SlideShare a Scribd company logo
International Journal of Communication Systems (IJCS) 2014, Wiley
An analytic network process and
trapezoidal interval-valued fuzzy
technique for order preference by
similarity to ideal solution network access
selection method
Emmanouil Skondras1,2, Aggeliki Sgora1,2, Angelos Michalas2 and
Dimitrios D. Vergados1
1Department of Informatics, University of Piraeus, 80, Karaoli and Dimitriou St.,
GR-18534, Piraeus, Greece
2Department of Informatics Engineering, Technological Educational Institute of
Western Macedonia, GR-52100, Kastoria, Greece
1
International Journal of Communication Systems (IJCS) 2014, Wiley
Outline
• Introduction.
• Contributions.
• Related work.
• The proposed Network Selection Method.
• Simulation Setup and Results.
• Conclusions.
• References.
2
International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction
International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (1/8)
• Next generation wireless networks
– Consist of many heterogeneous access technologies.
• Support various service types with different quality of
service (QoS) constraints, as well as user, requirements and
provider policies.
– Growing rapidly integrating multiple network
technologies.
• Aiming to support multimedia services in addition to voice
and data with high data rates and guaranteed QoS [1].
4
International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (2/8)
• End users devices (such as mobile phone or
netbook) are equipped with multiple radio
interfaces.
– Allowing connectivity to the most suitable network
environment.
• Based on users requirements and operators policies [2, 3].
• Need for network selection mechanisms that
consider multiple factors must be addressed.
5
International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (3/8)
• According to the always best connection
principle of the 4G wireless networks:
– Users of mobile services should be provided with
connectivity to the best access technology at
anytime [4, 5].
• Need for efficient vertical handover (VHO)
mechanisms to be applied.
6
International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (4/8)
• The handover process is supposed to be:
– Successful, infrequent, and imperceptible.
• To enable telecommunication providers meet the QoS
requirements of the users [6].
• In the case of heterogeneous networks:
– Seamless interworking among the different
technologies is also needed [7].
– Special attention to the VHO process should be
given [8].
7
International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (5/8)
• The VHO procedure consists of three main steps:
– Handover initiation.
• Contains the required procedures to identify the available access
networks and select the time of handover in respect of network
conditions and user mobility.
– Network selection.
• Selection of the most appropriate network alternative based on the
available network characteristics, user preferences, and applications
requirements.
– Handover execution.
• Completes the handover process by seamlessly connecting the terminal
to the selected network.
• This work deals with the network selection step of the VHO
process. 8
International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (6/8)
• Existing handover network selection schemes:
– Employ multi attribute decision-making methods (MADM),
fuzzy logic, neural networks, and utility functions [9].
• Because the selection of an access network depends
on several parameters with different relative
importance:
– The access network selection problem is usually looked at
from the aspect of multi-criteria analysis.
• More specifically by applying different MADM algorithms.
9
International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (7/8)
• A network selection method is proposed by
employing two MADM algorithms:
– The Analytic Network Process (ANP).
• Extension of the Analytic Hierarchy Process (AHP) for
criteria weights calculation
– A fuzzy version of the technique for order
preference by similarity to ideal solution (TOPSIS).
• For accomplishing the ranking of the candidate
networks.
10
International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (8/8)
• The proposed method considers the following factors to
provide advanced connection services:
– Network QoS characteristics and policies.
– Application requirements.
– Different types of users service-level agreements (SLAs).
• Linguistic values.
– Are used to characterize the performance of selection
criteria.
• Which are represented by interval-valued trapezoidal fuzzy
numbers.
11
International Journal of Communication Systems (IJCS) 2014, Wiley
Contributions
International Journal of Communication Systems (IJCS) 2014, Wiley
Contributions (1/3)
• Complex relationships allowed
– Within and among clusters of selection criteria
• By applying the ANP method
– Does not use an hierarchical framework as AHP but a
network model of dependencies.
– Eliminates the index consistency requirement of AHP.
» i.e., in AHP the relative importance of decision factors need to
be redefined in case index consistency value is more than 0.1.
• In our case:
– As clusters of selection criteria are considered the network QoS
characteristics and the network policies characteristics.
13
International Journal of Communication Systems (IJCS) 2014, Wiley
Contributions (2/3)
• Imprecise information of performance
selection criteria
– Can be better expressed.
• For different application types and users SLAs.
– By applying linguistic values and interval-valued fuzzy
numbers.
 Interval value fuzzy numbers.
– Can efficiently present uncertain information.
• By minimum maximum membership interval.
• Rather than by single membership values.
14
International Journal of Communication Systems (IJCS) 2014, Wiley
Contributions (3/3)
• Selection of the best network access technology
– Considering contradictory selection criteria.
• Facilitating the provision of high quality services.
– Satisfying different types of users SLAs.
• Fuzzy version of TOPSIS.
– Trapezoidal interval-valued Fuzzy TOPSIS (TFT).
• It resolves the case of having several services of different QoS constraints
running simultaneously on a terminal.
– Network selection is performed in a way satisfying multiple groups of
criteria per user.
– The ranking abnormality problem experienced in the original TOPSIS is
discarded [10].
• To avoid inconsistencies.
– When a new network is available or an existing network is removed from the
alternatives. 15
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (1/37)
• Multi attribute decision-making methods
– Are used to select the best alternative network
• Among candidate networks
– Given a set of criteria with different importance weights.
• MADM algorithms
– Are able to evaluate criteria of different value ranges.
• Sometimes even contradictory, using multi- criteria analysis.
– Widely used methods include:
• Analytic Hierarchy Process (AHP) [11, 12].
• Simple additive weighting (SAW) [12, 13].
• Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) [12–14].
• Fuzzy AHP-ELECTRE (FAE) [15].
• Gray relational analysis (GRA) [12, 13].
• Multiplicative exponent weighting (MEW) [12, 13].
• Distance to ideal alternative (D2I) [12].
• Analytic Network Process (ANP) [16].
17
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (2/37)
• Various weighting methods are used.
– Provide suitable criteria weights for each alternative.
• Several research studies use MADM methods for
network selection.
• Sharma and Khola [14]
– Presented a network selection algorithm.
• Based on the TOPSIS algorithm.
• Besides the usual parameters
– i.e., QoS, bandwidth, and cost
– It also takes a prediction of the Received Signal Strength (RSS) into
account.
18
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (3/37)
• Shi and Zhu [11]
– Employed two MADM methods
• Combined with the group decision-making algorithm to perform
network selection.
– The proposed procedure
• Defines two types of weights (namely the objective weights)
– Consider:
» The current attributes of candidate networks.
» The subjective weights specified according to the subscribers and traffic
class preferences.
– Weight vectors.
• Objective weights vector.
– Determined using the entropy weighting method.
• Subjective weights vector.
– Evaluated using the AHP.
19
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (4/37)
• Shi and Zhu [11]…
– The group decision-making method
• Employs both vector types to produce a synthesized vector
• The ranking of alternatives is the sum of the product of the
normalized attribute values with their respective weights.
– Compatibility of the integrated decision.
• It is finally checked to ensure the effectiveness of the proposed
solution.
– Results showed that the proposed method:
• Reduces the number of handoffs
• Improves QoS characteristics of conversational and interactive traffic
flows
 Compared with entropy weighting and GRA approaches.
20
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (5/37)
• Lassoued et al. [13]
– Described an evaluation framework of VHO mechanisms,
which emulates:
• Application characteristics.
• Mobile terminals context.
• User and operators preferences.
– The model provides user traces containing information
about:
• The location of the users.
• The QoS performance of the networks.
– Current network characteristics are obtained from:
• A mobility simulator emulating network access technologies.
• Location of access points.
• User mobility.
21
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (6/37)
• Lassoued et al. [13]…
– The proposed methodology:
• Used to compare the efficiency of various MADM network
selection algorithms in a dynamic environment, including:
– SAW, TOPSIS, GRA, MEW and their own proposed scheme
called Ubique [17].
– Simulation results
• Showed that the examined algorithms achieve good
performance,
• Ubique is less flexible to changes of delay and cost criteria
weights than the other approaches.
22
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (7/37)
• Lahby et al. [12]
– Proposed a network selection scheme
• It is based on the AHP method and the Mahalanobis distance.
– Mahalanobis distance is used to measure the distance of
alternatives.
» From the correlation of criteria
» The optimal network satisfying the QoS, security and cost
criteria is selected.
– Simulation results
• Both the ranking abnormality problem and the number of
handoffs in the proposed method
– Are reduced compared with the decision algorithms SAW, MEW,
TOPSIS and distance to ideal alternative.
23
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (8/37)
• Lahby et al. [16]
– Proposed a technique for network selection using:
• ANP to estimate the weights of selection criteria
• GRA to rank the alternative networks.
– Selection criteria include network related attributes
• The preference of users is expressed by evaluating different
criteria weights for each access network.
– By applying the ANP.
» Evaluates the criteria weights of each access network separately
• Based on users preferences; in that way, unique criteria weights
exist for each network.
24
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (9/37)
• Lahby et al. [16]…
– Simulation results.
• Indicated that this method reduces:
– The ranking abnormality problem.
– The number of handoffs.
 Compared with other method variants.
25
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (10/37)
• Sheng-mei et al. [18]
– Presented a network selection algorithm making
use of:
• The AHP and the entropy weight method.
– To evaluate the weights of network and user related criteria.
– Candidate access networks.
• Identified on the basis of their signal-to-interference-
plus-noise ratio (SINR) values.
– TOPSIS is used for the final ranking of the network
alternatives.
26
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (11/37)
• Sheng-mei et al. [18]…
– The proposed method achieves:
• Higher throughput.
• Reduced number of vertical handoffs.
• For various traffic classes.
 Compared with:
– Combined SINR-based vertical handoff algorithms [19]
– Multi-dimensional adaptive SINR-based vertical handoff
algorithms [20].
27
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (12/37)
• Alkhawlani et al. [21]
– Proposed a VHO decision system.
• Integrates fuzzy logic and TOP- SIS method.
– Network and user related criteria
• Processed by parallel fuzzy logic control (FLC)
subsystems.
– TOPSIS is applied to perform the selection of the
best network choice.
28
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (13/37)
• Alkhawlani et al. [21]…
– Simulation results showed that the proposed
solution:
• Reduces handover rate and handover failure.
• Increases the percentage of users assigned to networks
of their preference.
• Increases the utilization of inexpensive networks.
29
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (14/37)
• Alkhawlani and Mohsen [22]
– Presented a network selection system.
• Suitable for tightly coupled wireless network environments.
– It takes into account:
• The network choice proposed by the user
• Criteria imposed by the operator such as:
– Network policies.
– QoS characteristics.
– System capacity.
– Utilization.
30
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (15/37)
• Alkhawlani and Mohsen [22]…
– Two modules:
• The user software module.
– Evaluates the best network alternative based on selection criteria set by the
user including reliability, security, battery power, and price.
• The operator software module.
– Resides at the coordinator of the radio access technologies and performs the
final selection decision.
– It uses:
» The FLC subsystems of [18].
• To evaluate the performance of criteria.
» The AHP method.
• To assess the FLC subsystems outputs and select the best possible
network.
31
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (16/37)
• Alkhawlani and Mohsen [22]…
– Simulation results.
• The proposed network selection scheme
– Achieves better performance.
» In terms of user preferences satisfaction, QoS fulfillment and operator
benefits improvement.
– Compared with four different reference algorithms performing:
i. Random selection.
ii. Selection based on terminal speed.
iii. Selection based on service type.
iv. Selection based on the availability of resources, respectively.
32
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (17/37)
• Vasu et al. [23]
– Proposed a fuzzy rule based decision algorithm
• For vertical handoff in wireless heterogeneous
networks.
– The algorithm uses:
• QoS performance values as decision parameters.
• Triangular fuzzy membership functions.
– For the fuzzification of the input parameters and the
defuzzification of the output result.
33
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (18/37)
• Vasu et al. [23]…
– Evaluation of the proposed model.
• A non-birth Markov chain with states corresponding to
available access networks is used.
– Simulation experiments.
• Comparing the proposed approach against various
MADM methods
• The proposed method improves the performance of
delay sensitive applications.
34
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (19/37)
• Fuzzy logic for network selection
– Requires the definition of logic rules from
specialists
• With thorough knowledge of the behavior of the
available access networks in various conditions.
– As the number of selection criteria and the
available networks increase.
• Rules become more complex struggling to:
– Define effective policies.
– Evaluate the best alternative.
35
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (20/37)
• Fuzzy logic for network selection…
– Use of fuzzy logic based solutions.
• Limited to handover decision schemes.
– With reduced number of networks and selection criteria.
– Some network selection methods combine fuzzy
logic with neural networks.
• To rate the alternative access networks.
36
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (21/37)
• Gowrishankar et al. [24]
– Created an artificial neural network multi-criteria decision
analysis system.
• Performs network selection using network related attributes.
– Expressed either in crisp or in fuzzy linguistic values.
– Sensitivity analysis.
• Among the proposed solution, the TOPSIS and the SAW methods.
• Carried out in a network environment consisting of four overlaid
networks, where:
– Weights of different criteria change.
– Connections of four traffic types exist.
37
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (22/37)
• Gowrishankar et al. [24]…
– Results.
• The proposed method is:
– Less stable than TOPSIS.
– More stable than SAW.
 In respect to criteria weights changes.
– Neural network approaches.
• Replace the complex logic rules of fuzzy logic approaches.
• But they still suffer from scalability issues.
– Because of the required large number of the processing elements at
their hidden layers.
» As the complexity of criteria and the number of networks increase.
38
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (23/37)
• Several network selection schemes make use of
utility/cost functions.
– To provide performance metrics for different types of
criteria.
• Rodriguez et al. [25]
– Use a cost function for the network selection
• Includes the rules and policies for selecting the best candidate
network or for adapting ongoing session parameters.
39
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (24/37)
• Wu et al. [26]
– Used a set of utility functions to quantify selection criteria
including:
• Link quality (RSS).
• Battery power.
• Average throughput.
• Network delay.
• Monetary cost.
• Application type.
– The relative weights of criteria are calculated according to the
AHP method.
– The candidate networks are ranked using the weighted product
method.
– Simulation results.
• The proposed scheme:
– Improves network performance.
– Reduces power consumption of users terminals.
40
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (25/37)
• Wang et al. [27]
– The concepts of fuzzy logic, neural network, and utility
functions.
• Are combined to perform network selection.
– The proposed method.
• Uses a fuzzy neural network.
– Obtains network, user, and terminal related input criteria.
• Evaluates the performance of each access network.
– Attributes of criteria.
• Defined through utility functions.
• Processed through the fuzzification, interference and
defuzzification layers of the neural network.
41
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (26/37)
• Wang et al. [27]…
– A fuzzy version of the particle swarm optimization is used.
• For neural network training.
– It is not clear how expected network performance degrees are specified
during the learning process.
– Simulation results.
• The proposed method achieves better performance in terms of:
– Access blocking probability.
– Packet drop probability.
– Average throughput.
Compared with other network selection algorithms including GRA,
AHP and game theoretic.
42
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (27/37)
• There is a rate of uncertainty in characterizing
performance measurements as well as rates of
influence of performance metrics.
• Fuzzy MADM methods.
– Expressing uncertain quantities by fuzzy numbers.
• Received the interest of many researchers in decision theory.
