SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Research Inventy: International Journal Of Engineering And Science
Vol.3, Issue 8 (September 2013), PP 11-18
Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com
11
FUZZY LOGIC BASED INTELLIGENT APPROACH FOR
VERTICAL HANDOVER DECISION IN HETEROGENEOUS
WIRELESS NETWORKS
1
K.Bhagya Lakshmi, 2
dhanaraj Cheelu
1M.Tech student, CSE Department, Ravindra college of Engineering for women, Kurnool, 518004
2 Faculty of engineering, CSE Department, Ravindra college of Engineering for women, Kurnool, 518004
ABSTRACT : Next generation communications will offer a broad range of services accessible to users any
place at any time. Vertical handoff is the rudimentary requirement of the convergence of distinct access
technologies. The dream is that users will not be joined down to a long-term contract with one lone operator and
will rather than be adept to dynamically choose access provision on a per call basis. The evolving comparable
marketplace will supply a alternative of access networks in any granted location, each offering distinct network
technologies with varying characteristics to transport the user’s communications application. Most existing
upright handoff conclusion schemes are designed to rendezvous individual desires that may not achieve a good
scheme presentation. In this paper a smart approach and network selection conclusion scheme is used. The
understanding is founded on the fuzzy reasoning approach that chooses the best available network.
KEYWORDS : Vertical Handoff decision, Events and Triggers, Fuzzy logic, Fuzzification, Crisp value
I. INTRODUCTION
As the technology improvement in wireless communication, the services of wireless connection
networks are quickly growing very promptly. Presently, there are numerous types of wireless systems available to
fulfil distinct needs and requirements of mobile users. When users are roaming among diverse wireless networks,
such as Wireless LANs and 3G, the interconnection of these distinct systems has become a problem. While a
mobile fatal (MT) crosses the treatment boundary of two distinct schemes, its ongoing attachment should be
seamlessly swapped to a new network with a assured QoS. Such a cross-system transfer of an ongoing
connection is generally mentioned to as inter-system, or vertical handover. Vertical handoff is asymmetric
method where wireless fatal moves between two systems with distinct get access to technologies to supply
relentless services for the wireless terminal.
In a homogeneous environment, handover decision is advised as handover initiation step. It represents
the decision of starting or not the handover, and over which cell to hand over in cellular networks for instance.
Conventionally, it is sharp out that the need for level handover arises when the signal strength (SS) of the serving
base position (BS) deteriorates underneath a certain threshold value.In a heterogeneous natural environment,
users can move between distinct access systems. They will advantage from distinct network characteristics
(coverage, bandwidth, latency, power consumption, cost, etc.) that will not be contrasted directly. The handover
method shown comes more convoluted in such an environment contrasted to the homogeneous one.Therefore, the
more demanding problem is the handover conclusion and resolving it can leverage the handover presentation. It
is referred to vertical handover conclusion which desires more criteria (not only SS) contrasted to level handover.
In our paper, we mean by handover initiation the decision for the befitting instant to start the handover and by
network selection the conclusion for the most suitable get access to network. The first alternative can minimize
for example the signalling overhead, avoid unnecessary handovers and forecast disconnections. The second
alternative must satisfy network and client obligations by deciding over which access network to attach at any
issue of time when many when many access networks are available for a specific service.
Fuzzy Logic Based Intelligent…
12
Thus, in each handover conclusion making method, we can face the following questions: How does
vertical handover decision method works? What are the handover conclusion criteria used? How the needed
criteria can be accumulated? What is the handover conclusion principles applied? Who (terminal or network) is
making the conclusion? What are the handover performance optimizations that can be made? In our vision, the
major issues are: blending decision criteria, comparing them and responding client needs anytime and anyplace.
So, we must identify the conclusion factors (criteria, principle, schemes, etc.) and we should use them in order to
optimize handover performance (e.g., throughput, handover delay). Vertical handoff is a three stage method
namely Handoff initiation stage, Handoff decision stage, Handoff execution stage [1]. In this paper we have
presented upright handoff conclusion founded on fuzzy logic to select the best mesh during handover.
II. RELATED WORK
Some papers have addressed designing architecture for hybrid systems, such as the application-layer
session initiation protocol (SIP) [2], the hierarchical mobility management architecture suggested in [3], and the
P-handoff protocol [4]. Although, these papers concentrated on architecture design and did not address the
handoff decision issue or the vertical handoff presentation matters. W. Zhang, in [5], proposes that the vertical
handoff conclusion is formulated as a fuzzy multiple ascribe conclusion-making (MADM) problem. Fuzzy
reasoning is utilized to represent the imprecise information of some attributes of the systems and the preferences
of the user.
III. PROPOSED MODEL
3.1 Trigger Management System
A mobile apparatus is affected by numerous events in heterogeneous wireless environment. There are
distinct kinds of network events that concern to mobility administration that are recognized in [6] - [8]. Though
connection expertise varies, all these initiates and events can be clustered, founded on groups of events associated
to changes in network topology and routing, available access to media, wireless link situation, client activities
and preferences, context data, operator principles, quality of service (QoS) parameters, network composition, and
security alerts.
In the mobility administration, initiates can be classified and filtered based on five criteria: type, source,
