Displaying publications 41 - 60 of 89 in total

Abstract:
Sort:
  1. Yew HT, Supriyanto E, Satria MH, Hau YW
    PLoS One, 2016;11(11):e0165888.
    PMID: 27814388 DOI: 10.1371/journal.pone.0165888
    In heterogeneous wireless networks, wireless local area network (WLAN) is highly preferred by mobile terminals (MTs) owing to its high transmission bandwidth and low access cost. However, in high-speed environment, handover from a cellular network to a WLAN cell will lead to a high number of handover failures and unnecessary handovers due to the WLAN coverage limitation and will become worse at high speed. A new vertical handover method is proposed to minimize the probability of handover failure and unnecessary handover while maximizing the usage of WLAN in high-speed environment. The simulation results show that the proposed method kept the probability of handover failure and unnecessary handover below 0.5% and 1%, respectively. Compared with previous studies, the proposed method reduced the number of handover failures and unnecessary handovers up to 80.0% and 97.7%, respectively, while the MT is highly mobile. Using the proposed prediction method, the MT can benefit high bandwidth and low network access cost from the WLAN with minimum interruption regardless of speed.
    Matched MeSH terms: Computer Communication Networks/instrumentation*
  2. Jahanirad M, Anuar NB, Wahab AWA
    Forensic Sci Int, 2017 Mar;272:111-126.
    PMID: 28129583 DOI: 10.1016/j.forsciint.2017.01.010
    The VoIP services provide fertile ground for criminal activity, thus identifying the transmitting computer devices from recorded VoIP call may help the forensic investigator to reveal useful information. It also proves the authenticity of the call recording submitted to the court as evidence. This paper extended the previous study on the use of recorded VoIP call for blind source computer device identification. Although initial results were promising but theoretical reasoning for this is yet to be found. The study suggested computing entropy of mel-frequency cepstrum coefficients (entropy-MFCC) from near-silent segments as an intrinsic feature set that captures the device response function due to the tolerances in the electronic components of individual computer devices. By applying the supervised learning techniques of naïve Bayesian, linear logistic regression, neural networks and support vector machines to the entropy-MFCC features, state-of-the-art identification accuracy of near 99.9% has been achieved on different sets of computer devices for both call recording and microphone recording scenarios. Furthermore, unsupervised learning techniques, including simple k-means, expectation-maximization and density-based spatial clustering of applications with noise (DBSCAN) provided promising results for call recording dataset by assigning the majority of instances to their correct clusters.
    Matched MeSH terms: Computer Communication Networks*
  3. Onwuegbuzie IU, Abd Razak S, Fauzi Isnin I, Darwish TSJ, Al-Dhaqm A
    PLoS One, 2020;15(8):e0237154.
    PMID: 32797055 DOI: 10.1371/journal.pone.0237154
    Data prioritization of heterogeneous data in wireless sensor networks gives meaning to mission-critical data that are time-sensitive as this may be a matter of life and death. However, the standard IEEE 802.15.4 does not consider the prioritization of data. Prioritization schemes proffered in the literature have not adequately addressed this issue as proposed schemes either uses a single or complex backoff algorithm to estimate backoff time-slots for prioritized data. Subsequently, the carrier sense multiple access with collision avoidance scheme exhibits an exponentially increasing range of backoff times. These approaches are not only inefficient but result in high latency and increased power consumption. In this article, the concept of class of service (CS) was adopted to prioritize heterogeneous data (real-time and non-real-time), resulting in an optimized prioritized backoff MAC scheme called Class of Service Traffic Priority-based Medium Access Control (CSTP-MAC). This scheme classifies data into high priority data (HPD) and low priority data (LPD) by computing backoff times with expressions peculiar to the data priority class. The improved scheme grants nodes the opportunity to access the shared medium in a timely and power-efficient manner. Benchmarked against contemporary schemes, CSTP-MAC attained a 99% packet delivery ratio with improved power saving capability, which translates to a longer operational lifetime.
    Matched MeSH terms: Computer Communication Networks*
  4. Kaiwartya O, Kumar S, Lobiyal DK, Abdullah AH, Hassan AN
    Sensors (Basel), 2014;14(12):22342-71.