• Several fuzzy MADM network selection methods.
– Are suggested utilizing linguistic variables, triangular fuzzy
numbers, trapezoidal fuzzy numbers, etc.
• To model network attributes and their respective weights.
43
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (28/37)
• Chamodrakas and Martakos [10]
– Proposed a method for network selection that considers:
• Network conditions.
• QoS constraints.
• Energy consumption requirements.
– User preferences.
• Indicating the relative importance of criteria in different applications.
• Expressed using linguistic expressions.
– Transformed to triangular fuzzy numbers.
– Graded mean integration method.
• Used for the defuzzification of fuzzy numbers into crisp values.
– Utility functions.
• Used to model.
– QoS requirements.
– Energy consumption characteristics.
 Of different applications.
44
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (29/37)
• Chamodrakas and Martakos [10]…
– The fuzzy set representation version of TOPSIS.
• Used to combine selection criteria and weights.
– To perform the rating of the available networks.
• Resolves possible inconsistencies.
– Because of conflicting criteria.
» Such as bandwidth and energy consumption.
– Simulation results.
• The proposed method accomplishes a trade-off between QoS
requirements and energy consumption.
45
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (30/37)
• Sasirekha and Ilanzkumaran [28]
– Described two methods to perform network selection.
– Both methods use a fuzzy version of the AHP technique.
• To obtain the weights of selection criteria specifying networks
performance.
– Relative importance matrix.
• Resulting from the pairwise comparison of criteria .
• Fuzzified using triangular fuzzy numbers.
– With membership functions representing the scale of importance of five
levels.
– Relative importance values.
• Turned into crisp values using the geometric mean operator.
– While the rest of the steps of the AHP method follow.
46
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (31/37)
• Sasirekha and Ilanzkumaran [28]…
– The former network selection method.
• Uses TOPSIS to evaluate the best alternative network based on:
– The weights from AHP.
– The criteria values of each alternative network.
– The latter network selection method.
• Combines the fuzzy AHP with VIKOR method.
– Which has less complexity and performs equally well as TOPSIS.
– Evaluation.
• Both methods succeed to select the best network alternative.
47
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (32/37)
• Kaleem et al. [29]
– Presented a VHO decision algorithm.
• Based on network performance measurements to evaluate.
– The necessity of making a handoff.
– The best network alternative in case that handoff is required.
– To determine the handoff decision.
• A handoff factor is evaluated and compared with a constant
threshold.
– Network selection is performed using fuzzy TOPSIS.
48
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (33/37)
• Kaleem et al. [29]
– User preferences are defined.
• In the form of criteria weights.
– Ratings of selection criteria and criteria weights are expressed as
trapezoidal or triangular fuzzy numbers.
– Numerical examples and simulation experiments.
• Present the competence of the proposed approach.
– For various traffic classes.
– In heterogeneous network access technologies.
49
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (34/37)
• Lahby et al. [30]
– Compared the weighting algorithms of:
• AHP, fuzzy AHP, ANP and fuzzy ANP.
– For assigning weights to network dependent criteria used by
MADM algorithms performing network selection.
– The TOPSIS method is used.
• To evaluate the effects of the weighting algorithms.
50
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (35/37)
• Lahby et al. [30]…
– Results.
• All algorithms achieve similar results concerning the
network selected.
• The ranking abnormality of TOPSIS is reduced.
– When the ANP weighting method is used for:
» Background traffic.
» Conversational traffic.
» Interactive traffic.
» Streaming traffic.
51
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (36/37)
• Zhang [31]
– Performed an analysis of MADM methods for
handover decision.
– Uncertain linguistic terms of decision criteria such as
sojourn time and seamlessness.
• Converted to fuzzy data.
– Which in turn are converted to crisp values.
52
International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (37/37)
• Zhang [31]…
– SAW and TOPSIS.
• Suggested to perform the final ranking of the candidate
networks.
– Sensitivity analysis.
» TOPSIS is more sensitive to the criteria performance and
their weights.
– The paper identifies the handover decision case.
• In which several applications are running simultaneously on
a terminal as a group decision problem.
– Although its solution is not being addressed.
53
International Journal of Communication Systems (IJCS) 2014, Wiley
The proposed Network Selection
Method
International Journal of Communication Systems (IJCS) 2014, Wiley
The proposed Network Selection
Method
• Our proposed method consists of two MADM
algorithms:
– ANP
• Calculates the relative importance of the selection
criteria.
– Trapezoidal Fuzzy TOPSIS (TFT)
• Accomplishes the ranking of the candidate networks.
• Represents the performance of selection criteria using
interval-valued trapezoidal fuzzy numbers.
55
International Journal of Communication Systems (IJCS) 2014, Wiley
Analytic Network Process (ANP)
(1/2)
• The ANP was also introduced by Saaty [32].
– To deal with decision problems that criteria and
alternatives depend on each other.
• It is actually the generalization of the AHP.
• A decision problem that is analyzed with the ANP.
– Can be designed either as a control hierarchy or as a
nonhierarchical network.
56
International Journal of Communication Systems (IJCS) 2014, Wiley
Analytic Network Process (ANP)
(2/2)
• Nodes of the network represent components (or
clusters) of the system.
– Arcs denote interactions between them.
• Inner dependencies.
– Interactions and feedbacks within clusters.
• Outer dependencies.
– Interactions and feedbacks between clusters.
57
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (1/6)
• Step 1. Model construction and problem
structuring.
– The problem is analyzed and decomposed into a
rational system.
• Such as a network.
• Step 2. Pairwise comparison matrices and
priority vectors.
– The pairwise comparison matrix, as in AHP, is
derived using Saaty’s nine-point importance scale.
58
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (2/6)
• Analytic Hierarchy Process (AHP).
59
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (3/6)
• Step 3. Supermatrix formation.
– Represents the inner and the outer dependencies of
the network.
– It is actually a partitioned matrix.
• Each matrix segment represents a relationship between two
clusters in the network.
– To construct the supermatrix.
• The local priority vectors obtained in step 2 are grouped and
placed in the appropriate positions in a supermatrix.
– Based on the flow of influence from one cluster to another, or
from a cluster to itself, as in the loop.
60
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (4/6)
• Step 3. Supermatrix formation…
– Then, the supermatrix is transformed to a stochastic
one.
• The weighted supermatrix.
– The weighted supermatrix.
• Raised to limiting powers.
– Until all the entries converge to calculate the overall priorities.
» The cumulative influence of each element on every other
element with which it interacts is obtained [34].
– At this point, all the columns of the new matrix, the
limit supermatrix are the same.
• Their values show the global priority of each element of
network.
61
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (5/6)
• For example, if we assume a network with n clusters, where each cluster
Ck , k = 1, 2,…, n, and has mn elements, denoted as ek1 , ek2 ,…, ekmk , then
the standard form for a supermatrix can be expressed as:
62
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (6/6)
• Step 4. Selection of the best alternatives:
– If the supermatrix formed in step 3 covers the whole network:
• The priority weights of the alternatives can be found in the column of
alternatives in the normalized supermatrix.
– Otherwise:
• Additional calculations are required.
– In order to obtain the overall priorities of the alternatives.
– The alternative with the largest overall priority should be
selected.
• As it is the best alternative as determined by the calculations made
using matrix operations.
63
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (1/7)
• The concept of fuzzy logic was introduced by Zadeh
[35].
– It is used to make a decision from indeterminate and
approximate information.
• A fuzzy number represented by:
– A set of real values representing an uncertain quantity.
– A convex normalized continuous function
• Which estimates the degree of membership for each value in the
subset.
• Triangular or trapezoidal fuzzy numbers.
– Frequently used to represent uncertain information.
64
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (2/7)
• Trapezoidal fuzzy number
– Can be defined as a vector x = (x1, x2, x3, x4, υÂ)
with membership function:
 x1 < x2 < x3 < x4 and υ ∈[0,1].
65
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (3/7)
• Interval-Valued Fuzzy Number (IVFN).
– Introduced by Sambuc [36]
– Defined as A = [ΑL, AU].
• Consisting of the lower AL and the upper AU fuzzy numbers.
– Replace the crisp membership values by intervals in
[0, 1].
– Fuzzy information can be better expressed by intervals
than by single values.
66
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (4/7)
• Liu and Jin [37] and Cornelis et al. [38]
– Suggest that IVFNs are useful:
• In multiple criteria decision-making problems.
• Particularly in cases where attribute values are in the form of
linguistic expressions.
• Ashtiani et al. [39]
– Propose an extension of the fuzzy TOPSIS method.
• Using interval-valued triangular fuzzy numbers.
67
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (5/7)
• Liu and Jin [37]
– propose a decision-making method
• using weighted geometric aggregation operators
– on attribute values expressed in the form of IVFNs.
• According to the definition in [39], an IVFN A
is defined as follows:
68
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (6/7)
• The IVFNs:
69
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (7/7)
• Interval-valued trapezoidal fuzzy number [40].
– The most general form of fuzzy number.
– Can be represented as:
A = [AL, AU] = [(x1
L, x1
L, x1
L, x1
L, υA
L), (x1
U, x1
U, x1
U, x1
U, υA
U))],
where 0 ≤ x1
L ≤ x2
L ≤ x3
L ≤ x4
L ≤ 1, 0 ≤ x1
U ≤ x2
U ≤ x3
U ≤ x4
U ≤ 1and AL ⊂ AU
– The operational rules of the interval-valued trapezoidal
fuzzy numbers are defined in [40].
70
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (1/15)
• The TOPSIS introduced by Hwang and Yoon [41].
– It is based on the concept that:
• The best alternative should have the shortest distance from
the positive ideal solution.
• The longer distance from the negative ideal solution.
• In the present work:
– Network selection is performed using a proposed fuzzy
version of TOPSIS, namely Trapezoidal Fuzzy TOPSIS (TFT).
• Linguistic values of criteria attributes.
– Represented by interval-valued trapezoidal fuzzy numbers.
71
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (2/15)
• A = {A1, A2,…, An}
– The set of possible alternatives.
• C = {C1, C2,…, Cn}
– The set of criteria.
• w1, w2, …, wm
– The weights of each criterion.
• The steps of the method are as follows.
72
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (3/15)
• Step 1. Construction of the decision matrix:
– Each xij element of the n x m decision matrix D is an
interval-valued trapezoidal fuzzy number.
• Expresses the performance of alternative i for criterion j.
73
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (4/15)
• In case there are Q decision makers.
– The decision matrix and the criteria weights.
• Include the average of the performance values and
weights, respectively, of the decision makers.
• Assuming that for the kth decision maker.
– xijk is the performance of alternative i for criterion j.
– wjk is the importance weight for criterion j.
74
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (5/15)
• The average of the performance values and weights are
given by:
75
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (6/15)
• Step 2. Normalization of the decision matrix:
– Consider that Ωb is the set of benefits attributes and Ωc is the set of costs
attributes.
– The elements of the normalized decision matrix are computed as:
76
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (7/15)
• Step 3. Construction of the weighted
normalized decision matrix:
– It is constructed by multiplying each element of
the normalized decision matrix rij.
• With the respective weight wj according to the formula:
77
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (8/15)
• Step 4. Determination of the positive and negative
ideal solution:
– The positive ideal solution is defined as:
78
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (9/15)
• The negative ideal solutions are defined accordingly
as:
79
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (10/15)
• Step 5. Measurement of the distance of each
alternative from the ideal solutions:
– The distances of each alternative from the positive ideal
solution are evaluated as follows:
80
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (11/15)
• The distances of each alternative from the negative
ideal solution are estimated:
81
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (12/15)
• Consequently, similar to [39]:
– The distance of the alternatives from the positive
and negative ideal solutions are expressed by
intervals such as [di1
+, di2
+] and [di1
-, di2
-].
• Instead of single values.
– In this way, less information is lost.
82
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (13/15)
• Step 6. Calculation of the relative closeness:
– The relative closeness of the distances from the
ideal solutions are computed as:
83
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (14/15)
• Compound relative closeness.
– Obtained from the average of the aforementioned
values:
84
International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (15/15)
• Step 7. Alternatives ranking:
– The alternatives are ranked according to their RCi
values.
– The best alternative is the one with the highest RCi
value.
85
International Journal of Communication Systems (IJCS) 2014, Wiley
Simulation Setup and Results
International Journal of Communication Systems (IJCS) 2014, Wiley
Simulation Setup and Results (1/2)
• Ranking of the networks alternatives
– Performed using the TFT algorithm.
• Weights of network selection criteria
– Obtained from the ANP.
• Heterogeneous network environment.
– Consisting of a number of long-term evolution (LTE),
WiMAX and WiFi networks.
87
International Journal of Communication Systems (IJCS) 2014, Wiley
Simulation Setup and Results (2/2)
• Each network can provide at least one of the
following five service types:
– Voice-over-Internet protocol (VoIP).
– Conversational video (CVideo).
– Buffered streaming (BStreaming).
– Real time gaming (RTGaming).
– Web browsing.
88
International Journal of Communication Systems (IJCS) 2014, Wiley
QoS class mapping and Service-
Level Agreements (1/4)
89
• In order to allow service continuity.
– QoS mapping among the QoS classes of the
different access technologies is required.
International Journal of Communication Systems (IJCS) 2014, Wiley
QoS class mapping and Service-
Level Agreements (2/4)
• Four SLAs are defined.
– SLA1 has the highest service priority
– SLA4 has the lowest service priority.
• SLA1.
– Supports all service types.
– Provides the best values for QoS and policy decision criteria.
• SLA2.
– Supports less service types.
– It does not provide support for the VoIP and real time gaming services.
– Provides slightly worse decision criteria values than those offered by
the SLA1.
90
International Journal of Communication Systems (IJCS) 2014, Wiley
QoS class mapping and Service-
Level Agreements (3/4)
• SLA3.
– Supports only the buffered streaming and the Web
browsing services.
– Satisfactory QoS characteristics and policies.
• SLA4.
– Low price.
– Supports only the Web browsing service.
– Acceptable decision criteria values.
91
International Journal of Communication Systems (IJCS) 2014, Wiley
QoS class mapping and Service-
Level Agreements (4/4)
• The ANP method is applied
in order to estimate the
weights of network
selection criteria per
service type and SLA.
• The ANP network model:
92
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP network model
93
• Criteria are classified into two groups:
– The QoS characteristics.
• Contains network performance related criteria including:
– Throughput.
– Delay.
– Jitter.
– Packet loss.
– The policy characteristics.
• Contains operator defined rules including:
– Price.
– Security.
– Service reliability.
» Determines the ability for service constraints satisfaction and
optimization of performance when a network is congested.
International Journal of Communication Systems (IJCS) 2014, Wiley
Pairwise comparison decision
matrices
• Pairwise comparison decision matrices.
– Created on the basis of relations among the seven
selection criteria.
94
International Journal of Communication Systems (IJCS) 2014, Wiley
Relations of criteria
95
• The pairwise comparison decision matrices are used:
– To evaluate the priority vectors of criteria.
– To form the supermatrix per service type and SLA.
• Subsequently, the weighted supermatrices and,
finally, the limit supermatrices are obtained.
• Indicatively, for the SLA1 VoIP service:
– The initial, the weighted and the limit supermatrices are
presented in the following slides.
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP supermatrix for SLA1
VoIP service
96
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP weighted supermatrix
for SLA1 VoIP service
97
International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP limit supermatrix for
SLA1 VoIP service
98
International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights
• The criteria weights per service and SLA obtained by the limit
supermatrices are presented in the following slides.
• The weights are proportional to the constraints of each service as
well as to the agreements of each SLA.
• The weight of the price criterion is low for SLA1.
– The service reliability and the network QoS characteristics are
considered as the most important factors.
• In SLA2, the price criterion is more important than in SLA1.
– The respective weight is greater than that of SLA1.
• The weights of the service reliability and QoS characteristics criteria
in SLA2 are lower compared to the relative weights of SLA1.
• In SLA3, the weights of price and service reliability criteria are
balanced.
– As they are almost of equivalent importance.
• In SLA4, the price is the most important criterion.
– Resulting in a high estimated weight value.
99
International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights for SLA1
