2019 3rd International Conference on Advanced Information and Communications Technologies (AICT) 2019
DOI: 10.1109/aiact.2019.8847898
|View full text |Cite
|
Sign up to set email alerts
|

Neuro-Fuzzy Controller for Handover Operation in 5G Heterogeneous Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 12 publications
0
10
0
Order By: Relevance
“…Then the migration process begins. A method for assessing the adequacy of resources is presented in [10].…”
Section: Methods Of Automatic Live Migrationmentioning
confidence: 99%
“…Then the migration process begins. A method for assessing the adequacy of resources is presented in [10].…”
Section: Methods Of Automatic Live Migrationmentioning
confidence: 99%
“…e controller has considered a rule base and mathematical templates. By conducting the computer simulation [14], the performance of the neurofuzzy transmission controller was tested.…”
Section: Handover Operationmentioning
confidence: 99%
“…(i) Proximity Services: proximity support services (ProSe) are useful for both public security and business services. e key goal of the work of the Rel-17 in this field [14] is to establish a standard public security and ProSe commercial architecture. For public protection, it is crucial to help ProSe exploration and coordination where the EU is not covered, e.g., in rural regions lacking network access in cases of disaster relief.…”
Section: Introductionmentioning
confidence: 99%
“…The research that used neural network-based techniques is illustrated in this section. Semenova et al [8] applied a neurofuzzy controller for improving the handover mechanism in 5G heterogeneous networks. This controller was developed with three linguistic variable inputs concerning the network's signal strength.…”
Section: F) Neural Network-based Approachesmentioning
confidence: 99%
“…They failed to concurrently convince the requirements of key agreement, mutual authentication, and several other factors [5]. Thus, soft computing techniques, such as chaos theory [6] [7] [8], neural network [9], genetic programming, and fuzzy controller [8], are extensively used in telecommunication systems [10] [8]. The soft computing methods applied in the 5G systems provide more capacity in traffic controlling and many other systems related to decision making [11].…”
Section: Introductionmentioning
confidence: 99%