Handoff Management Enhancement using Soft Computing Techniques

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Handoff Management Enhancement using Soft Computing Techniques

In 4G cellular system, due to the mobility, proper handoff or handover management is critical to ensure seamless migration from one cell to another cell. Besides of maintaining the connection quality during a handover process, any advanced handover algorithms which can minimize required resources for the connection are critical. When connections need to migrate between heterogeneous networks fo...

متن کامل

Investigating electrochemical drilling (ECD) using statistical and soft computing techniques

In the present study, five modeling approaches of RA, MLP, MNN, GFF, and CANFIS were applied so as to estimate the radial overcut values in electrochemical drilling process. For these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. The developed models were evaluated in terms of their prediction capability with m...

متن کامل

investigating electrochemical drilling (ecd) using statistical and soft computing techniques

in the present study, five modeling approaches of ra, mlp, mnn, gff, and canfis were applied so as to estimate the radial overcut values in electrochemical drilling process. for these models, four input variables, namely electrolyte concentration, voltage, initial machining gap, and tool feed rate, were selected. the developed models were evaluated in terms of their prediction capability with m...

متن کامل

Damage identification by using soft-computing techniques

This paper describes a soft computing approach to solve the damage identification problem using Case-Based Reasoning (CBR) to obtain an initial diagnostic exploiting the outcomes given in known structure models simulations and the data acquired by the sensors in operating conditions once the system has started. It creates an incremental database (since a new experience is retained each time a p...

متن کامل

Intrusion Detection Using Soft Computing Techniques

As the popularity and usage of Internet increases all over the world, security issues have also become very essential that have to be considered. In literature, different techniques from various disciplines have been utilized to develop efficient security methods but those techniques always have some shortcomings. In this chapter the author discuss soft computing techniques that have been appli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2013

ISSN: 0975-8887

DOI: 10.5120/10777-5222