Please enter verification code
Confirm
Hook Replacement Method for Mobile Receiver in the Soft Handover Region
American Journal of Mathematical and Computer Modelling
Volume 2, Issue 1, February 2017, Pages: 1-5
Received: Oct. 30, 2016; Accepted: Nov. 10, 2016; Published: Jan. 4, 2017
Views 3330      Downloads 132
Authors
Ammar Odeh, Department of Computer Science and Information Systems, Al Maarefa College for Science & Technology, Riyadh, Kingdom of Saudi Arabia
Ibrahim Al Otoum, Department of Computer Science and Information Systems, Al Maarefa College for Science & Technology, Riyadh, Kingdom of Saudi Arabia
Bilal AL-Bataineh, Department of Computer Science Shaqra University Riyadh, Riyadh, Kingdom of Saudi Arabia
Article Tools
Follow on us
Abstract
The proposed work analyses there are many techniques already available for the soft handover region. Here the paper comes up with the new hook replacement technology for mobile receiver in the soft handover region. In our proposal, the receiver receive the signal from all available base station (BS) around the mobile and hooks to the base station which provides proper and strongest path while it comes to the fall of signal to noise ratio below pre-decided threshold level. Receiver compare the weakest hook of path concern with base station and remove it from the currently considerable hooks and with the sum of the strong and proper responsive hooks it creates proper and better group. Then after analysing all the hooks from the group it starts communicating with strongest hook. This paper describes this process in this paper by showing error performance, average no of considerable paths offered by this newly hook replacement scheme which is depend on Mobile Controlled Hand (MCHO). Which is applicable to GSM as well as CDMA (IS-95 and CDMA2000).
Keywords
Lacking of Channel, Techniques of Diversity, Hand Over Event Analysis
To cite this article
Ammar Odeh, Ibrahim Al Otoum, Bilal AL-Bataineh, Hook Replacement Method for Mobile Receiver in the Soft Handover Region, American Journal of Mathematical and Computer Modelling. Vol. 2, No. 1, 2017, pp. 1-5. doi: 10.11648/j.ajmcm.20170201.11
Copyright
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
H. Holma and A. Toskala, Wcdma for Umts vol. 2006: Wiley Online Library, 2000.
[2]
M.-S. Alouini and M. K. Simon, "An MGF-based performance analysis of generalized selection combining over Rayleigh fading channels," Communications, IEEE Transactions on, vol. 48, pp. 401-415, 2000.
[3]
S. Choi, et al., "Soft handover overhead reduction by RAKE reception with finger reassignment," Communications, IEEE Transactions on, vol. 56, pp. 213-221, 2008.
[4]
A. Papoulis and S. U. Pillai, Probability, random variables, and stochastic processes: Tata McGraw-Hill Education, 2002.
[5]
S. CHOI, et al., "Soft Handover Overhead Reduction by RAKE Reception with Finger Reassignment," IEEE transactions on communications, vol. 56, pp. 213-221, 2008.
[6]
T. J. L. Daniel Wong, "Soft Handoffs in CDMA Mobile Systems," IEEE, 1997.
[7]
S. Choi, et al., "Finger replacement method for RAKE receivers in the soft handover region," Wireless Communications, IEEE Transactions on, vol. 7, pp. 1152-1156, 2008.
[8]
T. Eng, et al., "Correction to" Comparison of diversity combining techniques for Rayleigh-fading channels"," Communications, IEEE Transactions on, vol. 46, p. 1111, 1998.
[9]
A. Odeh, et al., "Steganography in Arabic text using Kashida variation algorithm (KVA)," in Systems, Applications and Technology Conference (LISAT), 2013 IEEE Long Island, 2013, pp. 1-6.
[10]
A. Odeh, et al., "Fast real-time hardware engine for ZWC text steganography," in Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2014 4th International Conference on, 2014, pp. 1-5.
[11]
A. Odeh, et al., "Steganography in text by using MS word symbols," in American Society for Engineering Education (ASEE Zone 1), 2014 Zone 1 Conference of the, 2014, pp. 1-5.
[12]
M. Z. Win and J. H. Winters, "Virtual branch analysis of symbol error probability for hybrid selection/maximal-ratio combining in Rayleigh fading," Communications, IEEE Transactions on, vol. 49, pp. 1926-1934, 2001.
[13]
M. K. Simon and M.-S. Alouini, Digital communication over fading channels vol. 95: John Wiley & Sons, 2005.
[14]
G. L. Stüber, Principles of Mobile Communications, 2nd ed ed. Norwell, MA: Kluwer Academic Publisher, 2001.
[15]
A. Odeh, "Robust Text Steganography Algorithms for Secure Data Communications," UNIVERSITY OF BRIDGEPORT, 2015.
[16]
A. Odeh and E. Abdelfattah, "Quantum sort algorithm based on entanglement qubits {00, 11}," in Long Island Systems, Applications and Technology Conference (LISAT), 2016 IEEE, 2016, pp. 1-5.
[17]
A. Odeh, et al., "Performance evaluation of AODV and DSR routing protocols in MANET networks," 2012.
[18]
A. Odeh, et al., "Steganography by multipoint Arabic letters," in Systems, Applications and Technology Conference (LISAT), 2012 IEEE Long Island, 2012, pp. 1-7.
[19]
A. Odeh and K. Elleithy, "Steganography in arabic text using zero width and kashidha letters," International Journal of Computer Science & Information Technology, vol. 4, p. 1, 2012.
[20]
A. Odeh, et al., "Sorting N elements using quantum entanglement sets," in Innovative Computing Technology (INTECH), 2013 Third International Conference on, 2013, pp. 213-216.
[21]
A. Odeh, et al., "Quantum key distribution by using public key algorithm (rsa)," in Innovative Computing Technology (INTECH), 2013 Third International Conference on, 2013, pp. 83-86.
[22]
A. Odeh, et al., "Fast Real Hardware Engine for Multipoint Text Steganography".
ADDRESS
Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
U.S.A.
Tel: (001)347-983-5186