期刊文献+

用于异构网络的差值门限模糊切换算法 被引量:5

Difference threshold based fuzzy handover algorithm for heterogeneous networks
下载PDF
导出
摘要 为了提高用户在异构网络中进行垂直切换的准确度,减少"乒乓效应",提出了一种差值门限模糊切换算法(Difference Threshold based Fuzzy Handover,DTFH).DTFH算法考虑异构网络中的切换触发与切换判决两个方面.用户获得当前网络和目标网络的信噪比差值,根据该信噪比差值与设定的切换触发门限的比较结果进行切换触发;然后,采用模糊逻辑方法得到用户当前网络与目标网络的模糊判决值,根据两个网络的模糊判决值之差与设定的切换判决门限的对比结果进行切换判决.以LTE和WiMAX异构网络为仿真场景,仿真结果表明,与传统切换算法相比,DTFH算法能在减少"乒乓效应"的同时,提高用户吞吐量,从而提高垂直切换的性能. In order to improve the accuracy of vertical handover and to reduce the "Ping-Pong effect", a difference threshold based fuzzy handover (DTFH) algorithm is proposed for heterogeneous networks. The handover trigger and handover decision are considered for DTFH. The signal to noise ratio (SNR) gap between the target network and the current network is obtained by the mobile station (MS), and the SNR gap between the two networks is compared with a predefined trigger threshold for handover trigger. Then based on the method of fuzzy logic, the MS gets the fuzzy decision values of the target network and the current network, and the gap between the fuzzy decision values of these two networks is compared with a predefined decision threshold for handover decision. In simulation, a heterogeneous network comprising LTE and WiMAX is used. Compared with traditional handover algorithms, the simulation results show that the DTFH algorithm can reduce the "PingPong effect", increase the throughput of MS, and improve the performance of vertical handover.
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2011年第1期165-170,共6页 Journal of Xidian University
基金 国家自然科学基金资助项目(2003112255) 中央高校基本科研业务费资助项目(BUPT2009RC0113)
关键词 异构网络 垂直切换 触发 判决 模糊逻辑 heterogeneous networks vertical handover trigger decision fuzzy logic
  • 相关文献

参考文献10

  • 1Buddhikot M, Chandranmenon G, Han S, et al. Integration of 802. 11 and 3rd-generation Wireless Data Networks[ C]//Proc of the INFOCOM: 1. San Francisco: Institute of Electrical and Electronics Engineers Ine, 2003: 503-512.
  • 2郭强,朱杰,徐向华.一种无线异构网无缝切换控制方案及其仿真分析[J].上海交通大学学报,2004,38(12):2026-2029. 被引量:11
  • 3米志超,鲍民权,周建江.传感器网络中基于模糊决策的多目标路由优化算法[J].西安电子科技大学学报,2008,35(4):721-725. 被引量:8
  • 4肖倩,罗守山,杨文川,郑康锋.安全多方模糊综合评判模型及协议[J].北京邮电大学学报,2009,32(3):5-9. 被引量:1
  • 5Yang Kemeng, Gondal I, Qiu Bin, et al. A Fuzzy Adaptive Soft Handover Scheme Supporting Four Active Eets[ C]//ICIS 2007, 6th IEEE/ACIS International Conference. Melbourne: Inst of Elec and elec Eng Computer Society, 2007: 147-152.
  • 6Majlesi A, Khalaj B H. An Adaptive Fuzzy Logic Based Handoff Algorithm for Interworking Between WLANs and Mobile Networks[ C] //Proceedings of the 13th IEEE ISPIMRC'02: Vol 5. Portugal: IEEE, 2002: 2446-2451.
  • 7Shum K, Sun C W. Fuzzy Layer Selection Method in Hierarchical Cellular Systems[ J]. IEEE Trans on Vehicular Technology, 1999, 48 (6) : 1840-1849.
  • 8Lin C J, Tsai I T, Lee C Y. An Adaptive Fuzzy Predictor Based Handoff Algorithm for Heterogeneous Network[ C]//IEEE Annual Meeting of the Fuzzy Information: Vol 12. Banff: Inst of Elec and Elec Eng Inc, 2004: 944-947.
  • 9Liu Xia, Jiang Lingge. A Novel Fuzzy Logic Vertical Handoff Algorithm with Aid of Differential Prediction and Pre-decision Method[ C]//IEEE ICC 2007. Glasgow: Inst of Elec and Elec Eng Inc, 2007: 5665-5670.
  • 103rd Generation Partnership Project. TR 36. 938, Improved network controlled mobility between E-UTRAN and 3GPP2/Mobile WiMAX radio technologies V8. 0. 0[ S]. Sophia Antipolis: 3rd Generation Partnership Project, 2008.

二级参考文献25

  • 1秦波,秦慧,周克复,王晓峰,王育民.常数复杂性的百万富翁协议[J].西安理工大学学报,2005,21(2):149-152. 被引量:13
  • 2沈中,常义林,崔灿,张新.无线Ad Hoc网络中保留最小能量路径的拓扑控制算法[J].西安电子科技大学学报,2006,33(3):341-346. 被引量:10
  • 3Yao A C. Protocols for secure computations [ C ]//Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science. Los Alamitos: IEEE Computer Society Press, 1982: 160-164.
  • 4Goldreich O. Secure multi-party computation (working draft) [EB/OL]. [2008-10-16]. http://www, wisdom. weizmann, ac. il/- oded/pp, html.
  • 5Goldreieh O, Micali S, Wigderson A. How to play any mental game[C]// The 19th Annual ACM Conference on Theory of Computing. New York: ACM, 1987: 218-229.
  • 6Atallah M J, Kerschbaum F, Du W L. Secure and private sequence comparisons[ C] // Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. Washington: ACM, 2003: 39-44.
  • 7Goldwasser S, Micali S. Probabilistic encryption [ J ]. Journal of Computer and System Sciences, 1984, 28(2) : 270-299.
  • 8Paillier P. Public-key cryptosystems based on composite degree residuosity classes[C]// EUROCRYPT'99. Heidelberg: Springer-Verlag, 1999: 223-238.
  • 9Qi Bi, Zysman G L, Menkes H. Wireless mobile communications at the start of the 21st century[J]. IEEE Communications Magazine, 2001, 39(1): 110-116.
  • 10Ramjee R, La Porta T F, Salgarelli L, et al. IP-based access network infrastructure for next-generation wireless data networks[J]. IEEE Personal Communications, 2000, 7(4): 34-41.

共引文献17

同被引文献63

引证文献5

二级引证文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部