100
International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights for SLA2
101
International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights for SLA3
102
International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights for SLA4
103
International Journal of Communication Systems (IJCS) 2014, Wiley
Linguistic terms and the corresponding
interval-valued trapezoidal fuzzy numbers
• Linguistic terms for the criteria attributes
– Represented by interval-valued trapezoidal fuzzy
numbers as shown in the following slide.
• Network policy specifications are expressed
directly using linguistic terms.
104
International Journal of Communication Systems (IJCS) 2014, Wiley
Linguistic terms and the corresponding
interval-valued trapezoidal fuzzy numbers
105
International Journal of Communication Systems (IJCS) 2014, Wiley
Relation of the network QoS
characteristics and linguistic terms
• Crisp values of network QoS characteristics are
converted into linguistic terms
– Which correspond to specific ranges of values per
service type.
• The following table presents a relative example
for the VoIP service.
– Illustrating the correspondence between:
• Ranges of network QoS characteristics values.
• Linguistic terms.
106
International Journal of Communication Systems (IJCS) 2014, Wiley
Relation of the network QoS
characteristics and linguistic terms for VoIP
107
International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks
• The available-candidate networks in our simulations
at the time of network selection per service and SLA,
as well as, their specifications expressed by linguistic
terms, are depicted in the following slides.
• The case of having several services of different QoS
constraints running at the user site is being
addressed.
– Network selection is performed in a way satisfying multiple
groups of criteria per user.
108
International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks of SLA1
109
International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks of SLA2
110
International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks of SLA3
111
International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks of SLA4
112
International Journal of Communication Systems (IJCS) 2014, Wiley
Users
• We consider the case where nine users need
to select a network that:
– Satisfies the requirements of their services.
– Complies with their respective SLA agreements.
113
International Journal of Communication Systems (IJCS) 2014, Wiley
Required services per user
114
International Journal of Communication Systems (IJCS) 2014, Wiley
TFT results (1/4)
• The proposed TFT algorithm is applied for
each user.
– The available networks are ranked as shown in the
following slide.
• Positive and negative ideal solutions.
– Represented by unary and null trapezoidal fuzzy
numbers, respectively
• To eliminate the ranking abnormality problem.
115
International Journal of Communication Systems (IJCS) 2014, Wiley
TFT results (2/4)
116
International Journal of Communication Systems (IJCS) 2014, Wiley
TFT results (3/4)
• Ranking of the network alternatives is in
accordance with the users expectations.
• Example:
– User 1 requiring increased QoS provisioning selects
LTE 1 network.
• Which guarantees the best QoS characteristics and
service reliability.
• LTE 1 achieves higher ranking than the other networks
– Because of the high values of the QoS characteristics and
service reliability factors bearing higher importance according
to the relative ANP weights in SLA1.
117
International Journal of Communication Systems (IJCS) 2014, Wiley
TFT results (4/4)
• Example:
– On the contrary, user 9:
• Whose prior selection criterion is the price of the
service.
• Selects the WiFi 1 network.
– Which satisfies his or her requirements in respect of his or her SLA
agreement.
118
International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (1/8)
• The performance of TFT algorithm was evaluated
against:
– The original TOPSIS method
– The FAE method [15].
• Calculates the criteria weights using the fuzzy AHP
• Performs the network selection by applying the ELECTRE
algorithm.
• We consider the scenario of the nine users
described in the previous slides.
119
International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (2/8)
• Critical weakness of the TOPSIS and FAE
– They do not support users with more than one
service.
• In these cases, they consider only the most demanding
service of the user.
• Specifically:
– For users 2 and 3
» They applied only for the VoIP service.
– For user 7
» They applied only for the BStreaming service.
– For the rest of the users
» They applied for each single user service.
120
International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (3/8)
• The following slide presents the networks
classification performed by the:
– TFT.
– TOPSIS.
– FAE.
121
International Journal of Communication Systems (IJCS) 2014, Wiley
122
• Networks classification in respect of TFT, TOPSIS (T) and Fuzzy
AHP–ELECTRE (FAE) results:
Performance evaluation of the
TFT algorithm (4/8)
International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (5/8)
• When a user has only one service.
– The methods usually provide similar results.
• When a user requires multiple services.
– The TFT accomplishes more reliable results than the TOPSIS
and FAE.
• Because it considers the weights of each service.
123
International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (6/8)
• The results concerning user 1 using only the VoIP
service .
– Are similar for TFT and TOPSIS methods with the exception
of the evaluation sequence of the WiFi 1 and WiFi 2
networks.
– FAE accomplishes quite similar network rates with the TFT
and TOPSIS methods for this user.
124
International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (7/8)
• TFT succeeds more reliable results for user 4.
– Only the RTGaming service is used
• And the most important criteria are service reliability, throughput and
delay.
– TFT selects the WiMAX 2 network
• Which provides AG for service reliability, VG for throughput, and AG for
delay criterion.
– TOPSIS selects the LTE 1 network
• Which has similar values with the WiMAX 2 for service reliability and delay
criteria.
– But worse performance for throughout criterion by providing G instead of VG.
– FAE does not provide a clear choice for user 4
• Results to equal evaluation sequence for both WiMAX 2 and LTE 1
networks.
125
International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (8/8)
• The classification of networks obtained from
the three methods is quite different for user 7
– Who requests both BStreaming and Web browsing
services
– The TFT accomplishes more reliable results by
taking into account the weights of both services.
126
International Journal of Communication Systems (IJCS) 2014, Wiley
Sensitivity analysis of the TFT
algorithm (1/3)
• The sensitivity of the TFT is evaluated when the number of the
available access networks changes frequently.
• We consider three different network configuration scenarios for
the nine users defined in the previous slides.
• In the first scenario.
– All networks defined in the previous slides are available.
• In the second and third scenarios.
– The LTE 1 and the WiFi 2 networks, respectively, are not reachable.
• The following graphs include three column types of different
pattern.
– Indicating the ranking of network alternatives in each case.
127
International Journal of Communication Systems (IJCS) 2014, Wiley
Sensitivity analysis of the TFT
algorithm (2/3)
• First case.
– User 1 selects the LTE 1 network.
• Second case.
– The remaining networks improve their ranking order thus
user 1 selects the WiMAX 2 network.
• Third case.
– Only the last rated WiFi 3 network increases its rank.
• Because the WiFi 2 network preceded WiFi 3 in the other two
cases.
128
International Journal of Communication Systems (IJCS) 2014, Wiley
Sensitivity analysis of the TFT
algorithm (3/3)
• Similar behavior is observed in the ranking of
network alternatives for the other users.
• Ranking results of the proposed method:
– Normally adjusted with respect to the heterogeneous
network environment changes.
• Highlighting the methods sensitivity.
129
International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (1/5)
130
International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (2/5)
131
International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (3/5)
132
International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (4/5)
133
International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (5/5)
134
International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions
International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (1/5)
• Network selection in heterogeneous networks
is a complex task.
– Because it takes into account different parameters
with different relative importance, such as the:
• Network and the application characteristics.
• User preferences.
• Service cost.
136
International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (2/5)
• The proposed network selection method.
– Takes into account the:
• Network QoS characteristics policies.
• Application requirements.
• Different types of users SLAs.
– Selects the optimal network that satisfy
simultaneously:
• Applications’ requirements.
• User’s preferences running on a mobile user’s device.
137
International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (3/5)
• More specifically, the proposed method employs two MADM
algorithms:
– The ANP for criteria weights calculation.
– The TFT for accomplishing the overall rating of the network technologies.
• The ANP is selected to determine the relative importance and the
dependence of the criteria.
• As selection criteria are considered the:
– Network QoS parameters.
– Service constraints.
– User requirements.
– Provider policies.
• These criteria are easily configured and represented by interval-
valued trapezoidal fuzzy numbers. 138
International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (4/5)
• The TFT algorithm is applied to calculate the
overall rating of the available networks.
• Performance evaluation:
– When a user has only one service.
• TFT provides similar results to the original TOPSIS and FAE
methods.
– When a user requires multiple services.
• TFT performs better by satisfying multiple groups of criteria
per user.
– Because the original TOPSIS and FAE methods cannot support
more than one services.
139
International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (5/5)
• Sensitivity analysis:
– TFT does not suffer from the ranking abnormality
problem.
– The results are normally adjusted to the
heterogeneous network environment changes.
140
International Journal of Communication Systems (IJCS) 2014, Wiley
References
International Journal of Communication Systems (IJCS) 2014, Wiley
References (1/8)
1. Khanjari SA, Arafeh B, Day K, Alzeidi N. Bandwidth borrowing-based qos
approach for adaptive call admission control in multiclass traffic wireless cellular
networks. International Journal of Communication Systems 2013; 26(7):811–831.
2. Ma X, Liu J, Jiang H. On the design of algorithms for mobile multimedia systems:
a survey. International Journal of Communication Systems 2011; 24(10):1330–
1339.
3. Ou S, Pan H, Li F. Heterogeneous wireless access technology and its impact on
forming and maintaining friendship through mobile social networks.
International Journal of Communication Systems 2012; 25(10):1300–1312.
4. Gelabert X, Sallent O, Prez-Romero J, Agust R. Performance evaluation of radio
access selection strategies in constrained multi-access/multi-service wireless
networks. Computer Networks 2011; 55(1):173–192.
5. Verma R, Singh N. GRA based network selection in heterogeneous wireless
networks. Wireless Personal Communi- cations 2013; 72(2):1437–1452.
142
International Journal of Communication Systems (IJCS) 2014, Wiley
References (2/8)
6. Halgamuge MN, Vu H, Ramamohanarao K, Zukerman M. A call quality
performance measure for handoff algorithms. International Journal of
Communication Systems 2011; 24(3):363–383.
7. Wu J-S, Yang S-F, Hwang B-J. A terminal-controlled vertical handover decision
scheme in ieee 802.21-enabled heterogeneous wireless networks. International
Journal of Communication Systems 2009; 22(7):819–834.
8. Radhika K, Redd AV. Vertical handoff decision using game theory approach for
multi-mode mobile terminals in next generation wireless networks. International
Journal of Computer Applications 2011; 36:31–37.
9. Wang L, Kuo G-S. Mathematical modeling for network selection in
heterogeneous wireless networks—a tutorial. Communications Surveys Tutorials,
IEEE 2013; 15(1):271–292.
10. Chamodrakas I, Martakos D. A utility-based fuzzy TOPSIS method for energy
efficient network selection in heterogeneous wireless networks. Applied Soft
Computing 2012; 12(7):1929–1938.
143
International Journal of Communication Systems (IJCS) 2014, Wiley
References (3/8)
11. Shi Z, Zhu Q. Network selection based on multiple attribute decision making and
group decision making for heterogeneous wireless networks. The Journal of
China Universities of Posts and Telecommunications 2012; 19(5): 92–114.
12. Lahby M, Leghris C, Adib A. New multi access selection method based on
mahalanobis distance. Applied Mathematical Sciences 2012; 6(53-56):2745–
2760.
13. Lassoued I, Bonnin J-M, Ben Hamouda Z, Belghith A. A methodology for
evaluating vertical handoff decision mechanisms. 7th International Conference
on Networking, ICN 2008, Cancun, Mexico, 2008; 377–384.
14. Sharma M, Khola R. Pre decision based handoff in multi network environment.
Advances in Computer Science, Engineering & Applications, New Delhi, India,
2012; 609–616.
15. Charilas DE, Markaki OI, Psarras J, Constantinou P. Application of fuzzy AHP and
ELECTRE to network selection. 1st International Conference on Mobile
Lightweight Wireless Systems, Athens, Greece, 2009; 63–73.
144
International Journal of Communication Systems (IJCS) 2014, Wiley
References (4/8)
16. Lahby M, Leghris C, Adib A. New multi access selection method using differentiated
weight of access interface. International Conference on Communications and
Information Technology (ICCIT), Beirut, Lebanon, 2012; 237–242.
17. Suciu L, Bonnin JM, Guillouard K, Stévant B. Towards a highly adaptable user-centric
terminal architecture. The 7th International Symposium on Wireless Personal
Multimedia Communications (WPMC 2004), Abano, Italie, 2004.
18. Sheng-mei L, Su P, Minghai X. An improved topsis vertical handoff algorithm for
heterogeneousm wireless networks. 12th IEEE International Conference on
Communication Technology (ICCT), Nanjing, China, 2010; 750–754.
19. Yang K, Gondal I, Qiu B, Dooley LS. Combined SINR based vertical handoff algorithm
for next generation heterogeneous wireless networks. Global Telecommunications
Conference, GLOBECOM’07, Washington, USA, 2007; 4483–4487.
20. Yang K, Gondal I, Qiu Bin. Multi-dimensional adaptive sinr based vertical handoff for
heterogeneous wireless networks. Communications Letters, IEEE 2008; 12(6):438–
440.
145
International Journal of Communication Systems (IJCS) 2014, Wiley
References (5/8)
21. Alkhawlani MM, Alsalem KA, Hussein AA. Multi-criteria vertical handover by topsis
and fuzzy logic. International Conference on Communications and Information
Technology (ICCIT), Aqaba, Jordan, 2011; 96–102.
22. Alkhawlani MM, Mohsen AM. Hybrid approach for radio network selection in
heterogeneous wireless networks. International Journal of Advanced Science and
Technology 2012; 44:33–48.
23. Vasu K, Maheshwari S, Mahapatra S, Kumar CS. QoS aware fuzzy rule based vertical
handoff decision algorithm for wireless heterogeneous networks. National
Conference on Communications (NCC), Bangalore, India, 2011; 1–5.
24. Gowrishankar RBH, Sekhar GG, Satyanarayana P, et al. Performance evaluation of
vertical handoff in wireless data networks. 4th International Conference on
Wireless Communications, Networking and Mobile Computing, WICOM’08, Dalian,
China, 2008; 1–4.
25. Rodriguez J, Tsagaropoulos M, Politis I, Kotsopoulos S, Dagiuklas T. A middleware
architecture supporting seamless and secure multimedia services across an
intertechnology radio access network. Wireless Communications, IEEE 2009;
16(5):24–31.
146
International Journal of Communication Systems (IJCS) 2014, Wiley
References (6/8)
26. Wu Q, Li W, Wang R, Yu P. An access network selection mechanism for
heterogeneous wireless environments. Journal of Computational Information
Systems 2013; 9(5):1799–1807.
27. Wang H, Wang Z, Feng G, LV H, Chen X, Zhu Q. Intelligent access selection in
cognitive networks: a fuzzy neural network approach. Journal of Computational
Information Systems 2012; 8(21):8877–8884.
28. Sasirekha V, Ilanzkumaran M. Heterogeneous wireless network selection using
FAHP integrated with topsis and vikor. International Conference on Pattern
Recognition, Informatics and Medical Engineering (PRIME), Salem, India, 2013;
399–407.
29. Kaleem F, Mehbodniya A, Yen KK, Adachi F. Application of fuzzy topsis for
weighting the system attributes in overlay networks. 14th Asia-Pacific Network
Operations and Management Symposium (APNOMS12), 2012; 1–6.
30. Lahby M, Leghris C, Adib A. A survey and comparison study on weighting
algorithms for access network selection. 9th Annual Conference on Wireless On-
Demand Network Systems and Services (WONS), Courmayeur, Italy, 2012; 35–38.
147
International Journal of Communication Systems (IJCS) 2014, Wiley
References (7/8)
31. Zhang W. Handover decision using fuzzy MADM in heterogeneous networks.
Wireless Communications and Networking Conference, WCNC 2004, Atlanta,
USA, Vol. 2, 2004; 653–658.
32. Saaty TL. Decision making with dependence and feedback: the analytic network
process, 1996.
33. Yüksel ˙I, Dagdeviren M. Using the analytic network process (ANP) in a swot
analysis—a case study for a textile firm. Information Sciences 2007;
177(16):3364–3382.
34. Saaty TL, Vargas LG. Diagnosis with dependent symptoms: Bayes theorem and
the analytic hierarchy process. Operations Research 1998; 46(4):491–502.
35. Zadeh LA. Fuzzy sets. Information and Control 1965; 8(3):338–353.
36. Sambuc R. Fonctions and Floues: Application a l’aide au Diagnostic en Pathologie
Thyroidienne. Faculté de Médecine de Marseille: Marseille, France, 1975.
148
International Journal of Communication Systems (IJCS) 2014, Wiley
References (8/8)
37. Liu P, Jin F. A multi-attribute group decision-making method based on weighted
geometric aggregation operators of interval-valued trapezoidal fuzzy numbers.
Applied Mathematical Modelling 2012; 36(6):2498–2509.
38. Cornelis C, Deschrijver G, Kerre EE. Advances and challenges in interval-valued
fuzzy logic. Fuzzy Sets and Systems 2006; 157(5):622–627.
39. Ashtiani B, Haghighirad F, Makui A, et al. Extension of fuzzy topsis method based
on interval-valued fuzzy sets. Applied Soft Computing 2009; 9(2):457–461.
40. Wei S-H, Chen S-M. Fuzzy risk analysis based on interval-valued fuzzy numbers.
Expert Systems with Applications 2009; 36(2):2285–2299.
41. Hwang C-L, Yoon K. Multiple Attribute Decision Making. Springer-Verlag: Berlin,
New York, 1981.
149

