Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777766
Zahra Ghaffaripour, Alireza Abdollahpouri, P. Moradi
Problem of community detection has attracted many research efforts in recent years. Most of the algorithms developed for this purpose, take advantage of single-objective optimization methods which may be ineffective for complex networks. In addition, most of the networks in the real world are weighted, and therefore, this fact must be of special interest in order to achieve more precise communities in partitioning strategies. Accordingly, in this paper, a community detection method for weighted networks is proposed using multi-objective optimization based on genetic algorithm. Performance evaluation based on experiments on real datasets, shows that considering weights of the edges, leads to higher modularity factor.
{"title":"A multi-objective genetic algorithm for community detection in weighted networks","authors":"Zahra Ghaffaripour, Alireza Abdollahpouri, P. Moradi","doi":"10.1109/IKT.2016.7777766","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777766","url":null,"abstract":"Problem of community detection has attracted many research efforts in recent years. Most of the algorithms developed for this purpose, take advantage of single-objective optimization methods which may be ineffective for complex networks. In addition, most of the networks in the real world are weighted, and therefore, this fact must be of special interest in order to achieve more precise communities in partitioning strategies. Accordingly, in this paper, a community detection method for weighted networks is proposed using multi-objective optimization based on genetic algorithm. Performance evaluation based on experiments on real datasets, shows that considering weights of the edges, leads to higher modularity factor.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133086368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777760
M. Dezfoulian, Younes MiriNezhad, Seyed Muhammad Hossein Mousavi, Mehrdad Shafaei Mosleh, Muhammad Mehdi Shalchi
This article is focusing on optimization of the Ho-Kashyap classification algorithm. Choosing a proper learning sample plays a significant role in runtime and accuracy of the supervised classification algorithms, specially the Ho-Kashyap classification algorithm. This article with combining the methods of Multi Class Instance Selection and Ho-Kashyap, not has only reduced the starting time of algorithm, but has improved the accuracy of this algorithm, using proper parameters. The results of this suggested method, in terms of accuracy and time, are evaluated and simulations have proved that MCIS method can choose the data that have more effectiveness on classification, using proper measures. If Ho-Kashyap algorithm classifies using more important data, it could be to save the time in classification process and even increases the accuracy of classification.
{"title":"Optimization of the Ho-Kashyap classification algorithm using appropriate learning samples","authors":"M. Dezfoulian, Younes MiriNezhad, Seyed Muhammad Hossein Mousavi, Mehrdad Shafaei Mosleh, Muhammad Mehdi Shalchi","doi":"10.1109/IKT.2016.7777760","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777760","url":null,"abstract":"This article is focusing on optimization of the Ho-Kashyap classification algorithm. Choosing a proper learning sample plays a significant role in runtime and accuracy of the supervised classification algorithms, specially the Ho-Kashyap classification algorithm. This article with combining the methods of Multi Class Instance Selection and Ho-Kashyap, not has only reduced the starting time of algorithm, but has improved the accuracy of this algorithm, using proper parameters. The results of this suggested method, in terms of accuracy and time, are evaluated and simulations have proved that MCIS method can choose the data that have more effectiveness on classification, using proper measures. If Ho-Kashyap algorithm classifies using more important data, it could be to save the time in classification process and even increases the accuracy of classification.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127236346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777765
Mohammad Reza Rohanipoor, B. Ghavami, Mohsen Raji
In this paper, we propose a new method based on logic gates including quadded transistors to improve the Soft Error Rate (SER) of combinational circuits. Since the proposed method imposes considerable area overheads, we cannot apply it to all gates of the circuit to improve the circuit SER. So, at first, we identify the gates which are more sensitive to soft errors using a computational model. Then, we propose a method in order to reduce the SER of the circuit. This method optimizes the circuit SER considering the overheads on circuit area. Experimental results based on simulations performed on ISCAS'85 benchmark circuits show that the method can provide an SER reduction of up to 19% with less than 53% area overhead.
