SlideShare a Scribd company logo
1 of 7
Download to read offline
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 2, April 2020, pp. 669~675
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i2. 14894  669
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Failed handoffs in collaborative Wi-Fi networks
Cesar Hernandez, Diego Giral, C. Salgado
Technological Faculty, Universidad Distrital Francisco Jose de Caldas, Colombia
Article Info ABSTRACT
Article history:
Received Dec 9, 2019
Revised Dec 31, 2019
Accepted Feb 5, 2020
Cognitive radio networks enable a more efficient use of the radioelectric
spectrum through dynamic access. Decentralized cognitive radio networks
have gained popularity due to their advantages over centralized networks.
The purpose of this article is to propose the collaboration between secondary
users for cognitive Wi-Fi networks, in the form of two multi-criteria
decision-making algorithms known as TOPSIS and VIKOR and assess their
performance in terms of the number of failed handoffs. The comparative
analysis is established under four different scenarios, according to the service
class and the traffic level, within the Wi-Fi frequency band. The results show
the performance evaluation obtained through simulations and experimental
measurements, where the VIKOR algorithm has a better performance in
terms of failed handoffs under different scenarios and collaboration levels.
Keywords:
Cognitive radio
Failed handoff
GSM
MCDM
Spectral decision
Wireless networks
This is an open access article under the CC BY-SA license.
Corresponding Author:
Cesar Hernandez,
Technological Faculty,
Universidad Distrital Francisco Jose de Caldas,
Calle 68D Bis a Sur # 49F–70, Bogotá D.C., 111941, Colombia.
Email: cahernandezs@udistrital.edu.co
1. INTRODUCTION
Currently, wireless communication systems exhibit certain defficiencies in voice and data services
due to the saturation and scarcity in frequency bands within the spectrum. This can be explained by
the considerable increase of mobile devices in the radiofrequency network [1]. According to some studies, it
is expected that the IP traffic grows by 168 Exabytes in 2020 with the number of mobile devices equal to
three times the worldwide population [2]. However, time-based and geographic studies carried out by
the Federal Communications Commission of the United States [3] show that most of the radiofrequency
spectrum is used inefficiently.
This has prompted the use of strategies seeking to mitigate the issue [4]. Cognitive Radio (CR) rises
as a technology conceived to overcome this problem, through the dynamic access of the spectrum, and
characterized to perceive, learn and plan (decision-making) according to the current conditions of
the network [5–9]. This technology increases the bandwidth capacity and dynamic access to the spectrum
guaranteeing that there are no interferences between licensed primary users [8, 10].
Centralized networks are architectures with an infrastructure that operates under the command of
a central coordinator. The information from each SU feeds the central base, so that it can make decisions to
maximize communication parameters. However, this is not the best option for large scale systems and
applications in public security networks. The increase in measuring costs, system complexity and potential
unbalance and chaos in case of failure (vulnerability) turns it into a non-feasible architecture for CRN [11].
The previous scenario can be solved if the responsibility of the information is split among different control
points, serving as a baseline criterion for descentralized cognitive radio networks (DCRN).
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 669 - 675
670
The problem of the present research consists on carrying out the decision-making process for
a DCRN, giving the nodes the capacity to learn from the environment and proposing strategies that allow
the SU to exchange information collaboratively. The proposed solution is based on cooperative DCRN as this
work proposes the collaboration between secondary users through the exchange of information between
them [10, 12, 13].
This article presents a comparative assessment of the multi-criteria decision-making algorithms
TOPSIS and VIKOR for a Wi-Fi DCRN. Both algorithms are assessed and compared in terms of the average
number of failed handoffs over a 9-minute transmission for the same information size. The comparative
analysis is carried out in four different scenarios based on the service class (real time and better effort) and
the traffic level (high and low): real time (RT) with high traffic (HT), better effort (BE) with low traffic (LT),
RT with LT and BE with HT. The main contribution of the proposed solution is to show the performance
assessment obtained through simulations and experimental measurements, considering different collaboration
levels within the analysis (10%, 20%, 50%, 80% and 100%) between secondary users, which share
space-time information on spectral occupancy feeding the database of the decision-making algorithms.
2. RESEARCH METHOD
To determine the performance of each algorithm, a simulation tool was developed by the authors, in
which the simulation environment progressively recreates the behavior of spectral occupancy based on real
data captured in a metering campaign in the Wi-Fi frequency band. The spectral occupancy behavior
corresponds to a metering campaign that lasted several weeks in the city of Bogotá, Colombia [14].
The energy detection technique was used to determine the availability matrix for each channel in the Wi-Fi
frequency band. The decision threshold for the power variable was 5 dBm above noise floor.
One of the main contributions of this research is derived from handling experimental data of spectral
occupancy which is the result of studying the collaborative activity between SU to determine the best spectral
opportunities. The present research implemented and adapted a collaboration system combining TOPSIS and
VIKOR algorithms, through a module for information exchange between secondary users. Initially, each
secondary user stores the last k data in the radioelectric environment retrieved from information shared
between SU. It is assumed that there are 100 SU with heterogeneous information of the spectrum for a given
node of the descentralized network, and a percentage of that amount is used to gather the information used by
the TOPSIS and VIKOR algorithms to sort out the spectral opportunities. The purpose of this process is to
assess the influence of the cooperation between secondary users for a DCRN scenario.
2.1. Spectral allocation algorithms
The chosen alternatives for multi-criteria decision-making algorithms (MCDM) are the technique
for order preference by similiarity to Ideal solution (TOPSIS) and the multi-criteria optimization and
compromise solution (VIKOR).
2.1.1. TOPSIS
This algorithm has two sections: the unacceptable solution in any scenario and the ideal solution
of the system. Initially, the decision matrix X is built and then normalized using the square root method (1)
[15–19].
11 1 1 11 1
1 1 1
M M M
N NM N M NM
X
     