More Related Content

What's hot

SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESSURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
ijdpsjournal
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Waqas Tariq
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET Journal
 
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
pijans
 
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATIONA MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
IJCNCJournal
 
MAODV implementation
MAODV implementationMAODV implementation
MAODV implementation
anshul mahajan
 
A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing Environment
CSCJournals
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
IJECEIAES
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...
TELKOMNIKA JOURNAL
 
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
IJECEIAES
 

What's hot (10)

SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESSURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICES
 
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...
 
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
IRJET- Comparative Study on Embedded Feature Selection Techniques for Interne...
 
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...
 
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATIONA MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATION
 
MAODV implementation
MAODV implementationMAODV implementation
MAODV implementation
 
A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing Environment
 
Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks Traffic-aware adaptive server load balancing for softwaredefined networks
Traffic-aware adaptive server load balancing for softwaredefined networks
 
Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...Efficient P2P data dissemination in integrated optical and wireless networks ...
Efficient P2P data dissemination in integrated optical and wireless networks ...
 
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
 

Similar to An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method (presentation)

User Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless NetworksUser Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless Networks
IRJET Journal
 
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...
ijwmn
 
Quality of experience aware network selection model for service provisioning...
Quality of experience aware network selection model for service  provisioning...Quality of experience aware network selection model for service  provisioning...
Quality of experience aware network selection model for service provisioning...
IJECEIAES
 
DCCN 2016 - QoS to QoE
DCCN 2016 - QoS to QoEDCCN 2016 - QoS to QoE
DCCN 2016 - QoS to QoE
rudndccn
 
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
IJCNCJournal
 
8.conclusion
8.conclusion8.conclusion
8.conclusion
Basil John
 
Vertical handover dissusion
Vertical handover dissusionVertical handover dissusion
Vertical handover dissusion
waelayoub
 
Middleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datosMiddleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datos
Facultad de Informática UCM
 
A Research Framework for the Clean-Slate Design of Next-Generation Optical Ac...
A Research Framework for the Clean-Slate Design of Next-Generation Optical Ac...A Research Framework for the Clean-Slate Design of Next-Generation Optical Ac...
A Research Framework for the Clean-Slate Design of Next-Generation Optical Ac...
Xi'an Jiaotong-Liverpool University
 
monile networkin.pptx
monile networkin.pptxmonile networkin.pptx
monile networkin.pptx
ssuser32b116
 
Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Editor IJARCET
 
Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Editor IJARCET
 
Monitoring and Analyzing Big Traffic Data of a Large-Scale Cellular Network w...
Monitoring and Analyzing Big Traffic Data of a Large-Scale Cellular Network w...Monitoring and Analyzing Big Traffic Data of a Large-Scale Cellular Network w...
Monitoring and Analyzing Big Traffic Data of a Large-Scale Cellular Network w...
Alice Chan
 
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
cscpconf
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
iosrjce
 
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
IJCNCJournal
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
graphhoc
 
71 338-347
71 338-34771 338-347
71 338-347
idescitation
 
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid ServicesTowards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
Hong-Linh Truong
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
Dr Geetha Mohan
 

Similar to An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method (presentation) (20)

User Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless NetworksUser Preference based Network Selection in Wireless Networks
User Preference based Network Selection in Wireless Networks
 
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...
 
Quality of experience aware network selection model for service provisioning...
Quality of experience aware network selection model for service  provisioning...Quality of experience aware network selection model for service  provisioning...
Quality of experience aware network selection model for service provisioning...
 
DCCN 2016 - QoS to QoE
DCCN 2016 - QoS to QoEDCCN 2016 - QoS to QoE
DCCN 2016 - QoS to QoE
 
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...
 
8.conclusion
8.conclusion8.conclusion
8.conclusion
 
Vertical handover dissusion
Vertical handover dissusionVertical handover dissusion
Vertical handover dissusion
 
Middleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datosMiddleware para IoT basado en analítica de datos
Middleware para IoT basado en analítica de datos
 
A Research Framework for the Clean-Slate Design of Next-Generation Optical Ac...
A Research Framework for the Clean-Slate Design of Next-Generation Optical Ac...A Research Framework for the Clean-Slate Design of Next-Generation Optical Ac...
A Research Framework for the Clean-Slate Design of Next-Generation Optical Ac...
 
monile networkin.pptx
monile networkin.pptxmonile networkin.pptx
monile networkin.pptx
 
Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008
 
Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008
 
Monitoring and Analyzing Big Traffic Data of a Large-Scale Cellular Network w...
Monitoring and Analyzing Big Traffic Data of a Large-Scale Cellular Network w...Monitoring and Analyzing Big Traffic Data of a Large-Scale Cellular Network w...
Monitoring and Analyzing Big Traffic Data of a Large-Scale Cellular Network w...
 
