scholarly journals A Fuzzy Based Handover Decision Scheme for Mobile Devices Using Predictive Model

Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 2016
Author(s):  
Amit Kumar Gupta ◽  
Vikas Goel ◽  
Ruchi Rani Garg ◽  
D. R. Thirupurasundari ◽  
Ankit Verma ◽  
...  

Handover usually deals with the mobility of the end users in a mobile network to assure about the ongoing session of a user. It is observed that frequent handover results in call dropping due to latency. In order to overcome this issue, a fuzzy based handover decision scheme for mobile devices using a predictive model is proposed. First, an MFNN (Multi-layer Feed Forward Network) is used to determine the next cell of the user along with best hand off time. To obtain the best access network, multiple-attribute Access Network Selection Function (ANSF) is used. The fuzzy rule is applied by considering the parameter data rate, reliability, signal strength, battery power and mobility as input and the output obtained is the optimal network. The proposed scheme selects the best access network and enhances the quality of services.

2013 ◽  
Vol 427-429 ◽  
pp. 2259-2267
Author(s):  
Xing Wei Wang ◽  
Da Peng Qu ◽  
Min Huang

Oriented to the actual requirements of roaming among heterogeneous networks, a handover decision scheme with ABC (Always Best Connected) supported was proposed in this paper. Network application types, access network and mobile terminal models were described. Plenty of factors such as access network conditions, application requirements, users preference in coding systems and providers, mobile terminals condition etc were considered comprehensively, an optimal handover scheme of N terminals among M access networks was designed based on improved artificial fish swarm algorithm. By gaming analysis, Pareto optimum under Nash equilibrium of user utility and network utility was achieved or approached to the found solution. Simulation results showed that the proposed scheme has better performance than existed schemes.


2021 ◽  
Author(s):  
Akeem Olapade Mufutau ◽  
Fernando Pedro Guiomar ◽  
Arnaldo Oliveira ◽  
Paulo Pereira Monteiro

Abstract Towards enabling 5G radio access technologies and beyond to meet the requirements for continuous dynamic and diverse services, flexibility and scalability of the cellular network are therefore pertinent. The utilization of software-defined radio (SDR) aided with an open-source platform and virtualization techniques are increasingly exposing the realization of desirable flexibility for radio access network (RAN) while enabling the development of a prototype which can be directed at fostering further mobile network research activities. In this paper, we review OpenAirInterface (OAI) implementation and present an OAI based cloud RAN (C-RAN) testbed with which mobile fronthaul (MFH) solutions can be tested.


Author(s):  
Asem Moqbel ◽  
Mirella Yani-Di-Soriano ◽  
Shumaila Yousafzai

This paper examines UK mobile users’ perceptions of m-commerce utilization. For this purpose, the study has devised a Mobile Network Utilization Model that was empirically tested in experimental settings. The empirical findings revealed strong support for the capability of the proposed utilization model in measuring the concept of Mobile Task-Technology Fit (MTTF) and explaining the utilization of m-commerce services among UK mobile users. In particular, the research found that MTTF and m-commerce utilization are dependent on the interactions between the key components of a wider mobile network, that is mobile devices, mobile tasks, mobile operators, as well as mobile vendors. Fifteen factors were identified as a result of such interaction and the importance of these factors in explaining MTTF and the actual utilization of m-commerce services was empirically asserted.


Author(s):  
Asem Moqbel ◽  
Mirella Yani-De-Soriano ◽  
Shumaila Yousafzai

In this paper, the authors examine UK mobile users’ perceptions of m-commerce utilization. For this purpose, the authors devise a Mobile Network Utilization Model empirically tested in experimental settings. The empirical findings reveal strong support for the capability of the proposed utilization model in measuring the concept of Mobile Task-Technology Fit (MTTF) and explaining the utilization of m-commerce services among UK mobile users. In particular, their research finds that MTTF and m-commerce utilization are dependent on the interactions between the key components of a wider mobile network, namely mobile users, mobile devices, mobile tasks, mobile operators, as well as mobile vendors. The authors identify 15 factors as a result of such interaction and the importance of these factors in explaining MTTF and the utilization of m-commerce services.


Author(s):  
Darshan M. Tank

With the development of cloud computing and mobility, mobile cloud computing has emerged and become a focus of research. Mobile Cloud Computing (MCC) integrates mobile computing and cloud computing aiming to extend mobile devices capabilities. By the means of on-demand self-service and extendibility, it can offer the infrastructure, platform, and software services in a cloud to mobile users through the mobile network. There is huge market for mobile based e-Commerce applications across the globe. Security and privacy are the key issues for mobile cloud computing applications. The limited processing power and memory of a mobile device dependent on inherently unreliable wireless channel for communication and battery for power leaves little scope for a reliable security layer. Thus there is a need for a lightweight secure framework that provides security with minimum communication and processing overhead on mobile devices. The security and privacy protection services can be achieved with the help of secure mobile-cloud application services.