     
   
   
= =   
   
   
(1)
where ωi is the weight assigned to criterion i and the sum of weights must be equal to 1.
Afterwards, the ideal solution is determined as well as the worst solution, as described in (2) and (3).
( ) ( )   ij ij 1 MA max |j X , min |j X , ,   + + − + +
=   =  (2)
( ) ( )   ij ij 1 MA min |j X , max |j X , ,   − + − − −
=   =  (3)
where i = 1...M. X+ and X- are the set of benefits and costs, respectively.
TELKOMNIKA Telecommun Comput El Control 
Failed handoffs in collaborative Wi-Fi networks (Cesar Hernandez)
671
Afterwards, the Euclidian distance D is calculated for each alternative as seen in (4) and (5).
( )
M
2
i ij j
j 1
D i 1, , N + +
=
= − =  (4)
( )
M
2
i ij j
j 1
D i 1, , N − −
=
= − =  (5)
Finally, the alternatives are organized in descending order, according to the preference index given
by (6).
i
i
i i
D
C , i 1, ,N.
D D
−
+
+ −
= = 
+
(6)
2.1.2. VIKOR
The VIKOR method assumes that each alternative is assessed based on each criterion function, and
the classification can be established by comparing the measurements and choosing which are closest to
the ideal alternative [20–22]. In [16, 23–25], the procedure of the VIKOR algorithm is described. For each
parameter j = 1, 2, 3, …, N, the best and worst values are determined as shown in (7) and (8).
( ) ( ) j ij b ij c
i Mi M
F max x |j N , min x |j N+

=   (7)
( ) ( ) j ij b ij c
i M i M
F min x |j N , max x |j N−
 
=   (8)
where the benefit and cost parameters respectively named Nb and Nc belong to N.
Afterwards, the values of iS and iR for i= 1, 2, 3,…, M, are computed as described in (9)
and (10).
( )
( )
j ij
i j
j N j j
F x
S w
F F
+
+ −

−
=
−
 (9)
( )
( )
j ij
i j
i N
j j
F x
R max w
F F
+
+ −
 −
 =
−  
(10)
where jW
is the importance of the weight of parameter j.
Then, the values of iQ
are computed for i= 1, 2, 3,…, M, as shown in (11).
( )i i
i
S S R R
Q γ 1 γ
S S R R
+ +
− + − +
   − −
= + −   
− −   
(11)
where
i i
i M i M
S minS , S maxS+ −
 
= =
,
i i
i M i M
R minR , R maxR+ −
 
= =
, y 0 γ  1  .
Given the values of Q for all i belonging to M, the SO candidates are classifed from best to worst.
Finally, the selected SO is given by the optimal value of Q, as seen in (12).
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 669 - 675
672
* *
VIK i
i M
A arg min Q