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
 
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKS
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
71 338-347
71 338-34771 338-347
71 338-347
 
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid ServicesTowards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid Services
 
Cp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -networkCp7101 design and management of computer networks -network
Cp7101 design and management of computer networks -network
 

More from University of Piraeus

A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
University of Piraeus
 
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
University of Piraeus
 
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...
University of Piraeus
 
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...
University of Piraeus
 
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
University of Piraeus
 
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
University of Piraeus
 
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
University of Piraeus
 
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
University of Piraeus
 
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...
University of Piraeus
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing Systems
University of Piraeus
 
Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless Networks
University of Piraeus
 
Performance Analysis and Optimization of Next Generation Wireless Networks (P...
Performance Analysis and Optimization of Next Generation Wireless Networks (P...Performance Analysis and Optimization of Next Generation Wireless Networks (P...
Performance Analysis and Optimization of Next Generation Wireless Networks (P...
University of Piraeus
 
Personalized Real-Time Virtual Tours in Places with Cultural Interest
Personalized Real-Time Virtual Tours in Places with Cultural InterestPersonalized Real-Time Virtual Tours in Places with Cultural Interest
Personalized Real-Time Virtual Tours in Places with Cultural Interest
University of Piraeus
 
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...
University of Piraeus
 
The convergence of blockchain, internet of things (io t) and building informa...
The convergence of blockchain, internet of things (io t) and building informa...The convergence of blockchain, internet of things (io t) and building informa...
The convergence of blockchain, internet of things (io t) and building informa...
University of Piraeus
 
The revival of back-filled monuments through Augmented Reality (AR) (presenta...
The revival of back-filled monuments through Augmented Reality (AR) (presenta...The revival of back-filled monuments through Augmented Reality (AR) (presenta...
The revival of back-filled monuments through Augmented Reality (AR) (presenta...
University of Piraeus
 
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...
University of Piraeus
 
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)
University of Piraeus
 
A downlink scheduler supporting real time services in LTE cellular networks (...
A downlink scheduler supporting real time services in LTE cellular networks (...A downlink scheduler supporting real time services in LTE cellular networks (...
A downlink scheduler supporting real time services in LTE cellular networks (...
University of Piraeus
 
A Vertical Handover Management Scheme for VANET Cloud Computing Systems
A Vertical Handover Management Scheme for VANET Cloud Computing SystemsA Vertical Handover Management Scheme for VANET Cloud Computing Systems
A Vertical Handover Management Scheme for VANET Cloud Computing Systems
University of Piraeus
 

More from University of Piraeus (20)

A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
 
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...
 
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...
 
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...
 
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
 
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...
 
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
 
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...
 
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...
 
Mobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing SystemsMobility Management on 5G Vehicular Cloud Computing Systems
Mobility Management on 5G Vehicular Cloud Computing Systems
 
Performance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless NetworksPerformance Analysis and Optimization of Next Generation Wireless Networks
Performance Analysis and Optimization of Next Generation Wireless Networks
 
Performance Analysis and Optimization of Next Generation Wireless Networks (P...
Performance Analysis and Optimization of Next Generation Wireless Networks (P...Performance Analysis and Optimization of Next Generation Wireless Networks (P...
Performance Analysis and Optimization of Next Generation Wireless Networks (P...
 
Personalized Real-Time Virtual Tours in Places with Cultural Interest
Personalized Real-Time Virtual Tours in Places with Cultural InterestPersonalized Real-Time Virtual Tours in Places with Cultural Interest
Personalized Real-Time Virtual Tours in Places with Cultural Interest
 
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...
 
The convergence of blockchain, internet of things (io t) and building informa...
The convergence of blockchain, internet of things (io t) and building informa...The convergence of blockchain, internet of things (io t) and building informa...
The convergence of blockchain, internet of things (io t) and building informa...
 
The revival of back-filled monuments through Augmented Reality (AR) (presenta...
The revival of back-filled monuments through Augmented Reality (AR) (presenta...The revival of back-filled monuments through Augmented Reality (AR) (presenta...
The revival of back-filled monuments through Augmented Reality (AR) (presenta...
 
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...
 
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)
 
A downlink scheduler supporting real time services in LTE cellular networks (...
A downlink scheduler supporting real time services in LTE cellular networks (...A downlink scheduler supporting real time services in LTE cellular networks (...
A downlink scheduler supporting real time services in LTE cellular networks (...
 
A Vertical Handover Management Scheme for VANET Cloud Computing Systems
A Vertical Handover Management Scheme for VANET Cloud Computing SystemsA Vertical Handover Management Scheme for VANET Cloud Computing Systems
A Vertical Handover Management Scheme for VANET Cloud Computing Systems
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method (presentation)