{"title":"Design of fault tolerant digital integrated circuits based on quadded transistor logic","authors":"Mohammad Reza Rohanipoor, B. Ghavami, Mohsen Raji","doi":"10.1109/IKT.2016.7777765","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777765","url":null,"abstract":"In this paper, we propose a new method based on logic gates including quadded transistors to improve the Soft Error Rate (SER) of combinational circuits. Since the proposed method imposes considerable area overheads, we cannot apply it to all gates of the circuit to improve the circuit SER. So, at first, we identify the gates which are more sensitive to soft errors using a computational model. Then, we propose a method in order to reduce the SER of the circuit. This method optimizes the circuit SER considering the overheads on circuit area. Experimental results based on simulations performed on ISCAS'85 benchmark circuits show that the method can provide an SER reduction of up to 19% with less than 53% area overhead.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132140064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777751
Jaber Pournazari, Mohammad Alaei, F. Yazdanpanah
Wireless Multimedia Sensor Networks (WMSNs) are composed of the number of video, audio, and scalar sensors which the proposed method is investigated on sensors equipped to cameras. In this paper a new method distributed is introduced for enhancing the environmental multimedia sensing coverage and recording in wireless multimedia sensor networks. In the proposed method nodes are prioritized and selected for rotating and replacement based on the sensing overlaps; the node with more overlapping areas, has higher priority. The goal is to enhance coverage ratio with reduction of multimedia node overlap. The prioritizing table is updated after each execution of the algorithm in order to select the best node. The proposed method of prioritizing, rotation, and movement, improve the capability of energy conservation and also coverage ratio in the network. The results of implementation and comparison with other methods show which the proposed method improves network coverage with the least imposing of nodes movement and rotation.
{"title":"A method for coverage optimization in wireless multimedia sensor networks","authors":"Jaber Pournazari, Mohammad Alaei, F. Yazdanpanah","doi":"10.1109/IKT.2016.7777751","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777751","url":null,"abstract":"Wireless Multimedia Sensor Networks (WMSNs) are composed of the number of video, audio, and scalar sensors which the proposed method is investigated on sensors equipped to cameras. In this paper a new method distributed is introduced for enhancing the environmental multimedia sensing coverage and recording in wireless multimedia sensor networks. In the proposed method nodes are prioritized and selected for rotating and replacement based on the sensing overlaps; the node with more overlapping areas, has higher priority. The goal is to enhance coverage ratio with reduction of multimedia node overlap. The prioritizing table is updated after each execution of the algorithm in order to select the best node. The proposed method of prioritizing, rotation, and movement, improve the capability of energy conservation and also coverage ratio in the network. The results of implementation and comparison with other methods show which the proposed method improves network coverage with the least imposing of nodes movement and rotation.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133317919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777770
Hessam Amini, H. Veisi, Elham Mohammadi
Utilizing a language model in a brain-computer-interface-based (BCI-based) speller has been proven helpful in improving the performance of the system. Since it is important to evaluate the effect of the language model on the system, it is necessary to choose the words in a way that they can represent different levels of difficulty based on the language model. In this paper, we will give a brief introduction to the Persian BCI speller that we are going to develop. Then, we will explain how we select words with three levels of difficulty based on both a character-level and a word-level language model. We consider three levels of difficulty, named Easy, Medium and Hard, for which we have selected 3, 6 and 3 words, respectively. We then make a sentence for each of the words, so that the words are presented within a context. By doing so, the language model can predict the possibility of occurrence for each word. The novelty of this paper is in the fact that so far, there have not been implemented any Persian BCI spellers utilizing a language model as an aid in character recognition using the brain signals.
{"title":"Target words selection for a Persian brain-computer-interface-based speller using language model","authors":"Hessam Amini, H. Veisi, Elham Mohammadi","doi":"10.1109/IKT.2016.7777770","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777770","url":null,"abstract":"Utilizing a language model in a brain-computer-interface-based (BCI-based) speller has been proven helpful in improving the performance of the system. Since it is important to evaluate the effect of the language model on the system, it is necessary to choose the words in a way that they can represent different levels of difficulty based on the language model. In this paper, we will give a brief introduction to the Persian BCI speller that we are going to develop. Then, we will explain how we select words with three levels of difficulty based on both a character-level and a word-level language model. We consider three levels of difficulty, named Easy, Medium and Hard, for which we have selected 3, 6 and 3 words, respectively. We then make a sentence for each of the words, so that the words are presented within a context. By doing so, the language model can predict the possibility of occurrence for each word. The novelty of this paper is in the fact that so far, there have not been implemented any Persian BCI spellers utilizing a language model as an aid in character recognition using the brain signals.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123965636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777793
Tahereh Koohi-Var, M. Zahedi
Workflows are visualized in different ways. In most cases real workflows deviates from hand-made models and they can be plotted as a graphical diagram. Displaying Graphical diagrams with large amounts of data is difficult; because we are limited to two-dimensional computer screens or papers. In some cases it is essential to transform workflows to reduced ones, especially with reducing visualization complexity. In this paper, reduction of workflows is investigated in both structure and semantic aspects. This paper also introduces commonplace methods of reducing complexity of workflow visualizations. Finally we present linear merging reduction, as a technique to reduce workflow complexity.
