Pub Date : 2020-08-01DOI: 10.1109/SmartIoT49966.2020.00053
Chen Chen, Jiaxuan Deng, Ning Lv
Urban planning is an important application field of remote sensing images. Using semantic segmentation to deal with this matter shows great potential. However, there is still a long way to go to achieve complex semantic segmentation. To improve the learning ability of complex rules in a semantic segmentation network, and can explicitly indicate the context relationship between categories. This paper proposes a new convolution structure based on the current semantic segmentation network with the encoding-decoding structure. The traditional multi-layer convolution structure is replaced by a new multi-scale convolution parallel structure. In addition, a full connection conditional random field under certain rules are added to constrain the segmentation results. For the segmentation accuracy, we first compare it with the current segmentation network on a open datasets. And it has shown good practicality in detecting illegal constructions in Jiangxi province, China.
{"title":"Illegal Constructions Detection in Remote Sensing Images based on Multi-scale Semantic Segmentation","authors":"Chen Chen, Jiaxuan Deng, Ning Lv","doi":"10.1109/SmartIoT49966.2020.00053","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00053","url":null,"abstract":"Urban planning is an important application field of remote sensing images. Using semantic segmentation to deal with this matter shows great potential. However, there is still a long way to go to achieve complex semantic segmentation. To improve the learning ability of complex rules in a semantic segmentation network, and can explicitly indicate the context relationship between categories. This paper proposes a new convolution structure based on the current semantic segmentation network with the encoding-decoding structure. The traditional multi-layer convolution structure is replaced by a new multi-scale convolution parallel structure. In addition, a full connection conditional random field under certain rules are added to constrain the segmentation results. For the segmentation accuracy, we first compare it with the current segmentation network on a open datasets. And it has shown good practicality in detecting illegal constructions in Jiangxi province, China.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133983997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/SmartIoT49966.2020.00027
Weifeng Sun, Minghan Jia, Guanghao Zhang, Zun Wang
The popularization and application of the Internet of Things (IoT) have produced massive and multi-type data. The information in the network grows explosively, and is transmitted in many forms in the network. The traditional TCP congestion control algorithms are not suitable for long fat pipes, and the transmission rates are very low in some scenarios such as dedicated line transmission. The TCP-BBR algorithm is a TCP congestion control protocol proposed by Google for transmission on the long fat pipeline to improve the transmission throughput and reduce the delay of data transmission. Through simulations, it is found that the competition between TCP-BBR streams with different RTTs will cause serious RTT unfairness problem. The TCP-BBR data streams with small RTTs are always suppressed by the data streams with large RTTs. To solve this problem, the improved BBR algorithm RFBBR is proposed. The RFBBR can guarantee the faireness of BBR streams with different RTTs. The simulation results show that RFBBR can significantly improve fairness compared with BBR and BBQ in the wireless network spindle topology scenarios.
{"title":"RFBBR: A Rtt Faireness Awared Algorithm Based on BBR","authors":"Weifeng Sun, Minghan Jia, Guanghao Zhang, Zun Wang","doi":"10.1109/SmartIoT49966.2020.00027","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00027","url":null,"abstract":"The popularization and application of the Internet of Things (IoT) have produced massive and multi-type data. The information in the network grows explosively, and is transmitted in many forms in the network. The traditional TCP congestion control algorithms are not suitable for long fat pipes, and the transmission rates are very low in some scenarios such as dedicated line transmission. The TCP-BBR algorithm is a TCP congestion control protocol proposed by Google for transmission on the long fat pipeline to improve the transmission throughput and reduce the delay of data transmission. Through simulations, it is found that the competition between TCP-BBR streams with different RTTs will cause serious RTT unfairness problem. The TCP-BBR data streams with small RTTs are always suppressed by the data streams with large RTTs. To solve this problem, the improved BBR algorithm RFBBR is proposed. The RFBBR can guarantee the faireness of BBR streams with different RTTs. The simulation results show that RFBBR can significantly improve fairness compared with BBR and BBQ in the wireless network spindle topology scenarios.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124509960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The sorting of plates is an indispensable part of the plate processing production line. In order to achieve plate detection in complex detection scenarios, a multisize plate detection algorithm based on improved Mask RCNN is proposed. The model fusion method is used to introduce the DenseNet network structure to optimize the feature transfer path to make feature extraction more efficient. At the same time, the boundary distance constraint is added to the segmentation loss function, which makes the model more precise for the target with high stacking complexity and fuzzy boundary information. The experimental results show that the improved Mask RCNN performance is significantly improved, compared with other models, it achieves an optimization effect with an average accuracy of more than 98%.
