2019
DOI: 10.1007/978-981-15-1002-1_28
|View full text |Cite
|
Sign up to set email alerts
|

Handover Decision Algorithm for Next Generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…One example would be the techniques used for regulating mobility control parameters, known as handover self-optimization functions [50,51,[53][54][55][56][57][58]. Another example is the mechanisms used for making handover decisions, known as handover decision algorithms [59][60][61][62][63]. Protocols are also applied for rerouting data or voice calls to the new routing path, known as mobile routing protocols [64,65].…”
Section: Figure2 Ultra-dense and Overlapping Hetnets With Multi-typmentioning
confidence: 99%
See 1 more Smart Citation
“…One example would be the techniques used for regulating mobility control parameters, known as handover self-optimization functions [50,51,[53][54][55][56][57][58]. Another example is the mechanisms used for making handover decisions, known as handover decision algorithms [59][60][61][62][63]. Protocols are also applied for rerouting data or voice calls to the new routing path, known as mobile routing protocols [64,65].…”
Section: Figure2 Ultra-dense and Overlapping Hetnets With Multi-typmentioning
confidence: 99%
“…Since an efficient handover decision algorithm contributes to providing a seamless connection between the UE and serving network, it should be effectively designed to perform and produce a proper handover decision for the suitable target cell. In the literature, several handover decision algorithms have been introduced to further enhance handover performance [59,60,81,151]. These algorithms were designed based on various parameters that have been investigated in different wireless systems.…”
Section: E Inefficient Handover Decisionmentioning
confidence: 99%
“…Assaults on the non-denial: In VANETs, the nonrevocation is known with a reality that a vehicle cannot deny a selected message within the event that it's sent that message routinely, by delivering a mark for the message in VANETs, the vehicle cannot later deny the sent messages. The assault on the message nonrepudiation is processed as pursues [2]. 4.…”
Section: A Attacks On Authenticationmentioning
confidence: 99%