occurrence/frequency, happening persistence, and temporal constraints [9]. For example, we recognized three
initiate kinds based on if an event may, will, or should force a handoff. Source corresponds to the entity that
makes the trigger, for example, the wireless access constituent. With esteem to frequency of incident, an
happening may be either periodic (such as, mesh measurements) or asynchronous (such as, the accessibility of a
new network access or a security alert). Eventually, events can be either transient or continual, and they may be
associated with a real-time constraint. There are different kinds of events associated to mobility administration
and vertical handover. The events that concern to application layer mobility management encompass alterations
in QoS parameters, user preferences and security alerts.
The events of network topology and routing information relates to transport and network layer. The
events of wireless connection situation, connection parameters and available media bandwidth are some of the
events that relate to the data connection and personal layers. The figure 1 displays the events and initiates of
distinct levels in mobility management [9]. Initiate management in mobility management gives a facility to
improve hold ups and mistakes.
Now address the case where wireless has listed for a set of events, like accessible bandwidth, link rank,
network burden etc. Now when the network burden starts exceeding then after a certain threshold grade, a initiate
will be generated to describe the status of the network load. This will make the mobile node to take a prior
conclusion to switch to other accessible network.
Fuzzy Logic Based Intelligent…
13
Fig 1: Events and Triggers of Different Layer in Mobility Management
3.2 Fuzzy Inference System
Fuzzy reasoning scheme is utilized for mapping of non linear input data set to scalar output facts and
figures. When the problem is with doubt, then to forecast the correct value among all uncertainties’ we select
fuzzy logic. Fuzzy logic is used to choose the optimal network amidst given systems for handoff conclusion
founded on the multiple parameters as crisp inputs and give the best possible answer to choose the best network..
Input (X)
Output
Fig 2: Block Diagram of Fuzzy Logic System.
The fuzzy algorithm in [10] is as pursues.
1) Characterize the linguistic variables and periods for inputs and yields.
2) Assemble membership functions to the input and yield variables.
3) Construct the Rule groundwork.
4) Convert crunchy input facts and figures to fuzzy standards utilizing membership functions (fuzzification).
5) Assess the directions in the direct base. (Inference)
•User Preferences
•Security Alerts
•Context Information
•OoS Parameters
Application layer
•Network Load
•Network Topology and Routing InformationTransport layer
•Available Foreign Agents
•Network Configuration and Pre-authenticationNetwork layer
•Link Status
•Link Parameters
•Radio Network Access Conditions
Data link layer
•Available B andwidth
•Available Access M ediaPhysical layer
Layers Events and Triggers
Fuzzifier
Inference
Engine
DeFuzzifier
Membership
functions
and Rule
Base Handoff
Decision
Fuzzy Logic Based Intelligent…
14
6) Combine the outcomes of each direct. (Inference)
7) Alter the output facts and figures to non-fuzzy directions. (Defuzzification)
3.3 Architecture of Proposed Handover Decision Model
In the next generation, wireless apparatus are equipped with multiple network interfaces in order to
access heterogeneous wireless networks. So it is a demanding task to organize the complexity of different access
technologies in multi interface wireless apparatus. For multiple wireless apparatus it is essential to provide
seamless connectivity for apparatus which roam not only between cells in homogeneous network but also
between distinct accesses technologies. So we need vertical handover to use the best characteristic of any
technology at one time and another at any other time. This handover decision should be smart enough to take the
conclusion spontaneously. As for genuine time submissions we need more bandwidth and connection should be
alive all the time so conclusion should be smart which supply QoS obligations and witching among networks
should be at right time. Here we propose a form which assembles events from connection level, mesh level and
transport level and takes conclusion based on fuzzy directions. For our model we choose distinct variables, i.e.
signal strength, network burden and accessible bandwidth.
Fig 3: Proposed Intelligent Handover Decision System
Figure 3 displays the form for handover decision scheme. It comprises 4 levels of the OSI form. Link
layer triggers the alterations in interface signal strength and the bandwidth provided by the operator business.
Mesh level carries mobility in heterogeneous natural environment and transport level represents network burden.
Network burden can be observed by ascertaining congestion or flow of packets at transport level. The standards
of the events developed by event generator are feed to the fuzzy inference system. The output of the fuzzy
scheme is the handover decision. Event collector in submission level will assemble events from distinct levels,
i.e., if the accessible bandwidth is less than the required bandwidth then that interface will generate event that
will be collected by happening collector. Then all these events and initiates are forwarded to fuzzy professional
system as crunchy input, then the data from the direct base is taken and inputs are assessed. Event collector
sustains states of every interface variable for farther processing and also maintains last yield assortment that is
returned from fuzzy professional system.
Application
Layer Transport
Layer
Network
Layer
(Mobile IP)
Link
Layer
W-LAN
WiMAX
Cellular
Network
Event
Collector
FIS
Network
Load
Signal
Strength
Available
Bandwidth
UMTS
Handoff Decision
Fuzzy Logic Based Intelligent…
15
III. SIMULATION AND RESULTS
For scheme replication we use Sugeno Fuzzy Inference System. Fuzzy inference collects input values
of signal strength, mesh burden and accessible bandwidth from happening collector as crisp inputs and then
assesses them according to directions. The crisp input is then assessed utilizing direct groundwork. The created
and aggregated yield of directions evaluation is defuzzified and crisp yield is obtained. Figures 4, 5 and 6