    PMID: 25429415 DOI: 10.3390/s141222342
    Geographic routing is one of the most investigated themes by researchers for reliable and efficient dissemination of information in Vehicular Ad Hoc Networks (VANETs). Recently, different Geographic Distance Routing (GEDIR) protocols have been suggested in the literature. These protocols focus on reducing the forwarding region towards destination to select the Next Hop Vehicles (NHV). Most of these protocols suffer from the problem of elevated one-hop link disconnection, high end-to-end delay and low throughput even at normal vehicle speed in high vehicle density environment. This paper proposes a Geographic Distance Routing protocol based on Segment vehicle, Link quality and Degree of connectivity (SLD-GEDIR). The protocol selects a reliable NHV using the criteria segment vehicles, one-hop link quality and degree of connectivity. The proposed protocol has been simulated in NS-2 and its performance has been compared with the state-of-the-art protocols: P-GEDIR, J-GEDIR and V-GEDIR. The empirical results clearly reveal that SLD-GEDIR has lower link disconnection and end-to-end delay, and higher throughput as compared to the state-of-the-art protocols. It should be noted that the performance of the proposed protocol is preserved irrespective of vehicle density and speed.
    Matched MeSH terms: Computer Communication Networks
  5. Zubair S, Fisal N
    Sensors (Basel), 2014;14(5):8996-9026.
    PMID: 24854362 DOI: 10.3390/s140508996
    The need for implementing reliable data transfer in resource-constrained cognitive radio ad hoc networks is still an open issue in the research community. Although geographical forwarding schemes are characterized by their low overhead and efficiency in reliable data transfer in traditional wireless sensor network, this potential is still yet to be utilized for viable routing options in resource-constrained cognitive radio ad hoc networks in the presence of lossy links. In this paper, a novel geographical forwarding technique that does not restrict the choice of the next hop to the nodes in the selected route is presented. This is achieved by the creation of virtual clusters based on spectrum correlation from which the next hop choice is made based on link quality. The design maximizes the use of idle listening and receiver contention prioritization for energy efficiency, the avoidance of routing hot spots and stability. The validation result, which closely follows the simulation result, shows that the developed scheme can make more advancement to the sink as against the usual decisions of relevant ad hoc on-demand distance vector route select operations, while ensuring channel quality. Further simulation results have shown the enhanced reliability, lower latency and energy efficiency of the presented scheme.
    Matched MeSH terms: Computer Communication Networks
  6. Shamsan Saleh AM, Ali BM, Rasid MF, Ismail A
    Sensors (Basel), 2012;12(8):11307-33.
    PMID: 23112658 DOI: 10.3390/s120811307
    Planning of energy-efficient protocols is critical for Wireless Sensor Networks (WSNs) because of the constraints on the sensor nodes' energy. The routing protocol should be able to provide uniform power dissipation during transmission to the sink node. In this paper, we present a self-optimization scheme for WSNs which is able to utilize and optimize the sensor nodes' resources, especially the batteries, to achieve balanced energy consumption across all sensor nodes. This method is based on the Ant Colony Optimization (ACO) metaheuristic which is adopted to enhance the paths with the best quality function. The assessment of this function depends on multi-criteria metrics such as the minimum residual battery power, hop count and average energy of both route and network. This method also distributes the traffic load of sensor nodes throughout the WSN leading to reduced energy usage, extended network life time and reduced packet loss. Simulation results show that our scheme performs much better than the Energy Efficient Ant-Based Routing (EEABR) in terms of energy consumption, balancing and efficiency.
    Matched MeSH terms: Computer Communication Networks
  7. Umar IA, Mohd Hanapi Z, Sali A, Zulkarnain ZA
    Sensors (Basel), 2016 Jun 22;16(6).
    PMID: 27338411 DOI: 10.3390/s16060943
    Resource bound security solutions have facilitated the mitigation of spatio-temporal attacks by altering protocol semantics to provide minimal security while maintaining an acceptable level of performance. The Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol for Wireless Sensor Network (WSN) has been proposed to achieve a minimal selection of malicious nodes by introducing a dynamic collection window period to the protocol's semantics. However, its selection scheme suffers substantial packet losses due to the utilization of a single distance based parameter for node selection. In this paper, we propose a Fuzzy-based Geographic Forwarding protocol (FuGeF) to minimize packet loss, while maintaining performance. The FuGeF utilizes a new form of dynamism and introduces three selection parameters: remaining energy, connectivity cost, and progressive distance, as well as a Fuzzy Logic System (FLS) for node selection. These introduced mechanisms ensure the appropriate selection of a non-malicious node. Extensive simulation experiments have been conducted to evaluate the performance of the proposed FuGeF protocol as compared to DWSIGF variants. The simulation results show that the proposed FuGeF outperforms the two DWSIGF variants (DWSIGF-P and DWSIGF-R) in terms of packet delivery.
