2018
DOI: 10.1007/s00500-018-3246-2
|View full text |Cite
|
Sign up to set email alerts
|

Reduction in ping-pong effect in heterogeneous networks using fuzzy logic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 21 publications
0
11
0
1
Order By: Relevance
“…But the vehicles HO in a group requires frequent computation in the group, as well as measurement, and hence the computation will be higher in this work. The network layer-based L2 extension HO scheme was proposed (Naeem et al, 2019) and the architecture consists of an access router (AR), roadside unit (RSU), and vehicles. This work defines two HO schemes as inter-AR HO and intra-AR HO.…”
Section: Related Workmentioning
confidence: 99%
“…But the vehicles HO in a group requires frequent computation in the group, as well as measurement, and hence the computation will be higher in this work. The network layer-based L2 extension HO scheme was proposed (Naeem et al, 2019) and the architecture consists of an access router (AR), roadside unit (RSU), and vehicles. This work defines two HO schemes as inter-AR HO and intra-AR HO.…”
Section: Related Workmentioning
confidence: 99%
“…Dengan Multiple Attribute Decision Making (MADM) menggunakan logika fuzzy berguna untuk mengambil sebuah keputusan yang tepat dan berjalan secara realtime. Terdapat beberapa jenis sistem inferensi pada logika fuzzy seperti Mamdani, Sugeno-Tsukamoto, tetapi dalam skema ini menerapkan metode Sugeno-Tsukamoto (Naeem, Ngah, & Hashim, 2018) untuk menghasilkan kemungkinan handover yang akan dijalankan sistem.…”
Section: Pengambilan Keputusan Handover Berbasis Fuzzy Logicunclassified
“…Step 1, the PIS + and the NIS − are obtained. According to the calculation method of the fuzzy Euclidean distance in Formula (5) above, the distance between each candidate network and the fuzzy hesitant PIS + and NIS − is determined using Formula (13) and Formula (14) in Step 2, which are respectively written as:…”
Section: Inmentioning
confidence: 99%
“…Traditional access selection algorithms usually adopt mathematical models, such as multi-attribute decision making (MADM) [8,9], utility theory [10,11], fuzzy logic [12,13], game theory [14][15][16], optimal calculation [17,18], and neural network [19][20][21].…”
Section: Introductionmentioning
confidence: 99%