2014 ◽  
Vol 5 (1) ◽  
pp. 39-60 ◽  
Author(s):  
Sheila Cobourne ◽  
Lazaros Kyrillidis ◽  
Keith Mayes ◽  
Konstantinos Markantonakis

Voting in elections is the basis of democracy, but voting at polling stations may not be possible for all citizens. Remote (Internet) e-voting uses the voter's own equipment to cast votes, but is potentially vulnerable to many common attacks, which affect the election's integrity. Security can be improved by distributing vote processing over many web servers installed in tamper-resistant, secure environments, using the Smart Card Web Server (SCWS) on a mobile phone Subscriber Identity Module (SIM). A generic voting model is proposed, using a SIM/SCWS voting application with standardised Mobile Network Operator (MNO) management procedures to process the votes cast. E-voting systems Prêt à Voter and Estonian I-voting are used to illustrate the generic model. As the SCWS voting application is used in a distributed processing architecture, e-voting security is enhanced: to compromise an election, an attacker must target many individual mobile devices, rather than a centralised web server.


Author(s):  
Shanthi Thangam Manukumar ◽  
Vijayalakshmi Muthuswamy

With the development of edge devices and mobile devices, the authenticated fast access for the networks is necessary and important. To make the edge and mobile devices smart, fast, and for the better quality of service (QoS), fog computing is an efficient way. Fog computing is providing the way for resource provisioning, service providers, high response time, and the best solution for mobile network traffic. In this chapter, the proposed method is for handling the fog resource management using efficient offloading mechanism. Offloading is done based on machine learning prediction technology and also by using the KNN algorithm to identify the nearest fog nodes to offload. The proposed method minimizes the energy consumption, latency and improves the QoS for edge devices, IoT devices, and mobile devices.


Author(s):  
Dawit Hadush Hailu

<p>Cloud Radio Access Network (C-RAN) has emerged as a promising solution to meet the ever-growing capacity demand and reduce the cost of mobile network components. In such network, the mobile operator’s Remote Radio Head (RRH) and Base Band Unit (BBU) are often separated and the connection between them has very tight timing and latency requirements. To employ packet-based network for C-RAN fronthaul, the carried fronthaul traffic are needed to achieve the requirements of fronthaul streams. For this reason, the aim of this paper is focused on investigating and evaluating the feasibility of Integrated Hybrid Optical Network (IHON) networks for mobile fronthaul. TransPacket AS (www.transpacket.com) develops a fusion switching that efficiently serves both Guaranteed Service Transport (GST) traffic with absolute priority and packet switched Statistical Multiplexing (SM) best effort traffic. We verified how the leftover capacity of fusion node can be used to carry the low priority packets and how the GST traffic can have deterministic characteristics on a single wavelength by delaying it with Fixed Delay Line (FDL). For example, for L<sub>1GE </sub><sup>SM</sup> =0.3 the added SM traffic increases the 10GE wavelength utilization up to 89% without any losses and with SM PLR=1E<sup>-03</sup> up to 92% utilization. The simulated results and numerical analysis confirm that the PDV and PLR of GST traffic in Ethernet network meet the requirements of mobile fronthaul using CPRI. For Ethernet network, the number of nodes in the network limits the maximum separation distance between BBU and RRH (link length); for increasing the number of nodes, the link length decreases. Consequently, Radio over Ethernet (RoE) traffic should receive the priority and Quality of Service (QoS) HP can provide. On the other hand, Low Priority (LP) classes are not sensitive to QoS metrics and should be used for transporting time insensitive applications and services.</p>


Author(s):  
Adnan Mahmood ◽  
Shadi M. S. Hilles ◽  
Hushairi Zen

Vertical Handover Decision (VHD) algorithms are indispensable components of forthcoming 4G heterogeneous wireless networks architecture – so as to provide requisite Quality of Service to an assortment of applications anywhere at any time, while allowing seamless roaming in highly dynamic scenarios (i.e. multitude of access network technologies that vary in bandwidth, latency, monetary cost, etc.) using Mobile Terminals (MTs) enabled with multiple access interfaces. In this article, a critical review of the existing VHD algorithms has been carried out as an effort to update the previous studies. To offer a methodical contrast, recently published VHD algorithms have been classified into four major classes depending on the key handover decision criterion used, i.e. RSS based algorithms, bandwidth based algorithms, cost function based algorithms, and the combination algorithms. Moreover, operational fundamentals, advantages, and disadvantages of exemplary VHD algorithms for each class have been presented to assess the tradeoffs between their intricacy of implementation and the efficacy.


Sign in / Sign up

Export Citation Format

Share Document