{"id":"https://openalex.org/W2901676754","doi":"https://doi.org/10.1109/ictc.2018.8539660","title":"Random Access Channel Management for Handling Massive Numbers of Machine-to-Machine Communication Devices","display_name":"Random Access Channel Management for Handling Massive Numbers of Machine-to-Machine Communication Devices","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2901676754","doi":"https://doi.org/10.1109/ictc.2018.8539660","mag":"2901676754"},"language":"en","primary_location":{"id":"doi:10.1109/ictc.2018.8539660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2018.8539660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037015653","display_name":"Agusta Daniel Anthoni Kurnia","orcid":null},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Agusta Daniel Anthoni Kurnia","raw_affiliation_strings":["Department of Computer Engineering, Ajou University, Suwon, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Ajou University, Suwon, South Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050640061","display_name":"Young\u2010June Choi","orcid":"https://orcid.org/0000-0003-2240-0892"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Young-June Choi","raw_affiliation_strings":["Department of Computer Engineering, Department of Software, Ajou University, Suwon, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Department of Software, Ajou University, Suwon, South Korea","institution_ids":["https://openalex.org/I57664883"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037015653"],"corresponding_institution_ids":["https://openalex.org/I57664883"],"apc_list":null,"apc_paid":null,"fwci":0.3863,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.64206092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1186","last_page":"1190"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/random-access","display_name":"Random access","score":0.8451082706451416},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8177872896194458},{"id":"https://openalex.org/keywords/preamble","display_name":"Preamble","score":0.7965205907821655},{"id":"https://openalex.org/keywords/machine-to-machine","display_name":"Machine to machine","score":0.6936154365539551},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.647848904132843},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6231327652931213},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.560337483882904},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5528334975242615},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5189087986946106},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.47453296184539795},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.4594678580760956},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4373512864112854},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4341288208961487},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.20080307126045227},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.1619507372379303},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12767136096954346},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11198785901069641},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.09322071075439453}],"concepts":[{"id":"https://openalex.org/C101722063","wikidata":"https://www.wikidata.org/wiki/Q218825","display_name":"Random access","level":2,"score":0.8451082706451416},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8177872896194458},{"id":"https://openalex.org/C2780691134","wikidata":"https://www.wikidata.org/wiki/Q1129448","display_name":"Preamble","level":3,"score":0.7965205907821655},{"id":"https://openalex.org/C76763059","wikidata":"https://www.wikidata.org/wiki/Q251072","display_name":"Machine to machine","level":3,"score":0.6936154365539551},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.647848904132843},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6231327652931213},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.560337483882904},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5528334975242615},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5189087986946106},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.47453296184539795},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.4594678580760956},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4373512864112854},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4341288208961487},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.20080307126045227},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.1619507372379303},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12767136096954346},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11198785901069641},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.09322071075439453},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictc.2018.8539660","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc.2018.8539660","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W1490674876","https://openalex.org/W1516996557","https://openalex.org/W2034643337","https://openalex.org/W2042768148","https://openalex.org/W2049816023","https://openalex.org/W2132247362","https://openalex.org/W2148895884","https://openalex.org/W2542891369","https://openalex.org/W4293263215"],"related_works":["https://openalex.org/W2980498362","https://openalex.org/W2586215923","https://openalex.org/W3198850615","https://openalex.org/W2575325773","https://openalex.org/W2393245530","https://openalex.org/W2740111078","https://openalex.org/W2610738413","https://openalex.org/W2519310898","https://openalex.org/W2514883743","https://openalex.org/W2994929300"],"abstract_inverted_index":{"Machine-to-Machine":[0],"(M2M)":[1],"Communication":[2],"is":[3,37],"becoming":[4],"one":[5],"of":[6,15,21,32,74,88,115,118,124],"the":[7,18,54,72,75,82,100,110,116,122],"emerging":[8],"paradigms":[9],"to":[10,24,39,52,59],"enable":[11],"a":[12,29,65,86],"broad":[13],"range":[14],"applications":[16],"from":[17],"massive":[19,30],"deployment":[20],"sensor":[22],"devices":[23,34],"mission-critical":[25],"services.":[26],"Nevertheless,":[27],"having":[28],"number":[31,123],"M2M":[33,90],"activated":[35],"simultaneously":[36],"difficult":[38],"tackle":[40,60],"and":[41,98,121],"it":[42],"can":[43,70],"cause":[44],"some":[45],"issues":[46],"in":[47,113],"connection":[48],"establishment":[49],"that":[50,69,105],"leads":[51],"degrading":[53],"network":[55,111],"performance.":[56],"In":[57],"order":[58],"this":[61],"issues,":[62],"we":[63],"propose":[64],"random":[66,119],"access":[67,120],"management":[68],"optimize":[71],"QoS":[73],"M2M-related":[76],"application.":[77],"The":[78],"proposed":[79],"approach":[80,107],"handles":[81],"signaling":[83],"process":[84],"within":[85],"group":[87],"related":[89],"devices,":[91],"thus":[92],"preventing":[93],"unnecessary":[94],"recurring":[95],"data":[96],"transmission,":[97],"reusing":[99],"assigned":[101],"PRACH.":[102],"Results":[103],"show":[104],"our":[106],"significantly":[108],"improves":[109],"performance":[112],"term":[114],"probability":[117],"preamble":[125],"transmission.":[126]},"counts_by_year":[{"year":2020,"cited_by_count":3}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