{"title":"Linear merging reduction: A workflow diagram simplification method","authors":"Tahereh Koohi-Var, M. Zahedi","doi":"10.1109/IKT.2016.7777793","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777793","url":null,"abstract":"Workflows are visualized in different ways. In most cases real workflows deviates from hand-made models and they can be plotted as a graphical diagram. Displaying Graphical diagrams with large amounts of data is difficult; because we are limited to two-dimensional computer screens or papers. In some cases it is essential to transform workflows to reduced ones, especially with reducing visualization complexity. In this paper, reduction of workflows is investigated in both structure and semantic aspects. This paper also introduces commonplace methods of reducing complexity of workflow visualizations. Finally we present linear merging reduction, as a technique to reduce workflow complexity.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130605659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777789
Saeid Mohammadpour, Farnaz Tafte
M-commerce has gained so much attention in recent years. M-commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum to mean “delivery of electronic commerce capabilities directly into the customer's hand, anywhere, via wireless technology”. This portable form of commerce is of so much benefit for the stakeholders including the organizations and end-users. However, it has some challenges that need to be mitigated or totally addressed if possible. Cloud computing, specifically in its mobile form, is capable of presenting some solutions for the existent challenges. In this research, the most common challenges and weak areas of M-commerce is considered, and their corresponding cloud solutions are presented. Additionally, based on the available M-commerce reference model, a new layered structure including the cloud services is provided, and a new cloud-based M-commerce architecture is suggested accordingly.
近年来,移动商务获得了如此多的关注。移动商务(M-commerce)一词最初是由凯文·达菲(Kevin Duffey)在1997年全球移动商务论坛(Global Mobile Commerce Forum)的启动仪式上提出的,意思是“通过无线技术将电子商务能力随时随地直接交付到客户手中”。这种可移植的商业形式对包括组织和最终用户在内的利益相关者有很多好处。然而,如果可能的话,它也有一些需要减轻或完全解决的挑战。云计算,特别是移动形式的云计算,能够为现有的挑战提供一些解决方案。本研究考虑了移动商务最常见的挑战和薄弱环节,并提出了相应的云解决方案。在现有移动商务参考模型的基础上,提出了包含云服务的新的分层结构,并据此提出了一种新的基于云的移动商务架构。
{"title":"M-commerce: The state of the art, challenges, and cloud-based solutions","authors":"Saeid Mohammadpour, Farnaz Tafte","doi":"10.1109/IKT.2016.7777789","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777789","url":null,"abstract":"M-commerce has gained so much attention in recent years. M-commerce was originally coined in 1997 by Kevin Duffey at the launch of the Global Mobile Commerce Forum to mean “delivery of electronic commerce capabilities directly into the customer's hand, anywhere, via wireless technology”. This portable form of commerce is of so much benefit for the stakeholders including the organizations and end-users. However, it has some challenges that need to be mitigated or totally addressed if possible. Cloud computing, specifically in its mobile form, is capable of presenting some solutions for the existent challenges. In this research, the most common challenges and weak areas of M-commerce is considered, and their corresponding cloud solutions are presented. Additionally, based on the available M-commerce reference model, a new layered structure including the cloud services is provided, and a new cloud-based M-commerce architecture is suggested accordingly.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129707349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777753
Sepide Moradi, M. Alavi
Wireless sensor networks are being used more and more. Sensor nodes can be distributed in hazardous environments to collect data. As these environments are usually unsecured, provide security in wireless sensor networks is vital. Detecting attacks in sensor networks is inevitable to provide security. Various attacks threaten sensor networks one of which is Sybil attack, which can be a big threat for geographical routing protocols and multi-path routing. In this paper, a distributed method has been presented using mobile agents and local information of each sensor to detect Sybil attack. The results of simulation show the efficacy of this method in comparison with previous methods.