{"title":"Multisize plate detection algorithm based on improved Mask RCNN","authors":"Feiyang Song, Liming Wu, Gengzhe Zheng, Xinying He, Guanchu Wu, Y. Zhong","doi":"10.1109/SmartIoT49966.2020.00049","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00049","url":null,"abstract":"The sorting of plates is an indispensable part of the plate processing production line. In order to achieve plate detection in complex detection scenarios, a multisize plate detection algorithm based on improved Mask RCNN is proposed. The model fusion method is used to introduce the DenseNet network structure to optimize the feature transfer path to make feature extraction more efficient. At the same time, the boundary distance constraint is added to the segmentation loss function, which makes the model more precise for the target with high stacking complexity and fuzzy boundary information. The experimental results show that the improved Mask RCNN performance is significantly improved, compared with other models, it achieves an optimization effect with an average accuracy of more than 98%.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124837748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/SmartIoT49966.2020.00040
Fengqi Li, C. Shang, Lupeng Zhang, Jing Liu
In China, the manual approach is still widely used in outsourcing data entry because of the poor recognition of OCR for Chinese. However, little consideration has been given to enhancing the credibility of manual data entry. In this paper, we propose TFBO (Trusted Framework Based on Blockchain for Outsourcing Data Entry). Firstly, we propose the system architecture and transaction flow of TFBO. Secondly, we propose Assign-on-chain to ensure the allocation process is traceable, which applies GODSS to generate a globally optimal of services selection and broadcasts the selection on the blockchain. Thirdly, we propose Result-on-chain uses searchable encryption to ensure the final entry result is irreversible and can be used for the deposit. Finally, we propose Check-on-chain to avoid the malicious behavior of clients or subcontractors through the smart contract about decentralized checking. The extensive credibility analysis and performance evaluation show that our solution is trusted and feasible.
{"title":"TFBO: A Trusted Framework based on Blockchain for Outsourcing Data Entry","authors":"Fengqi Li, C. Shang, Lupeng Zhang, Jing Liu","doi":"10.1109/SmartIoT49966.2020.00040","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00040","url":null,"abstract":"In China, the manual approach is still widely used in outsourcing data entry because of the poor recognition of OCR for Chinese. However, little consideration has been given to enhancing the credibility of manual data entry. In this paper, we propose TFBO (Trusted Framework Based on Blockchain for Outsourcing Data Entry). Firstly, we propose the system architecture and transaction flow of TFBO. Secondly, we propose Assign-on-chain to ensure the allocation process is traceable, which applies GODSS to generate a globally optimal of services selection and broadcasts the selection on the blockchain. Thirdly, we propose Result-on-chain uses searchable encryption to ensure the final entry result is irreversible and can be used for the deposit. Finally, we propose Check-on-chain to avoid the malicious behavior of clients or subcontractors through the smart contract about decentralized checking. The extensive credibility analysis and performance evaluation show that our solution is trusted and feasible.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125004499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/SmartIoT49966.2020.00063
Qianzhen Sun, Tie Qiu, He Guo
The Internet of Things (IoT) is susceptible to threats from natural disasters and human damage, thereby affecting the communication efficiency and security of the network. The scale-free IoT topology can resist the impact of random attacks, but is particularly vulnerable to malicious attacks against critical nodes. To tackle this problem, this paper proposes an intelligent topology optimization strategy combined with convolutional neural network, which evolves the initial IoT topology into a robust onion-like structure against malicious attacks. In addition, we introduce a method to convert topology information into a sequence model suitable for feature extraction. The experimental results show that this strategy can efficiently optimize the network topology into an onion-like structure.
