{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:24:38Z","timestamp":1742970278990,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030657284"},{"type":"electronic","value":"9783030657291"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-65729-1_21","type":"book-chapter","created":{"date-parts":[[2020,12,22]],"date-time":"2020-12-22T16:03:13Z","timestamp":1608652993000},"page":"240-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analytical Model for CSMA-Based MAC Protocol for Industrial IoT Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5045-5869","authenticated-orcid":false,"given":"Alexey","family":"Tsarev","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1745-8424","authenticated-orcid":false,"given":"Emil","family":"Khayrov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9104-708X","authenticated-orcid":false,"given":"Ek\u0430terina","family":"Medvedeva","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2655-4805","authenticated-orcid":false,"given":"Yuliya","family":"Gaidamaka","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4802-9585","authenticated-orcid":false,"given":"Chiara","family":"Buratti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,22]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Buratti, C., Mesini, L., Verdone, R.: Comparing MAC protocols for industrial IoT using Terahertz communications. In: IEEE PIMRC, August 2020","DOI":"10.1109\/PIMRC48278.2020.9217308"},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Elayan, H., Amin, O., Shubair, R.M., Alouini, M.: Terahertz communication: the opportunities of wireless technology beyond 5G. In: CommNet, April 2018, pp. 1\u20135. IEEE (2018). https:\/\/doi.org\/10.1109\/commnet.2018.8360286","DOI":"10.1109\/commnet.2018.8360286"},{"key":"21_CR3","unstructured":"Polese, M., Jornet, J., Melodia, T., Zorzi, M.: Toward end-to-end, full-stack 6G terahertz networks. IEEE Commun. Mag. arXiv:2005.07989v1 [cs.NI]"},{"key":"21_CR4","doi-asserted-by":"publisher","unstructured":"Tekb\u0131y\u0131k, K., Ekti, A.R., Kurt, G.K., Gorcin, A.: Terahertz band communication systems: challenges, novelties and standardization efforts. Phys. Commun. 35, 100700. https:\/\/doi.org\/10.1016\/j.phycom.2019.04.014","DOI":"10.1016\/j.phycom.2019.04.014"},{"key":"21_CR5","unstructured":"Ghafoor, S., Boujnah, N., Rehmani, M.H., Davy, A.: MAC protocols for terahertz communication: a comprehensive survey. arXiv:1904.11441v3 [cs.NI]"},{"key":"21_CR6","unstructured":"Recommendation ITU-R M.1450-5 (02\/2014): Characteristics of broadband radio local area networks, ITU-R, February 2014"},{"key":"21_CR7","doi-asserted-by":"publisher","unstructured":"Bianchi, G.: IEEE 802.11-saturation throughput analysis. IEEE Commun. Lett. 2(12), 318\u2013320 (1998). https:\/\/doi.org\/10.1109\/4234.736171","DOI":"10.1109\/4234.736171"},{"key":"21_CR8","doi-asserted-by":"publisher","unstructured":"Bianchi, G., Tinnirello, I.: Remarks on IEEE 802.11 DCF performance analysis. IEEE Commun. Lett. 9(8), 765\u2013767 (2005). https:\/\/doi.org\/10.1109\/lcomm.2005.1496609","DOI":"10.1109\/lcomm.2005.1496609"},{"key":"21_CR9","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-319-47217-1_22","volume-title":"Computer and Information Sciences","author":"KE Samouylov","year":"2016","unstructured":"Samouylov, K.E., Gaidamaka, Y.V., Gudkova, I.A., Zaripova, E.R., Shorgin, S.Y.: Baseline analytical model for machine-type communications over 3GPP RACH in LTE-advanced networks. In: Czach\u00f3rski, T., Gelenbe, E., Grochla, K., Lent, R. (eds.) ISCIS 2016. CCIS, vol. 659, pp. 203\u2013213. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47217-1_22"},{"key":"21_CR10","first-page":"3266","volume":"6953070","author":"A Pyattaev","year":"2014","unstructured":"Pyattaev, A., Johnsson, K., Surak, A., Florea, R., Andreev, S., Koucheryavy, Y.: Network-assisted D2D communications: Implementing a technology prototype for cellular traffic offloading. WCNC, art. 6953070, 3266\u20133271 (2014)","journal-title":"WCNC, art."},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Galinina, O., Tabassum, H., Mikhaylov, K., Andreev, S., Hossain, E., Koucheryavy, Y.: On feasibility of 5G-grade dedicated RF charging technology for wireless-powered wearables. IEEE Wirel. Commun. 23(2), 7462482, 28\u201337 (2016)","DOI":"10.1109\/MWC.2016.7462482"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Ometov, A., et al.: Toward trusted, social-aware D2D connectivity: Bridging across the technology and sociality realms. IEEE Wirel. Commun. 23(4), 7553033, 103\u2013111 (2016)","DOI":"10.1109\/MWC.2016.7553033"},{"issue":"2","key":"21_CR13","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1287\/opre.15.2.254.JSTOR168557","volume":"15","author":"WJ Gordon","year":"1967","unstructured":"Gordon, W.J., Newell, G.F.: Closed queuing systems with exponential servers. Oper. Res. 15(2), 185\u2013370 (1967). https:\/\/doi.org\/10.1287\/opre.15.2.254.JSTOR168557","journal-title":"Oper. Res."},{"issue":"9","key":"21_CR14","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1145\/362342.362345","volume":"16","author":"JP Buzen","year":"1973","unstructured":"Buzen, J.P.: Computational algorithms for closed queueing networks with exponential servers. Commun. ACM 16(9), 527\u2013531 (1973). https:\/\/doi.org\/10.1145\/362342.362345","journal-title":"Commun. ACM"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"20413","DOI":"10.1109\/ACCESS.2019.2963723","volume":"8","author":"M Zhu","year":"2020","unstructured":"Zhu, M., Chang, L., Wang, N., You, I.: A smart collaborative routing protocol for delay sensitive applications in industrial IoT. IEEE Access 8, 20413\u201320427 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2019.2963723","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-65729-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T13:39:41Z","timestamp":1710250781000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-65729-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030657284","9783030657291"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-65729-1_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NEW2AN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Next Generation Wired\/Wireless Networking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"St. Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"new2an2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.new2an.org\/#\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"225","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}