  • 1. International Journal of Communication Systems (IJCS) 2014, Wiley An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method Emmanouil Skondras1,2, Aggeliki Sgora1,2, Angelos Michalas2 and Dimitrios D. Vergados1 1Department of Informatics, University of Piraeus, 80, Karaoli and Dimitriou St., GR-18534, Piraeus, Greece 2Department of Informatics Engineering, Technological Educational Institute of Western Macedonia, GR-52100, Kastoria, Greece 1
  • 2. International Journal of Communication Systems (IJCS) 2014, Wiley Outline • Introduction. • Contributions. • Related work. • The proposed Network Selection Method. • Simulation Setup and Results. • Conclusions. • References. 2
  • 3. International Journal of Communication Systems (IJCS) 2014, Wiley Introduction
  • 4. International Journal of Communication Systems (IJCS) 2014, Wiley Introduction (1/8) • Next generation wireless networks – Consist of many heterogeneous access technologies. • Support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. – Growing rapidly integrating multiple network technologies. • Aiming to support multimedia services in addition to voice and data with high data rates and guaranteed QoS [1]. 4
  • 5. International Journal of Communication Systems (IJCS) 2014, Wiley Introduction (2/8) • End users devices (such as mobile phone or netbook) are equipped with multiple radio interfaces. – Allowing connectivity to the most suitable network environment. • Based on users requirements and operators policies [2, 3]. • Need for network selection mechanisms that consider multiple factors must be addressed. 5
  • 6. International Journal of Communication Systems (IJCS) 2014, Wiley Introduction (3/8) • According to the always best connection principle of the 4G wireless networks: – Users of mobile services should be provided with connectivity to the best access technology at anytime [4, 5]. • Need for efficient vertical handover (VHO) mechanisms to be applied. 6
  • 7. International Journal of Communication Systems (IJCS) 2014, Wiley Introduction (4/8) • The handover process is supposed to be: – Successful, infrequent, and imperceptible. • To enable telecommunication providers meet the QoS requirements of the users [6]. • In the case of heterogeneous networks: – Seamless interworking among the different technologies is also needed [7]. – Special attention to the VHO process should be given [8]. 7
  • 8. International Journal of Communication Systems (IJCS) 2014, Wiley Introduction (5/8) • The VHO procedure consists of three main steps: – Handover initiation. • Contains the required procedures to identify the available access networks and select the time of handover in respect of network conditions and user mobility. – Network selection. • Selection of the most appropriate network alternative based on the available network characteristics, user preferences, and applications requirements. – Handover execution. • Completes the handover process by seamlessly connecting the terminal to the selected network. • This work deals with the network selection step of the VHO process. 8
  • 9. International Journal of Communication Systems (IJCS) 2014, Wiley Introduction (6/8) • Existing handover network selection schemes: – Employ multi attribute decision-making methods (MADM), fuzzy logic, neural networks, and utility functions [9]. • Because the selection of an access network depends on several parameters with different relative importance: – The access network selection problem is usually looked at from the aspect of multi-criteria analysis. • More specifically by applying different MADM algorithms. 9
  • 10. International Journal of Communication Systems (IJCS) 2014, Wiley Introduction (7/8) • A network selection method is proposed by employing two MADM algorithms: – The Analytic Network Process (ANP). • Extension of the Analytic Hierarchy Process (AHP) for criteria weights calculation – A fuzzy version of the technique for order preference by similarity to ideal solution (TOPSIS). • For accomplishing the ranking of the candidate networks. 10
  • 11. International Journal of Communication Systems (IJCS) 2014, Wiley Introduction (8/8) • The proposed method considers the following factors to provide advanced connection services: – Network QoS characteristics and policies. – Application requirements. – Different types of users service-level agreements (SLAs). • Linguistic values. – Are used to characterize the performance of selection criteria. • Which are represented by interval-valued trapezoidal fuzzy numbers. 11
  • 12. International Journal of Communication Systems (IJCS) 2014, Wiley Contributions
  • 13. International Journal of Communication Systems (IJCS) 2014, Wiley Contributions (1/3) • Complex relationships allowed – Within and among clusters of selection criteria • By applying the ANP method – Does not use an hierarchical framework as AHP but a network model of dependencies. – Eliminates the index consistency requirement of AHP. » i.e., in AHP the relative importance of decision factors need to be redefined in case index consistency value is more than 0.1. • In our case: – As clusters of selection criteria are considered the network QoS characteristics and the network policies characteristics. 13
  • 14. International Journal of Communication Systems (IJCS) 2014, Wiley Contributions (2/3) • Imprecise information of performance selection criteria – Can be better expressed. • For different application types and users SLAs. – By applying linguistic values and interval-valued fuzzy numbers.  Interval value fuzzy numbers. – Can efficiently present uncertain information. • By minimum maximum membership interval. • Rather than by single membership values. 14
  • 15. International Journal of Communication Systems (IJCS) 2014, Wiley Contributions (3/3) • Selection of the best network access technology – Considering contradictory selection criteria. • Facilitating the provision of high quality services. – Satisfying different types of users SLAs. • Fuzzy version of TOPSIS. – Trapezoidal interval-valued Fuzzy TOPSIS (TFT). • It resolves the case of having several services of different QoS constraints running simultaneously on a terminal. – Network selection is performed in a way satisfying multiple groups of criteria per user. – The ranking abnormality problem experienced in the original TOPSIS is discarded [10]. • To avoid inconsistencies. – When a new network is available or an existing network is removed from the alternatives. 15
  • 16. International Journal of Communication Systems (IJCS) 2014, Wiley Related work
  • 17. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (1/37) • Multi attribute decision-making methods – Are used to select the best alternative network • Among candidate networks – Given a set of criteria with different importance weights. • MADM algorithms – Are able to evaluate criteria of different value ranges. • Sometimes even contradictory, using multi- criteria analysis. – Widely used methods include: • Analytic Hierarchy Process (AHP) [11, 12]. • Simple additive weighting (SAW) [12, 13]. • Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) [12–14]. • Fuzzy AHP-ELECTRE (FAE) [15]. • Gray relational analysis (GRA) [12, 13]. • Multiplicative exponent weighting (MEW) [12, 13]. • Distance to ideal alternative (D2I) [12]. • Analytic Network Process (ANP) [16]. 17
  • 18. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (2/37) • Various weighting methods are used. – Provide suitable criteria weights for each alternative. • Several research studies use MADM methods for network selection. • Sharma and Khola [14] – Presented a network selection algorithm. • Based on the TOPSIS algorithm. • Besides the usual parameters – i.e., QoS, bandwidth, and cost – It also takes a prediction of the Received Signal Strength (RSS) into account. 18
  • 19. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (3/37) • Shi and Zhu [11] – Employed two MADM methods • Combined with the group decision-making algorithm to perform network selection. – The proposed procedure • Defines two types of weights (namely the objective weights) – Consider: » The current attributes of candidate networks. » The subjective weights specified according to the subscribers and traffic class preferences. – Weight vectors. • Objective weights vector. – Determined using the entropy weighting method. • Subjective weights vector. – Evaluated using the AHP. 19
  • 20. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (4/37) • Shi and Zhu [11]… – The group decision-making method • Employs both vector types to produce a synthesized vector • The ranking of alternatives is the sum of the product of the normalized attribute values with their respective weights. – Compatibility of the integrated decision. • It is finally checked to ensure the effectiveness of the proposed solution. – Results showed that the proposed method: • Reduces the number of handoffs • Improves QoS characteristics of conversational and interactive traffic flows  Compared with entropy weighting and GRA approaches. 20
  • 21. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (5/37) • Lassoued et al. [13] – Described an evaluation framework of VHO mechanisms, which emulates: • Application characteristics. • Mobile terminals context. • User and operators preferences. – The model provides user traces containing information about: • The location of the users. • The QoS performance of the networks. – Current network characteristics are obtained from: • A mobility simulator emulating network access technologies. • Location of access points. • User mobility. 21
  • 22. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (6/37) • Lassoued et al. [13]… – The proposed methodology: • Used to compare the efficiency of various MADM network selection algorithms in a dynamic environment, including: – SAW, TOPSIS, GRA, MEW and their own proposed scheme called Ubique [17]. – Simulation results • Showed that the examined algorithms achieve good performance, • Ubique is less flexible to changes of delay and cost criteria weights than the other approaches. 22
  • 23. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (7/37) • Lahby et al. [12] – Proposed a network selection scheme • It is based on the AHP method and the Mahalanobis distance. – Mahalanobis distance is used to measure the distance of alternatives. » From the correlation of criteria » The optimal network satisfying the QoS, security and cost criteria is selected. – Simulation results • Both the ranking abnormality problem and the number of handoffs in the proposed method – Are reduced compared with the decision algorithms SAW, MEW, TOPSIS and distance to ideal alternative. 23
  • 24. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (8/37) • Lahby et al. [16] – Proposed a technique for network selection using: • ANP to estimate the weights of selection criteria • GRA to rank the alternative networks. – Selection criteria include network related attributes • The preference of users is expressed by evaluating different criteria weights for each access network. – By applying the ANP. » Evaluates the criteria weights of each access network separately • Based on users preferences; in that way, unique criteria weights exist for each network. 24
  • 25. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (9/37) • Lahby et al. [16]… – Simulation results. • Indicated that this method reduces: – The ranking abnormality problem. – The number of handoffs.  Compared with other method variants. 25
  • 26. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (10/37) • Sheng-mei et al. [18] – Presented a network selection algorithm making use of: • The AHP and the entropy weight method. – To evaluate the weights of network and user related criteria. – Candidate access networks. • Identified on the basis of their signal-to-interference- plus-noise ratio (SINR) values. – TOPSIS is used for the final ranking of the network alternatives. 26
  • 27. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (11/37) • Sheng-mei et al. [18]… – The proposed method achieves: • Higher throughput. • Reduced number of vertical handoffs. • For various traffic classes.  Compared with: – Combined SINR-based vertical handoff algorithms [19] – Multi-dimensional adaptive SINR-based vertical handoff algorithms [20]. 27
  • 28. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (12/37) • Alkhawlani et al. [21] – Proposed a VHO decision system. • Integrates fuzzy logic and TOP- SIS method. – Network and user related criteria • Processed by parallel fuzzy logic control (FLC) subsystems. – TOPSIS is applied to perform the selection of the best network choice. 28
  • 29. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (13/37) • Alkhawlani et al. [21]… – Simulation results showed that the proposed solution: • Reduces handover rate and handover failure. • Increases the percentage of users assigned to networks of their preference. • Increases the utilization of inexpensive networks. 29
  • 30. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (14/37) • Alkhawlani and Mohsen [22] – Presented a network selection system. • Suitable for tightly coupled wireless network environments. – It takes into account: • The network choice proposed by the user • Criteria imposed by the operator such as: – Network policies. – QoS characteristics. – System capacity. – Utilization. 30
  • 31. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (15/37) • Alkhawlani and Mohsen [22]… – Two modules: • The user software module. – Evaluates the best network alternative based on selection criteria set by the user including reliability, security, battery power, and price. • The operator software module. – Resides at the coordinator of the radio access technologies and performs the final selection decision. – It uses: » The FLC subsystems of [18]. • To evaluate the performance of criteria. » The AHP method. • To assess the FLC subsystems outputs and select the best possible network. 31
  • 32. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (16/37) • Alkhawlani and Mohsen [22]… – Simulation results. • The proposed network selection scheme – Achieves better performance. » In terms of user preferences satisfaction, QoS fulfillment and operator benefits improvement. – Compared with four different reference algorithms performing: i. Random selection. ii. Selection based on terminal speed. iii. Selection based on service type. iv. Selection based on the availability of resources, respectively. 32
  • 33. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (17/37) • Vasu et al. [23] – Proposed a fuzzy rule based decision algorithm • For vertical handoff in wireless heterogeneous networks. – The algorithm uses: • QoS performance values as decision parameters. • Triangular fuzzy membership functions. – For the fuzzification of the input parameters and the defuzzification of the output result. 33
  • 34. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (18/37) • Vasu et al. [23]… – Evaluation of the proposed model. • A non-birth Markov chain with states corresponding to available access networks is used. – Simulation experiments. • Comparing the proposed approach against various MADM methods • The proposed method improves the performance of delay sensitive applications. 34
  • 35. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (19/37) • Fuzzy logic for network selection – Requires the definition of logic rules from specialists • With thorough knowledge of the behavior of the available access networks in various conditions. – As the number of selection criteria and the available networks increase. • Rules become more complex struggling to: – Define effective policies. – Evaluate the best alternative. 35
  • 36. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (20/37) • Fuzzy logic for network selection… – Use of fuzzy logic based solutions. • Limited to handover decision schemes. – With reduced number of networks and selection criteria. – Some network selection methods combine fuzzy logic with neural networks. • To rate the alternative access networks. 36
  • 37. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (21/37) • Gowrishankar et al. [24] – Created an artificial neural network multi-criteria decision analysis system. • Performs network selection using network related attributes. – Expressed either in crisp or in fuzzy linguistic values. – Sensitivity analysis. • Among the proposed solution, the TOPSIS and the SAW methods. • Carried out in a network environment consisting of four overlaid networks, where: – Weights of different criteria change. – Connections of four traffic types exist. 37
  • 38. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (22/37) • Gowrishankar et al. [24]… – Results. • The proposed method is: – Less stable than TOPSIS. – More stable than SAW.  In respect to criteria weights changes. – Neural network approaches. • Replace the complex logic rules of fuzzy logic approaches. • But they still suffer from scalability issues. – Because of the required large number of the processing elements at their hidden layers. » As the complexity of criteria and the number of networks increase. 38
  • 39. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (23/37) • Several network selection schemes make use of utility/cost functions. – To provide performance metrics for different types of criteria. • Rodriguez et al. [25] – Use a cost function for the network selection • Includes the rules and policies for selecting the best candidate network or for adapting ongoing session parameters. 39
  • 40. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (24/37) • Wu et al. [26] – Used a set of utility functions to quantify selection criteria including: • Link quality (RSS). • Battery power. • Average throughput. • Network delay. • Monetary cost. • Application type. – The relative weights of criteria are calculated according to the AHP method. – The candidate networks are ranked using the weighted product method. – Simulation results. • The proposed scheme: – Improves network performance. – Reduces power consumption of users terminals. 40
  • 41. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (25/37) • Wang et al. [27] – The concepts of fuzzy logic, neural network, and utility functions. • Are combined to perform network selection. – The proposed method. • Uses a fuzzy neural network. – Obtains network, user, and terminal related input criteria. • Evaluates the performance of each access network. – Attributes of criteria. • Defined through utility functions. • Processed through the fuzzification, interference and defuzzification layers of the neural network. 41
  • 42. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (26/37) • Wang et al. [27]… – A fuzzy version of the particle swarm optimization is used. • For neural network training. – It is not clear how expected network performance degrees are specified during the learning process. – Simulation results. • The proposed method achieves better performance in terms of: – Access blocking probability. – Packet drop probability. – Average throughput. Compared with other network selection algorithms including GRA, AHP and game theoretic. 42
  • 43. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (27/37) • There is a rate of uncertainty in characterizing performance measurements as well as rates of influence of performance metrics. • Fuzzy MADM methods. – Expressing uncertain quantities by fuzzy numbers. • Received the interest of many researchers in decision theory. • Several fuzzy MADM network selection methods. – Are suggested utilizing linguistic variables, triangular fuzzy numbers, trapezoidal fuzzy numbers, etc. • To model network attributes and their respective weights. 43