{"title":"A distributed method based on mobile agent to detect Sybil attacks in wireless sensor networks","authors":"Sepide Moradi, M. Alavi","doi":"10.1109/IKT.2016.7777753","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777753","url":null,"abstract":"Wireless sensor networks are being used more and more. Sensor nodes can be distributed in hazardous environments to collect data. As these environments are usually unsecured, provide security in wireless sensor networks is vital. Detecting attacks in sensor networks is inevitable to provide security. Various attacks threaten sensor networks one of which is Sybil attack, which can be a big threat for geographical routing protocols and multi-path routing. In this paper, a distributed method has been presented using mobile agents and local information of each sensor to detect Sybil attack. The results of simulation show the efficacy of this method in comparison with previous methods.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130263653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777761
Ali Gorji Sefidmazgi, Fatemeh Ahmadi-Abkenari, Seid Abolghasem Mirroshandel
One of the main aims of molecular biology is to understand regulatory relationships between the cellular components. Most of the methods developed to extract gene regulatory relationship from time-delayed gene expression data are not sensitive to non-linearity and non-monotonicity of the cellular system. Here we present four various time-lagged correlation methods including Pearson, Spearman, Kendall and distance correlation and an information theoretic measure (Mutual Information). We propose a method to limit potential regulators while introducing a new dynamic threshold. The SOS DNA Repair of E. coli dataset is used for simulation. The methods are implemented in R Programming language, and the results show the performance of the proposed method to reveal the structure of gene regulatory network.
{"title":"Correlation analysis as a dependency measures for inferring of time-lagged gene regulatory network","authors":"Ali Gorji Sefidmazgi, Fatemeh Ahmadi-Abkenari, Seid Abolghasem Mirroshandel","doi":"10.1109/IKT.2016.7777761","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777761","url":null,"abstract":"One of the main aims of molecular biology is to understand regulatory relationships between the cellular components. Most of the methods developed to extract gene regulatory relationship from time-delayed gene expression data are not sensitive to non-linearity and non-monotonicity of the cellular system. Here we present four various time-lagged correlation methods including Pearson, Spearman, Kendall and distance correlation and an information theoretic measure (Mutual Information). We propose a method to limit potential regulators while introducing a new dynamic threshold. The SOS DNA Repair of E. coli dataset is used for simulation. The methods are implemented in R Programming language, and the results show the performance of the proposed method to reveal the structure of gene regulatory network.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114485945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-09-01DOI: 10.1109/IKT.2016.7777747
Mehran Moghaddam, N. Movahhedinia, M. Khayyambashi, F. Hendessi
Technological developments alongside VLSI achievements enable mobile devices to be equipped with multiple radio interfaces which is known as multihoming. On the other hand, the combination of various wireless access technologies, known as Next Generation Wireless Networks (NGWNs) has been introduced to provide continuous connection to mobile devices in any time and location. Cognitive radio networks as a part of NGWNs aroused to overcome spectrum inefficiency and spectrum scarcity issues. In order to provide seamless and ubiquitous connection across heterogeneous wireless access networks in the context of cognitive radio networks, utilizing Mobile IPv6 is beneficial. In this paper, a mobile device equipped with two radio interfaces is considered in order to evaluate performance of spectrum handover in terms of handover latency. The analytical results show that the proposed model can achieve better performance compared to other related mobility management protocols mainly in terms of handover latency.
{"title":"Performance evaluation of spectrum mobility in multi-homed mobile IPv6 cognitive radio cellular networks","authors":"Mehran Moghaddam, N. Movahhedinia, M. Khayyambashi, F. Hendessi","doi":"10.1109/IKT.2016.7777747","DOIUrl":"https://doi.org/10.1109/IKT.2016.7777747","url":null,"abstract":"Technological developments alongside VLSI achievements enable mobile devices to be equipped with multiple radio interfaces which is known as multihoming. On the other hand, the combination of various wireless access technologies, known as Next Generation Wireless Networks (NGWNs) has been introduced to provide continuous connection to mobile devices in any time and location. Cognitive radio networks as a part of NGWNs aroused to overcome spectrum inefficiency and spectrum scarcity issues. In order to provide seamless and ubiquitous connection across heterogeneous wireless access networks in the context of cognitive radio networks, utilizing Mobile IPv6 is beneficial. In this paper, a mobile device equipped with two radio interfaces is considered in order to evaluate performance of spectrum handover in terms of handover latency. The analytical results show that the proposed model can achieve better performance compared to other related mobility management protocols mainly in terms of handover latency.","PeriodicalId":205496,"journal":{"name":"2016 Eighth International Conference on Information and Knowledge Technology (IKT)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116403011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}