{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:02Z","timestamp":1777704602693,"version":"3.51.4"},"reference-count":21,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2018,7,31]],"date-time":"2018-07-31T00:00:00Z","timestamp":1532995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,12,24]]},"abstract":"<jats:p>Network selection is a common issue faced by mobile users. There are several approaches that can be used to optimize the quality of service (QoS) in wireless local area network (WLAN) and cellular network namely by connecting to optimal access point (AP) or using parallel path at transport layer such as transmission control protocol (TCP). In this paper, progressive mobility prediction (PMP) is used to predict the optimal WiFi AP that mobile devices should be connected to for better connectivity. In PMP, dual hidden Markov model (HMM) is used as a prediction tool to provide optimal QoS. The performance and effectiveness of the proposed PMP approach is evaluated in a real-world test bed and compared with MultiPath TCP (MPTCP), the protocol that is used to aggregate multiple network paths for better network performance. The results show that optimal access point prediction with PMP helps in the WiFi AP selection process compared with MPTCP and conventional approach. By selecting optimal WiFi AP, mobile users experience lower handover count as well as network throughput as compared to MPTCP and the conventional approach.<\/jats:p>","DOI":"10.3233\/jifs-169825","type":"journal-article","created":{"date-parts":[[2018,8,5]],"date-time":"2018-08-05T06:37:34Z","timestamp":1533451054000},"page":"5827-5836","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Performance comparison between progressive mobility prediction using hidden Markov model and multipath transmission control protocol"],"prefix":"10.1177","volume":"35","author":[{"given":"Khong-Lim","family":"Yap","sequence":"first","affiliation":[{"name":"National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia"}]},{"given":"Yung-Wey","family":"Chong","sequence":"additional","affiliation":[{"name":"National Advanced IPv6 Centre, Universiti Sains Malaysia, Penang, Malaysia"}]},{"given":"Kwangman","family":"Ko","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Sangji University, Wonju, South Korea"}]}],"member":"179","published-online":{"date-parts":[[2018,7,31]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"Wi-Fi: An extension or alternative to cellular networks? | Telecoms.com. [Online]. Available: http:\/\/telecoms.com\/opinion\/wi-fi-an-extension-or-alternative-to-cellular-networks\/. [Accessed: 02-Mar-2017]."},{"key":"e_1_3_2_3_2","doi-asserted-by":"crossref","unstructured":"MoJ. KimS. and KimH. Will Wi-Fi replace cellular technology? in 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN) 2017 pp. 1031\u20131033.","DOI":"10.1109\/ICUFN.2017.7993956"},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","unstructured":"StynesD. BrownK.N. and SreenanC.J. A probabilistic approach to user mobility prediction for wireless services 2016 Int Wirel Commun Mob Comput Conf2016 pp. 120\u2013125.","DOI":"10.1109\/IWCMC.2016.7577044"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.06.056"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993744"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","unstructured":"LvQ. MeiZ. QiaoY. ZhongY. LeiZ. MarkovHidden. Model based user mobility analysis in LTE network 2014 Int Symp Wirel Pers Multimed Commun no. c 2014 pp. 379\u2013384.","DOI":"10.1109\/WPMC.2014.7014848"},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","unstructured":"PoosamaniN. and RheeI. Wi-Fi hotspot auto-discovery: A practical & energy-aware system for smart objects using cellular signals Proc 12th Int Conf Mob Ubiquitous Syst Comput Netw Serv MOBIQUITOUS 2015 2015 .","DOI":"10.4108\/eai.22-7-2015.2260071"},{"key":"e_1_3_2_9_2","doi-asserted-by":"crossref","unstructured":"MohamedA. OniretiO. HoseinitabatabaeiS.A. ImranM. ImranA. and TafazolliR. Mobility prediction for hanmanagement in cellular networks with control\/data separation IEEE Int Conf Commun2015-Septe (2015) 3939\u20133944.","DOI":"10.1109\/ICC.2015.7248939"},{"key":"e_1_3_2_10_2","first-page":"1","article-title":"Next place prediction using mobility Markov chains","author":"Gambs S.","year":"2012","unstructured":"GambsS., KillijianM.-O. and Del Prado CortezM.N., Next place prediction using mobility Markov chains, Proc First Work Meas Priv Mobil MPM 20122012, pp. 1\u20136.","journal-title":"Proc First Work Meas Priv Mobil MPM 2012"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","unstructured":"ParijaS. RanjanR.K. and SahuP.K. Location prediction of mobility management using neural network techniques in cellular network 2013 Int Conf Emerg Trends VLSI Embed Syst Nano Electron Telecommun Syst 2013 pp. 1\u20134.","DOI":"10.1109\/ICEVENT.2013.6496540"},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","unstructured":"GedatE. FechnerP. FiebelkornR. and VandenhoutenR. Human action recognition with hidden Markov models and neural network derived poses 2017 IEEE 15th International Symposium on Intelligent Systems and Informatics (SISY)2017 pp. 000157\u2013000162.","DOI":"10.1109\/SISY.2017.8080544"},{"key":"e_1_3_2_13_2","first-page":"1","article-title":"Website fingerprinting attack on anonymity networks based on profile hidden markov model","author":"Zhuo Z.","year":"2017","unstructured":"ZhuoZ., ZhangY., ZhangZ., ZhangX. and ZhangJ., Website fingerprinting attack on anonymity networks based on profile hidden markov model, IEEE Trans Inf Forensics Secur, 2017, pp. 1\u20131.","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.190"},{"issue":"99","key":"e_1_3_2_15_2","first-page":"1","article-title":"Big data driven hidden Markov model based individual mobility prediction at points of interest","author":"Lv Q.","year":"2016","unstructured":"LvQ., QiaoY., AnsariN., LiuJ. and YangJ., Big data driven hidden Markov model based individual mobility prediction at points of interest, IEEE Trans Veh TechnolPP(99) (2016), 1.","journal-title":"IEEE Trans Veh Technol"},{"key":"e_1_3_2_16_2","unstructured":"MATLAB - MathWorks. [Online]. Available: https:\/\/www.mathworks.com\/products\/matlab.html. [Accessed: 10-Feb-2017]."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/5.18626"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/MASSP.1986.1165342"},{"key":"e_1_3_2_19_2","unstructured":"PaaschC. BarreS. Multipath TCP in the Linux Kernel available from https:\/\/multiple-tcp.org."},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"YapK.-K. HuangT.-Y. Making use of all the networks around us: A case study in android Proc 2nd ACM Sigcomm Workshop on Cellular Networks: Operations Challenges and Future Design 2012 pp. 25\u201332.","DOI":"10.1145\/2342468.2342474"},{"key":"e_1_3_2_21_2","unstructured":"YapK.-L. ChongY.-W. and KoK. Progressive mobility prediction using dual hidden markov model for optimized access point selection Proc International Conference on Green and Human Information Technology 2018 pp. 15\u201320."},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2584615"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169825","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169825","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:34Z","timestamp":1777455694000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169825"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,31]]},"references-count":21,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12,24]]}},"alternative-id":["10.3233\/JIFS-169825"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169825","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,31]]}}}