= (12)
3. RESULTS AND DISCUSSION
In terms of performance assessment, two types of applications were considered: real time (RT) and
better effort (BE) as well as two traffic levels: high traffic (HT) and low traffic (LT), leading to four different
scenarios: GSM RT HT, GSM RT LT, GSM BE HT and GSM BE LT. The accumulative average failed
handoffs (AAFH) is the metric used for assessment both for the TOPSIS as shown in Figure 1 and
the VIKOR algorithms as shown in Figure 2. Ten simulations were performed for each experiment and then
the average of each experiment was plotted.
Figure 1 shows that the number of failed handoffs is 24% lower for low traffic compared to high
traffic since there are less spectral opportunities. Another interesting finding is that the number of failed
handoffs is very similar between the BE and RT scenarios for the same level of traffic, which makes
this variable less relevant within a spectrum allocation model and leading to reconsider the operation of
the chosen algorithm. Finally, the collaboration percentage between secondary users is not significant
for real time applications while better effort applications exhibit an improvement in performance by 11% as
the collaboration percentage grows higher.
Figure 2 shows that the number of failed handoffs is 25% lower for low traffic compared to high
traffic. As seen for the TOPSIS algorithm, the VIKOR algorithm reveals a similar number of failed handoffs
between BE and RT, for the same traffic level. Finally, in terms of the collaboration percentage between
secondary users, only the BE-LT scenario shows a significant improvement by 7%.
Table 1 shows the percentage-based relative values of the comparative performance assessment for
each scenario among different levels of collaboration. It can be concluded that, although there is evidence of
an improvement in performance for each algorithm when the level of collaboration rises, said improvement
does not exceed 10% in most cases. Therefore, it could prove interesting to assess each algorithm
comparatively in all scenarios, taking into account the highest and lowest collaboration levels of 10% and
100% respectively, as shown in Table 2. The scenario-based analysis does not reveal that an algorithm
dominates over the other one in all scenarios or with common conditions.
The significance of the results, regarding the collaboration module, shows that the level of
collaboration between SU is directly proportional to the performance of the algorithm. However,
the improvement rate is not significantly high. According to the results, an increase in the level of
collaboration between SU by 1000% (from 10% to 100%) only improves the performance of the algorithm
by approximately 10%.
Table 1. Benchmarking by level of collaboration for AAFH
AAFH Wi-Fi BE LT Wi-Fi RT LT Wi-Fi BE HT Wi-Fi RT HT
TOPSIS SU10 26.83 72 42.22 71.31
VIKOR SU10 72.53 86.75 93.14 64.44
TOPSIS SU20 70.97 79.12 68084 84.47
VIKOR SU20 76.74 94,74 95 79.82
TOPSIS SU50 71.74 79.12 91.35 86.14
VIKOR SU50 78.57 98.63 95.96 83.65
TOPSIS SU80 74.16 80.9 94.06 87
VIKOR SU80 78.57 98.63 95.96 87.88
TOPSIS SU100 76.74 80.9 100 89.69
VIKOR SU100 81.48 100 97.94 87.88
Table 2. Benchmarking by scenario with 10% and 100% collaboration for AAFH
AAFH TOPSIS SU10 VIKOR SU10 TOPSIS SU100 VIKOR SU100
Wi-Fi BE LT 26.83 72.53 76.74 81.48
Wi-Fi RT LT 72 86.75 80.9 100
Wi-Fi BE HT 42.22 93.14 100 97.94
Wi-Fi RT HT 71.31 64.44 89.69 87.88
Wi-Fi LT 49.415 79.64 78.82 90.74
Wi-Fi HT 56.765 78.79 94.845 92.91
Wi-Fi BE 34.525 82.835 88.37 89.71
Wi-Fi RT 71.655 75.595 85.295 93.94
TELKOMNIKA Telecommun Comput El Control 
Failed handoffs in collaborative Wi-Fi networks (Cesar Hernandez)
673
Figure 1. Failed Handoffs for TOPSIS algorithm in collaborative Wi-Fi networks
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 669 - 675
674
Figure 2. Failed handoffs for VIKOR algorithm in collaborative Wi-Fi networks
4. CONCLUSION
According to the results obtained, the level of collaboration between SU is directly proportional to
the performance of the algorithm. However, the improvement rate is not significantly high. An increase in
the collaboration level between SU by 1000% (going from 10% to 100%) only achieves an improvement in
throughput between 5 and 7% approximately. The previous statement implies that a collaboration level of
10% is sufficient to deliver convenient results in terms of throughput.
TELKOMNIKA Telecommun Comput El Control 
Failed handoffs in collaborative Wi-Fi networks (Cesar Hernandez)
675
ACKNOWLEDGEMENTS
The authors wish to thank Universidad Distrital Francisco José de Caldas for funding and supporting
this research work.
REFERENCES
[1] D. A. López, N. Y. García, and J. F. Herrera, “Desarrollo de un Modelo Predictivo para la Estimación del
Comportamiento de Variables en una Infraestructura de Red,” Inf. tecnológica, vol. 26, no. 5, pp. 143–154, 2015.
[2] CISCO, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update,” CISCO, 2017.
[3] F. C. Commission, “Notice of Proposed Rulemaking and Order,” Mex. DF Rep. Docket no. 03, vol. 332,
pp. 1-53, 2003.
[4] N. Abbas, Y. Nasser, and K. El Ahmad, “Recent advances on artificial intelligence and learning techniques in
cognitive radio networks,” EURASIP J. Wirel. Commun. Netw., vol. 174, no. 2015, pp. 1–20, 2015.
[5] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “A survey on spectrum management in cognitive radio
networks,” IEEE Commun. Mag., vol. 46, no. 4, pp. 40–48, 2008.
[6] I. F. Akyildiz, L. Won-Yeol, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive
radio wireless networks: A survey,” Comput. Networks, vol. 50, no. 13, pp. 2127–2159, 2006.
[7] E. Ahmed, A. Gani, S. Abolfazli, L. J. Yao, and S. U. Khan, “Channel Assignment Algorithms in Cognitive
Radio Networks: Taxonomy, Open Issues, and Challenges,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1,
pp. 795–823, 2016.
[8] G. Tsiropoulos, O. Dobre, M. Ahmed, and K. Baddour, “Radio Resource Allocation Techniques for Efficient
Spectrum Access in Cognitive Radio Networks,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 824–847, 2016.
[9] M. Ozger and O. B. Akan, “On the utilization of spectrum opportunity in cognitive radio networks,” IEEE
Commun. Lett., vol. 20, no. 1, pp. 157–160, 2016.
[10] I. F. Akyildiz, W.-Y. Lee, and K. R. Chowdhury, “CRAHNs: Cognitive radio ad hoc networks,” Ad Hoc Networks,
vol. 7, no. 5, pp. 810–836, 2009.
[11] D. A. Pankratev, A. A. Samsonov, and A. D. Stotckaia, “Wireless Data Transfer Technologies in a Decentralized
System,” in 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering
(EIConRus), pp. 620–623, 2019.
[12] W. Ejaz, N. Ul Hasan, and H. S. Kim, “Distributed cooperative spectrum sensing in cognitive radio for ad hoc
networks,” Comput. Commun., vol. 36, no. 12, pp. 1341–1349, 2013.
[13] A. Bujari, C. T. Calafate, J.-C. Cano, P. Manzoni, C. E. Palazzi, and D. Ronzani, “Flying ad-hoc network
application scenarios and mobility models,” Int. J. Distrib. Sens. Networks, vol. 13, no. 10, 2018.
https://doi.org/10.1177%2F1550147717738192.
[14] L. F. Pedraza, C. Hernández, K. Galeano, E. Rodríguez-Colina, and I. P. Páez, "Ocupación espectral y modelo de
radio cognitiva para Bogotá", Primera. Bogotá: Editorial UD, 2016.
[15] T. Kaya and C. Kahraman, “Multicriteria renewable energy planning using an integrated fuzzy VIKOR & AHP
methodology: The case of Istanbul,” Energy, vol. 35, no. 6, pp. 2517–2527, 2010.
[16] C. Ramírez Pérez and V. M. Ramos Ramos, “Handover vertical: un problema de toma de decisión múltiple,” in
Congreso Internacional sobre Innovación y Desarrollo Tecnológico, 2010.
[17] C. Ramirez-Perez and V. Ramos-R, “On the Effectiveness of Multi-criteria Decision Mechanisms for
Vertical Handoff,” in International Conference on Advanced Information Networking and Applications,
pp. 1157–1164, 2013.
[18] M. Lahby, L. Cherkaoui, and A. Adib, “Hybrid network selection strategy by using M-AHP/E-TOPSIS
for heterogeneous networks,” in International Conference on Intelligent Systems: Theories and Applications,
pp. 1–6, 2013.
[19] G. Büyüközkan and G. Çifçi, “A combined fuzzy AHP and fuzzy TOPSIS based strategic analysis of electronic
service quality in healthcare industry,” Expert Syst. Appl., vol. 39, no. 3, pp. 2341–2354, 2012.
[20] C. Hernández, I. Páez, and D. Giral, “Modelo AHP-VIKOR para handoff espectral en redes de radio cognitiva,”
Tecnura, vol. 19, no. 45, pp. 29–39, 2015.
[21] C. Hernández, L. F. Pedraza, I. Páez, and E. Rodriguez-Colina, “Análisis de la Movilidad Espectral en Redes de
Radio Cognitiva,” Inf. tecnológica, vol. 26, no. 6, pp. 169–186, 2015.
[22] T. Tanino, T. Tanaka, and M. Inuiguchi, "Multi-objective programming and goal programming: theory and
applications," Springer Science & Business Media, 2003.
[23] E. Stevens-Navarro, J. D. Martinez-Morales, and U. Pineda-Rico, “Evaluation of vertical handoff decision
algorightms based on MADM methods for heterogeneous wireless networks,” J. Appl. Res. Technol., vol. 10, no. 4,
pp. 534–548, 2012.
[24] E. Stevens-Navarro, R. Gallardo-Medina, U. Pineda-Rico, and J. Acosta-Elias, “Application of MADM method
VIKOR for vertical handoff in heterogeneous wireless networks,” IEICE Trans. Commun., vol. 95, no. 2,
pp. 599–602, 2012, doi: 10.1587/transcom.E95.B.599.
[25] C. Bernal and C. Hernández, "Modelo de decisión espectral para redes de radio cognitiva," Primera Ed.
Bogotá, 2019.

