The wireless technology and communication plays a vital role in our daily life. The end users are expecting more Quality of Experience (QOE) rather than the Quality of Service (QOS). In order to provide full signal coverage the entire cellular network coverage is divided in to small cells called as femtocells, those femtocells are covered with femtocell antennas which are very small in size compared with regular antennas. With these femtocell coverage problem is solved but when a user moves from one location to another location the user has to switch from one base station to so many base station which cannot be maintained with present handoff methods. The present hand off methods working on distance calculation approach, the proposed method is based on the velocity and device direction calculated based on GPS location toward the Base Station (BS) of the device which may ping pong handoff effect.
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...cscpconf
An efficient resource allocation is one of the greatest challenges in wireless cellular
communication. The resource allocation schemes avoid wastage of resources by allocating
resources to a mobile terminal over a short period of time, providing quality of service over
wireless networks is the most stressing point for service providers. In general a high degree of
sharing is efficient, but requires service protection mechanisms to guarantee the QoS for all
services. In this paper we address the multi cell interference on overall radio resource
utilization and propose a new strategy for resource allocation in multi cell systems. we also
propose a joint management of interference within and between cells for allocation of radio
resources , Simulation results are showing that there is a significant improvement in the resource utilization so that overall network performance.
This is a presentation I did at the pre-Master studies at Ain shams University. It\'s about algorithms and techniques of call admission when a mobile node moves among cell in a wireless network.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
Interference management in lte downlink networksijwmn
Two major challenges for evolving LTE (Long Term Evolution) networks are to achieve enhanced system capacity and cell coverage compared with WCDMA (Wideband Code Division Multiple Access) system. Effective utilization of radio resources as well as dense spectrum reuse are at the core to attain these targets. However, dense frequency reuse may increase inter-cell interference, which in turn severely limits the capacity of users in the system. Inter-cell interference can restrict overall system performance in terms of throughput and spectral efficiency, especially for the users located at the cell edge area. Hence, careful management of inter-cell interferences becomes crucial to improve LTE system performance. In this paper, interference mitigation schemes for LTE downlink networks are investigated.
Wap based seamless roaming in urban environment with wise handoff techniqueijujournal
This paper highlights the studies performed to arrive at a novel handoff scheme in achieving uninterrupted connectivity. Every wireless communication user prefers seamless mobility and uninterrupted communication. Achieving this scenario is quite challenging both technologically and economically. Few of the reasons are geographical and man made constraints. Dynamic changes in environment and ever changing geographical landscape also pose serious difficulties to engineers involved in design of wireless systems. The following schemes have been suggested in an effort to improve Q.o.S of wireless mobile communication scenarios.
A DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATIONcscpconf
Now a days, mobile users are growing rapidly and the available frequency spectrum is limited.
Therefore the available spectrum must be efficiently utilized. In response a large number of
channel assignment and allocation policies have been proposed. Mostly Dynamic Channel
Allocation (DCA) has become an important subject of research and development for cellular
networks. In this paper, we propose a distributed dynamic channel allocation (DDCA)
algorithm for originating calls. This algorithm is executed at each base station and to allocate
the channel to mobile station, base station communicates with each other. In DDCA, the total
number of channels is divided into three groups. Any cell in the cluster can acquire the channel
group as long as no one of its adjacent cells is holding the same group. Due to this the cochannel
interference is avoided. The result show blocking rate of distributed dynamic channel allocation is reduced as compared to dynamic channel allocation algorithm with non-uniform traffic distribution
RESOURCE ALLOCATION TECHNIQUE USING LOAD MATRIX METHOD IN WIRELESS CELLULAR S...cscpconf
An efficient resource allocation is one of the greatest challenges in wireless cellular
communication. The resource allocation schemes avoid wastage of resources by allocating
resources to a mobile terminal over a short period of time, providing quality of service over
wireless networks is the most stressing point for service providers. In general a high degree of
sharing is efficient, but requires service protection mechanisms to guarantee the QoS for all
services. In this paper we address the multi cell interference on overall radio resource
utilization and propose a new strategy for resource allocation in multi cell systems. we also
propose a joint management of interference within and between cells for allocation of radio
resources , Simulation results are showing that there is a significant improvement in the resource utilization so that overall network performance.
This is a presentation I did at the pre-Master studies at Ain shams University. It\'s about algorithms and techniques of call admission when a mobile node moves among cell in a wireless network.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
Interference management in lte downlink networksijwmn
Two major challenges for evolving LTE (Long Term Evolution) networks are to achieve enhanced system capacity and cell coverage compared with WCDMA (Wideband Code Division Multiple Access) system. Effective utilization of radio resources as well as dense spectrum reuse are at the core to attain these targets. However, dense frequency reuse may increase inter-cell interference, which in turn severely limits the capacity of users in the system. Inter-cell interference can restrict overall system performance in terms of throughput and spectral efficiency, especially for the users located at the cell edge area. Hence, careful management of inter-cell interferences becomes crucial to improve LTE system performance. In this paper, interference mitigation schemes for LTE downlink networks are investigated.