show the fuzzy input variable for the accessible bandwidth, network burden and signal power respectively.
Each of the fuzzy variables has three subsets. These sets are mapped to the corresponding Gaussian member’s
purposes. Since here we are utilizing the fuzzy input variables and each of them has three subsets so there are
27 directions. These directions are granted in the Appendix.
4. Available Bandwidth 5. Network Load 6. Signal Strength
Figure 4, 5, 6: Fuzzy Input Variables
The fuzzy set standards for the yield decision variable handoff conclusion are NO, Probably Yes (PY) and Yes
(Y). The universe of discourse for the variable handoff is characterized from 0 to 1.
Now let us consider a wireless apparatus currently in a W-LAN mesh. The entire network interface
variables, i.e. accessible bandwidth, mesh burden, and signal strength of the current mesh are known. Now as
the apparatus moves from one location to another where cellular mesh and UMTS systems are available, the
apparatus interface for cellular mesh and UMTS starts receiving pointers. As the new pointers are obtained,
the triggers of its variable will be developed. The apparatus will evaluate network variables of the present
network with the new one making a conclusion of vertical handover counting on current submission
requirement. Now the crisp inputs of mesh variables are entered in the fuzzy inference scheme through which
they overtake to the direct groundwork to evaluate the yield crunchy worth for network assortment.
Fuzzy Logic Based Intelligent…
16
Fig 7: Rule Base for W-LAN network Fig 8: Rule Base for UMTS network Fig 9: Rule Base for Cellular
network
Fig 10: Network Load, Signal Strength and Handoff Value Fig 11: Network Load, Available Bandwidth and
Handoff Value
Fig 12: Available Bandwidth, Signal Strength and Handoff Value
Fig: Surface Curves
Fuzzy Logic Based Intelligent…
17
Now consider for demonstration, that the crisp input value of present W-LAN mesh for mesh variable
bandwidth, mesh burden and pointer strength be 2.71, 2.83 and 3.01 respectively. As the apparatus moves
from one location to another where cellular network and UMTS are available. The input crisp worth of new
mesh i.e. for UMTS the worth for mesh variables bandwidth, network load and pointer power is 8.37, 8.86 and
8.37 and similarly for cellular mesh the input crunchy value are 6.81, 5.24 and 6.93 respectively. Now putting
these standards to the Sugeno fuzzy professional system, the crisp output for network selection is got for W-
LAN, UMTS and Cellular mesh. Figure 7, 8 and 9 displays the directions evaluation phase of fuzzy expert
system for W-LAN, UMTS and Cellular systems respectively. Figures 10, 11 and 12 displays the surface
bends between mesh load, available bandwidth, and pointer power and handoff values. Crisp yield got from
systems from fusilier is forwarded to the comparator to make last conclusion about the interface assortment.
From the overhead demonstration, the crisp value of handoff yield for W-LAN is 0.284 (No), for UMTS is
0.972 (Yes) and for Cellular mesh is 0.765 (PY). So UMTS will be chosen.
V. CONCLUSION
In this paper an smart approach is utilized to find the best accessible mesh throughout vertical
handover in heterogeneous wireless mesh environment. The Sugeno Fuzzy Inference scheme is utilized to find
the conclusion for vertical handover. The inference scheme uses the crisp input standards for mesh parameters
such as available bandwidth, network burden and signal strength. The standards of these mesh parameters are
collected by event collector and are feed to fuzzy inference scheme. The yield of the fuzzy system is handover
conclusion. In this way a smart approach will be taken founded on yield standards (handoff standards) to select
the best network.
REFERENCES
[1] A. Bhuvaneswari and Dr. E. George Dharma Prakash Raj ,” An Overview of Vertical Handoff Decision Making Algorithms”, I.
J. Computer Network and Information Security, 2012, 9, 55-62.
[2] W.Wu, N.Banerjee, K. Basu, and S. K. Das, “SIP-Based Vertical Handoff between WWANs and WLANs,” IEEE Wireless
Communications, vol. 12, no. 3, pp. 66–72, 2005.
[3] H. Badis and K. Al-Agha, “Fast and Efficient Vertical Handoffs In Wireless Overlay Networks,” in Proceedings of IEEE
International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC ’04), vol. 3, pp. 1968–1972,
Barcelona, Spain, September 2004.
[4] J. Tourrilhes and C. Carter, “P-Handoff: A Protocol for Fine-Grained Peer-To-Peer Vertical Handoff,” in Proceedings of the 13th
IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC ’02), vol. 2, pp. 966971, Lisbon,
Portugal, September 2002.
[5] W. Zhang, “Handover Decision Using Fuzzy MADM In Heterogeneous Networks,” in Proc. IEEE WCNC, Atlanta, GA, Mar.
2004,
pp. 653–658.
[6] P. Prasad, W. Mohr, and W. Konhuser, Third Generation Mobile Communication Systems.Boston: MA: Artech House Publishers,
2005.
[7] Jochen Eisl et al, “Mobility Architecture & Framework - D4.2 Core Report,” 2005, IST- 2002-507134-AN/WP4/D4.2.[8]E.
Casalicchio, V. Cardellini, and S. Tucci, “A Layer-2 Trigger To Improve Qos In Content And Session-Oriented Mobile Services,”
in Proceedings of the 8th ACM international Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems,
Montral, Quebec, Canada, OCT 2005, pp. 95–102.
[9] J. Makela and K. Pentikousis, “Trigger Management Mechanisms”, IEEE 2nd International symposium on wireless pervasive
computing, 2007.
[10]. A short Fuzzy Logic tutorial, April 8, 2010.
Fuzzy Logic Based Intelligent…
18
Appendix
Rules: The rule blocks contain the control strategy of a fuzzy logic system. The rules 'if' part describes the
situation, for which the rules are designed. The 'then' part describes the response of the fuzzy system in this
situation.
IF THEN
Available
Bandwidth
Network
Load
Signal
Strength
Handoff
ValueLow Low Low NO
Low Low Medium NO
Low Low High PY
Low Medium Low NO
Low Medium Medium PY
Low Medium High PY
Low High Low PY
Low High Medium PY
Low High High YES
Medium Low Low NO
Medium Low Medium PY
Medium Low High PY
Medium Medium Low PY
Medium Medium Medium PY
Medium Medium High YES
Medium High Low PY
Medium High Medium YES
Medium High High YES
High Low Low PY
High Low Medium PY
High Low High YES
High Medium Low PY
High Medium Medium YES
High Medium High YES
High High Low YES
High High Medium YES
High High High YES

