Designing a Vertical Handover Algorithm for Security-Constrained Applications
Round 1
Reviewer 1 Report
Highlight the key contribution in end of introduction
Make abstract short and more descriptive
Related work part add table to compare other works.
It is suggested to discuss some papers of different secruity applications like discuss the following paper "A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT" and "Robust watermarking algorithm for medical images based on log-polar transform"
Conclusion part add future contribution
Limitations of this study are needs to be highlighted
Fig 2 is bit scaled out, make it more scientific
Author Response
Author's Notes to Reviewer1
- Highlight the key contribution in end of introduction
Revised and highlighted duly: End of introduction section
- Make abstract short and more descriptive
Revised and highlighted duly: Abstract
- Related work part add table to compare other works
Revised and highlighted duly: Added Table 1
- It is suggested to discuss some papers of different security applications like discuss the following paper "A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT" and "Robust watermarking algorithm for medical images based on log-polar transform"
Revised and highlighted duly: Section 1
- Conclusion part add future contribution
Revised and highlighted duly: Conclusion section
- Limitations of this study are needs to be highlighted
Revised and highlighted duly: Section 3
- Fig 2 is bit scaled out, make it more scientific
Revised and highlighted duly: Fig 2
Reviewer 2 Report
In the context of Heterogeneous Networks (HetNets), the authors propose a new secure Vertical Handover (VHO) algorithm that improves the co-located Wi-Fi and UMTS networks in terms of packet loss, delay, and throughput. The performance of their proposed algorithm is verified in a set of scenarios. Results show that their proposal outperforms the Media Independent Handover (MIH) standard, which enables the seamless transfer of connections among HetNets, in terms of delay, handover time, throughput, and packet loss.
To summarize my opinion, it is a good work with significant interesting results. Some minor issues are as follows :
- Figure 1 is too big and does not provide a good description of the different VHO phases.
- In line 172, the section title should be replaced by "Design of the Proposed Algorithm."
- You should improve the resolution of the flowchart in Figure 2 to improve its readability.
- In the conclusion, the authors mention in lines 331 and 332 "with various numbers of MUs", but in Table 2, the number of MUs is fixed at 50 for the whole simulation. Please double-check that.
- Some reference details are missing. e.g., the edition number should be added to the reference [10,12,14]. Please double-check that.
Author Response
Author's Notes to Reviewer2
- Figure 1 is too big and does not provide a good description of the different VHO phases
Revised and highlighted duly: Figure 1
2. In line 172, the section title should be replaced by "Design of the Proposed Algorithm."
Revised and highlighted duly: The section 3 title
3. You should improve the resolution of the flowchart in Figure 2 to improve its readability
Revised and highlighted duly: Figure 2
4. In the conclusion, the authors mention in lines 331 and 332 "with various numbers of MUs", but in Table 2, the number of MUs is fixed at 50 for the whole simulation. Please double-check that
Revised and highlighted duly: Table 3 & Conclusions section
5. Some reference details are missing. e.g., the edition number should be added to the reference [10,12,14]. Please double-check that
Revised and highlighted duly: References [10, 12, 14]
Round 2
Reviewer 1 Report
Author addressed all queries, need minor improvements before acceptance.
Language improvement is required. i.e, abstract "In Heterogenous" no need of in.
Introuction part define abbrivations. first paragraph MU is missing abbrivation.
Dataset should be defined bit more
Discussing transformation secruity "Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform" and log polar security "Robust watermarking algorithm for medical images based on log-polar transform" in introduction part will increase significance of introduction.
Conclusion part dont add references, move reference before conclusion
Figure 7 y axis unit is missing
Author Response
Author's Notes to Reviewer1
Author addressed all queries, need minor improvements before acceptance.
Thank you for your time to review our paper.
- Language improvement is required. i.e, abstract "In Heterogenous" no need of in. We checked the mentioned sentence but if we remove the word of “in”, the entire structure of the sentence will become ambiguous. However, we kindly request the reviewer to check similar changes if it is further needed.
- Introduction part define abbreviations. first paragraph MU is missing abbreviation. Revised duly: Introduction section.
- Dataset should be defined bit more. We are not simulating the proposed algorithm with the existing or new datasets. However, we have explained the working of the simulation scenario in Section 4.
- Discussing transformation security "Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform" and log polar security "Robust watermarking algorithm for medical images based on log-polar transform" in introduction part will increase significance of introduction. Revised duly: Introduction section.
- Conclusion part don’t add references, move reference before conclusion. Revised duly: Conclusion section.
- Figure 7 y axis unit is missing. In Figure 7, the Y-axis presents the number of frequent handovers. Therefore, there is no need of unit for a number. We have revised it to be "number of frequent handovers", accordingly.