Wap based seamless roaming in urban environment with wise handoff techniqueijujournal
This paper highlights the studies performed to arrive at a novel handoff scheme in achieving uninterrupted connectivity. Every wireless communication user prefers seamless mobility and uninterrupted communication. Achieving this scenario is quite challenging both technologically and economically. Few of the reasons are geographical and man made constraints. Dynamic changes in environment and ever changing geographical landscape also pose serious difficulties to engineers involved in design of wireless systems. The following schemes have been suggested in an effort to improve Q.o.S of wireless mobile communication scenarios.
A DISTRIBUTED DYNAMIC CHANNEL ALLOCATION IN CELLULAR COMMUNICATIONcscpconf
Now a days, mobile users are growing rapidly and the available frequency spectrum is limited.
Therefore the available spectrum must be efficiently utilized. In response a large number of
channel assignment and allocation policies have been proposed. Mostly Dynamic Channel
Allocation (DCA) has become an important subject of research and development for cellular
networks. In this paper, we propose a distributed dynamic channel allocation (DDCA)
algorithm for originating calls. This algorithm is executed at each base station and to allocate
the channel to mobile station, base station communicates with each other. In DDCA, the total
number of channels is divided into three groups. Any cell in the cluster can acquire the channel
group as long as no one of its adjacent cells is holding the same group. Due to this the cochannel
interference is avoided. The result show blocking rate of distributed dynamic channel allocation is reduced as compared to dynamic channel allocation algorithm with non-uniform traffic distribution
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Wimax technology has reshaped the framework of broadband wireless internet
service. It provides the internet service to unconnected or detached areas such as east South
Africa, rural areas of America and Asia region. Full duplex helpers employed with one of
the relay stations selection and indexing method that is Randomized Distributed Space Time
are used to expand the coverage area of primary Wimax station. The basic problem was
identified at cell edge due to weather conditions (rain, fog), insertion of destruction because
of multiple paths in the same communication channel and due to interference created by
other users in that communication. It is impractical task for the receiver station to decode
the transmitted signal successfully at the cell edges, which increases the high packet loss and
retransmissions. But Wimax is a outstanding technology which is used for improving the
quality of internet service and also it offers various services like Voice over Internet
Protocol, Video conferencing and Multimedia broadcast etc where a little delay in packet
transmission can cause a big loss in the communication. Even setup and initialization of
another Wimax station nearer to each other is not a good alternate, where any mobile
station can easily handover to another base station if it gets a strong signal from other one.
But in rural areas, for few numbers of customers, installation of base station nearer to each
other is costlier task. In this review article, we present a scheme using R-DSTC technique to
choose and select helpers (relay nodes) randomly to expand the coverage area and help to
mobile station as a helper to provide secure communication with base station. In this work,
we use full duplex helpers for better utilization of bandwidth.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Soft Frequency Reuse (SFR) in LTE-A Heterogeneous Networks based upon Power R...IJECEIAES
As the traffic demand grows and the RF environment changes, the mobile network relies on techniques such as SFR in Heterogeneous Network (HetNet) to overcome capacity and link budget limitation to maintain user experience. Inter-Cell Interference (ICI) strongly affecting Signal-toInterference plus Noise Ratio (SINR) of active UEs, especially cell-edge users, which leads to a significant degradation in the total throughput. In this paper we evaluate the performance of SFR with HetNet system in order dealing with interferences. Simulation result shows that the power ratio control in SFR HetNet system doesn’t have much effect on total achieved capacity for overall cell.
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
By virtue of their robustness, cost-effectiveness, self-organizing and self-configuring nature, WMNs have emerged as a new network paradigm for a wide range of applications, such as public safety and emergency response communications, intelligent transportation systems, and community networks. It is anticipated that WMNs will not only resolve the limitations of wireless ad hoc networks, local area networks (WLANs), personal area networks (WPANs), and metropolitan area networks (WMANs) but also significantly improve such networks’ performance. One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. In this paper, it is proposed to evaluate the performance of two different channel assignment schemes namely common channel assignment (CCA) and centralized tabu-based search algorithm under WCETT routing protocols for varying traffic load in terms of packet delivery ratio, throughput, average end to end delay and routing overhead using NS2 network simulator. WCETT protocol uses the weighted sum of the cumulative expected transmission time and the maximal value of efficient channels among all channels.
UNIT I
WIRELESS COMMUNICATION
Cellular systems- Frequency Management and Channel Assignment- types of handoff and their characteristics, dropped call rates & their evaluation -MAC – SDMA – FDMA –TDMA – CDMA – Cellular Wireless Networks
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS ijdpsjournal
IEEE 802.11 based mobile communication towers is used very much in many personal and industrial purposes as it provides a continuous connectivity to Mobile Nodes (MNs) and allows them to change their attachment point from old Access Point (A)P to new AP while needed. But one main problem of continuous connectivity is handover latency which consists of scanning, authentication and re-association phases. Scanning is the most time consuming part of handover process. In this paper, we introduce a prescanning mechanism using Global Positioning System (GPS) to reduce handover delay. In our method, scanning is completed almost before actual handover starts. From the simulation results, it can be seen that our proposed mechanism reduces handover delay by a great deal.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
The peer-reviewed International Journal of Engineering Inventions (IJEI) is started with a mission to encourage contribution to research in Science and Technology. Encourage and motivate researchers in challenging areas of Sciences and Technology.