Weitere ähnliche Inhalte

Was ist angesagt?

Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksEricsson
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKIAEME Publication
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet graphhoc
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429IJRAT
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSijasuc
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)pijans
 
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...IDES Editor
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellulareSAT Publishing House
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Wireless personal communication
Wireless personal communicationWireless personal communication
Wireless personal communicationVenu Madhav
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 

Was ist angesagt? (18)

Gateway Selection in Capillary Networks
Gateway Selection in Capillary NetworksGateway Selection in Capillary Networks
Gateway Selection in Capillary Networks
 
F505052131
F505052131F505052131
F505052131
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
Jz2417141717
Jz2417141717Jz2417141717
Jz2417141717
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
Paper id 26201429
Paper id 26201429Paper id 26201429
Paper id 26201429
 
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLSDATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
DATA AGGREGATION AND PRIVACY FOR POLICE PATROLS
 
International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)International Journal on AdHoc Networking Systems (IJANS)
International Journal on AdHoc Networking Systems (IJANS)
 
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
 
D24019026
D24019026D24019026
D24019026
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
Hf3612861290
Hf3612861290Hf3612861290
Hf3612861290
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Intelligent Agents in Telecommunications
Intelligent Agents in TelecommunicationsIntelligent Agents in Telecommunications
Intelligent Agents in Telecommunications
 
Booysen machine 2012
Booysen machine 2012Booysen machine 2012
Booysen machine 2012
 
Wireless personal communication
Wireless personal communicationWireless personal communication
Wireless personal communication
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 

Andere mochten auch

F043046054
F043046054F043046054
F043046054inventy
 
A0420105
A0420105A0420105
A0420105inventy
 
A generalized bernoulli sub-ODE Method and Its applications for nonlinear evo...
A generalized bernoulli sub-ODE Method and Its applications for nonlinear evo...A generalized bernoulli sub-ODE Method and Its applications for nonlinear evo...
A generalized bernoulli sub-ODE Method and Its applications for nonlinear evo...inventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audioinventy
 
Culture Shift in the Context of Language Shift
Culture Shift in the Context of Language ShiftCulture Shift in the Context of Language Shift
Culture Shift in the Context of Language Shiftinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 

Andere mochten auch (9)

F043046054
F043046054F043046054
F043046054
 
A0420105
A0420105A0420105
A0420105
 
A generalized bernoulli sub-ODE Method and Its applications for nonlinear evo...
A generalized bernoulli sub-ODE Method and Its applications for nonlinear evo...A generalized bernoulli sub-ODE Method and Its applications for nonlinear evo...
A generalized bernoulli sub-ODE Method and Its applications for nonlinear evo...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 AudioNovel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
Novel Approach of Implementing Psychoacoustic model for MPEG-1 Audio
 
Culture Shift in the Context of Language Shift
Culture Shift in the Context of Language ShiftCulture Shift in the Context of Language Shift
Culture Shift in the Context of Language Shift
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 

Ähnlich wie Research Inventy : International Journal of Engineering and Science

Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Editor IJARCET
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Editor IJARCET
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...ijmnct
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIAEME Publication
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile networkBasil John
 
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...Editor IJMTER
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
 
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile SystemsPerformance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systemsjosephjonse
 
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile SystemsPerformance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systemsjosephjonse
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSjosephjonse
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2IAEME Publication
 
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSUSER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSijwmn
 

Ähnlich wie Research Inventy : International Journal of Engineering and Science (20)

C0941017
C0941017C0941017
C0941017
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
 
Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029Volume 2-issue-6-2021-2029
Volume 2-issue-6-2021-2029
 
A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...A vertical handover decision approaches in next generation wireless networks ...
A vertical handover decision approaches in next generation wireless networks ...
 