More Related Content

What's hot

Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
 
A novel predictive model for capturing threats for facilitating effective soc...
A novel predictive model for capturing threats for facilitating effective soc...A novel predictive model for capturing threats for facilitating effective soc...
A novel predictive model for capturing threats for facilitating effective soc...IJECEIAES
 
Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks IJECEIAES
 
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingIJCNCJournal
 
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios  Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios IJECEIAES
 
Energy detection technique for
Energy detection technique forEnergy detection technique for
Energy detection technique forranjith kumar
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...IRJET Journal
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...M H
 
Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communicati...
Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communicati...Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communicati...
Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communicati...IJECEIAES
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)iaemedu
 
Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Editor IJARCET
 
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DDevice Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DTELKOMNIKA JOURNAL
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...M H
 
Paper id 2320143
Paper id 2320143Paper id 2320143
Paper id 2320143IJRAT
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...CSCJournals
 
A New Approach for Solving Inverse Scattering Problems with Overset Grid Gene...
A New Approach for Solving Inverse Scattering Problems with Overset Grid Gene...A New Approach for Solving Inverse Scattering Problems with Overset Grid Gene...
A New Approach for Solving Inverse Scattering Problems with Overset Grid Gene...TELKOMNIKA JOURNAL
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 

What's hot (19)

Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...
 
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...
 
Path loss prediction
Path loss predictionPath loss prediction
Path loss prediction
 
A novel predictive model for capturing threats for facilitating effective soc...
A novel predictive model for capturing threats for facilitating effective soc...A novel predictive model for capturing threats for facilitating effective soc...
A novel predictive model for capturing threats for facilitating effective soc...
 
Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks Performance of symmetric and asymmetric links in wireless networks
Performance of symmetric and asymmetric links in wireless networks
 
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud ComputingITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
ITA: The Improved Throttled Algorithm of Load Balancing on Cloud Computing
 
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios  Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios
Sensing and Sharing Schemes for Spectral Efficiency of Cognitive Radios
 
Energy detection technique for
Energy detection technique forEnergy detection technique for
Energy detection technique for
 
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
Machine Learning Algorithms for Image Classification of Hand Digits and Face ...
 
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
Interpolation Techniques for Building a Continuous Map from Discrete Wireless...
 
Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communicati...
Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communicati...Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communicati...
Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communicati...
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
The hybrid evolutionary algorithm for optimal planning of hybrid woban (1)
 
Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008
 
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DDevice Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
 
Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...Map as a Service: A Framework for Visualising and Maximising Information Retu...
Map as a Service: A Framework for Visualising and Maximising Information Retu...
 