    Matched MeSH terms: Computer Communication Networks
  8. Zubair S, Syed Yusoff SK, Fisal N
    Sensors (Basel), 2016;16(2):172.
    PMID: 26840312 DOI: 10.3390/s16020172
    The emergence of the Internet of Things and the proliferation of mobile wireless devices has brought the area of mobile cognitive radio sensor networks (MCRSN) to the research spot light. Notwithstanding the potentials of CRSNs in terms of opportunistic channel usage for bursty traffic, the effect of the mobility of resource-constrained nodes to route stability, mobility-induced spatio-temporal spectral opportunities and primary user (PU) protection still remain open issues that need to be jointly addressed. To this effect, this paper proposes a mobile reliable geographical forwarding routing (MROR) protocol. MROR provides a robust mobile framework for geographical forwarding that is based on a mobility-induced channel availability model. It presents a comprehensive routing strategy that considers PU activity (to take care of routes that have to be built through PU coverage), PU signal protection (by the introduction of a mobility-induced guard (mguard) distance) and the random mobility-induced spatio-temporal spectrum opportunities (for enhancement of throughput). It also addresses the issue of frequent route maintenance that arises when speeds of the mobile nodes are considered as a routing metric. As a result, simulation has shown the ability of MROR to reduce the route failure rate by about 65% as against other schemes. In addition, further results show that MROR can improve both the throughput and goodput at the sink in an energy-efficient manner that is required in CRSNs as against compared works.
    Matched MeSH terms: Computer Communication Networks
  9. Homaei MH, Salwana E, Shamshirband S
    Sensors (Basel), 2019 Jul 18;19(14).
    PMID: 31323905 DOI: 10.3390/s19143173
    "Internet of Things (IoT)" has emerged as a novel concept in the world of technology and communication. In modern network technologies, the capability of transmitting data through data communication networks (such as Internet or intranet) is provided for each organism (e.g. human beings, animals, things, and so forth). Due to the limited hardware and operational communication capability as well as small dimensions, IoT undergoes several challenges. Such inherent challenges not only cause fundamental restrictions in the efficiency of aggregation, transmission, and communication between nodes; but they also degrade routing performance. To cope with the reduced availability time and unstable communications among nodes, data aggregation, and transmission approaches in such networks are designed more intelligently. In this paper, a distributed method is proposed to set child balance among nodes. In this method, the height of the network graph increased through restricting the degree; and network congestion reduced as a result. In addition, a dynamic data aggregation approach based on Learning Automata was proposed for Routing Protocol for Low-Power and Lossy Networks (LA-RPL). More specifically, each node was equipped with learning automata in order to perform data aggregation and transmissions. Simulation and experimental results indicate that the LA-RPL has better efficiency than the basic methods used in terms of energy consumption, network control overhead, end-to-end delay, loss packet and aggregation rates.
    Matched MeSH terms: Computer Communication Networks
  10. Mustaffa Samad
    Scientific Research Journal, 2006;3(1):27-36.
    MyJurnal
    The Internet has been an integral part of the Information and Communication
    Technology (ICT) community in recent years. New internet users have been
    growing steadily over the years. This has lead to the depletion of new Internet
    Protocol (IP) addresses worldwide. To overcome this predicament, the new
    Internet Protocol version 6 (IPv6) had been introduced. The existing Internet
    Protocol version 4 (IPv4) is expected to be eventually replaced by this IPv6.
    The changeover from IPv4 to IPv6 is expected to be implemented progressively.
    During this transition period, these two protocols are expected to coexist for
    a number of years. IPv4-to-IPv6 transition tools have been designed to facilitate
    a smooth transition from IPv4 to IPv6. The two most basic IPv4-to-IPv6
    transition tools available are the hybrid stack mechanism and tunneling.
    Tunneling is the encapsulation of IPv6 traffic within IPv4 packets so they can
    be sent over an IPv4 infrastructure. This project was initiated to set up an
    experimental IPv6 testbed, in order to study the performance as well as
    transition and migration issues of IPv6 networks under controlled conditions.
    This paper looks at how tunneling can be performed over existing internetwork
    infrastructure at Fakulti Kejuruteraan Elektrik (FKE), UiTM.