  • 44. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (28/37) • Chamodrakas and Martakos [10] – Proposed a method for network selection that considers: • Network conditions. • QoS constraints. • Energy consumption requirements. – User preferences. • Indicating the relative importance of criteria in different applications. • Expressed using linguistic expressions. – Transformed to triangular fuzzy numbers. – Graded mean integration method. • Used for the defuzzification of fuzzy numbers into crisp values. – Utility functions. • Used to model. – QoS requirements. – Energy consumption characteristics.  Of different applications. 44
  • 45. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (29/37) • Chamodrakas and Martakos [10]… – The fuzzy set representation version of TOPSIS. • Used to combine selection criteria and weights. – To perform the rating of the available networks. • Resolves possible inconsistencies. – Because of conflicting criteria. » Such as bandwidth and energy consumption. – Simulation results. • The proposed method accomplishes a trade-off between QoS requirements and energy consumption. 45
  • 46. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (30/37) • Sasirekha and Ilanzkumaran [28] – Described two methods to perform network selection. – Both methods use a fuzzy version of the AHP technique. • To obtain the weights of selection criteria specifying networks performance. – Relative importance matrix. • Resulting from the pairwise comparison of criteria . • Fuzzified using triangular fuzzy numbers. – With membership functions representing the scale of importance of five levels. – Relative importance values. • Turned into crisp values using the geometric mean operator. – While the rest of the steps of the AHP method follow. 46
  • 47. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (31/37) • Sasirekha and Ilanzkumaran [28]… – The former network selection method. • Uses TOPSIS to evaluate the best alternative network based on: – The weights from AHP. – The criteria values of each alternative network. – The latter network selection method. • Combines the fuzzy AHP with VIKOR method. – Which has less complexity and performs equally well as TOPSIS. – Evaluation. • Both methods succeed to select the best network alternative. 47
  • 48. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (32/37) • Kaleem et al. [29] – Presented a VHO decision algorithm. • Based on network performance measurements to evaluate. – The necessity of making a handoff. – The best network alternative in case that handoff is required. – To determine the handoff decision. • A handoff factor is evaluated and compared with a constant threshold. – Network selection is performed using fuzzy TOPSIS. 48
  • 49. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (33/37) • Kaleem et al. [29] – User preferences are defined. • In the form of criteria weights. – Ratings of selection criteria and criteria weights are expressed as trapezoidal or triangular fuzzy numbers. – Numerical examples and simulation experiments. • Present the competence of the proposed approach. – For various traffic classes. – In heterogeneous network access technologies. 49
  • 50. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (34/37) • Lahby et al. [30] – Compared the weighting algorithms of: • AHP, fuzzy AHP, ANP and fuzzy ANP. – For assigning weights to network dependent criteria used by MADM algorithms performing network selection. – The TOPSIS method is used. • To evaluate the effects of the weighting algorithms. 50
  • 51. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (35/37) • Lahby et al. [30]… – Results. • All algorithms achieve similar results concerning the network selected. • The ranking abnormality of TOPSIS is reduced. – When the ANP weighting method is used for: » Background traffic. » Conversational traffic. » Interactive traffic. » Streaming traffic. 51
  • 52. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (36/37) • Zhang [31] – Performed an analysis of MADM methods for handover decision. – Uncertain linguistic terms of decision criteria such as sojourn time and seamlessness. • Converted to fuzzy data. – Which in turn are converted to crisp values. 52
  • 53. International Journal of Communication Systems (IJCS) 2014, Wiley Related work (37/37) • Zhang [31]… – SAW and TOPSIS. • Suggested to perform the final ranking of the candidate networks. – Sensitivity analysis. » TOPSIS is more sensitive to the criteria performance and their weights. – The paper identifies the handover decision case. • In which several applications are running simultaneously on a terminal as a group decision problem. – Although its solution is not being addressed. 53
  • 54. International Journal of Communication Systems (IJCS) 2014, Wiley The proposed Network Selection Method
  • 55. International Journal of Communication Systems (IJCS) 2014, Wiley The proposed Network Selection Method • Our proposed method consists of two MADM algorithms: – ANP • Calculates the relative importance of the selection criteria. – Trapezoidal Fuzzy TOPSIS (TFT) • Accomplishes the ranking of the candidate networks. • Represents the performance of selection criteria using interval-valued trapezoidal fuzzy numbers. 55
  • 56. International Journal of Communication Systems (IJCS) 2014, Wiley Analytic Network Process (ANP) (1/2) • The ANP was also introduced by Saaty [32]. – To deal with decision problems that criteria and alternatives depend on each other. • It is actually the generalization of the AHP. • A decision problem that is analyzed with the ANP. – Can be designed either as a control hierarchy or as a nonhierarchical network. 56
  • 57. International Journal of Communication Systems (IJCS) 2014, Wiley Analytic Network Process (ANP) (2/2) • Nodes of the network represent components (or clusters) of the system. – Arcs denote interactions between them. • Inner dependencies. – Interactions and feedbacks within clusters. • Outer dependencies. – Interactions and feedbacks between clusters. 57
  • 58. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP steps (1/6) • Step 1. Model construction and problem structuring. – The problem is analyzed and decomposed into a rational system. • Such as a network. • Step 2. Pairwise comparison matrices and priority vectors. – The pairwise comparison matrix, as in AHP, is derived using Saaty’s nine-point importance scale. 58
  • 59. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP steps (2/6) • Analytic Hierarchy Process (AHP). 59
  • 60. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP steps (3/6) • Step 3. Supermatrix formation. – Represents the inner and the outer dependencies of the network. – It is actually a partitioned matrix. • Each matrix segment represents a relationship between two clusters in the network. – To construct the supermatrix. • The local priority vectors obtained in step 2 are grouped and placed in the appropriate positions in a supermatrix. – Based on the flow of influence from one cluster to another, or from a cluster to itself, as in the loop. 60
  • 61. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP steps (4/6) • Step 3. Supermatrix formation… – Then, the supermatrix is transformed to a stochastic one. • The weighted supermatrix. – The weighted supermatrix. • Raised to limiting powers. – Until all the entries converge to calculate the overall priorities. » The cumulative influence of each element on every other element with which it interacts is obtained [34]. – At this point, all the columns of the new matrix, the limit supermatrix are the same. • Their values show the global priority of each element of network. 61
  • 62. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP steps (5/6) • For example, if we assume a network with n clusters, where each cluster Ck , k = 1, 2,…, n, and has mn elements, denoted as ek1 , ek2 ,…, ekmk , then the standard form for a supermatrix can be expressed as: 62
  • 63. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP steps (6/6) • Step 4. Selection of the best alternatives: – If the supermatrix formed in step 3 covers the whole network: • The priority weights of the alternatives can be found in the column of alternatives in the normalized supermatrix. – Otherwise: • Additional calculations are required. – In order to obtain the overall priorities of the alternatives. – The alternative with the largest overall priority should be selected. • As it is the best alternative as determined by the calculations made using matrix operations. 63
  • 64. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal Interval-Valued Fuzzy Numbers (1/7) • The concept of fuzzy logic was introduced by Zadeh [35]. – It is used to make a decision from indeterminate and approximate information. • A fuzzy number represented by: – A set of real values representing an uncertain quantity. – A convex normalized continuous function • Which estimates the degree of membership for each value in the subset. • Triangular or trapezoidal fuzzy numbers. – Frequently used to represent uncertain information. 64
  • 65. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal Interval-Valued Fuzzy Numbers (2/7) • Trapezoidal fuzzy number – Can be defined as a vector x = (x1, x2, x3, x4, υÂ) with membership function:  x1 < x2 < x3 < x4 and υ ∈[0,1]. 65
  • 66. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal Interval-Valued Fuzzy Numbers (3/7) • Interval-Valued Fuzzy Number (IVFN). – Introduced by Sambuc [36] – Defined as A = [ΑL, AU]. • Consisting of the lower AL and the upper AU fuzzy numbers. – Replace the crisp membership values by intervals in [0, 1]. – Fuzzy information can be better expressed by intervals than by single values. 66
  • 67. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal Interval-Valued Fuzzy Numbers (4/7) • Liu and Jin [37] and Cornelis et al. [38] – Suggest that IVFNs are useful: • In multiple criteria decision-making problems. • Particularly in cases where attribute values are in the form of linguistic expressions. • Ashtiani et al. [39] – Propose an extension of the fuzzy TOPSIS method. • Using interval-valued triangular fuzzy numbers. 67
  • 68. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal Interval-Valued Fuzzy Numbers (5/7) • Liu and Jin [37] – propose a decision-making method • using weighted geometric aggregation operators – on attribute values expressed in the form of IVFNs. • According to the definition in [39], an IVFN A is defined as follows: 68
  • 69. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal Interval-Valued Fuzzy Numbers (6/7) • The IVFNs: 69
  • 70. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal Interval-Valued Fuzzy Numbers (7/7) • Interval-valued trapezoidal fuzzy number [40]. – The most general form of fuzzy number. – Can be represented as: A = [AL, AU] = [(x1 L, x1 L, x1 L, x1 L, υA L), (x1 U, x1 U, x1 U, x1 U, υA U))], where 0 ≤ x1 L ≤ x2 L ≤ x3 L ≤ x4 L ≤ 1, 0 ≤ x1 U ≤ x2 U ≤ x3 U ≤ x4 U ≤ 1and AL ⊂ AU – The operational rules of the interval-valued trapezoidal fuzzy numbers are defined in [40]. 70
  • 71. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (1/15) • The TOPSIS introduced by Hwang and Yoon [41]. – It is based on the concept that: • The best alternative should have the shortest distance from the positive ideal solution. • The longer distance from the negative ideal solution. • In the present work: – Network selection is performed using a proposed fuzzy version of TOPSIS, namely Trapezoidal Fuzzy TOPSIS (TFT). • Linguistic values of criteria attributes. – Represented by interval-valued trapezoidal fuzzy numbers. 71
  • 72. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (2/15) • A = {A1, A2,…, An} – The set of possible alternatives. • C = {C1, C2,…, Cn} – The set of criteria. • w1, w2, …, wm – The weights of each criterion. • The steps of the method are as follows. 72
  • 73. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (3/15) • Step 1. Construction of the decision matrix: – Each xij element of the n x m decision matrix D is an interval-valued trapezoidal fuzzy number. • Expresses the performance of alternative i for criterion j. 73
  • 74. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (4/15) • In case there are Q decision makers. – The decision matrix and the criteria weights. • Include the average of the performance values and weights, respectively, of the decision makers. • Assuming that for the kth decision maker. – xijk is the performance of alternative i for criterion j. – wjk is the importance weight for criterion j. 74
  • 75. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (5/15) • The average of the performance values and weights are given by: 75
  • 76. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (6/15) • Step 2. Normalization of the decision matrix: – Consider that Ωb is the set of benefits attributes and Ωc is the set of costs attributes. – The elements of the normalized decision matrix are computed as: 76
  • 77. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (7/15) • Step 3. Construction of the weighted normalized decision matrix: – It is constructed by multiplying each element of the normalized decision matrix rij. • With the respective weight wj according to the formula: 77
  • 78. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (8/15) • Step 4. Determination of the positive and negative ideal solution: – The positive ideal solution is defined as: 78
  • 79. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (9/15) • The negative ideal solutions are defined accordingly as: 79
  • 80. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (10/15) • Step 5. Measurement of the distance of each alternative from the ideal solutions: – The distances of each alternative from the positive ideal solution are evaluated as follows: 80
  • 81. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (11/15) • The distances of each alternative from the negative ideal solution are estimated: 81
  • 82. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (12/15) • Consequently, similar to [39]: – The distance of the alternatives from the positive and negative ideal solutions are expressed by intervals such as [di1 +, di2 +] and [di1 -, di2 -]. • Instead of single values. – In this way, less information is lost. 82
  • 83. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (13/15) • Step 6. Calculation of the relative closeness: – The relative closeness of the distances from the ideal solutions are computed as: 83
  • 84. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (14/15) • Compound relative closeness. – Obtained from the average of the aforementioned values: 84
  • 85. International Journal of Communication Systems (IJCS) 2014, Wiley The trapezoidal interval-valued fuzzy TOPSIS algorithm (15/15) • Step 7. Alternatives ranking: – The alternatives are ranked according to their RCi values. – The best alternative is the one with the highest RCi value. 85
  • 86. International Journal of Communication Systems (IJCS) 2014, Wiley Simulation Setup and Results
  • 87. International Journal of Communication Systems (IJCS) 2014, Wiley Simulation Setup and Results (1/2) • Ranking of the networks alternatives – Performed using the TFT algorithm. • Weights of network selection criteria – Obtained from the ANP. • Heterogeneous network environment. – Consisting of a number of long-term evolution (LTE), WiMAX and WiFi networks. 87
  • 88. International Journal of Communication Systems (IJCS) 2014, Wiley Simulation Setup and Results (2/2) • Each network can provide at least one of the following five service types: – Voice-over-Internet protocol (VoIP). – Conversational video (CVideo). – Buffered streaming (BStreaming). – Real time gaming (RTGaming). – Web browsing. 88
  • 89. International Journal of Communication Systems (IJCS) 2014, Wiley QoS class mapping and Service- Level Agreements (1/4) 89 • In order to allow service continuity. – QoS mapping among the QoS classes of the different access technologies is required.
  • 90. International Journal of Communication Systems (IJCS) 2014, Wiley QoS class mapping and Service- Level Agreements (2/4) • Four SLAs are defined. – SLA1 has the highest service priority – SLA4 has the lowest service priority. • SLA1. – Supports all service types. – Provides the best values for QoS and policy decision criteria. • SLA2. – Supports less service types. – It does not provide support for the VoIP and real time gaming services. – Provides slightly worse decision criteria values than those offered by the SLA1. 90
  • 91. International Journal of Communication Systems (IJCS) 2014, Wiley QoS class mapping and Service- Level Agreements (3/4) • SLA3. – Supports only the buffered streaming and the Web browsing services. – Satisfactory QoS characteristics and policies. • SLA4. – Low price. – Supports only the Web browsing service. – Acceptable decision criteria values. 91
  • 92. International Journal of Communication Systems (IJCS) 2014, Wiley QoS class mapping and Service- Level Agreements (4/4) • The ANP method is applied in order to estimate the weights of network selection criteria per service type and SLA. • The ANP network model: 92
  • 93. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP network model 93 • Criteria are classified into two groups: – The QoS characteristics. • Contains network performance related criteria including: – Throughput. – Delay. – Jitter. – Packet loss. – The policy characteristics. • Contains operator defined rules including: – Price. – Security. – Service reliability. » Determines the ability for service constraints satisfaction and optimization of performance when a network is congested.
  • 94. International Journal of Communication Systems (IJCS) 2014, Wiley Pairwise comparison decision matrices • Pairwise comparison decision matrices. – Created on the basis of relations among the seven selection criteria. 94
  • 95. International Journal of Communication Systems (IJCS) 2014, Wiley Relations of criteria 95 • The pairwise comparison decision matrices are used: – To evaluate the priority vectors of criteria. – To form the supermatrix per service type and SLA. • Subsequently, the weighted supermatrices and, finally, the limit supermatrices are obtained. • Indicatively, for the SLA1 VoIP service: – The initial, the weighted and the limit supermatrices are presented in the following slides.
  • 96. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP supermatrix for SLA1 VoIP service 96
  • 97. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP weighted supermatrix for SLA1 VoIP service 97
  • 98. International Journal of Communication Systems (IJCS) 2014, Wiley The ANP limit supermatrix for SLA1 VoIP service 98
  • 99. International Journal of Communication Systems (IJCS) 2014, Wiley Criteria weights • The criteria weights per service and SLA obtained by the limit supermatrices are presented in the following slides. • The weights are proportional to the constraints of each service as well as to the agreements of each SLA. • The weight of the price criterion is low for SLA1. – The service reliability and the network QoS characteristics are considered as the most important factors. • In SLA2, the price criterion is more important than in SLA1. – The respective weight is greater than that of SLA1. • The weights of the service reliability and QoS characteristics criteria in SLA2 are lower compared to the relative weights of SLA1. • In SLA3, the weights of price and service reliability criteria are balanced. – As they are almost of equivalent importance. • In SLA4, the price is the most important criterion. – Resulting in a high estimated weight value. 99
  • 100. International Journal of Communication Systems (IJCS) 2014, Wiley Criteria weights for SLA1 100
  • 101. International Journal of Communication Systems (IJCS) 2014, Wiley Criteria weights for SLA2 101
  • 102. International Journal of Communication Systems (IJCS) 2014, Wiley Criteria weights for SLA3 102
  • 103. International Journal of Communication Systems (IJCS) 2014, Wiley Criteria weights for SLA4 103
