Next Article in Journal
A Systematic Review of Machine-Vision-Based Leather Surface Defect Inspection
Next Article in Special Issue
Spatial-Temporal Value-of-Information Maximization for Mobile Crowdsensing in Wireless Sensor Networks
Previous Article in Journal
A ConvNext-Based and Feature Enhancement Anchor-Free Siamese Network for Visual Tracking
Previous Article in Special Issue
AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks
 
 
Article
Peer-Review Record

Task Offloading in Wireless Powered Mobile Crowd Sensing: A Matching-Based Approach

Electronics 2022, 11(15), 2377; https://doi.org/10.3390/electronics11152377
by Difei Yi 1, Jun Li 2,*, Chengpei Tang 2,*, Ziqi Lin 2, Yu Han 2 and Rui Qiu 3
Reviewer 1: Anonymous
Reviewer 2: Anonymous
Reviewer 3:
Electronics 2022, 11(15), 2377; https://doi.org/10.3390/electronics11152377
Submission received: 27 June 2022 / Revised: 19 July 2022 / Accepted: 22 July 2022 / Published: 30 July 2022
(This article belongs to the Special Issue Wireless Powered Communications for Internet of Things)

Round 1

Reviewer 1 Report

 Please find below some comments that might help to revise the paper.

1. Page 6, formula (6), In both conditions 3) and 4) ``$\forall i\in \{1,…,M\}$ and’’ is missing. Specifically, ``$\forall j\in \{1,…,N\}$’’ should be ``$\forall i\in \{1,…,M\}$ and $\forall j\in \{1,…,N\}$ ’’

2. Page 7. Definition 2 of ``two-side exchange stable’’ solution. For the readers it might be interesting to see some explanation whether this definition defines the so-called Pareto optimal solution.

3. Page 8, Algorithm 1. Lines 27-30 might be confusing for the readers.
If “End” in Line 27 is not a point of termination for the  algorithm, the readers might expect that there is “Begin” somewhere before this “End” to define the group of operators. Say, something like “while” in line 8 and “end while” in line 23. Please use the other name for Step 3 to avoid confusing for the readers.

4. It might be interesting for readers to read a comment that besides the considered optimization approach,  in  literature, game theoretical approach is used also if  the communication agents are selfish, i.e., if  each agent wants to  maximize its own payoff. Say, for example 

for throughput communication metric:

[R1] T. Alpcan, T. Basar, R. Srikant, and E. Altman, ``CDMA uplink power control as a noncooperative game’’, Wireless Networks, vol. 8, pp. 659–670, 2002, DOI: 10.1023/A:1020375225649

for latency (delay) communication metric:

[R2] A. Garnaev, A. Petropulu, W. Trappe, and H. V. Poor, "An Anti-Jamming Multiple Access Channel Game Using Latency As Metric," IEEE Wireless Communications Letters, 2022, DOI: 10.1109/LCOMM.2020.2995661

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Reviewer 2 Report

No comments

Author Response

Thank you very much for your in-detail reading of the manuscript.

Reviewer 3 Report

The paper is well written and introduces an important framework for mobile data sensing, which is important these days, especially with the wide spread adoption of mobile phones. I have few comments that I like the authors to clarify.

- I did not see a detailed discussion about the mobility aspect of the users and how they affect the framework operation (e.g. what is the mobility model used to simulate the users' mobility), how mobility affects the system reliability, data redundancy, coverage, etc.

- I was expecting to see some analysis about the algorithms complexity in terms of time and processing power, especially that it will run under the  mobile phones that are  battery operated and limited in capabilities.

- make sure to introduce the acronyms only once and not to define them more than one. (e.g. PoI)

- Please include more references regarding the original matching algorithm, so the reader can learn more about it, which will help in understanding the proposed algorithm.

Author Response

Please see the attachment.

Author Response File: Author Response.pdf

Back to TopTop