    Matched MeSH terms: Computer Communication Networks
  11. Yee PL, Mehmood S, Almogren A, Ali I, Anisi MH
    PeerJ Comput Sci, 2020;6:e326.
    PMID: 33816976 DOI: 10.7717/peerj-cs.326
    Opportunistic routing is an emerging routing technology that was proposed to overcome the drawback of unreliable transmission, especially in Wireless Sensor Networks (WSNs). Over the years, many forwarder methods were proposed to improve the performance in opportunistic routing. However, based on existing works, the findings have shown that there is still room for improvement in this domain, especially in the aspects of latency, network lifetime, and packet delivery ratio. In this work, a new relay node selection method was proposed. The proposed method used the minimum or maximum range and optimum energy level to select the best relay node to forward packets to improve the performance in opportunistic routing. OMNeT++ and MiXiM framework were used to simulate and evaluate the proposed method. The simulation settings were adopted based on the benchmark scheme. The evaluation results showed that our proposed method outperforms in the aspect of latency, network lifetime, and packet delivery ratio as compared to the benchmark scheme.
    Matched MeSH terms: Computer Communication Networks
  12. Ng KJ, Islam MT, Alevy AM, Mansor MF
    Sensors (Basel), 2020 Apr 26;20(9).
    PMID: 32357426 DOI: 10.3390/s20092456
    This paper presents an ultralow profile, low passive intermodulation (PIM), and super-wideband in-building ceiling mount antenna that covers both the cellular and public safety ultra high frequency (UHF) band for distributed antenna system (DAS) applications. The proposed antenna design utilizes a modified 2-D planar discone design concept that is miniaturized to fit into a small disc-shaped radome. The 2-D planar discone has an elliptical-shaped disc monopole and a bell-shaped ground plane, a stub at the shorting path, with asymmetrical structure and an additional proximity coupling patch to maximize the available electrical path to support the 350 MHz band range. The proposed design maximizes the radome area with a reduction of about 62% compared to similar concept type antennas. Besides, the proposed design exhibits an improved radiation pattern with null reduction compared to a typical dipole/monopole when lies at the horizontal plane. A prototype was manufactured to demonstrate the antenna performance. The VSWR and radiation pattern results agreed with the simulated results. The proposed antenna achieves a band ratio of 28.57:1 while covering a frequency range of 350-10,000 MHz. The measured passive intermodulation levels are better than -150 dBc (2 × 20 Watts) for 350, 700 and 1920 MHz bands.
    Matched MeSH terms: Computer Communication Networks
  13. Jan S, Yafi E, Hafeez A, Khatana HW, Hussain S, Akhtar R, et al.
    Sensors (Basel), 2021 Apr 25;21(9).
    PMID: 33922886 DOI: 10.3390/s21093000
    A significant increase has been observed in the use of Underwater Wireless Sensor Networks (UWSNs) over the last few decades. However, there exist several associated challenges with UWSNs, mainly due to the nodes' mobility, increased propagation delay, limited bandwidth, packet duplication, void holes, and Doppler/multi-path effects. To address these challenges, we propose a protocol named "An Efficient Routing Protocol based on Master-Slave Architecture for Underwater Wireless Sensor Network (ERPMSA-UWSN)" that significantly contributes to optimizing energy consumption and data packet's long-term survival. We adopt an innovative approach based on the master-slave architecture, which results in limiting the forwarders of the data packet by restricting the transmission through master nodes only. In this protocol, we suppress nodes from data packet reception except the master nodes. We perform extensive simulation and demonstrate that our proposed protocol is delay-tolerant and energy-efficient. We achieve an improvement of 13% on energy tax and 4.8% on Packet Delivery Ratio (PDR), over the state-of-the-art protocol.
    Matched MeSH terms: Computer Communication Networks
  14. Shaukat HR, Hashim F, Shaukat MA, Ali Alezabi K
    Sensors (Basel), 2020 Apr 17;20(8).