{"title":"An Intelligent Topology Optimization Strategy Toward the Robust Onion-like Structure","authors":"Qianzhen Sun, Tie Qiu, He Guo","doi":"10.1109/SmartIoT49966.2020.00063","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00063","url":null,"abstract":"The Internet of Things (IoT) is susceptible to threats from natural disasters and human damage, thereby affecting the communication efficiency and security of the network. The scale-free IoT topology can resist the impact of random attacks, but is particularly vulnerable to malicious attacks against critical nodes. To tackle this problem, this paper proposes an intelligent topology optimization strategy combined with convolutional neural network, which evolves the initial IoT topology into a robust onion-like structure against malicious attacks. In addition, we introduce a method to convert topology information into a sequence model suitable for feature extraction. The experimental results show that this strategy can efficiently optimize the network topology into an onion-like structure.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"37 42","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113934279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the implementation way of bilateral interactions in virtual reality, haptic display can not only bring users touch feedback for the better sense of immersion, but also enable them to operate objects in virtual environments on their own initiative. In this article, we present an electromagnetic haptic display system, which performs contactless forces on the magnetic stylus in the magnetic field excited by three iron-core coils with adjustable position and orientation, for the production of haptic feedback. High-frequency pulses and H-bridge circuits are employed for the rapid current drive in coils, and it is proved that the refresh rate of our haptic device is able to fulfill the simulation of dynamic haptic feedback like push, pull and squeeze. In addition, the processes of current generation in single coil and magnetic field generation for coil array are clearly analyzed, and a Varying-Model Predictive Control algorithm is proposed, where the predictive model is updated adaptively according to the real-time motions of stylus and coils, to generate the required magnetic field smoothly and precisely. Experiments show that the magnetic flux density measured at the position of stylus follows the reference value well in three dimensions with the aid of the proposed algorithm, and dynamic and accurate electromagnetic haptic display can be achieved.
{"title":"Dynamic and Accurate Force Feedback for Electromagnetic Haptic Display","authors":"Xiaosa Li, Zhiyong Yuan, Jianhui Zhao, Xiangyun Liao","doi":"10.1109/SmartIoT49966.2020.00028","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00028","url":null,"abstract":"As the implementation way of bilateral interactions in virtual reality, haptic display can not only bring users touch feedback for the better sense of immersion, but also enable them to operate objects in virtual environments on their own initiative. In this article, we present an electromagnetic haptic display system, which performs contactless forces on the magnetic stylus in the magnetic field excited by three iron-core coils with adjustable position and orientation, for the production of haptic feedback. High-frequency pulses and H-bridge circuits are employed for the rapid current drive in coils, and it is proved that the refresh rate of our haptic device is able to fulfill the simulation of dynamic haptic feedback like push, pull and squeeze. In addition, the processes of current generation in single coil and magnetic field generation for coil array are clearly analyzed, and a Varying-Model Predictive Control algorithm is proposed, where the predictive model is updated adaptively according to the real-time motions of stylus and coils, to generate the required magnetic field smoothly and precisely. Experiments show that the magnetic flux density measured at the position of stylus follows the reference value well in three dimensions with the aid of the proposed algorithm, and dynamic and accurate electromagnetic haptic display can be achieved.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129791433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/SmartIoT49966.2020.00048
Nahina Islam, B. Ray, Faezeh Pasandideh
The Internet of Things (IoT) has changed the definition of smart farming and enhanced it’s capabilities to monitor and assess crop and soil quality; to plan planting locations to optimize resources and land area. The Low-Power Wide-Area Network (LPWAN) technologies have enhanced these capabilities by increasing the wireless communication range, by eliminating the dependency of Backhaul networks and by reducing power consumption. In this paper, we have presented an experimental analysis of LPWAN literature with the support of simulation and actual implementation of a Long Range Wide Area Network (LoRaWAN) based IoT network for smart farming. Based on our evaluation and experiment of the existing work and the practical implementation of IoT based smart sprinkler using LoRaWAN communication protocol, this paper has presented a comparison and evaluation of different LPWAN technologies for remote smart farming. The empirical equation of wireless communication range of LoRaWAN gateways and power consumption model of LoRaWAN end devices helped us to determine that, the LoRaWAN communication system enables an IoT network to be deployed over 10 kilometers wirelessly in remote settings without being dependent on a Long Term Evolution (LTE-4G/5G) or other backhaul network and the end devices consume as low energy as only 15.36mAh per day.