Wimax technology has reshaped the framework of broadband wireless internet
service. It provides the internet service to unconnected or detached areas such as east South
Africa, rural areas of America and Asia region. Full duplex helpers employed with one of
the relay stations selection and indexing method that is Randomized Distributed Space Time
are used to expand the coverage area of primary Wimax station. The basic problem was
identified at cell edge due to weather conditions (rain, fog), insertion of destruction because
of multiple paths in the same communication channel and due to interference created by
other users in that communication. It is impractical task for the receiver station to decode
the transmitted signal successfully at the cell edges, which increases the high packet loss and
retransmissions. But Wimax is a outstanding technology which is used for improving the
quality of internet service and also it offers various services like Voice over Internet
Protocol, Video conferencing and Multimedia broadcast etc where a little delay in packet
transmission can cause a big loss in the communication. Even setup and initialization of
another Wimax station nearer to each other is not a good alternate, where any mobile
station can easily handover to another base station if it gets a strong signal from other one.
But in rural areas, for few numbers of customers, installation of base station nearer to each
other is costlier task. In this review article, we present a scheme using R-DSTC technique to
choose and select helpers (relay nodes) randomly to expand the coverage area and help to
mobile station as a helper to provide secure communication with base station. In this work,
we use full duplex helpers for better utilization of bandwidth.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Soft Frequency Reuse (SFR) in LTE-A Heterogeneous Networks based upon Power R...IJECEIAES
As the traffic demand grows and the RF environment changes, the mobile network relies on techniques such as SFR in Heterogeneous Network (HetNet) to overcome capacity and link budget limitation to maintain user experience. Inter-Cell Interference (ICI) strongly affecting Signal-toInterference plus Noise Ratio (SINR) of active UEs, especially cell-edge users, which leads to a significant degradation in the total throughput. In this paper we evaluate the performance of SFR with HetNet system in order dealing with interferences. Simulation result shows that the power ratio control in SFR HetNet system doesn’t have much effect on total achieved capacity for overall cell.
Quantative Analysis and Evaluation of Topology Control Schemes for Utilizing ...ijsrd.com
By virtue of their robustness, cost-effectiveness, self-organizing and self-configuring nature, WMNs have emerged as a new network paradigm for a wide range of applications, such as public safety and emergency response communications, intelligent transportation systems, and community networks. It is anticipated that WMNs will not only resolve the limitations of wireless ad hoc networks, local area networks (WLANs), personal area networks (WPANs), and metropolitan area networks (WMANs) but also significantly improve such networks’ performance. One fundamental problem of WMNs with a limited number of radio interfaces and orthogonal channels is that the performance degrades significantly as the network size grows. This results from increased interference between nodes and diminished spatial reuse over the network. In this paper, it is proposed to evaluate the performance of two different channel assignment schemes namely common channel assignment (CCA) and centralized tabu-based search algorithm under WCETT routing protocols for varying traffic load in terms of packet delivery ratio, throughput, average end to end delay and routing overhead using NS2 network simulator. WCETT protocol uses the weighted sum of the cumulative expected transmission time and the maximal value of efficient channels among all channels.
UNIT I
WIRELESS COMMUNICATION
Cellular systems- Frequency Management and Channel Assignment- types of handoff and their characteristics, dropped call rates & their evaluation -MAC – SDMA – FDMA –TDMA – CDMA – Cellular Wireless Networks
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS ijdpsjournal
IEEE 802.11 based mobile communication towers is used very much in many personal and industrial purposes as it provides a continuous connectivity to Mobile Nodes (MNs) and allows them to change their attachment point from old Access Point (A)P to new AP while needed. But one main problem of continuous connectivity is handover latency which consists of scanning, authentication and re-association phases. Scanning is the most time consuming part of handover process. In this paper, we introduce a prescanning mechanism using Global Positioning System (GPS) to reduce handover delay. In our method, scanning is completed almost before actual handover starts. From the simulation results, it can be seen that our proposed mechanism reduces handover delay by a great deal.
