Radio Access Technology (RAT) selection mechanism using TOPSIS method in Heterogeneous Wireless Networks (HWN)
In next-generation wireless networks, a Multi-Mode Device (MMD) can be connected with available Radio Access Technology (RAT) in a Heterogeneous Wireless Network (HWN). The appropriate RAT selection is essential to achieve expected Quality of Service (QoS) in HWN. There are many factors t...
| Main Authors: | Anwar, Farhat, Masud, Mosharrof Hussain, Khan, Burhan Ul Islam, Olanrewaju, Rashidah Funke, Abdul Latif, Suhaimi |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Institute of Advanced Engineering and Science
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/65940/ http://irep.iium.edu.my/65940/1/65940_Radio%20Access%20Technology%20%28RAT%29.pdf http://irep.iium.edu.my/65940/7/65940_Radio%20Access%20Technology%20%28RAT%29%20selection_scopus.pdf |
Similar Items
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Game theory for resource allocation in heterogeneous wireless networks - a review
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
FRGS-13-081-0322/ design and modelling of novel dynamic bandwidth aggregation scheme in heterogeneous wireless network (hwn) for mission critical applications
by: Anwar, Farhat, et al.
Published: (2018)
by: Anwar, Farhat, et al.
Published: (2018)
An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks
by: Latif, Suhaimi A, et al.
Published: (2013)
by: Latif, Suhaimi A, et al.
Published: (2013)
Offline OTP based solution for secure internet banking access
by: Khan, Burhan ul Islam, et al.
Published: (2019)
by: Khan, Burhan ul Islam, et al.
Published: (2019)
Performance analysis of IIUM wireless campus network
by: Abd Latif, Suhaimi, et al.
Published: (2013)
by: Abd Latif, Suhaimi, et al.
Published: (2013)
Fuzzy logic based handoff latency reduction mechanism in layer 2 of heterogeneous mobile IPv6 networks
by: Anwar, Farhat, et al.
Published: (2013)
by: Anwar, Farhat, et al.
Published: (2013)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Game theoretic approach for exhaustive tactical modelling of node misbehavior in adhoc networking based IOT paradigm/P-RIGS18-020-0020
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
by: Olanrewaju, Rashidah Funke Olanrewaju, et al.
Published: (2019)
An analysis of resource sharing scheme in heterogeneous wireless campus network
by: Masud, M.H., et al.
Published: (2013)
by: Masud, M.H., et al.
Published: (2013)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
QoS oriented mapReduce optimization for hadoop based
bigData application
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Medium access prioritizing in the heterogeneous low-rate wireless PANs
by: Al-Medhwahi, Mohammed Ahmed Ali, et al.
Published: (2016)
by: Al-Medhwahi, Mohammed Ahmed Ali, et al.
Published: (2016)
Deployment challenges of MIPV6
by: Masud, Mosharrof Hussain, et al.
Published: (2011)
by: Masud, Mosharrof Hussain, et al.
Published: (2011)
A survey on MANETs: architecture, evolution, applications,
security issues and solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
by: Khan, Burhan Ul Islam, et al.
Published: (2018)
An adaptive and viable face identification for Android mobile devices
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Scrutinising internet banking security solutions
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
Practical applications and design challenges of wireless heterogeneous sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
by: Khan, Burhan Ul Islam, et al.
Published: (2020)
A game theory-based strategic approach to ensure reliable data transmission with optimized network operations in futuristic Mobile Adhoc Networks
by: Khan, Burhan ul Islam, et al.
Published: (2020)
by: Khan, Burhan ul Islam, et al.
Published: (2020)
Bayesian signaling game based efficient security model for MANETs
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
Prospects and problems of cognitive radio network architectures in wireless sensor networks
by: Salami, Abdulazeez F., et al.
Published: (2011)
by: Salami, Abdulazeez F., et al.
Published: (2011)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Conquest XHTML: a programers guide to extensible HyperText Markup Language
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
Malicious behaviour of node and its significant security techniques in MANET- a review
by: Khan, Burhan ul Islam, et al.
Published: (2013)
by: Khan, Burhan ul Islam, et al.
Published: (2013)
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
An exploration of issues and limitations in current methods of TOPSIS and fuzzy TOPSIS
by: Madi, Elissa, et al.
Published: (2016)
by: Madi, Elissa, et al.
Published: (2016)
Securing electronic transactions via payment gateways: a systematic review
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
A network selection algorithm based on enhanced access router discovery in heterogeneous wireless networks
by: Abdullah, Radhwan M., et al.
Published: (2014)
by: Abdullah, Radhwan M., et al.
Published: (2014)
Similar Items
-
Analysis of packet reordering delay for bandwidth aggregation in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018) -
Game theory for resource allocation in heterogeneous wireless networks - a review
by: Anwar, Farhat, et al.
Published: (2018) -
Bandwidth allocation policy using the game theory model in heterogeneous wireless networks
by: Anwar, Farhat, et al.
Published: (2018) -
FRGS-13-081-0322/ design and modelling of novel dynamic bandwidth aggregation scheme in heterogeneous wireless network (hwn) for mission critical applications
by: Anwar, Farhat, et al.
Published: (2018) -
An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks
by: Latif, Suhaimi A, et al.
Published: (2013)