Paper id 2320143
Paper id 2320143Paper id 2320143
Paper id 2320143
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
 
A New Approach for Solving Inverse Scattering Problems with Overset Grid Gene...
A New Approach for Solving Inverse Scattering Problems with Overset Grid Gene...A New Approach for Solving Inverse Scattering Problems with Overset Grid Gene...
A New Approach for Solving Inverse Scattering Problems with Overset Grid Gene...
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 

Similar to Failed handoffs in collaborative Wi-Fi networks

Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 
Reconfigurable intelligent surface passive beamforming enhancement using uns...
Reconfigurable intelligent surface passive beamforming  enhancement using uns...Reconfigurable intelligent surface passive beamforming  enhancement using uns...
Reconfigurable intelligent surface passive beamforming enhancement using uns...IJECEIAES
 
Throughput in cooperative wireless networks
Throughput in cooperative wireless networksThroughput in cooperative wireless networks
Throughput in cooperative wireless networksjournalBEEI
 
ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...
ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...
ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...IJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ijasuc
 
Energy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networksEnergy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networksAlexander Decker
 
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...TELKOMNIKA JOURNAL
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid wobanThe hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid wobanIAEME Publication
 
Proposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple AccessProposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple AccessTELKOMNIKA JOURNAL
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA SystemMultiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA SystemTELKOMNIKA JOURNAL
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...TELKOMNIKA JOURNAL
 
IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network
IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous NetworkIoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network
IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous NetworkIJCNCJournal
 
IOT-BASED MOBILE ADAPTIVE ROUTING ALGORITHM IN A UBIQUITOUS NETWORK
IOT-BASED MOBILE ADAPTIVE ROUTING ALGORITHM IN A UBIQUITOUS NETWORKIOT-BASED MOBILE ADAPTIVE ROUTING ALGORITHM IN A UBIQUITOUS NETWORK
IOT-BASED MOBILE ADAPTIVE ROUTING ALGORITHM IN A UBIQUITOUS NETWORKIJCNCJournal
 
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor NetworksA Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networksijma
 

Similar to Failed handoffs in collaborative Wi-Fi networks (20)

Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Reconfigurable intelligent surface passive beamforming enhancement using uns...
Reconfigurable intelligent surface passive beamforming  enhancement using uns...Reconfigurable intelligent surface passive beamforming  enhancement using uns...
Reconfigurable intelligent surface passive beamforming enhancement using uns...
 
Throughput in cooperative wireless networks
Throughput in cooperative wireless networksThroughput in cooperative wireless networks
Throughput in cooperative wireless networks
 
ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...
ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...
ENERGY PERFORMANCE OF A COMBINED HORIZONTAL AND VERTICAL COMPRESSION APPROACH...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
ENERGY EFFICIENCY OF MIMO COOPERATIVE NETWORKS WITH ENERGY HARVESTING SENSOR ...
 
Energy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networksEnergy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networks
 
Energy-efficient routing protocol for wireless sensor networks based on prog...
Energy-efficient routing protocol for wireless sensor networks  based on prog...Energy-efficient routing protocol for wireless sensor networks  based on prog...
Energy-efficient routing protocol for wireless sensor networks based on prog...
 
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
The hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid wobanThe hybrid evolutionary algorithm for optimal planning of hybrid woban
The hybrid evolutionary algorithm for optimal planning of hybrid woban
 
Proposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple AccessProposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple Access
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA SystemMultiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
 
IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network
IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous NetworkIoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network
IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network
 
IOT-BASED MOBILE ADAPTIVE ROUTING ALGORITHM IN A UBIQUITOUS NETWORK
IOT-BASED MOBILE ADAPTIVE ROUTING ALGORITHM IN A UBIQUITOUS NETWORKIOT-BASED MOBILE ADAPTIVE ROUTING ALGORITHM IN A UBIQUITOUS NETWORK
IOT-BASED MOBILE ADAPTIVE ROUTING ALGORITHM IN A UBIQUITOUS NETWORK
 
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor NetworksA Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
A Scheme for Joint Signal Reconstruction in Wireless Multimedia Sensor Networks
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