71 338-347
71 338-34771 338-347
71 338-347
 
Intelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networksIntelligent network selection using fuzzy logic for 4 g wireless networks
Intelligent network selection using fuzzy logic for 4 g wireless networks
 
An efficient vertical handoff mechanism for future mobile network
An efficient vertical handoff mechanism for  future mobile networkAn efficient vertical handoff mechanism for  future mobile network
An efficient vertical handoff mechanism for future mobile network
 
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
A Comparative Analysis of Vertical Handover Decision Process Algorithms for N...
 
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...
 
10
1010
10
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
 
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile SystemsPerformance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
 
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile SystemsPerformance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systems
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
 
Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2Performance and handoff evaluation of heterogeneous wireless networks 2
Performance and handoff evaluation of heterogeneous wireless networks 2
 
Kd3118761881
Kd3118761881Kd3118761881
Kd3118761881
 
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSUSER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETS
 

Mehr von inventy

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...inventy
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuelsinventy
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...inventy
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...inventy
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systemsinventy
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...inventy
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...inventy
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...inventy
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...inventy
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...inventy
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...inventy
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...inventy
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...inventy
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineinventy
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...inventy
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluationinventy
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generationinventy
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...inventy
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezerinventy
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsinventy
 

Mehr von inventy (20)

Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
Experimental Investigation of a Household Refrigerator Using Evaporative-Cool...
 
Copper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation FuelsCopper Strip Corrossion Test in Various Aviation Fuels
Copper Strip Corrossion Test in Various Aviation Fuels
 
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
Additional Conservation Laws for Two-Velocity Hydrodynamics Equations with th...
 
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
Comparative Study of the Quality of Life, Quality of Work Life and Organisati...
 
A Study of Automated Decision Making Systems
A Study of Automated Decision Making SystemsA Study of Automated Decision Making Systems
A Study of Automated Decision Making Systems
 
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
Crystallization of L-Glutamic Acid: Mechanism of Heterogeneous β -Form Nuclea...
 
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
Evaluation of Damage by the Reliability of the Traction Test on Polymer Test ...
 
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...Application of Kennelly’model of Running Performances to Elite Endurance Runn...
Application of Kennelly’model of Running Performances to Elite Endurance Runn...
 
Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...Development and Application of a Failure Monitoring System by Using the Vibra...
Development and Application of a Failure Monitoring System by Using the Vibra...
 
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
The Management of Protected Areas in Serengeti Ecosystem: A Case Study of Iko...
 
Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...Size distribution and biometric relationships of little tunny Euthynnus allet...
Size distribution and biometric relationships of little tunny Euthynnus allet...
 
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
Removal of Chromium (VI) From Aqueous Solutions Using Discarded Solanum Tuber...
 
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...Effect of Various External and Internal Factors on the Carrier Mobility in n-...
Effect of Various External and Internal Factors on the Carrier Mobility in n-...
 
Transient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbineTransient flow analysis for horizontal axial upper-wind turbine
Transient flow analysis for horizontal axial upper-wind turbine
 
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
Choice of Numerical Integration Method for Wind Time History Analysis of Tall...
 
Impacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability EvaluationImpacts of Demand Side Management on System Reliability Evaluation
Impacts of Demand Side Management on System Reliability Evaluation
 
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable GenerationReliability Evaluation of Riyadh System Incorporating Renewable Generation
Reliability Evaluation of Riyadh System Incorporating Renewable Generation
 
The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...The effect of reduced pressure acetylene plasma treatment on physical charact...
The effect of reduced pressure acetylene plasma treatment on physical charact...
 
Experimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum FreezerExperimental Investigation of Mini Cooler cum Freezer
Experimental Investigation of Mini Cooler cum Freezer
 
Growth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin filmsGrowth and Magnetic properties of MnGeP2 thin films
Growth and Magnetic properties of MnGeP2 thin films
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Research Inventy : International Journal of Engineering and Science