An Efficient Call Admission Control Scheme for Handling Handoffs in Wireless ...pijans
Personal Communication Network (PCN) is an emerging wireless network that promises many new
services for the telecommunication industry. The proliferation of demands for extending wireless services
to integrated services, which supports the transmission of data and multimedia information, has resulted in
the need for broadband wireless systems that are able to provide service capabilities similar to those of
wire line networks. The ATM cell - relay paradigm is one possible approach to provide broadband wireless
transmission with PCN’s using the ATM switching networks for interconnection of PCN cells. As traffic in
these mobile cellular networks increases, Handoffs will become an increasingly important issue. As cell
sizes shrink to accommodate an increasingly large demand of services, newer more efficient handoff
schemes need to be used. In this paper, the authors describe the use of novel and efficient data structure
which dynamically allocates guard channel for handoffs and introduces the concept of channel borrowing
strategy. The proposed scheme allocates the guard channels for handoff requests dynamically, based on the
traffic load for certain time period. A new originating call in the cell coverage area also uses these guard
channels if they are unused. Our basic idea is to allow Guard channels to be shared between new calls and
handoff calls. This approach maximizes the channel utilization. The simulation results prove that the
channel borrowing scheme improves the overall throughput.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Reviewiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
PERFORMANCE EVALUATION OF MOBILE WIMAX IEEE 802.16E FOR HARD HANDOVERIJCNCJournal
Seamless handover in wireless networks is to guarantee both service continuity and service quality. In
WiMAX, providing scalability and quality of service for multimedia services during handover is a main
challenge because of high latency and packet loss. In this paper, we created four scenarios using Qualnet
5.2 Network Simulator to analyze the hard handover functionality of WiMAX under different conditions.
The scenarios such as Flag with 5 and 10 sec UCD and DCD interval values, Random mobility scenario
and DEM scenario using 6 WiMAX Cells have been considered. This study is performed over the real
urban area of JNU where we have used JNU map for scenarios 1, 2 and 3 but for scenario 4, the JNU
terrain data has been used. Further, each BS of 6 WiMAX cell is connected to four nodes. All nodes of each
scenario are fixed except Node 1. Node 1 is moving and performing the handover between the different BSs
while sending and receiving real time traffics. Flag mobility model is used in Scenario 1, 2 and 4 to model
the movement of the Node 1 while we use random mobility model in sceanrio3. 5 seconds time interval is
used for Scenarios 1, 3, and 4 while 10 seconds time interval is used for scenario 2 to study the effect of
management messages load on handover. Further, the statistical measures of handover performance of
WiMAX in terms of number of handover performed, throughput, end-to-end delay, jitter, and packets
dropped are observed and evaluated.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systemsjosephjonse
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
Performance Evaluation of Vertical Hard Handovers in Cellular Mobile Systemsjosephjonse
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSjosephjonse
With the rapid increase of new and diverse cellular mobile services, the overlapping of cells has become typical in the majority of the coverage area of the network. Vertical handovers occur between two layers of cells when a user is switched from one layer to the other. In this paper we investigate the influence of network parameters on vertical hard handover performance in a cell environment. The work considers two layers of cells: a layer of macrocells and a layer of microcells. Handover requests enter the macrocell from neighbor macrocells and from microcells that belong to a different layer. Using Markov chain analysis and simulation we calculate network performance parameters such as mean queue delay, handover dropping probability and channel utilization. We also compare the handover performance for the macrocell and macrocell traffic separately. Our results show the influence of total channels, maximum queue size and handover request arrival rate on handover performance. They also show that when the traffic from each layer is treated with equal priority in the system, the performance of each layer is comparable.
Performance assessment of VoIP service over different handover mechanisms in ...IJECEIAES
Many researchers have discussed various topics in universal mobile telecommunication system (UMTS) networks: the process of switching from one cell to another for the subscriber and the impact of the quality of the connection during the transition process, quality of services (QoS), the quality of the uplink and downlink carrier line, the various types of code for the voice transmitted through the Internet, especially the research that discussed voice over internet protocol (VoIP) technology as voice travels from cell to cell in mobile networks, depending on the type of delivery. In this paper, a proposed scenario of a UMTS network was implemented to evaluate the multicellular VoIP movement; the proposed UMTS network was simulated using the OPNET 14.5 simulator. The calculation and analysis of the different parameters of the user while moving from one cell to another with different movement speeds considered, the best mean opinion score (MOS) value (3.19) registered for the scenario (soft handover) comparing with another type of handover (3.00).
The performance of wireless sensor network (WSN)
can be effect by interference. The many devices in network
capable of causing interference and this can cause dropping
packets or block the transmission channel. In this paper we study
how manage the interference in WSN. This managing can be
done by flow control and power level control. We used
heterogeneous collaborative network nodes like PIC
microcontroller, ARM microcontroller and Personal Computer
(PC) to build our network. Also we assign priority level for each
node to allow the node with high priority to manage the flow and
power level of other node within same network and same used
channel. The time synchronization required due to different
nodes used. The protocol used for time synchronization is
Timing-sync Protocol for Sensor Networks (TPSN).
Inter-cell Interference Management Technique for Multi-Cell LTE-A Network IJECEIAES
In modern cellular system such as LTE Advanced (LTE-A), frequency reuse scheme is targeted to be applied to fulfill the requirement of high capacity broadband access and high spectrum efficiency. But this kind of frequency planning may lead to the worse inter-cell interference (ICI) level experienced especially by a user located at the cell edge. Soft Frequency Reuse (SFR) is considered as an effective way to mitigate inter-cell interference and maintain capacity. We propose a power division SFR, known as multi level SFR technique to minimize ICI in a designed LTE-A network for sub-urban environment. Service area of LTE-A network was first developed to deploy particular number of eNB by using LTE network planning tools in the frequency of 1800 MHz with the use of SISO (Single Input Single Output) antennas. Coverage dimensioning and propagation consideration determine LTE-A parameters which were used in the simulation. Monte carlo simulation is executed to examine the performance of SFR for LTE-A downlink transmission to address different power ratio and traffic loads problem. Both performance of cell edge users and overall cell performance are evaluated in terms of CINR, BLER, and throughput. Performance with SFR is also compared with the classical frequency reuse one and three.