Failed handoffs in collaborative Wi-Fi networks

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 2, April 2020, pp. 669~675 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i2. 14894  669 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Failed handoffs in collaborative Wi-Fi networks Cesar Hernandez, Diego Giral, C. Salgado Technological Faculty, Universidad Distrital Francisco Jose de Caldas, Colombia Article Info ABSTRACT Article history: Received Dec 9, 2019 Revised Dec 31, 2019 Accepted Feb 5, 2020 Cognitive radio networks enable a more efficient use of the radioelectric spectrum through dynamic access. Decentralized cognitive radio networks have gained popularity due to their advantages over centralized networks. The purpose of this article is to propose the collaboration between secondary users for cognitive Wi-Fi networks, in the form of two multi-criteria decision-making algorithms known as TOPSIS and VIKOR and assess their performance in terms of the number of failed handoffs. The comparative analysis is established under four different scenarios, according to the service class and the traffic level, within the Wi-Fi frequency band. The results show the performance evaluation obtained through simulations and experimental measurements, where the VIKOR algorithm has a better performance in terms of failed handoffs under different scenarios and collaboration levels. Keywords: Cognitive radio Failed handoff GSM MCDM Spectral decision Wireless networks This is an open access article under the CC BY-SA license. Corresponding Author: Cesar Hernandez, Technological Faculty, Universidad Distrital Francisco Jose de Caldas, Calle 68D Bis a Sur # 49F–70, Bogotá D.C., 111941, Colombia. Email: cahernandezs@udistrital.edu.co 1. INTRODUCTION Currently, wireless communication systems exhibit certain defficiencies in voice and data services due to the saturation and scarcity in frequency bands within the spectrum. This can be explained by the considerable increase of mobile devices in the radiofrequency network [1]. According to some studies, it is expected that the IP traffic grows by 168 Exabytes in 2020 with the number of mobile devices equal to three times the worldwide population [2]. However, time-based and geographic studies carried out by the Federal Communications Commission of the United States [3] show that most of the radiofrequency spectrum is used inefficiently. This has prompted the use of strategies seeking to mitigate the issue [4]. Cognitive Radio (CR) rises as a technology conceived to overcome this problem, through the dynamic access of the spectrum, and characterized to perceive, learn and plan (decision-making) according to the current conditions of the network [5–9]. This technology increases the bandwidth capacity and dynamic access to the spectrum guaranteeing that there are no interferences between licensed primary users [8, 10]. Centralized networks are architectures with an infrastructure that operates under the command of a central coordinator. The information from each SU feeds the central base, so that it can make decisions to maximize communication parameters. However, this is not the best option for large scale systems and applications in public security networks. The increase in measuring costs, system complexity and potential unbalance and chaos in case of failure (vulnerability) turns it into a non-feasible architecture for CRN [11]. The previous scenario can be solved if the responsibility of the information is split among different control points, serving as a baseline criterion for descentralized cognitive radio networks (DCRN).
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 669 - 675 670 The problem of the present research consists on carrying out the decision-making process for a DCRN, giving the nodes the capacity to learn from the environment and proposing strategies that allow the SU to exchange information collaboratively. The proposed solution is based on cooperative DCRN as this work proposes the collaboration between secondary users through the exchange of information between them [10, 12, 13]. This article presents a comparative assessment of the multi-criteria decision-making algorithms TOPSIS and VIKOR for a Wi-Fi DCRN. Both algorithms are assessed and compared in terms of the average number of failed handoffs over a 9-minute transmission for the same information size. The comparative analysis is carried out in four different scenarios based on the service class (real time and better effort) and the traffic level (high and low): real time (RT) with high traffic (HT), better effort (BE) with low traffic (LT), RT with LT and BE with HT. The main contribution of the proposed solution is to show the performance assessment obtained through simulations and experimental measurements, considering different collaboration levels within the analysis (10%, 20%, 50%, 80% and 100%) between secondary users, which share space-time information on spectral occupancy feeding the database of the decision-making algorithms. 2. RESEARCH METHOD To determine the performance of each algorithm, a simulation tool was developed by the authors, in which the simulation environment progressively recreates the behavior of spectral occupancy based on real data captured in a metering campaign in the Wi-Fi frequency band. The spectral occupancy behavior corresponds to a metering campaign that lasted several weeks in the city of Bogotá, Colombia [14]. The energy detection technique was used to determine the availability matrix for each channel in the Wi-Fi frequency band. The decision threshold for the power variable was 5 dBm above noise floor. One of the main contributions of this research is derived from handling experimental data of spectral occupancy which is the result of studying the collaborative activity between SU to determine the best spectral opportunities. The present research implemented and adapted a collaboration system combining TOPSIS and VIKOR algorithms, through a module for information exchange between secondary users. Initially, each secondary user stores the last k data in the radioelectric environment retrieved from information shared between SU. It is assumed that there are 100 SU with heterogeneous information of the spectrum for a given node of the descentralized network, and a percentage of that amount is used to gather the information used by the TOPSIS and VIKOR algorithms to sort out the spectral opportunities. The purpose of this process is to assess the influence of the cooperation between secondary users for a DCRN scenario. 