2021
DOI: 10.1007/s11107-020-00920-w
|View full text |Cite
|
Sign up to set email alerts
|

Research on dynamic handover decision algorithm based on fuzzy logic control in mobile FSO networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Among them, the method of deleting attributes with missing values is suitable for very few attributes. Value contains a large number of missing values, to obtain more effective results [ 12 ]. The common missing value completion methods include mean value interpolation, mode interpolation, and intermediate value interpolation.…”
Section: Database Establishmentmentioning
confidence: 99%
“…Among them, the method of deleting attributes with missing values is suitable for very few attributes. Value contains a large number of missing values, to obtain more effective results [ 12 ]. The common missing value completion methods include mean value interpolation, mode interpolation, and intermediate value interpolation.…”
Section: Database Establishmentmentioning
confidence: 99%
“…e distance between the overlapping data object and part B data object must be greater than the width of the overlapping area. Considering specific data objects with less than l or equal composite spacing, it is not necessary to evaluate whether the two can be combined [13]. Two attribute data objects can be removed from the priority, and the recovery time can be reduced by adjusting the priority accordingly.…”
Section: Optimization Of Rural Tourism Feature Subalgorithmmentioning
confidence: 99%
“…Al-Salhi et al based on logistic regression algorithm and decision tree algorithm, analysis of prognostic factors for breast cancer [10]. Qian et al proposed a safe outsourcing drug detection system based on DT-PKC encryption system, the system classification is completed by the SVM algorithm, and privacy protection is achieved by designing a secure multiparty protocol [11]. Yao et al based on the fully homomorphic encryption algorithm, in the ciphertext domain, the minor allele frequencies and chi-square detection in genome-wide association analysis are calculated and support the calculation of Hamming distance and approximate edit distance for encrypted DNA sequences [12].…”
Section: Literature Reviewmentioning
confidence: 99%