EVALUATION OF PARAMETERS FOR IMPROVING HANDOFF PERFORMANCE IN MOBILE WIMAX NE...ijdpsjournal
Mobile WiMAX is the latest technology that promises broadband wireless access over long distance. In order to support mobility and continuous network connectivity in mobile WiMAX, it is necessary to provide handoff. Handoff is an essential process in wireless networks to guarantee continuous and effective services. This paper focuses on the analysis of the performance of the handoff process in Mobile WiMAX. This paper aims to find out the factors/parameters of the WiMAX module that affect handoff performance the most, such as handoff duration of less than 50 ms and mobility speed up to 120km/hour. Simulation results show that some of the parameters of WiMAX do not have any influence on handoff latency, while others have great impact towards achieving shorter handoff duration time. The results also show that handoff times could vary for different speeds of the Mobile Station (MS).
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAYIJCNCJournal
Wireless communication faces adversities due to noise, fading, and path loss. Multiple-Input MultipleOutput (MIMO) systems are used to overcome individual fading effect by employing transmit diversity. Duo to user single-antenna, Cooperation between at least two users is able to provide spatial diversity. This paper presents the evaluation of the performances of the Amplify and Forward (AF) cooperative system for different relay positions using several network topologies over Rayleigh and Rician fading channel. Furthermore, we present the performances of AF cooperative system with various power allocation. The results show that cooperative communication with convolutional coding shows an outperformance compared to the non-convolutional, which is a promising solution for high data-rate networks such as (WSN), Ad hoc, (IoT), and even mobile networks. When topologies are compared, the simulation shows that, linear topology offers the best BER performance, in contrast when the relay acts as source and the source take the relay place, the analysis result shows that, equilateral triangle topology has the best BER performance and stability, and the system performance with inter-user Rician fading channel is better than the performance of the system with inter-user Rayleigh fading channel.
Enhanced Seamless Handoff Using Multiple Access Points in Wireless Local Area...IJERA Editor
The Mobility in wireless cellular communication systems is its backbone so as to enhance the quality of service and maintain the continuous service. Handoff is an important task in maintaining the continuity of call in cellular systems and its failure can result in ongoing call termination. In cellular mobile networks, the coverage region is divided into smaller cells in order to achieve high system capacity. Each cell has a Base-Station (BS), which provides the service to the Mobile Terminals (MTs), i.e. users equipped with phones, within its region. Before a mobile user can communicate with other user(s) in the network, a group of the frequency bands or channels should usually be assigned. The MTs is free to move across cells. When the mobile user crossing a cell boundary or by deterioration in quality of the signal in the current channel, handoff process is initiated. The scope of this project is to design 802.11 handoff schemes to solve the handoff problems in closely-spaced WLANs.The major problem in multiple WLANs are so many users trying to use same access point(AP), and interferences from nearby WLAN. The better hand off scheme based on signal strength and velocity of the nodes is proposed. The simulation results show that the proposed handoff scheme significantly reduces packet losses compared with existing handoff schemes.
Similar to Improved handoff mechanism for infiltrating user equipments in composite networks (20)
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Improved handoff mechanism for infiltrating user equipments in … (Venkata Vara Prasad Padyala)
2601
This paper presents an improved handoff mechanism to improve the QOE by having clear cut idea
when to perform, where to perform the handoff by having the metric values as free channel availability,
frequency of user and person moving direction. The different handoff methods will present in section 2.
The mechanism used to achieve QOS is in section 3. Conclusions are mentioned in the section 4.
2. THE EXISTING HANDOFF MECHANISMS AND THE PROBLEM WITH THE PRESENT
METHODS
The handoff mechanism in cellular network is the process when a user moves from one cellular
network to another without disconnecting the session. If the handoff is not performed then the signal
attenuation will happen when the User Equipment (UE) move away from the antenna i.e. Base Station
Transceiver (BST). The next important thing to be considering is signal should not be fade. The fading may
either be due to multipath propagation, referred to as multipath induced fading, weather (particularly rain) or
shadowing from obstacles affecting the wave propagation some time referred to as shadow fading.
Formula to calculate the received signal strength (RSS) is:
𝑅𝑆 𝑏[𝑚] = 𝑃𝑇𝑏 − 𝑃𝐿 𝑏[𝑚] − 𝑈𝑏[𝑚]
𝑅𝑆𝑓[𝑚] = 𝑃𝑇𝑓 − 𝑃𝐿 𝑓[𝑚] − 𝑈𝑓[𝑚] (1)
𝑅𝑆 𝑏[𝑚] ∶ indicates the received signal strength from base station (b) at time interval (m).