  • 1. Research Inventy: International Journal Of Engineering And Science Vol.3, Issue 8 (September 2013), PP 11-18 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com 11 FUZZY LOGIC BASED INTELLIGENT APPROACH FOR VERTICAL HANDOVER DECISION IN HETEROGENEOUS WIRELESS NETWORKS 1 K.Bhagya Lakshmi, 2 dhanaraj Cheelu 1M.Tech student, CSE Department, Ravindra college of Engineering for women, Kurnool, 518004 2 Faculty of engineering, CSE Department, Ravindra college of Engineering for women, Kurnool, 518004 ABSTRACT : Next generation communications will offer a broad range of services accessible to users any place at any time. Vertical handoff is the rudimentary requirement of the convergence of distinct access technologies. The dream is that users will not be joined down to a long-term contract with one lone operator and will rather than be adept to dynamically choose access provision on a per call basis. The evolving comparable marketplace will supply a alternative of access networks in any granted location, each offering distinct network technologies with varying characteristics to transport the user’s communications application. Most existing upright handoff conclusion schemes are designed to rendezvous individual desires that may not achieve a good scheme presentation. In this paper a smart approach and network selection conclusion scheme is used. The understanding is founded on the fuzzy reasoning approach that chooses the best available network. KEYWORDS : Vertical Handoff decision, Events and Triggers, Fuzzy logic, Fuzzification, Crisp value I. INTRODUCTION As the technology improvement in wireless communication, the services of wireless connection networks are quickly growing very promptly. Presently, there are numerous types of wireless systems available to fulfil distinct needs and requirements of mobile users. When users are roaming among diverse wireless networks, such as Wireless LANs and 3G, the interconnection of these distinct systems has become a problem. While a mobile fatal (MT) crosses the treatment boundary of two distinct schemes, its ongoing attachment should be seamlessly swapped to a new network with a assured QoS. Such a cross-system transfer of an ongoing connection is generally mentioned to as inter-system, or vertical handover. Vertical handoff is asymmetric method where wireless fatal moves between two systems with distinct get access to technologies to supply relentless services for the wireless terminal. In a homogeneous environment, handover decision is advised as handover initiation step. It represents the decision of starting or not the handover, and over which cell to hand over in cellular networks for instance. Conventionally, it is sharp out that the need for level handover arises when the signal strength (SS) of the serving base position (BS) deteriorates underneath a certain threshold value.In a heterogeneous natural environment, users can move between distinct access systems. They will advantage from distinct network characteristics (coverage, bandwidth, latency, power consumption, cost, etc.) that will not be contrasted directly. The handover method shown comes more convoluted in such an environment contrasted to the homogeneous one.Therefore, the more demanding problem is the handover conclusion and resolving it can leverage the handover presentation. It is referred to vertical handover conclusion which desires more criteria (not only SS) contrasted to level handover. In our paper, we mean by handover initiation the decision for the befitting instant to start the handover and by network selection the conclusion for the most suitable get access to network. The first alternative can minimize for example the signalling overhead, avoid unnecessary handovers and forecast disconnections. The second alternative must satisfy network and client obligations by deciding over which access network to attach at any issue of time when many when many access networks are available for a specific service.
  • 2. Fuzzy Logic Based Intelligent… 12 Thus, in each handover conclusion making method, we can face the following questions: How does vertical handover decision method works? What are the handover conclusion criteria used? How the needed criteria can be accumulated? What is the handover conclusion principles applied? Who (terminal or network) is making the conclusion? What are the handover performance optimizations that can be made? In our vision, the major issues are: blending decision criteria, comparing them and responding client needs anytime and anyplace. So, we must identify the conclusion factors (criteria, principle, schemes, etc.) and we should use them in order to optimize handover performance (e.g., throughput, handover delay). Vertical handoff is a three stage method namely Handoff initiation stage, Handoff decision stage, Handoff execution stage [1]. In this paper we have presented upright handoff conclusion founded on fuzzy logic to select the best mesh during handover. II. RELATED WORK Some papers have addressed designing architecture for hybrid systems, such as the application-layer session initiation protocol (SIP) [2], the hierarchical mobility management architecture suggested in [3], and the P-handoff protocol [4]. Although, these papers concentrated on architecture design and did not address the handoff decision issue or the vertical handoff presentation matters. W. Zhang, in [5], proposes that the vertical handoff conclusion is formulated as a fuzzy multiple ascribe conclusion-making (MADM) problem. Fuzzy reasoning is utilized to represent the imprecise information of some attributes of the systems and the preferences of the user. III. PROPOSED MODEL 3.1 Trigger Management System A mobile apparatus is affected by numerous events in heterogeneous wireless environment. There are distinct kinds of network events that concern to mobility administration that are recognized in [6] - [8]. Though connection expertise varies, all these initiates and events can be clustered, founded on groups of events associated to changes in network topology and routing, available access to media, wireless link situation, client activities and preferences, context data, operator principles, quality of service (QoS) parameters, network composition, and security alerts. In the mobility administration, initiates can be classified and filtered based on five criteria: type, source, occurrence/frequency, happening persistence, and temporal constraints [9]. For example, we recognized three initiate kinds based on if an event may, will, or should force a handoff. Source corresponds to the entity that makes the trigger, for example, the wireless access constituent. With esteem to frequency of incident, an happening may be either periodic (such as, mesh measurements) or asynchronous (such as, the accessibility of a new network access or a security alert). Eventually, events can be either transient or continual, and they may be associated with a real-time constraint. There are different kinds of events associated to mobility administration and vertical handover. The events that concern to application layer mobility management encompass alterations in QoS parameters, user preferences and security alerts. The events of network topology and routing information relates to transport and network layer. The events of wireless connection situation, connection parameters and available media bandwidth are some of the events that relate to the data connection and personal layers. The figure 1 displays the events and initiates of distinct levels in mobility management [9]. Initiate management in mobility management gives a facility to improve hold ups and mistakes. Now address the case where wireless has listed for a set of events, like accessible bandwidth, link rank, network burden etc. Now when the network burden starts exceeding then after a certain threshold grade, a initiate will be generated to describe the status of the network load. This will make the mobile node to take a prior conclusion to switch to other accessible network.
  • 3. Fuzzy Logic Based Intelligent… 13 Fig 1: Events and Triggers of Different Layer in Mobility Management 3.2 Fuzzy Inference System Fuzzy reasoning scheme is utilized for mapping of non linear input data set to scalar output facts and figures. When the problem is with doubt, then to forecast the correct value among all uncertainties’ we select fuzzy logic. Fuzzy logic is used to choose the optimal network amidst given systems for handoff conclusion founded on the multiple parameters as crisp inputs and give the best possible answer to choose the best network.. Input (X) Output Fig 2: Block Diagram of Fuzzy Logic System. The fuzzy algorithm in [10] is as pursues. 1) Characterize the linguistic variables and periods for inputs and yields. 2) Assemble membership functions to the input and yield variables. 3) Construct the Rule groundwork. 4) Convert crunchy input facts and figures to fuzzy standards utilizing membership functions (fuzzification). 5) Assess the directions in the direct base. (Inference) •User Preferences •Security Alerts •Context Information •OoS Parameters Application layer •Network Load •Network Topology and Routing InformationTransport layer •Available Foreign Agents •Network Configuration and Pre-authenticationNetwork layer •Link Status •Link Parameters •Radio Network Access Conditions Data link layer •Available B andwidth •Available Access M ediaPhysical layer Layers Events and Triggers Fuzzifier Inference Engine DeFuzzifier Membership functions and Rule Base Handoff Decision
  • 4. Fuzzy Logic Based Intelligent… 14 6) Combine the outcomes of each direct. (Inference) 7) Alter the output facts and figures to non-fuzzy directions. (Defuzzification) 3.3 Architecture of Proposed Handover Decision Model In the next generation, wireless apparatus are equipped with multiple network interfaces in order to access heterogeneous wireless networks. So it is a demanding task to organize the complexity of different access technologies in multi interface wireless apparatus. For multiple wireless apparatus it is essential to provide seamless connectivity for apparatus which roam not only between cells in homogeneous network but also between distinct accesses technologies. So we need vertical handover to use the best characteristic of any technology at one time and another at any other time. This handover decision should be smart enough to take the conclusion spontaneously. As for genuine time submissions we need more bandwidth and connection should be alive all the time so conclusion should be smart which supply QoS obligations and witching among networks should be at right time. Here we propose a form which assembles events from connection level, mesh level and transport level and takes conclusion based on fuzzy directions. For our model we choose distinct variables, i.e. signal strength, network burden and accessible bandwidth. Fig 3: Proposed Intelligent Handover Decision System Figure 3 displays the form for handover decision scheme. It comprises 4 levels of the OSI form. Link layer triggers the alterations in interface signal strength and the bandwidth provided by the operator business. Mesh level carries mobility in heterogeneous natural environment and transport level represents network burden. Network burden can be observed by ascertaining congestion or flow of packets at transport level. The standards of the events developed by event generator are feed to the fuzzy inference system. The output of the fuzzy scheme is the handover decision. Event collector in submission level will assemble events from distinct levels, i.e., if the accessible bandwidth is less than the required bandwidth then that interface will generate event that will be collected by happening collector. Then all these events and initiates are forwarded to fuzzy professional system as crunchy input, then the data from the direct base is taken and inputs are assessed. Event collector sustains states of every interface variable for farther processing and also maintains last yield assortment that is returned from fuzzy professional system. Application Layer Transport Layer Network Layer (Mobile IP) Link Layer W-LAN WiMAX Cellular Network Event Collector FIS Network Load Signal Strength Available Bandwidth UMTS Handoff Decision