2.1. Spectral allocation algorithms The chosen alternatives for multi-criteria decision-making algorithms (MCDM) are the technique for order preference by similiarity to Ideal solution (TOPSIS) and the multi-criteria optimization and compromise solution (VIKOR). 2.1.1. TOPSIS This algorithm has two sections: the unacceptable solution in any scenario and the ideal solution of the system. Initially, the decision matrix X is built and then normalized using the square root method (1) [15–19]. 11 1 1 11 1 1 1 1 M M M N NM N M NM X                     = =            (1) where ωi is the weight assigned to criterion i and the sum of weights must be equal to 1. Afterwards, the ideal solution is determined as well as the worst solution, as described in (2) and (3). ( ) ( )   ij ij 1 MA max |j X , min |j X , ,   + + − + + =   =  (2) ( ) ( )   ij ij 1 MA min |j X , max |j X , ,   − + − − − =   =  (3) where i = 1...M. X+ and X- are the set of benefits and costs, respectively.
  • 3. TELKOMNIKA Telecommun Comput El Control  Failed handoffs in collaborative Wi-Fi networks (Cesar Hernandez) 671 Afterwards, the Euclidian distance D is calculated for each alternative as seen in (4) and (5). ( ) M 2 i ij j j 1 D i 1, , N + + = = − =  (4) ( ) M 2 i ij j j 1 D i 1, , N − − = = − =  (5) Finally, the alternatives are organized in descending order, according to the preference index given by (6). i i i i D C , i 1, ,N. D D − + + − = =  + (6) 2.1.2. VIKOR The VIKOR method assumes that each alternative is assessed based on each criterion function, and the classification can be established by comparing the measurements and choosing which are closest to the ideal alternative [20–22]. In [16, 23–25], the procedure of the VIKOR algorithm is described. For each parameter j = 1, 2, 3, …, N, the best and worst values are determined as shown in (7) and (8). ( ) ( ) j ij b ij c i Mi M F max x |j N , min x |j N+  =   (7) ( ) ( ) j ij b ij c i M i M F min x |j N , max x |j N−   =   (8) where the benefit and cost parameters respectively named Nb and Nc belong to N. Afterwards, the values of iS and iR for i= 1, 2, 3,…, M, are computed as described in (9) and (10). ( ) ( ) j ij i j j N j j F x S w F F + + −  − = −  (9) ( ) ( ) j ij i j i N j j F x R max w F F + + −  −  = −   (10) where jW is the importance of the weight of parameter j. Then, the values of iQ are computed for i= 1, 2, 3,…, M, as shown in (11). ( )i i i S S R R Q γ 1 γ S S R R + + − + − +    − − = + −    − −    (11) where i i i M i M S minS , S maxS+ −   = = , i i i M i M R minR , R maxR+ −   = = , y 0 γ  1  . Given the values of Q for all i belonging to M, the SO candidates are classifed from best to worst. Finally, the selected SO is given by the optimal value of Q, as seen in (12).
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 669 - 675 672 * * VIK i i M A arg min Q  = (12) 3. RESULTS AND DISCUSSION In terms of performance assessment, two types of applications were considered: real time (RT) and better effort (BE) as well as two traffic levels: high traffic (HT) and low traffic (LT), leading to four different scenarios: GSM RT HT, GSM RT LT, GSM BE HT and GSM BE LT. The accumulative average failed handoffs (AAFH) is the metric used for assessment both for the TOPSIS as shown in Figure 1 and the VIKOR algorithms as shown in Figure 2. Ten simulations were performed for each experiment and then the average of each experiment was plotted. Figure 1 shows that the number of failed handoffs is 24% lower for low traffic compared to high traffic since there are less spectral opportunities. Another interesting finding is that the number of failed handoffs is very similar between the BE and RT scenarios for the same level of traffic, which makes this variable less relevant within a spectrum allocation model and leading to reconsider the operation of the chosen algorithm. Finally, the collaboration percentage between secondary users is not significant for real time applications while better effort applications exhibit an improvement in performance by 11% as the collaboration percentage grows higher. Figure 2 shows that the number of failed handoffs is 25% lower for low traffic compared to high traffic. As seen for the TOPSIS algorithm, the VIKOR algorithm reveals a similar number of failed handoffs between BE and RT, for the same traffic level. Finally, in terms of the collaboration percentage between secondary users, only the BE-LT scenario shows a significant improvement by 7%. Table 1 shows the percentage-based relative values of the comparative performance assessment for each scenario among different levels of collaboration. It can be concluded that, although there is evidence of an improvement in performance for each algorithm when the level of collaboration rises, said improvement does not exceed 10% in most cases. Therefore, it could prove interesting to assess each algorithm comparatively in all scenarios, taking into account the highest and lowest collaboration levels of 10% and 100% respectively, as shown in Table 2. The scenario-based analysis does not reveal that an algorithm dominates over the other one in all scenarios or with common conditions. The significance of the results, regarding the collaboration module, shows that the level of collaboration between SU is directly proportional to the performance of the algorithm. However, the improvement rate is not significantly high. According to the results, an increase in the level of collaboration between SU by 1000% (from 10% to 100%) only improves the performance of the algorithm by approximately 10%. Table 1. Benchmarking by level of collaboration for AAFH AAFH Wi-Fi BE LT Wi-Fi RT LT Wi-Fi BE HT Wi-Fi RT HT TOPSIS SU10 26.83 72 42.22 71.31 VIKOR SU10 72.53 86.75 93.14 64.44 TOPSIS SU20 70.97 79.12 68084 84.47 VIKOR SU20 76.74 94,74 95 79.82 TOPSIS SU50 71.74 79.12 91.35 86.14 VIKOR SU50 78.57 98.63 95.96 83.65 TOPSIS SU80 74.16 80.9 94.06 87 VIKOR SU80 78.57 98.63 95.96 87.88 TOPSIS SU100 76.74 80.9 100 89.69 VIKOR SU100 81.48 100 97.94 87.88 Table 2. Benchmarking by scenario with 10% and 100% collaboration for AAFH AAFH TOPSIS SU10 VIKOR SU10 TOPSIS SU100 VIKOR SU100 Wi-Fi BE LT 26.83 72.53 76.74 81.48 Wi-Fi RT LT 72 86.75 80.9 100 Wi-Fi BE HT 42.22 93.14 100 97.94 Wi-Fi RT HT 71.31 64.44 89.69 87.88 Wi-Fi LT 49.415 79.64 78.82 90.74 Wi-Fi HT 56.765 78.79 94.845 92.91 Wi-Fi BE 34.525 82.835 88.37 89.71 Wi-Fi RT 71.655 75.595 85.295 93.94
