Location Management Techniques to Improve QoS in Mobile Networks Using Intelligent Agent
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1
Abstract
Location Management (LM) is one of the major issues of mobile networks that should be taken into account for providing Quality of Service (QoS) and to meet the subscribers demand (satisfaction). Location management techniques are divided into three types (i) Updation Techniques (UT) and (ii) Paging Techniques (PT) (iii) Delivery. The LM is used for tracking where the subscribers are locate, and based on that permitting calls, Short Message Service (SMS) and other mobile phone services are delivered to them with the assistance of Intelligent Agent (IA). The Redundant Update Remove Algorithm (RURA) which is used for reducing the updation between BSC and MSC. Enhanced Temporal Updation (ETU) reduces the location updates between MS and MSC. The Performances of updation techniques are analyzed. Intelligent Agent (IA) improves QoS in Mobile Networks.
Authors and Affiliations
Selvan. C , Dr. R. Shanmugalakshmi
Partial fingerprint matching based on SIFT Features
Fingerprints are being extensively used for person identification in a number of commercial, civil, and forensic applications. The current Fingerprint matching technology is quite mature for matching full prints, matchin...
Review on Recent Image Segmentation Techniques
Image Segmentation refers to the process of partitioning an image into non-overlapping different regions with similar attributes, for gray level images, the most basic attribute used is the luminance amplitude, and for c...
Adjoint LMS (ALMS) Algorithm Based Active Noise Control with Feedback Path Modeling
In active noise control (ANC) systems, there exists an inherent feedback from the loudspeaker to the primary microphone. Adjoint least mean square (ALMS) algorithm is known to be an alternative to the widely used filtere...
Collaborative Filtering Based Recommendation System: A survey
the most common technique used for recommendations is collaborative filtering. Recommender systems based on collaborative filtering predict user preferences for products or services by learning past user-item relationshi...
COLLABORATIVE ANOMALY-BASED INTRUSION DETECTION IN MOBILE AD HOC NETWORKS
Intrusion Prevention is first line of defense against attacks in MANET. Intrusion Detection and response presents a second line of defense. New vulnerabilities will continue to invent new attack methods so new technology...