A fuzzy based handover decision scheme for mobile devices using predictive model

AK Gupta, V Goel, RR Garg, DR Thirupurasundari… - Electronics, 2021 - mdpi.com
Handover usually deals with the mobility of the end users in a mobile network to assure
about the ongoing session of a user. It is observed that frequent handover results in call …

[PDF][PDF] Utility based Vertical Handoff Decision Model for LTE-A networks

T Padmapriya, V Saminadan - International Journal of Computer …, 2016 - academia.edu
LTE-A networks consists of numerous networking technologies and do not possess a central
controlling system. In general, users can navigate freely within a network without losing the …

Handoff decision for multi-user multi-class traffic in MIMO-LTE-A networks

T Padmapriya, V Saminadan - Procedia Computer Science, 2016 - Elsevier
LTE-A networks do not have a central controlling system or node and is made up of several
networking technologies. Handover is a method to assure that users can move freely within …

Security and privacy enforced wireless mobile communication using PI-MAKA protocol design

T Senthil Kumar, S Prabakaran - Measurement and Control, 2019 - journals.sagepub.com
The fast development of mobile networks and compact mobile devices bring attention to the
users for wireless mobile communication. But providing security and protecting the privacy of …

[PDF][PDF] Mutual authentication technique with four biometric entities applying fuzzy neural network in 5G mobile communications

PK Bhattacharjee - IOSR Journal of Electronics and …, 2020 - researchgate.net
5G mobile communications system is offering very high speed data communications
technology having connectivity to all sorts of the networks like 2G, 3G, 4G, WiMAX, MANET …

[PDF][PDF] Mutual Authentication Technique with Four Entities Using Fuzzy Neural Network in 4-G Mobile Communications

PK Bhattacharjee, S Roy, RK Pal - IOSR Journal of Computer …, 2015 - researchgate.net
4-G mobile communications system is offering high speed data communications technology
having connectivity to all sorts of the networks including 2-G and 3-G mobile networks …

[PDF][PDF] Mutual Authentication Technique with Four Entities Implemented by Fuzzy Neural Network in 4-G Mobile Communications

PK Bhattacharjee, RK Pal - 2015 - academia.edu
G mobile communications system is offering high speed data communications technology
having connectivity to all sorts of the networks including 2-G and 3-G mobile networks …

Advance Artificial Intelligence Based Mutual Authentication Technique with Four Entities in 4-G Mobile Communications

PK Bhattacharjee, S Roy, RK Pal - … International Conference on …, 2014 - ieeexplore.ieee.org
4-G mobile communications system is offering high speed data communications technology
having connectivity to all sorts of the networks including 2-G and 3-G mobile networks …

[PDF][PDF] A Systematic Review on Various Security Issues and its Mitigation Techniques in WMN

TS Kumar, S Prabakaran - Indian Journal …, 2018 - sciresol.s3.us-east-2.amazonaws …
Objectives: To delineate various security vulnerabilities and defence strategies involved in
secure mobile communications. Methods/Statistical Analysis: Due to the enormous growth of …

Game-theory-based load balancing technique for vertical handoff in next generation networks

V Kaushik, JS Sodhi, RK Tyagi - International Journal of …, 2017 - inderscienceonline.com
In the next generation networks, during vertical handoff, it is good practice to balance the
network load to increase the efficiency and reduce the overhead. In this paper, we propose …