Next Article in Journal
Dynamic-Breakdown of the Ball-Screw Inerter in ISD System
Previous Article in Journal
Sol-Gel Synthesis of Caffeic Acid Entrapped in Silica/Polyethylene Glycol Based Organic-Inorganic Hybrids: Drug Delivery and Biological Properties
Previous Article in Special Issue
Stride-TCN for Energy Consumption Forecasting and Its Optimization
 
 
Article
Peer-Review Record

Designing a Vertical Handover Algorithm for Security-Constrained Applications

Appl. Sci. 2023, 13(4), 2166; https://doi.org/10.3390/app13042166
by Omar Khattab *, Murad Khan and Basil Alothman
Reviewer 1:
Reviewer 2:
Appl. Sci. 2023, 13(4), 2166; https://doi.org/10.3390/app13042166
Submission received: 12 January 2023 / Revised: 2 February 2023 / Accepted: 6 February 2023 / Published: 8 February 2023
(This article belongs to the Special Issue Advances in Applied Smart Mobile Media & Network Computing)

Round 1

Reviewer 1 Report

Highlight the key contribution in end of introduction

Make abstract short and more descriptive

Related work part add table to compare other works.

It is suggested to discuss some papers of different secruity applications like discuss the following paper "A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT"  and "Robust watermarking algorithm for medical images based on log-polar transform"

Conclusion part add future contribution

Limitations of this study are needs to be highlighted

Fig 2 is bit scaled out, make it more scientific 

 

 

Author Response

Author's Notes to Reviewer1

  1. Highlight the key contribution in end of introduction

Revised and highlighted duly: End of introduction section

  1. Make abstract short and more descriptive

         Revised and highlighted duly: Abstract

  1. Related work part add table to compare other works

Revised and highlighted duly: Added Table 1

  1. It is suggested to discuss some papers of different security applications like discuss the following paper "A Multi-Watermarking Algorithm for Medical Images Using Inception V3 and DCT"  and "Robust watermarking algorithm for medical images based on log-polar transform"

Revised and highlighted duly: Section 1

  1. Conclusion part add future contribution

Revised and highlighted duly: Conclusion section

  1. Limitations of this study are needs to be highlighted

Revised and highlighted duly: Section 3

  1. Fig 2 is bit scaled out, make it more scientific 

         Revised and highlighted duly: Fig 2

Reviewer 2 Report

In the context of Heterogeneous Networks (HetNets), the authors propose a new secure Vertical Handover (VHO) algorithm that improves the co-located Wi-Fi and UMTS networks in terms of packet loss, delay, and throughput. The performance of their proposed algorithm is verified in a set of scenarios. Results show that their proposal outperforms the Media Independent Handover (MIH) standard, which enables the seamless transfer of connections among HetNets, in terms of delay, handover time, throughput, and packet loss.

To summarize my opinion, it is a good work with significant interesting results. Some minor issues are as follows :

 

  1. Figure 1 is too big and does not provide a good description of the different VHO phases.
  2. In line 172, the section title should be replaced by "Design of the Proposed Algorithm."
  3. You should improve the resolution of the flowchart in Figure 2 to improve its readability.
  4. In the conclusion, the authors mention in lines 331 and 332 "with various numbers of MUs", but in Table 2, the number of MUs is fixed at 50 for the whole simulation. Please double-check that.
  5. Some reference details are missing. e.g., the edition number should be added to the reference [10,12,14]. Please double-check that. 

Author Response

Author's Notes to Reviewer2

  1. Figure 1 is too big and does not provide a good description of the different VHO phases

Revised and highlighted duly: Figure 1

      2. In line 172, the section title should be replaced by "Design of the                          Proposed Algorithm."

          Revised and highlighted duly: The section 3 title

      3. You should improve the resolution of the flowchart in Figure 2 to improve            its readability

          Revised and highlighted duly: Figure 2

      4. In the conclusion, the authors mention in lines 331 and 332 "with various              numbers of MUs", but in Table 2, the number of MUs is fixed at 50 for the            whole simulation. Please double-check that

           Revised and highlighted duly: Table 3 & Conclusions section

      5. Some reference details are missing. e.g., the edition number should be                  added to the reference [10,12,14]. Please double-check that

          Revised and highlighted duly: References [10, 12, 14]

Round 2

Reviewer 1 Report

Author addressed all queries, need minor improvements before acceptance.

Language improvement is required. i.e, abstract "In Heterogenous" no need of in.

Introuction part define abbrivations. first paragraph MU is missing abbrivation.

Dataset should be defined bit more

Discussing transformation secruity "Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform" and log polar security "Robust watermarking algorithm for medical images based on log-polar transform" in introduction part will increase significance of introduction.

Conclusion part dont add references, move reference before conclusion

Figure 7 y axis unit is missing

 

 

Author Response

Author's Notes to Reviewer1

Author addressed all queries, need minor improvements before acceptance.

Thank you for your time to review our paper.

  1. Language improvement is required. i.e, abstract "In Heterogenous" no need of in.                                                                                                        We checked the mentioned sentence but if we remove the word of “in”, the entire structure of the sentence will become ambiguous. However, we kindly request the reviewer to check similar changes if it is further needed.
  1. Introduction part define abbreviations. first paragraph MU is missing abbreviation.                                                                                                    Revised duly: Introduction section.
  1. Dataset should be defined bit more.                                                          We are not simulating the proposed algorithm with the existing or new datasets. However, we have explained the working of the simulation scenario in Section 4.
  1. Discussing transformation security "Robust watermarking algorithm for medical images based on accelerated‐KAZE discrete cosine transform" and log polar security "Robust watermarking algorithm for medical images based on log-polar transform" in introduction part will increase significance of introduction.                                                                    Revised duly: Introduction section.
  1. Conclusion part don’t add references, move reference before conclusion.    Revised duly: Conclusion section.
  1. Figure 7 y axis unit is missing.                                                                       In Figure 7, the Y-axis presents the number of frequent handovers. Therefore, there is no need of unit for a number. We have revised it to be "number of frequent handovers", accordingly.
Back to TopTop