    PMID: 32316487 DOI: 10.3390/s20082283
    Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes' important credentials and subsequently replicate the nodes, which may expose the network to a number of other security attacks, and eventually compromise the entire network. This harmful attack where a single or more nodes illegitimately claims an identity as replicas is known as the node replication attack. The problem of node replication attack can be further aggravated due to the mobile nature in WSN. In this paper, we propose an extended version of multi-level replica detection technique built on Danger Theory (DT), which utilizes a hybrid approach (centralized and distributed) to shield the mobile wireless sensor networks (MWSNs) from clone attacks. The danger theory concept depends on a multi-level of detections; first stage (highlights the danger zone (DZ) by checking the abnormal behavior of mobile nodes), second stage (battery check and random number) and third stage (inform about replica to other networks). The DT method performance is highlighted through security parameters such as false negative, energy, detection time, communication overhead and delay in detection. The proposed approach also demonstrates that the hybrid DT method is capable and successful in detecting and mitigating any malicious activities initiated by the replica. Nowadays, crimes are vastly increasing and it is crucial to modify the systems accordingly. Indeed, it is understood that the communication needs to be secured by keen observation at each level of detection. The simulation results show that the proposed approach overcomes the weaknesses of the previous and existing centralized and distributed approaches and enhances the performance of MWSN in terms of communication and memory overhead.
    Matched MeSH terms: Computer Communication Networks
  15. Al-Ani A, Anbar M, Laghari SA, Al-Ani AK
    PLoS One, 2020;15(5):e0232574.
    PMID: 32392261 DOI: 10.1371/journal.pone.0232574
    OpenFlow makes a network highly flexible and fast-evolving by separating control and data planes. The control plane thus becomes responsive to changes in topology and load balancing requirements. OpenFlow also offers a new approach to handle security threats accurately and responsively. Therefore, it is used as an innovative firewall that acts as a first-hop security to protect networks against malicious users. However, the firewall provided by OpenFlow suffers from Internet protocol version 6 (IPv6) fragmentation, which can be used to bypass the OpenFlow firewall. The OpenFlow firewall cannot identify the message payload unless the switch implements IPv6 fragment reassembly. This study tests the IPv6 fragmented packets that can evade the OpenFlow firewall, and proposes a new mechanism to guard against attacks carried out by malicious users to exploit IPv6 fragmentation loophole in OpenFlow networks. The proposed mechanism is evaluated in a simulated environment by using six scenarios, and results exhibit that the proposed mechanism effectively fixes the loophole and successfully prevents the abuse of IPv6 fragmentation in OpenFlow networks.
    Matched MeSH terms: Computer Communication Networks
  16. Budati AK, Islam S, Hasan MK, Safie N, Bahar N, Ghazal TM
    Sensors (Basel), 2023 May 25;23(11).
    PMID: 37299798 DOI: 10.3390/s23115072
    The global expansion of the Visual Internet of Things (VIoT)'s deployment with multiple devices and sensor interconnections has been widespread. Frame collusion and buffering delays are the primary artifacts in the broad area of VIoT networking applications due to significant packet loss and network congestion. Numerous studies have been carried out on the impact of packet loss on Quality of Experience (QoE) for a wide range of applications. In this paper, a lossy video transmission framework for the VIoT considering the KNN classifier merged with the H.265 protocols. The performance of the proposed framework was assessed while considering the congestion of encrypted static images transmitted to the wireless sensor networks. The performance analysis of the proposed KNN-H.265 protocol is compared with the existing traditional H.265 and H.264 protocols. The analysis suggests that the traditional H.264 and H.265 protocols cause video conversation packet drops. The performance of the proposed protocol is estimated with the parameters of frame number, delay, throughput, packet loss ratio, and Peak Signal to Noise Ratio (PSNR) on MATLAB 2018a simulation software. The proposed model gives 4% and 6% better PSNR values than the existing two methods and better throughput.
    Matched MeSH terms: Computer Communication Networks
  17. Jabeen T, Jabeen I, Ashraf H, Jhanjhi NZ, Yassine A, Hossain MS
    Sensors (Basel), 2023 May 25;23(11).
    PMID: 37299782 DOI: 10.3390/s23115055
    The Internet of Things (IoT) uses wireless networks without infrastructure to install a huge number of wireless sensors that track system, physical, and environmental factors. There are a variety of WSN uses, and some well-known application factors include energy consumption and lifespan duration for routing purposes. The sensors have detecting, processing, and communication capabilities. In this paper, an intelligent healthcare system is proposed which consists of nano sensors that collect real-time health status and transfer it to the doctor's server. Time consumption and various attacks are major concerns, and some existing techniques contain stumbling blocks. Therefore, in this research, a genetic-based encryption method is advocated to protect data transmitted over a wireless channel using sensors to avoid an uncomfortable data transmission environment. An authentication procedure is also proposed for legitimate users to access the data channel. Results show that the proposed algorithm is lightweight and energy efficient, and time consumption is 90% lower with a higher security ratio.