  • 5. Fuzzy Logic Based Intelligent… 15 III. SIMULATION AND RESULTS For scheme replication we use Sugeno Fuzzy Inference System. Fuzzy inference collects input values of signal strength, mesh burden and accessible bandwidth from happening collector as crisp inputs and then assesses them according to directions. The crisp input is then assessed utilizing direct groundwork. The created and aggregated yield of directions evaluation is defuzzified and crisp yield is obtained. Figures 4, 5 and 6 show the fuzzy input variable for the accessible bandwidth, network burden and signal power respectively. Each of the fuzzy variables has three subsets. These sets are mapped to the corresponding Gaussian member’s purposes. Since here we are utilizing the fuzzy input variables and each of them has three subsets so there are 27 directions. These directions are granted in the Appendix. 4. Available Bandwidth 5. Network Load 6. Signal Strength Figure 4, 5, 6: Fuzzy Input Variables The fuzzy set standards for the yield decision variable handoff conclusion are NO, Probably Yes (PY) and Yes (Y). The universe of discourse for the variable handoff is characterized from 0 to 1. Now let us consider a wireless apparatus currently in a W-LAN mesh. The entire network interface variables, i.e. accessible bandwidth, mesh burden, and signal strength of the current mesh are known. Now as the apparatus moves from one location to another where cellular mesh and UMTS systems are available, the apparatus interface for cellular mesh and UMTS starts receiving pointers. As the new pointers are obtained, the triggers of its variable will be developed. The apparatus will evaluate network variables of the present network with the new one making a conclusion of vertical handover counting on current submission requirement. Now the crisp inputs of mesh variables are entered in the fuzzy inference scheme through which they overtake to the direct groundwork to evaluate the yield crunchy worth for network assortment.
  • 6. Fuzzy Logic Based Intelligent… 16 Fig 7: Rule Base for W-LAN network Fig 8: Rule Base for UMTS network Fig 9: Rule Base for Cellular network Fig 10: Network Load, Signal Strength and Handoff Value Fig 11: Network Load, Available Bandwidth and Handoff Value Fig 12: Available Bandwidth, Signal Strength and Handoff Value Fig: Surface Curves
  • 7. Fuzzy Logic Based Intelligent… 17 Now consider for demonstration, that the crisp input value of present W-LAN mesh for mesh variable bandwidth, mesh burden and pointer strength be 2.71, 2.83 and 3.01 respectively. As the apparatus moves from one location to another where cellular network and UMTS are available. The input crisp worth of new mesh i.e. for UMTS the worth for mesh variables bandwidth, network load and pointer power is 8.37, 8.86 and 8.37 and similarly for cellular mesh the input crunchy value are 6.81, 5.24 and 6.93 respectively. Now putting these standards to the Sugeno fuzzy professional system, the crisp output for network selection is got for W- LAN, UMTS and Cellular mesh. Figure 7, 8 and 9 displays the directions evaluation phase of fuzzy expert system for W-LAN, UMTS and Cellular systems respectively. Figures 10, 11 and 12 displays the surface bends between mesh load, available bandwidth, and pointer power and handoff values. Crisp yield got from systems from fusilier is forwarded to the comparator to make last conclusion about the interface assortment. From the overhead demonstration, the crisp value of handoff yield for W-LAN is 0.284 (No), for UMTS is 0.972 (Yes) and for Cellular mesh is 0.765 (PY). So UMTS will be chosen. V. CONCLUSION In this paper an smart approach is utilized to find the best accessible mesh throughout vertical handover in heterogeneous wireless mesh environment. The Sugeno Fuzzy Inference scheme is utilized to find the conclusion for vertical handover. The inference scheme uses the crisp input standards for mesh parameters such as available bandwidth, network burden and signal strength. The standards of these mesh parameters are collected by event collector and are feed to fuzzy inference scheme. The yield of the fuzzy system is handover conclusion. In this way a smart approach will be taken founded on yield standards (handoff standards) to select the best network. REFERENCES [1] A. Bhuvaneswari and Dr. E. George Dharma Prakash Raj ,” An Overview of Vertical Handoff Decision Making Algorithms”, I. J. Computer Network and Information Security, 2012, 9, 55-62. [2] W.Wu, N.Banerjee, K. Basu, and S. K. Das, “SIP-Based Vertical Handoff between WWANs and WLANs,” IEEE Wireless Communications, vol. 12, no. 3, pp. 66–72, 2005. [3] H. Badis and K. Al-Agha, “Fast and Efficient Vertical Handoffs In Wireless Overlay Networks,” in Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC ’04), vol. 3, pp. 1968–1972, Barcelona, Spain, September 2004. [4] J. Tourrilhes and C. Carter, “P-Handoff: A Protocol for Fine-Grained Peer-To-Peer Vertical Handoff,” in Proceedings of the 13th IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC ’02), vol. 2, pp. 966971, Lisbon, Portugal, September 2002. [5] W. Zhang, “Handover Decision Using Fuzzy MADM In Heterogeneous Networks,” in Proc. IEEE WCNC, Atlanta, GA, Mar. 2004, pp. 653–658. [6] P. Prasad, W. Mohr, and W. Konhuser, Third Generation Mobile Communication Systems.Boston: MA: Artech House Publishers, 2005. [7] Jochen Eisl et al, “Mobility Architecture & Framework - D4.2 Core Report,” 2005, IST- 2002-507134-AN/WP4/D4.2.[8]E. Casalicchio, V. Cardellini, and S. Tucci, “A Layer-2 Trigger To Improve Qos In Content And Session-Oriented Mobile Services,” in Proceedings of the 8th ACM international Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Montral, Quebec, Canada, OCT 2005, pp. 95–102. [9] J. Makela and K. Pentikousis, “Trigger Management Mechanisms”, IEEE 2nd International symposium on wireless pervasive computing, 2007. [10]. A short Fuzzy Logic tutorial, April 8, 2010.
  • 8. Fuzzy Logic Based Intelligent… 18 Appendix Rules: The rule blocks contain the control strategy of a fuzzy logic system. The rules 'if' part describes the situation, for which the rules are designed. The 'then' part describes the response of the fuzzy system in this situation. IF THEN Available Bandwidth Network Load Signal Strength Handoff ValueLow Low Low NO Low Low Medium NO Low Low High PY Low Medium Low NO Low Medium Medium PY Low Medium High PY Low High Low PY Low High Medium PY Low High High YES Medium Low Low NO Medium Low Medium PY Medium Low High PY Medium Medium Low PY Medium Medium Medium PY Medium Medium High YES Medium High Low PY Medium High Medium YES Medium High High YES High Low Low PY High Low Medium PY High Low High YES High Medium Low PY High Medium Medium YES High Medium High YES High High Low YES High High Medium YES High High High YES