𝑃𝑇𝑏: indicated the power transmitted from base station.
𝑃𝐿 𝑏[𝑚] : indicated the path loss at time interval m.
𝑈𝑏[𝑚]: indicates the fading value at time interval m.
𝑅𝑆𝑓[𝑚] : indicates the received signal strength from fentocell (f) at time interval (m).
𝑃𝑇𝑓 : indicated the power transmitted from femtocell.
𝑃𝐿 𝑓[𝑚] : indicated the path loss at time interval m.
𝑈𝑓[𝑚]: indicates the fading value at time interval m.
Based on the RSS value between the base station and femtocell the handoff will occur to maintain
the communication of user who are in ongoing call [3]. The hand off is basically two types 1. Soft handoff 2.
Hard handoff. In soft handoff the both Base Station (BS) information to be maintain the Activation Record.
But in the hard hand off the Activation Record will maintain the one BS information in a particular time [4].
To provide the good signal the Femto cells are introduced in the uncovered macro cell regions. So now two
networks are there, not only these two we have the heterogeneous networks as shown bellow [5].
The handoff mechanisms of soft and hard handoffs are maintaining the Active List is difficult to
maintain the QOE. If the UE moves from one region to another region as shown in the above Figure 1, then
the hand off will take time then it leads to the call blocking then QOE is not achieved. The hand off in
composite network will be classified as:
Horizontal handoff
Vertical handoff
Diagonal handoff
Horizontal handoff: The hand of will taken care between Intra BSC handoff or Inter BSC handoff or
Inter MSC handoff. This leads to the one cell region i.e. same network. The Horizontal handoff process
having the 3 basic things: First the handoff initiation to be done, next an available free channel to be given to
the UE without disturbing the current communication process. The final thing is connection transfer and
the handoff execution.
Vertical handoff: The vertical handoff will be performed in the Inter-network. In the Figure 1 if
a user moves from In-Build corporate network to the next two networks are as Metropolitan Area, Regional
area. Then to maintain the call without losing a vertical handoff should be happened. The vertical handoff
challenge is focus more on user preferences in performing a handoff from one network to another network.
The handoff decision algorithms for the vertical handoff mainly classified based on Received signal
strength (RSS) mentioned in formula (1). Bandwidth Based i.e. cognitive mechanism is applied in such a way
that secondary user is going to use primary user channel without affecting the primary user. In this paper we
are considering the RSS values of the BS and FS. Among the all values the feasible values will be considered
without occurring the call blocking. By using the Support Vector Machine (SVM) the optimal solution will
be given. The SVM is going to work with the limited RSS values in an effective manner. Diagonal handoff:
The diagonal handoff is the combination of both horizontal and vertical handoff methods.
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2600 - 2606
2602
Figure 1. Representation of composite network
The decision logic takes both pre-configured parameters and runtime measurements as inputs (1),
and determines the next appropriate cell (2). Once the decision is made, it executes the handoff procedure (3)
and migrates the device to the chosen next cell as shown in Figure 2. Once the previous handoff procedure
completes, the device switches to a new cell; New handoff procedures can be invoked and new serving cells
will be further selected and switched to (4 and 5) as long as the handoff criteria is met [6].
Figure 2. Distribute handoff process with each atomic handoff executed at the serving cell
2.1. Drawbacks of each handoff mechanism
In soft handoff the mobile device has to maintain the both BS information in Active List, it leads to
difficult to maintain in the heavy load time [7]. With the hard handoff the ping pong affect will not be
resolved i.e. unnecessary handoffs will not be resolved. Ping pong handover occur when the UE is handed
over from one cell to another but is quickly handed back to the original cell. The both soft and hard handoff
will not resolve the problem in heterogeneous wireless network handoff problems. To resolve those a vertical
handoff should be performed between the different networks. Within network the horizontal handoff will be
performed. By performing the above handoff mechanisms the through put also be increased so maximum
number of packets will be transmitted without any loss [8].
4. Int J Elec & Comp Eng ISSN: 2088-8708
Improved handoff mechanism for infiltrating user equipments in … (Venkata Vara Prasad Padyala)
2603
3. THE MECHANISM USED TO ACHIEVE QOS
Base on the RSS, hand of mechanism will be performed. So for any user the RSS to be calculated,
the RSb[m] and RSf[m] are representing the RSS values at ‘m’ time intervals. Based on the RSS value
the handoff will be performed, the RSS values will be calculated by using formula (1). The RSS values are
and distance values between the nodes to the BS are the dimensions to plat the graph [9]. When ever to
a problem more dimensions are there but fewer samples available to a particular time then to classify the data
super vector machines (SVM) can be used. See the Figure 3 it shows the vertical handoff and horizontal
handoff, the vertical handoff is happening between the AP’s points under the same BS. But the horizontal is
crossing the BS and needs another channel from next BS [10]. Figure 3 is showing the case is when a user
should go to the next BS based on RSS, how it has to choose one channel for the communication. The RSS of
the node will be calculated from different stations then based on the values by applying SVM the feasible
solution will be find.