    Matched MeSH terms: Computer Communication Networks
  18. Devan PAM, Ibrahim R, Omar M, Bingi K, Abdulrab H
    Sensors (Basel), 2023 Jul 07;23(13).
    PMID: 37448072 DOI: 10.3390/s23136224
    A novel hybrid Harris Hawk-Arithmetic Optimization Algorithm (HHAOA) for optimizing the Industrial Wireless Mesh Networks (WMNs) and real-time pressure process control was proposed in this research article. The proposed algorithm uses inspiration from Harris Hawk Optimization and the Arithmetic Optimization Algorithm to improve position relocation problems, premature convergence, and the poor accuracy the existing techniques face. The HHAOA algorithm was evaluated on various benchmark functions and compared with other optimization algorithms, namely Arithmetic Optimization Algorithm, Moth Flame Optimization, Sine Cosine Algorithm, Grey Wolf Optimization, and Harris Hawk Optimization. The proposed algorithm was also applied to a real-world industrial wireless mesh network simulation and experimentation on the real-time pressure process control system. All the results demonstrate that the HHAOA algorithm outperforms different algorithms regarding mean, standard deviation, convergence speed, accuracy, and robustness and improves client router connectivity and network congestion with a 31.7% reduction in Wireless Mesh Network routers. In the real-time pressure process, the HHAOA optimized Fractional-order Predictive PI (FOPPI) Controller produced a robust and smoother control signal leading to minimal peak overshoot and an average of a 53.244% faster settling. Based on the results, the algorithm enhanced the efficiency and reliability of industrial wireless networks and real-time pressure process control systems, which are critical for industrial automation and control applications.
    Matched MeSH terms: Computer Communication Networks
  19. Safa Sadiq A, Fisal NB, Ghafoor KZ, Lloret J
    ScientificWorldJournal, 2014;2014:602808.
    PMID: 25614890 DOI: 10.1155/2014/602808
    We propose an Advanced Mobility Handover scheme (AMH) in this paper for seamless mobility in MIPv6-based wireless networks. In the proposed scheme, the mobile node utilizes a unique home IPv6 address developed to maintain communication with other corresponding nodes without a care-of-address during the roaming process. The IPv6 address for each MN during the first round of AMH process is uniquely identified by HA using the developed MN-ID field as a global permanent, which is identifying uniquely the IPv6 address of MN. Moreover, a temporary MN-ID is generated by access point each time an MN is associated with a particular AP and temporarily saved in a developed table inside the AP. When employing the AMH scheme, the handover process in the network layer is performed prior to its default time. That is, the mobility handover process in the network layer is tackled by a trigger developed AMH message to the next access point. Thus, a mobile node keeps communicating with the current access point while the network layer handover is executed by the next access point. The mathematical analyses and simulation results show that the proposed scheme performs better as compared with the existing approaches.
    Matched MeSH terms: Computer Communication Networks*
  20. Sadiq AS, Fisal NB, Ghafoor KZ, Lloret J
    ScientificWorldJournal, 2014;2014:610652.
    PMID: 25574490 DOI: 10.1155/2014/610652
    We propose an adaptive handover prediction (AHP) scheme for seamless mobility based wireless networks. That is, the AHP scheme incorporates fuzzy logic with AP prediction process in order to lend cognitive capability to handover decision making. Selection metrics, including received signal strength, mobile node relative direction towards the access points in the vicinity, and access point load, are collected and considered inputs of the fuzzy decision making system in order to select the best preferable AP around WLANs. The obtained handover decision which is based on the calculated quality cost using fuzzy inference system is also based on adaptable coefficients instead of fixed coefficients. In other words, the mean and the standard deviation of the normalized network prediction metrics of fuzzy inference system, which are collected from available WLANs are obtained adaptively. Accordingly, they are applied as statistical information to adjust or adapt the coefficients of membership functions. In addition, we propose an adjustable weight vector concept for input metrics in order to cope with the continuous, unpredictable variation in their membership degrees. Furthermore, handover decisions are performed in each MN independently after knowing RSS, direction toward APs, and AP load. Finally, performance evaluation of the proposed scheme shows its superiority compared with representatives of the prediction approaches.
    Matched MeSH terms: Computer Communication Networks*
Filters
Contact Us

Please provide feedback to Administrator (afdal@afpm.org.my)

External Links