article-title>Simplified firefly algorithm for 2d image key-points search</article-title>
          ,
          <source>in: IEEE SSCI 2014 - 2014 IEEE Symposium Series on Computa- mation, IEEE Signal Processing Letters</source>
          <volume>26</volume>
          (
          <year>2019</year>
          )
          <article-title>tional Intelligence - CIHLI</article-title>
          <year>2014</year>
          : 2014 IEEE Sym-
          <volume>362</volume>
          -366. posium on Computational Intelligence for Human- [17]
          <string-name>
            <given-names>M.</given-names>
            <surname>Mozafari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Saad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bennis</surname>
          </string-name>
          , M. Debbah, OpLike Intelligence, Proceedings,
          <year>2014</year>
          . doi:
          <volume>10</volume>
          .1109/
          <article-title>timal transport theory for power-eficient deployCIHLI</article-title>
          .
          <year>2014</year>
          .
          <volume>7013395</volume>
          .
          <article-title>ment of unmanned aerial vehicles</article-title>
          , in: 2016 IEEE
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>L. A.</given-names>
            <surname>Al-Haddad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Giernacki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Shandookh</surname>
          </string-name>
          , international conference on communications (ICC),
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Jaber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Puchalski</surname>
          </string-name>
          , Vibration signal process- IEEE,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
          <article-title>ing for multirotor uavs fault diagnosis: Filtering or</article-title>
          [18]
          <string-name>
            <given-names>N. N.</given-names>
            <surname>Dat</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Ponzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Vincelli</surname>
          </string-name>
          ,
          <article-title>Supporting multiresolution analysis?, Maintenance &amp; Reliabili- impaired people with a following robotic assistant ty/Eksploatacja i Niezawodność 26 (</article-title>
          <year>2024</year>
          ).
          <article-title>by means of end-to-end visual target navigation</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Bonanno</surname>
          </string-name>
          ,
          <string-name>
            <surname>G. Capizzi,</surname>
          </string-name>
          <article-title>An hybrid neuro- and reinforcement learning approaches, in: CEUR wavelet approach for long-term prediction of solar Workshop Proceedings</article-title>
          , volume
          <volume>3118</volume>
          ,
          <year>2021</year>
          , p.
          <fpage>51</fpage>
          -
          <lpage>wind</lpage>
          ,
          <source>Proceedings of the International Astronomi- 63. cal Union</source>
          <volume>6</volume>
          (
          <year>2010</year>
          )
          <fpage>153</fpage>
          -
          <lpage>155</lpage>
          . [19]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , An advanced solu-
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Ciccarella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Vatalaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vizzarri</surname>
          </string-name>
          ,
          <article-title>Content deliv- tion based on machine learning for remote emdr ery on ip network: Service providers and tv broad- therapy</article-title>
          ,
          <source>Technologies</source>
          <volume>11</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .3390/ casters business repositioning,
          <source>in: 2019 3rd Inter- technologies11060172. national Conference on Recent Advances in Sig-</source>
          [20]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Guan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Briso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>He</surname>
          </string-name>
          , J. Cheng, Z. Zhong, nal Processing, Telecommunications &amp;
          <string-name>
            <surname>Computing F. Quitin</surname>
          </string-name>
          ,
          <article-title>Analytical modeling of uav-to-vehicle (SigTelCom)</article-title>
          , IEEE,
          <year>2019</year>
          , pp.
          <fpage>149</fpage>
          -
          <lpage>154</lpage>
          .
          <article-title>propagation channels in built-up areas</article-title>
          , arXiv
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>R.</given-names>
            <surname>Giuliano</surname>
          </string-name>
          ,
          <string-name>
            <surname>From</surname>
          </string-name>
          5g-advanced to 6g in 2030: New preprint arXiv:
          <year>1907</year>
          .
          <volume>01518</volume>
          (
          <year>2019</year>
          ).
          <article-title>services, 3gpp advances and enabling technologies</article-title>
          , [21]
          <string-name>
            <given-names>I. E.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tibermacine</surname>
          </string-name>
          , W. Guettala, IEEE Access (
          <year>2024</year>
          ). C. Napoli,
          <string-name>
            <given-names>S.</given-names>
            <surname>Russo</surname>
          </string-name>
          , Enhancing sentiment anal-
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Berbineau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sabra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Deniau</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Gransart, ysis on seed-iv dataset with vision transformers:</article-title>
          <string-name>
            <given-names>R.</given-names>
            <surname>Torrego</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Arriola</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Val</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Soler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Viz- A comparative study, in: ACM International zarri</article-title>
          , et al.,
          <source>Zero on site testing of railway wire- Conference Proceeding Series</source>
          ,
          <year>2023</year>
          , p.
          <fpage>238</fpage>
          -
          <lpage>246</lpage>
          .
          <article-title>less systems: the emulradio4rail platforms</article-title>
          , in: doi:10.1145/3638985.3639024.