  • 5. TELKOMNIKA Telecommun Comput El Control  Failed handoffs in collaborative Wi-Fi networks (Cesar Hernandez) 673 Figure 1. Failed Handoffs for TOPSIS algorithm in collaborative Wi-Fi networks
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 669 - 675 674 Figure 2. Failed handoffs for VIKOR algorithm in collaborative Wi-Fi networks 4. CONCLUSION According to the results obtained, the level of collaboration between SU is directly proportional to the performance of the algorithm. However, the improvement rate is not significantly high. An increase in the collaboration level between SU by 1000% (going from 10% to 100%) only achieves an improvement in throughput between 5 and 7% approximately. The previous statement implies that a collaboration level of 10% is sufficient to deliver convenient results in terms of throughput.
  • 7. TELKOMNIKA Telecommun Comput El Control  Failed handoffs in collaborative Wi-Fi networks (Cesar Hernandez) 675 ACKNOWLEDGEMENTS The authors wish to thank Universidad Distrital Francisco José de Caldas for funding and supporting this research work. REFERENCES [1] D. A. López, N. Y. García, and J. F. Herrera, “Desarrollo de un Modelo Predictivo para la Estimación del Comportamiento de Variables en una Infraestructura de Red,” Inf. tecnológica, vol. 26, no. 5, pp. 143–154, 2015. [2] CISCO, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update,” CISCO, 2017. [3] F. C. Commission, “Notice of Proposed Rulemaking and Order,” Mex. DF Rep. Docket no. 03, vol. 332, pp. 1-53, 2003. [4] N. Abbas, Y. Nasser, and K. El Ahmad, “Recent advances on artificial intelligence and learning techniques in cognitive radio networks,” EURASIP J. Wirel. Commun. Netw., vol. 174, no. 2015, pp. 1–20, 2015. [5] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “A survey on spectrum management in cognitive radio networks,” IEEE Commun. Mag., vol. 46, no. 4, pp. 40–48, 2008. [6] I. F. Akyildiz, L. Won-Yeol, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey,” Comput. Networks, vol. 50, no. 13, pp. 2127–2159, 2006. [7] E. Ahmed, A. Gani, S. Abolfazli, L. J. Yao, and S. U. Khan, “Channel Assignment Algorithms in Cognitive Radio Networks: Taxonomy, Open Issues, and Challenges,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 795–823, 2016. [8] G. Tsiropoulos, O. Dobre, M. Ahmed, and K. Baddour, “Radio Resource Allocation Techniques for Efficient Spectrum Access in Cognitive Radio Networks,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 824–847, 2016. [9] M. Ozger and O. B. Akan, “On the utilization of spectrum opportunity in cognitive radio networks,” IEEE Commun. Lett., vol. 20, no. 1, pp. 157–160, 2016. [10] I. F. Akyildiz, W.-Y. Lee, and K. R. Chowdhury, “CRAHNs: Cognitive radio ad hoc networks,” Ad Hoc Networks, vol. 7, no. 5, pp. 810–836, 2009. [11] D. A. Pankratev, A. A. Samsonov, and A. D. Stotckaia, “Wireless Data Transfer Technologies in a Decentralized System,” in 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pp. 620–623, 2019. [12] W. Ejaz, N. Ul Hasan, and H. S. Kim, “Distributed cooperative spectrum sensing in cognitive radio for ad hoc networks,” Comput. Commun., vol. 36, no. 12, pp. 1341–1349, 2013. [13] A. Bujari, C. T. Calafate, J.-C. Cano, P. Manzoni, C. E. Palazzi, and D. Ronzani, “Flying ad-hoc network application scenarios and mobility models,” Int. J. Distrib. Sens. Networks, vol. 13, no. 10, 2018. https://doi.org/10.1177%2F1550147717738192. [14] L. F. Pedraza, C. Hernández, K. Galeano, E. Rodríguez-Colina, and I. P. Páez, "Ocupación espectral y modelo de radio cognitiva para Bogotá", Primera. Bogotá: Editorial UD, 2016. [15] T. Kaya and C. Kahraman, “Multicriteria renewable energy planning using an integrated fuzzy VIKOR & AHP methodology: The case of Istanbul,” Energy, vol. 35, no. 6, pp. 2517–2527, 2010. [16] C. Ramírez Pérez and V. M. Ramos Ramos, “Handover vertical: un problema de toma de decisión múltiple,” in Congreso Internacional sobre Innovación y Desarrollo Tecnológico, 2010. [17] C. Ramirez-Perez and V. Ramos-R, “On the Effectiveness of Multi-criteria Decision Mechanisms for Vertical Handoff,” in International Conference on Advanced Information Networking and Applications, pp. 1157–1164, 2013. [18] M. Lahby, L. Cherkaoui, and A. Adib, “Hybrid network selection strategy by using M-AHP/E-TOPSIS for heterogeneous networks,” in International Conference on Intelligent Systems: Theories and Applications, pp. 1–6, 2013. [19] G. Büyüközkan and G. Çifçi, “A combined fuzzy AHP and fuzzy TOPSIS based strategic analysis of electronic service quality in healthcare industry,” Expert Syst. Appl., vol. 39, no. 3, pp. 2341–2354, 2012. [20] C. Hernández, I. Páez, and D. Giral, “Modelo AHP-VIKOR para handoff espectral en redes de radio cognitiva,” Tecnura, vol. 19, no. 45, pp. 29–39, 2015. [21] C. Hernández, L. F. Pedraza, I. Páez, and E. Rodriguez-Colina, “Análisis de la Movilidad Espectral en Redes de Radio Cognitiva,” Inf. tecnológica, vol. 26, no. 6, pp. 169–186, 2015. [22] T. Tanino, T. Tanaka, and M. Inuiguchi, "Multi-objective programming and goal programming: theory and applications," Springer Science & Business Media, 2003. [23] E. Stevens-Navarro, J. D. Martinez-Morales, and U. Pineda-Rico, “Evaluation of vertical handoff decision algorightms based on MADM methods for heterogeneous wireless networks,” J. Appl. Res. Technol., vol. 10, no. 4, pp. 534–548, 2012. [24] E. Stevens-Navarro, R. Gallardo-Medina, U. Pineda-Rico, and J. Acosta-Elias, “Application of MADM method VIKOR for vertical handoff in heterogeneous wireless networks,” IEICE Trans. Commun., vol. 95, no. 2, pp. 599–602, 2012, doi: 10.1587/transcom.E95.B.599. [25] C. Bernal and C. Hernández, "Modelo de decisión espectral para redes de radio cognitiva," Primera Ed. Bogotá, 2019.