Figure 3. Handoff in composite network
3.1. Flow chart of handoff mechanism
In the above flow chart the handoff will be done by the RSS value and the threshold value in present
cell. The first condition is that the RSS value of the device is more than the threshold value of the cell then
handoff not required to the device [11, 12]. If the RSS value is less than the threshold value of the cell and
which is nearer to the next cell and velocity is high and towards the new cell region then the handoff should
be done, but the direction towards the existing cell then handoff is not required just a channel of present cell
can be assigned based on the cognitive behavior of the nodes for channel allocation [13-16]. The direction of
the device will be calculated by using the GPS location can be used available in the mobile devices, this data
will be maintained at the VLR (Visitor Location Register) [17-19]. This data can be used to reduce
the unnecessary handoff things so this will reduce the PINGPONG affect. Figure 4 shows the Flow Chart of
handoff mechanism.
3.2. Channel allocation algorithm
The input is the node distance from the BS’s, velocity of the node in case of mobile device.
The output is the RSS values and the neighboring channels free list. These type of channel allocation are in
these articles but the proposed channel allocation is best [20-22].
Step1. First the RSS values of the node to be calculated formula (1).
Step2. Measure the velocity of the user equipment and direction.
Step2. Based on the above values find the next expected BS to be chosen based on SVM.
Step3. The trained data will help you edge fining in a cellular network to a particular BS.
Step4. The active list of the node to be updated based on the RSS values and channel availability.
Step5. The active list should maintain the BS information’s based on user requirements. So it can be soft or
hard handoff based the values.
Step6. The free channel will be given to the user or mobile node.
The above algorithm will work with less parameter values also because for classification SVM is
applied. The femtocell will provide the coverage to the each corner of the home and any office zone where
we need full coverage of the signal [23-25]. The point we are going to address is that the newly penetrated
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2600 - 2606
2604
cell in to the region of femtocell will get the channel based on the cognitive principle i.e. the newly entered
person we will consider as the secondary user (SU) in allocating the channel. The final conclusion is that
the unnecessary handoff things will reduce the PINGPONG affect.
The Figure 5 is describing that when the device is having more distance from the BS then the RSS
value is less. We have to switch the device to the nearest BS based on the direction and velocity of
the device. Some devices just enter in to the next cellular region and they will return to the previous cell
region then if handoff occurs then the channel allocation is waste of thing this effect in ping pong effect in
the handoff. To avoid this effect the device velocity and direction to be consider. The velocity can be
measured based on the distance traveled in particular time period and the direction can be measured based on
the GPS location. If the velocity is more and device GPS direction is towards the current cell region BS but
trying to enter little bit to new BS location then the handoff is not required. This problem will be resolved by
having the above channel allocation algorithm. If the device switching to the new BS region, handoff will be
performed based on the new cognitive technique of the femtocell.
Figure 4. Flow chart of handoff mechanism
6. Int J Elec & Comp Eng ISSN: 2088-8708
Improved handoff mechanism for infiltrating user equipments in … (Venkata Vara Prasad Padyala)
2605
Figure 5. RSSI vs distances
4. CONCLUSION
The final conclusion is that present days the users are more relay on the network communication for
any work. So when a user is in journey or he is in a office the location is not covered by the signal zone then
femtocell will provide the coverage but user moving from one cell region to another cell region
communication should not block or break. To keep the communication a vertical handoff mechanism is taken
with little updating the RSS value classification to a node in m time intervals. In feature to the algorithm
a training data set can be given and with machine learning approach of SVM the final channel of BS to be
found for communication.
REFERENCES
[1] Rameshwari Gopal Hulkund, Ganeshayya Shidaganti, Bhanu Ravishankar, Thiyagarajan Shanmugam, “Efficient
and Effective Cellular Technology: Femtocells,” IEEE International Conference on Recent Trends in Electronics
Information Communication Technology, India, May 2016.
[2] Pramod Goyal, D K Lobiyal, C P Katti, “Vertical Handoff in Heterogeneous Wireless Networks: A Tutorial,” IEEE
International Conference on Computing, Communication and Automation, Jul. 2017.
[3] Jung-Min Moon, Dong-Ho Cho, “Efficient Handoff Algorithm for Inbound Mobility in Hierarchical Macro/Femto
Cell Networks,” in IEEE Communications Letters, vol. 13, no. 10, pp. 755-757, Oct. 2009.
[4] Venkata Vara Prasad Padyala, K V D Kiran, “A prediction scheme of mobility of cognitive femtocells LTE-
A/LTE-UE under different speed scenarios,” IJET, vol. 7, 2018.
[5] Pramod Goyal, D.K. Lobiyal, C.P.Katti, “Game Theory for Vertical Handoff Decisions in Heterogeneous Wireless
Networks: ATutorial,” in Lecture Notes in Electrical Engineering, Advanced Computational and Communication
Paradigms, Springer, pp. 422-430, Jan. 2018.