{"title":"IoT Based Smart Farming: Are the LPWAN Technologies Suitable for Remote Communication?","authors":"Nahina Islam, B. Ray, Faezeh Pasandideh","doi":"10.1109/SmartIoT49966.2020.00048","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00048","url":null,"abstract":"The Internet of Things (IoT) has changed the definition of smart farming and enhanced it’s capabilities to monitor and assess crop and soil quality; to plan planting locations to optimize resources and land area. The Low-Power Wide-Area Network (LPWAN) technologies have enhanced these capabilities by increasing the wireless communication range, by eliminating the dependency of Backhaul networks and by reducing power consumption. In this paper, we have presented an experimental analysis of LPWAN literature with the support of simulation and actual implementation of a Long Range Wide Area Network (LoRaWAN) based IoT network for smart farming. Based on our evaluation and experiment of the existing work and the practical implementation of IoT based smart sprinkler using LoRaWAN communication protocol, this paper has presented a comparison and evaluation of different LPWAN technologies for remote smart farming. The empirical equation of wireless communication range of LoRaWAN gateways and power consumption model of LoRaWAN end devices helped us to determine that, the LoRaWAN communication system enables an IoT network to be deployed over 10 kilometers wirelessly in remote settings without being dependent on a Long Term Evolution (LTE-4G/5G) or other backhaul network and the end devices consume as low energy as only 15.36mAh per day.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130092277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/smartiot49966.2020.00004
Xiaozhen Yan Harbin, Chuntao Wang
{"title":"SmartIoT 2020 TOC","authors":"Xiaozhen Yan Harbin, Chuntao Wang","doi":"10.1109/smartiot49966.2020.00004","DOIUrl":"https://doi.org/10.1109/smartiot49966.2020.00004","url":null,"abstract":"","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133589505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/SmartIoT49966.2020.00064
Shi-Syun Kuo, Wei-Tsung Su
In this paper, we propose the blockchain-indexed storage (BIS) to provide scalable and secure IoT-enabled supply chain traceability. Although blockchain can prevent data from being maliciously tampered with, scalability is the challenge to directly store supply chain data into blockchain. A massive IoT devices can generate enormous transactions and data which can significantly increase latency and cost. Instead of directly storing supply chain data into blockchain, BIS stores data and data fingerprint into off-chain storages and blockchain, respectively. In addition, BIS supports adaptive transaction arrival rate to control latency and cost according to demand. Our preliminary implementation and analysis show the feasibility of applying BIS to provide scalable and secure supply chain traceability.
{"title":"A Blockchain-Indexed Storage supporting Scalable Data Integrity in Supply Chain Traceability","authors":"Shi-Syun Kuo, Wei-Tsung Su","doi":"10.1109/SmartIoT49966.2020.00064","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00064","url":null,"abstract":"In this paper, we propose the blockchain-indexed storage (BIS) to provide scalable and secure IoT-enabled supply chain traceability. Although blockchain can prevent data from being maliciously tampered with, scalability is the challenge to directly store supply chain data into blockchain. A massive IoT devices can generate enormous transactions and data which can significantly increase latency and cost. Instead of directly storing supply chain data into blockchain, BIS stores data and data fingerprint into off-chain storages and blockchain, respectively. In addition, BIS supports adaptive transaction arrival rate to control latency and cost according to demand. Our preliminary implementation and analysis show the feasibility of applying BIS to provide scalable and secure supply chain traceability.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"10 14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-08-01DOI: 10.1109/SmartIoT49966.2020.00047
Tingyu Qi, Youzheng Wang
In this paper, we propose a non-orthogonal multiple access (NOMA)-based p-persistent Carrier Sense Multiple Access (CSMA) technique, exploring the multipacket reception (MPR) capability from power domain. The essence of our proposed technique is that devices transmit packets in predetermined power level scheme if the channel is sensed idle, and access point (AP) performs successive interference cancellation (SIC) to mitigate co-channel interference. A semi-Markov model is established to analyze our proposed technique in terms of throughput. Simulation results validate that our proposed technique is effective to improve the throughput.
本文提出了一种基于非正交多址(NOMA)的p-persistent Carrier Sense multiple access (CSMA)技术,从功率域探索多包接收(MPR)能力。我们提出的技术的本质是,如果信道被感知为空闲,设备以预定的功率级方案传输数据包,接入点(AP)执行连续干扰消除(SIC)以减轻同信道干扰。建立了半马尔可夫模型,从吞吐量的角度分析了我们提出的技术。仿真结果验证了该方法对提高吞吐量的有效性。
{"title":"NOMA-based Slotted p-Persistent CSMA with Multipacket Reception from Power Domain","authors":"Tingyu Qi, Youzheng Wang","doi":"10.1109/SmartIoT49966.2020.00047","DOIUrl":"https://doi.org/10.1109/SmartIoT49966.2020.00047","url":null,"abstract":"In this paper, we propose a non-orthogonal multiple access (NOMA)-based p-persistent Carrier Sense Multiple Access (CSMA) technique, exploring the multipacket reception (MPR) capability from power domain. The essence of our proposed technique is that devices transmit packets in predetermined power level scheme if the channel is sensed idle, and access point (AP) performs successive interference cancellation (SIC) to mitigate co-channel interference. A semi-Markov model is established to analyze our proposed technique in terms of throughput. Simulation results validate that our proposed technique is effective to improve the throughput.","PeriodicalId":399187,"journal":{"name":"2020 IEEE International Conference on Smart Internet of Things (SmartIoT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127648525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}