          <source>2021 IEEE 93rd Vehicular Technology Conference</source>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Hourani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kandeepan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Jamalipour</surname>
          </string-name>
          ,
          <string-name>
            <surname>Mod(VTC2021-Spring</surname>
            <given-names>)</given-names>
          </string-name>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
          <article-title>eling air-to-ground path loss for low altitude plat-</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Napoli</surname>
          </string-name>
          , E. Tramontana,
          <article-title>forms in urban environments, in: 2014 IEEE global Graphic object feature extraction system based on communications conference</article-title>
          , IEEE,
          <year>2014</year>
          , pp.
          <fpage>2898</fpage>
          - cuckoo search algorithm,
          <source>Expert Systems with Ap- 2904. plications 66</source>
          (
          <year>2016</year>
          )
          <fpage>20</fpage>
          -
          <lpage>31</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.eswa. [23]
          <string-name>
            <surname>G. De Magistris</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Russo</surname>
          </string-name>
          , P. Roma, J. T. Starczewski,
          <year>2016</year>
          .
          <volume>08</volume>
          .068.
          <string-name>
            <surname>C. Napoli</surname>
          </string-name>
          ,
          <article-title>An explainable fake news detector based</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vizzarri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Mazzenga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Giuliano</surname>
          </string-name>
          ,
          <article-title>Future tech- on named entity recognition and stance classificanologies for train communication: The role of leo tion applied to covid-19, Information (Switzerland) hts satellites in the adaptable communication sys- 13 (</article-title>
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3390/info13030137. tem,
          <source>Sensors</source>
          <volume>23</volume>
          (
          <year>2022</year>
          )
          <fpage>68</fpage>
          . [24]
          <string-name>
            <given-names>L.</given-names>
            <surname>Canese</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. C.</given-names>
            <surname>Cardarilli</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Dehghan Pir</surname>
          </string-name>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamsoshoara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Khaledi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Afghah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Razi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. Di</given-names>
            <surname>Nunzio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Spanò</surname>
          </string-name>
          , Design and
          <string-name>
            <given-names>development J.</given-names>
            <surname>Ashdown</surname>
          </string-name>
          ,
          <article-title>Distributed cooperative spectrum shar- of multi-agent reinforcement learning intelligence ing in uav networks using multi-agent reinforce- on the robotarium platform for embedded system ment learning</article-title>
          ,
          <source>in: 2019 16th IEEE Annual Con- applications</source>
          , Electronics (Switzerland)
          <volume>13</volume>
          (
          <year>2024</year>
          ).
          <source>sumer Communications &amp; Networking Conference doi:10</source>
          .3390/electronics13101819. (CCNC), IEEE,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . [25]
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Channel capacity and channel estimation of</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Woźniak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Połap</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gabryel</surname>
          </string-name>
          , R. K. Nowicki,
          <article-title>ofdm ultra-wide-band systems</article-title>
          , in: 2012 InternaC. Napoli, E. Tramontana,
          <article-title>Can we process 2d im- tional Conference on Computer Science and Elecages using artificial bee colony?</article-title>
          ,
          <source>in: Lecture Notes tronics Engineering</source>
          , volume
          <volume>2</volume>
          ,
          <year>2012</year>
          , pp.
          <fpage>152</fpage>
          -
          <lpage>156</lpage>
          . in
          <source>Artificial Intelligence (Subseries of Lecture Notes doi:10</source>
          .1109/ICCSEE.
          <year>2012</year>
          .
          <volume>26</volume>
          . in Computer Science), volume
          <volume>9119</volume>
          ,
          <year>2015</year>
          , p.
          <fpage>660</fpage>
          -
          <lpage>[</lpage>
          26]
          <string-name>
            <given-names>J.</given-names>
            <surname>Cui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nallanathan</surname>
          </string-name>
          , Multi-agent
          <year>rein671</year>
          .
          <source>doi:10</source>
          .1007/978-3-
          <fpage>319</fpage>
          -19324-3_
          <fpage>59</fpage>
          .
          <article-title>forcement learning-based resource allocation for</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Bing</surname>
          </string-name>
          ,
          <article-title>Study on modeling of communication chan- uav networks</article-title>
          ,
          <source>IEEE Transactions on Wireless Comnel of uav, Procedia Computer Science</source>
          <volume>107</volume>
          (
          <year>2017</year>
          ) munications
          <volume>19</volume>
          (
          <year>2019</year>
          )
          <fpage>729</fpage>
          -
          <lpage>743</lpage>
          .
          <fpage>550</fpage>
          -
          <lpage>557</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>G.</given-names>
            <surname>Capizzi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. Lo</given-names>
            <surname>Sciuto</surname>
          </string-name>
          ,
          <article-title>A novel 2-d fir filter design methodology based on a gaussian-based approxi-</article-title>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>