[6] K.V.D. Kiran, “Multi Cross Protocol with Hybrid Topology Control for MANETS,” Journal of Theoretical and
Applied Information Technology, vol. 95, no. 3, 2017.
[7] Guowang Miao, Jens Zander, Ki Won Sung, and Ben Slimane, “Fundamentals of Mobile Data Networks,”
Cam-bridge University Press, Jan. 2016
[8] Zhou Guohua, Peter Legg, Gao Hui, “A network controlled handover mechanism and its optimization in LTE
heteroge-neous networks,” Wireless Communications and Network-ing Conference (WCNC), IEEE, 2013.
[9] Muhammad Alee Khan, Nasir Saeed, “Location Awareness in 5G network using RSS measurements for public
safety applications,” in IEEE Access, vol. 5, pp. 21753-21762, 2017.
[10] Zhang Dongsong, “A load identification algorithm based on SVM,” 2017 First International Conference on
Electronics Instrumentation & Information Systems (EIIS), Harbin, pp. 1-5, 2017.
[11] Mahammed Enes Bayarakdar, Ali Calhan, “Non-preemptive Queueing Model of Spectrum Based on Prioritized
Data Traffic in Cognitive Wireless Network,” in Etri Journal, vol. 39, no. 4, pp. 558-569, Aug. 2017.
[12] K.V.D. Kiran, “Integrated Distributed Architecture to Integrate Wireless Sensor Networks (WSN) with Grid for
Healthcare,” International Journal of Bio-Science and Bio-Technology, vol. 7, no. 3, pp. 243-250, 2015.
[13] K.V.D. Kiran, “A Critical study of information security risk assessment using fuzzy and entropy methodologies,”
International Journal on Computers and Communications, vol. 1, no. 1, pp. 17-22, Dec 2012.
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 3, June 2020 : 2600 - 2606
2606
[14] K.V.D. Kiran, “Literature Review on RisK Literature Review on Risk and their Components,” International
Journal for Research in Emerging Science and Technology (IJREST), vol. 1, no. 6, Nov. 2014.
[15] K.V.D. Kiran, “Performance Analysis of Layered Architecture to integrate Mobile Devices and Grid Computing
with a Resource Scheduling Algorithm,” International Conference on Computational Intelligence and Multimedia
Applications (ICCIMA 2007), Sivakasi, Tamil Nadu, India, pp. 352-356, 2007.
[16] K.V.D. Kiran, “Risk Assessment in Distributed Banking System,” International Journal of Applied Engineering
Research (IJAER), vol. 9, no.19, pp. 6087-6100, 2014.
[17] Chunyi Peng, Yuanjie Li, “Demystify Undesired Handoff in Cellular Networks,” 2016 25th International
Conference on Computer Communication and Networks (ICCCN), Waikoloa, HI, pp. 1-9, 2016.
[18] FENG Lei, YIN Mengjun, XIANG Nan, LI Wenjing, QIU Xuesong, “Load-Balancing Based on Base-Station
CoMP with Guaranteed call blocking rate,” 2014 International Symposium on Wireless Personal Multimedia
Communications (WPMC), Sydney, NSW, pp. 271-276, 2014.
[19] Tuan LeAnh, Nguyen H. Tran, “Distributed Power and Channel Allocation for Cognitive Femtocell Network using
a Coalitional Game in Partition Form Approach,” in IEEE Transactions on Vehicular Technology, vol. 66, no. 4,
pp. 3475-3490, Apr. 2017.
[20] Gadiraju Divija, Jitender Grover, Garimella Ramamurthy, “Dynamic Channel Allocation in Small Cells,” 2018 7th
International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)
(ICRITO), Noida, India, pp. 582-588, 2018.
[21] Haijun Zhang, chunxiao Jiang, Xiaotao Mao, Hsiao Hwa Chen, “Interference-Lomited Resource Optimization in
Cognitive Femtocell with Fairness and Imperfect Spectrum Sensing,” IEEE Transactions on Vehicular Technology,
vol. 65, no. 3, pp. 1761-1771, Mar. 2016.
[22] Yujie Zhang, Shaowei Wang, “Resource Allocation for Cognitive Radio-Enabled Femtocell Network with
Imperfect Spectrum Sensing and Channel Uncertainty,” IEEE Transactions on Vehicular Technology, vol. 65,
no. 9, pp. 7719-7728, Sep. 2016.
[23] S. Fouziya Sulthana, R. Nakkeeran, “priority-Based Resource Scheduling in Hybrid-Access LTE Femtocell,”
Journal of Communications and Information Networks, vol. 3, no. 2, pp. 75–83, Jun. 2018.
[24] Jana Zausinova, Martin Zoricak, Gabriel Bugar and Juraj Gazda, “Financial Implications of Femtocell
Deployment,” MATEC Web of Conferences, vol. 227, no. 9, pp. 03006, Jan. 2018.
[25] Abdullah Alhumaidi Alotaibi, Marios C Angelides, “Femtocell deployment plan: Movung indoors,” 2017
Intelligent Systems Conference (IntelliSys), London, pp. 210-216, 2017.