  • 104. International Journal of Communication Systems (IJCS) 2014, Wiley Linguistic terms and the corresponding interval-valued trapezoidal fuzzy numbers • Linguistic terms for the criteria attributes – Represented by interval-valued trapezoidal fuzzy numbers as shown in the following slide. • Network policy specifications are expressed directly using linguistic terms. 104
  • 105. International Journal of Communication Systems (IJCS) 2014, Wiley Linguistic terms and the corresponding interval-valued trapezoidal fuzzy numbers 105
  • 106. International Journal of Communication Systems (IJCS) 2014, Wiley Relation of the network QoS characteristics and linguistic terms • Crisp values of network QoS characteristics are converted into linguistic terms – Which correspond to specific ranges of values per service type. • The following table presents a relative example for the VoIP service. – Illustrating the correspondence between: • Ranges of network QoS characteristics values. • Linguistic terms. 106
  • 107. International Journal of Communication Systems (IJCS) 2014, Wiley Relation of the network QoS characteristics and linguistic terms for VoIP 107
  • 108. International Journal of Communication Systems (IJCS) 2014, Wiley Available networks • The available-candidate networks in our simulations at the time of network selection per service and SLA, as well as, their specifications expressed by linguistic terms, are depicted in the following slides. • The case of having several services of different QoS constraints running at the user site is being addressed. – Network selection is performed in a way satisfying multiple groups of criteria per user. 108
  • 109. International Journal of Communication Systems (IJCS) 2014, Wiley Available networks of SLA1 109
  • 110. International Journal of Communication Systems (IJCS) 2014, Wiley Available networks of SLA2 110
  • 111. International Journal of Communication Systems (IJCS) 2014, Wiley Available networks of SLA3 111
  • 112. International Journal of Communication Systems (IJCS) 2014, Wiley Available networks of SLA4 112
  • 113. International Journal of Communication Systems (IJCS) 2014, Wiley Users • We consider the case where nine users need to select a network that: – Satisfies the requirements of their services. – Complies with their respective SLA agreements. 113
  • 114. International Journal of Communication Systems (IJCS) 2014, Wiley Required services per user 114
  • 115. International Journal of Communication Systems (IJCS) 2014, Wiley TFT results (1/4) • The proposed TFT algorithm is applied for each user. – The available networks are ranked as shown in the following slide. • Positive and negative ideal solutions. – Represented by unary and null trapezoidal fuzzy numbers, respectively • To eliminate the ranking abnormality problem. 115
  • 116. International Journal of Communication Systems (IJCS) 2014, Wiley TFT results (2/4) 116
  • 117. International Journal of Communication Systems (IJCS) 2014, Wiley TFT results (3/4) • Ranking of the network alternatives is in accordance with the users expectations. • Example: – User 1 requiring increased QoS provisioning selects LTE 1 network. • Which guarantees the best QoS characteristics and service reliability. • LTE 1 achieves higher ranking than the other networks – Because of the high values of the QoS characteristics and service reliability factors bearing higher importance according to the relative ANP weights in SLA1. 117
  • 118. International Journal of Communication Systems (IJCS) 2014, Wiley TFT results (4/4) • Example: – On the contrary, user 9: • Whose prior selection criterion is the price of the service. • Selects the WiFi 1 network. – Which satisfies his or her requirements in respect of his or her SLA agreement. 118
  • 119. International Journal of Communication Systems (IJCS) 2014, Wiley Performance evaluation of the TFT algorithm (1/8) • The performance of TFT algorithm was evaluated against: – The original TOPSIS method – The FAE method [15]. • Calculates the criteria weights using the fuzzy AHP • Performs the network selection by applying the ELECTRE algorithm. • We consider the scenario of the nine users described in the previous slides. 119
  • 120. International Journal of Communication Systems (IJCS) 2014, Wiley Performance evaluation of the TFT algorithm (2/8) • Critical weakness of the TOPSIS and FAE – They do not support users with more than one service. • In these cases, they consider only the most demanding service of the user. • Specifically: – For users 2 and 3 » They applied only for the VoIP service. – For user 7 » They applied only for the BStreaming service. – For the rest of the users » They applied for each single user service. 120
  • 121. International Journal of Communication Systems (IJCS) 2014, Wiley Performance evaluation of the TFT algorithm (3/8) • The following slide presents the networks classification performed by the: – TFT. – TOPSIS. – FAE. 121
  • 122. International Journal of Communication Systems (IJCS) 2014, Wiley 122 • Networks classification in respect of TFT, TOPSIS (T) and Fuzzy AHP–ELECTRE (FAE) results: Performance evaluation of the TFT algorithm (4/8)
  • 123. International Journal of Communication Systems (IJCS) 2014, Wiley Performance evaluation of the TFT algorithm (5/8) • When a user has only one service. – The methods usually provide similar results. • When a user requires multiple services. – The TFT accomplishes more reliable results than the TOPSIS and FAE. • Because it considers the weights of each service. 123
  • 124. International Journal of Communication Systems (IJCS) 2014, Wiley Performance evaluation of the TFT algorithm (6/8) • The results concerning user 1 using only the VoIP service . – Are similar for TFT and TOPSIS methods with the exception of the evaluation sequence of the WiFi 1 and WiFi 2 networks. – FAE accomplishes quite similar network rates with the TFT and TOPSIS methods for this user. 124
  • 125. International Journal of Communication Systems (IJCS) 2014, Wiley Performance evaluation of the TFT algorithm (7/8) • TFT succeeds more reliable results for user 4. – Only the RTGaming service is used • And the most important criteria are service reliability, throughput and delay. – TFT selects the WiMAX 2 network • Which provides AG for service reliability, VG for throughput, and AG for delay criterion. – TOPSIS selects the LTE 1 network • Which has similar values with the WiMAX 2 for service reliability and delay criteria. – But worse performance for throughout criterion by providing G instead of VG. – FAE does not provide a clear choice for user 4 • Results to equal evaluation sequence for both WiMAX 2 and LTE 1 networks. 125
  • 126. International Journal of Communication Systems (IJCS) 2014, Wiley Performance evaluation of the TFT algorithm (8/8) • The classification of networks obtained from the three methods is quite different for user 7 – Who requests both BStreaming and Web browsing services – The TFT accomplishes more reliable results by taking into account the weights of both services. 126
  • 127. International Journal of Communication Systems (IJCS) 2014, Wiley Sensitivity analysis of the TFT algorithm (1/3) • The sensitivity of the TFT is evaluated when the number of the available access networks changes frequently. • We consider three different network configuration scenarios for the nine users defined in the previous slides. • In the first scenario. – All networks defined in the previous slides are available. • In the second and third scenarios. – The LTE 1 and the WiFi 2 networks, respectively, are not reachable. • The following graphs include three column types of different pattern. – Indicating the ranking of network alternatives in each case. 127
  • 128. International Journal of Communication Systems (IJCS) 2014, Wiley Sensitivity analysis of the TFT algorithm (2/3) • First case. – User 1 selects the LTE 1 network. • Second case. – The remaining networks improve their ranking order thus user 1 selects the WiMAX 2 network. • Third case. – Only the last rated WiFi 3 network increases its rank. • Because the WiFi 2 network preceded WiFi 3 in the other two cases. 128
  • 129. International Journal of Communication Systems (IJCS) 2014, Wiley Sensitivity analysis of the TFT algorithm (3/3) • Similar behavior is observed in the ranking of network alternatives for the other users. • Ranking results of the proposed method: – Normally adjusted with respect to the heterogeneous network environment changes. • Highlighting the methods sensitivity. 129
  • 130. International Journal of Communication Systems (IJCS) 2014, Wiley TFT’s networks ranking in case of networks environment changes (1/5) 130
  • 131. International Journal of Communication Systems (IJCS) 2014, Wiley TFT’s networks ranking in case of networks environment changes (2/5) 131
  • 132. International Journal of Communication Systems (IJCS) 2014, Wiley TFT’s networks ranking in case of networks environment changes (3/5) 132
  • 133. International Journal of Communication Systems (IJCS) 2014, Wiley TFT’s networks ranking in case of networks environment changes (4/5) 133
  • 134. International Journal of Communication Systems (IJCS) 2014, Wiley TFT’s networks ranking in case of networks environment changes (5/5) 134
  • 135. International Journal of Communication Systems (IJCS) 2014, Wiley Conclusions
  • 136. International Journal of Communication Systems (IJCS) 2014, Wiley Conclusions (1/5) • Network selection in heterogeneous networks is a complex task. – Because it takes into account different parameters with different relative importance, such as the: • Network and the application characteristics. • User preferences. • Service cost. 136
  • 137. International Journal of Communication Systems (IJCS) 2014, Wiley Conclusions (2/5) • The proposed network selection method. – Takes into account the: • Network QoS characteristics policies. • Application requirements. • Different types of users SLAs. – Selects the optimal network that satisfy simultaneously: • Applications’ requirements. • User’s preferences running on a mobile user’s device. 137
  • 138. International Journal of Communication Systems (IJCS) 2014, Wiley Conclusions (3/5) • More specifically, the proposed method employs two MADM algorithms: – The ANP for criteria weights calculation. – The TFT for accomplishing the overall rating of the network technologies. • The ANP is selected to determine the relative importance and the dependence of the criteria. • As selection criteria are considered the: – Network QoS parameters. – Service constraints. – User requirements. – Provider policies. • These criteria are easily configured and represented by interval- valued trapezoidal fuzzy numbers. 138
  • 139. International Journal of Communication Systems (IJCS) 2014, Wiley Conclusions (4/5) • The TFT algorithm is applied to calculate the overall rating of the available networks. • Performance evaluation: – When a user has only one service. • TFT provides similar results to the original TOPSIS and FAE methods. – When a user requires multiple services. • TFT performs better by satisfying multiple groups of criteria per user. – Because the original TOPSIS and FAE methods cannot support more than one services. 139
  • 140. International Journal of Communication Systems (IJCS) 2014, Wiley Conclusions (5/5) • Sensitivity analysis: – TFT does not suffer from the ranking abnormality problem. – The results are normally adjusted to the heterogeneous network environment changes. 140
  • 141. International Journal of Communication Systems (IJCS) 2014, Wiley References
  • 142. International Journal of Communication Systems (IJCS) 2014, Wiley References (1/8) 1. Khanjari SA, Arafeh B, Day K, Alzeidi N. Bandwidth borrowing-based qos approach for adaptive call admission control in multiclass traffic wireless cellular networks. International Journal of Communication Systems 2013; 26(7):811–831. 2. Ma X, Liu J, Jiang H. On the design of algorithms for mobile multimedia systems: a survey. International Journal of Communication Systems 2011; 24(10):1330– 1339. 3. Ou S, Pan H, Li F. Heterogeneous wireless access technology and its impact on forming and maintaining friendship through mobile social networks. International Journal of Communication Systems 2012; 25(10):1300–1312. 4. Gelabert X, Sallent O, Prez-Romero J, Agust R. Performance evaluation of radio access selection strategies in constrained multi-access/multi-service wireless networks. Computer Networks 2011; 55(1):173–192. 5. Verma R, Singh N. GRA based network selection in heterogeneous wireless networks. Wireless Personal Communi- cations 2013; 72(2):1437–1452. 142
  • 143. International Journal of Communication Systems (IJCS) 2014, Wiley References (2/8) 6. Halgamuge MN, Vu H, Ramamohanarao K, Zukerman M. A call quality performance measure for handoff algorithms. International Journal of Communication Systems 2011; 24(3):363–383. 7. Wu J-S, Yang S-F, Hwang B-J. A terminal-controlled vertical handover decision scheme in ieee 802.21-enabled heterogeneous wireless networks. International Journal of Communication Systems 2009; 22(7):819–834. 8. Radhika K, Redd AV. Vertical handoff decision using game theory approach for multi-mode mobile terminals in next generation wireless networks. International Journal of Computer Applications 2011; 36:31–37. 9. Wang L, Kuo G-S. Mathematical modeling for network selection in heterogeneous wireless networks—a tutorial. Communications Surveys Tutorials, IEEE 2013; 15(1):271–292. 10. Chamodrakas I, Martakos D. A utility-based fuzzy TOPSIS method for energy efficient network selection in heterogeneous wireless networks. Applied Soft Computing 2012; 12(7):1929–1938. 143
  • 144. International Journal of Communication Systems (IJCS) 2014, Wiley References (3/8) 11. Shi Z, Zhu Q. Network selection based on multiple attribute decision making and group decision making for heterogeneous wireless networks. The Journal of China Universities of Posts and Telecommunications 2012; 19(5): 92–114. 12. Lahby M, Leghris C, Adib A. New multi access selection method based on mahalanobis distance. Applied Mathematical Sciences 2012; 6(53-56):2745– 2760. 13. Lassoued I, Bonnin J-M, Ben Hamouda Z, Belghith A. A methodology for evaluating vertical handoff decision mechanisms. 7th International Conference on Networking, ICN 2008, Cancun, Mexico, 2008; 377–384. 14. Sharma M, Khola R. Pre decision based handoff in multi network environment. Advances in Computer Science, Engineering & Applications, New Delhi, India, 2012; 609–616. 15. Charilas DE, Markaki OI, Psarras J, Constantinou P. Application of fuzzy AHP and ELECTRE to network selection. 1st International Conference on Mobile Lightweight Wireless Systems, Athens, Greece, 2009; 63–73. 144
  • 145. International Journal of Communication Systems (IJCS) 2014, Wiley References (4/8) 16. Lahby M, Leghris C, Adib A. New multi access selection method using differentiated weight of access interface. International Conference on Communications and Information Technology (ICCIT), Beirut, Lebanon, 2012; 237–242. 17. Suciu L, Bonnin JM, Guillouard K, Stévant B. Towards a highly adaptable user-centric terminal architecture. The 7th International Symposium on Wireless Personal Multimedia Communications (WPMC 2004), Abano, Italie, 2004. 18. Sheng-mei L, Su P, Minghai X. An improved topsis vertical handoff algorithm for heterogeneousm wireless networks. 12th IEEE International Conference on Communication Technology (ICCT), Nanjing, China, 2010; 750–754. 19. Yang K, Gondal I, Qiu B, Dooley LS. Combined SINR based vertical handoff algorithm for next generation heterogeneous wireless networks. Global Telecommunications Conference, GLOBECOM’07, Washington, USA, 2007; 4483–4487. 20. Yang K, Gondal I, Qiu Bin. Multi-dimensional adaptive sinr based vertical handoff for heterogeneous wireless networks. Communications Letters, IEEE 2008; 12(6):438– 440. 145
  • 146. International Journal of Communication Systems (IJCS) 2014, Wiley References (5/8) 21. Alkhawlani MM, Alsalem KA, Hussein AA. Multi-criteria vertical handover by topsis and fuzzy logic. International Conference on Communications and Information Technology (ICCIT), Aqaba, Jordan, 2011; 96–102. 22. Alkhawlani MM, Mohsen AM. Hybrid approach for radio network selection in heterogeneous wireless networks. International Journal of Advanced Science and Technology 2012; 44:33–48. 23. Vasu K, Maheshwari S, Mahapatra S, Kumar CS. QoS aware fuzzy rule based vertical handoff decision algorithm for wireless heterogeneous networks. National Conference on Communications (NCC), Bangalore, India, 2011; 1–5. 24. Gowrishankar RBH, Sekhar GG, Satyanarayana P, et al. Performance evaluation of vertical handoff in wireless data networks. 4th International Conference on Wireless Communications, Networking and Mobile Computing, WICOM’08, Dalian, China, 2008; 1–4. 25. Rodriguez J, Tsagaropoulos M, Politis I, Kotsopoulos S, Dagiuklas T. A middleware architecture supporting seamless and secure multimedia services across an intertechnology radio access network. Wireless Communications, IEEE 2009; 16(5):24–31. 146
  • 147. International Journal of Communication Systems (IJCS) 2014, Wiley References (6/8) 26. Wu Q, Li W, Wang R, Yu P. An access network selection mechanism for heterogeneous wireless environments. Journal of Computational Information Systems 2013; 9(5):1799–1807. 27. Wang H, Wang Z, Feng G, LV H, Chen X, Zhu Q. Intelligent access selection in cognitive networks: a fuzzy neural network approach. Journal of Computational Information Systems 2012; 8(21):8877–8884. 28. Sasirekha V, Ilanzkumaran M. Heterogeneous wireless network selection using FAHP integrated with topsis and vikor. International Conference on Pattern Recognition, Informatics and Medical Engineering (PRIME), Salem, India, 2013; 399–407. 29. Kaleem F, Mehbodniya A, Yen KK, Adachi F. Application of fuzzy topsis for weighting the system attributes in overlay networks. 14th Asia-Pacific Network Operations and Management Symposium (APNOMS12), 2012; 1–6. 30. Lahby M, Leghris C, Adib A. A survey and comparison study on weighting algorithms for access network selection. 9th Annual Conference on Wireless On- Demand Network Systems and Services (WONS), Courmayeur, Italy, 2012; 35–38. 147
  • 148. International Journal of Communication Systems (IJCS) 2014, Wiley References (7/8) 31. Zhang W. Handover decision using fuzzy MADM in heterogeneous networks. Wireless Communications and Networking Conference, WCNC 2004, Atlanta, USA, Vol. 2, 2004; 653–658. 32. Saaty TL. Decision making with dependence and feedback: the analytic network process, 1996. 33. Yüksel ˙I, Dagdeviren M. Using the analytic network process (ANP) in a swot analysis—a case study for a textile firm. Information Sciences 2007; 177(16):3364–3382. 34. Saaty TL, Vargas LG. Diagnosis with dependent symptoms: Bayes theorem and the analytic hierarchy process. Operations Research 1998; 46(4):491–502. 35. Zadeh LA. Fuzzy sets. Information and Control 1965; 8(3):338–353. 36. Sambuc R. Fonctions and Floues: Application a l’aide au Diagnostic en Pathologie Thyroidienne. Faculté de Médecine de Marseille: Marseille, France, 1975. 148
  • 149. International Journal of Communication Systems (IJCS) 2014, Wiley References (8/8) 37. Liu P, Jin F. A multi-attribute group decision-making method based on weighted geometric aggregation operators of interval-valued trapezoidal fuzzy numbers. Applied Mathematical Modelling 2012; 36(6):2498–2509. 38. Cornelis C, Deschrijver G, Kerre EE. Advances and challenges in interval-valued fuzzy logic. Fuzzy Sets and Systems 2006; 157(5):622–627. 39. Ashtiani B, Haghighirad F, Makui A, et al. Extension of fuzzy topsis method based on interval-valued fuzzy sets. Applied Soft Computing 2009; 9(2):457–461. 40. Wei S-H, Chen S-M. Fuzzy risk analysis based on interval-valued fuzzy numbers. Expert Systems with Applications 2009; 36(2):2285–2299. 41. Hwang C-L, Yoon K. Multiple Attribute Decision Making. Springer-Verlag: Berlin, New York, 1981. 149