Next Article in Journal
Research on the Cultural Landscape Features and Regional Variations of Traditional Villages and Dwellings in Multicultural Blending Areas: A Case Study of the Jiangxi-Anhui Junction Region
Previous Article in Journal
Utilization of By-Products from the Fruit and Vegetable Processing Industry in Pasta Production
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks

1
Faculty of Information Engineering, Xi’an University, Xi’an 710065, China
2
Faculty of Automation and Information Engineering, Xi’an University of Technology, Xi’an 710048, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(4), 2188; https://doi.org/10.3390/app15042188
Submission received: 12 December 2024 / Revised: 15 February 2025 / Accepted: 16 February 2025 / Published: 18 February 2025

Abstract

:
This paper addresses the handover challenge in indoor visible light communication and Wi-Fi heterogeneous networks, proposing an adaptive handover strategy based on user trajectory prediction. Extracting meaningful and important location points from massive trajectory data for clustering, an improved hidden Markov model is used to predict the user’s next location by analyzing the patterns of the user’s historical mobile trajectory data. The Q-learning algorithm is then used to determine the optimal network handover based on the current network state, while a seamless handover protocol is introduced to ensure successful network transition and uninterrupted data transmission. Compared with the traditional STD-LTE handover scheme, the proposed algorithm can reduce vertical handover rates by up to 32% during fast walking. When indoor user connections increase, the algorithm can maintain high fairness and high throughput when indoor user connections increase, verifying that it is robust in different scenarios.

1. Introduction

The widespread adoption of mobile networks has led to a dramatic rise in the number of Internet users in a short period of time. Additionally, the rapid development of the Industrial Internet has driven a sharp increase in the number of mobile devices accessing the Internet and the demand for related applications [1]. Due to the gradual depletion of radio spectrum resources, Wireless Fidelity (Wi-Fi), which operates at 2.4 GHz, has a limited spectrum bandwidth, which restricts its ability to accommodate the rapidly increasing data traffic and bandwidth demands. Visible light communication (VLC) offers abundant spectrum resources and combines lighting and communication, and it has the potential to become the next generation of wireless communication technology [2]. The heterogeneous network formed by VLC complementing Wi-Fi can provide indoor users with faster, greener, and more reliable communication services. However, since the coverage areas of the two networks overlap with each other in real scenarios, the random movement of users between different access points will lead to frequent network handovers. Research on efficient user movement prediction algorithms and solving the problems of the reasonable selection of network access points have become important challenges for heterogeneous communication networks.
Depending on whether the network belongs to the same technology mode before and after the handover, the handover mode can be categorized into two types [3]: vertical handover (VHO) and horizontal handover (HHO). HHO refers to the handover between the same technology, while VHO refers to the handover between different technologies. In indoor VLC/Wi-Fi heterogeneous networks, there is more literature on optimizing the VHO problem, and all of these studies have achieved specific results. Bao et al. proposed a handover decision mechanism based on channel-adaptive dwell time, which dynamically adjusts the dwell time to adapt to changes in the network environment [4]. Okine et al. proposed a hybrid application-aware VHO scheme that combines network state and application requirements (e.g., delay, bandwidth) to optimize the handover decision [5]. Babalola et al. predicted VHO using a hidden Markov model [6]. Liang et al. proposed combining a hierarchical analysis method with a cooperative game model to decide whether to perform VHO [7].
The VHO decision scheme implies a direct transfer to Wi-Fi for communication when the quality of VLC communication is degraded or interrupted. However, too many connections can easily lead to Wi-Fi overload and reduce system performance. To solve the network selection problem, Wu et al. proposed a centralized handover scheme using the statistical information of channel blocking [8], which employs optimization techniques to maximize the overall system throughput. Some scholars proposed using fuzzy logic [9] and artificial neural networks [10] in indoor heterogeneous networks. These methods optimize handover decisions using system parameters such as channel state information, user speed, and data rate. However, fuzzy logic rules must be predefined and adjusted, increasing practical applications’ complexity and maintenance cost. Artificial neural networks need many iterations to reach a stable state. An analysis of the above literature reveals that none of these studies consider the actual scenarios of mobile users. Additionally, they all suffer from high computational complexity and frequent handovers.
To better adapt to the dynamic needs of mobile users, trajectory prediction techniques can be introduced into indoor heterogeneous networks, avoiding the problem of frequent handovers caused by relying on a single piece of information (e.g., received signal strength) in the traditional methods. In indoor space, the density-based spatial clustering of applications with noise (DBSCAN) algorithm [11,12] is mainly used to mine mobile users’ trajectory features. Cheng et al. converted indoor location data into a sequence of stationary points with semantic information and clustered the trajectories using the DBSCAN algorithm [13]. Lan et al. utilized a density clustering algorithm to cluster the trajectories and computed the similarity between trajectories to identify the anomalous trajectories [14]. Laursen et al. proposed a tracking algorithm based on hidden Markov models (HMM) to predict indoor user trajectories [15]. Qiao et al. proposed methods that can adaptively change the HMM parameters to realize the prediction of different types of user trajectory data [16]. Wang et al. proposed a Markov chain-based campus trajectory prediction model by building a state transfer matrix to describe the transfer probabilities between different times and locations [17]. Existing studies show that traditional methods mainly cluster the spatial density of trajectory points. However, these methods ignore key features in the trajectory, such as time, direction, and speed. Directly analyzing the raw data will have the problem of a more extensive sample set, and the temporal performance of the convergence of the clustering is not quite in line with the expectation. In the aspect of the trajectory prediction, the prediction by using the traditional HMM will still have the inaccurate results. This is because the state transfer probability matrix describes the probability of a user moving from one location to another. Existing research does not take into account the problem that the user stays in a location for too long, which leads to a state transfer probability of 0 and partial prediction failure.
To address these problems, this paper proposes a network handover algorithm based on predicting the user’s mobile trajectory. The algorithm applies to VHO and HHO problems in indoor VLC/Wi-Fi heterogeneous networks. It reduces the number of handovers while improving system throughput, providing users with more stable and reliable communication services. The main contributions of this paper can be summarized as the two following points:
1. Important location points are extracted from the massive trajectory data to be clustered using the DBSCAN algorithm, and the clustering results are used as the hidden state of HMM to predict the user’s next possible location. This avoids the problem of prediction failure caused by the state transfer probability matrix being zero during the prediction process by introducing a linear smoothing mechanism.
2. An adaptive network handover strategy based on Q-learning is proposed. The strategy selects the best network access point for the user by considering the current network state, user trajectory, and service quality. A seamless handover protocol is introduced throughout the handover process for seamless data transmission.
The rest of the paper is organized as follows: Section 2 presents the system model for VLC/Wi-Fi heterogeneous networks, including the channel model and optical path blocking model for VLC and Wi-Fi. Section 3 details the proposed network handover algorithm based on location prediction, mainly consisting of trajectory clustering, movement prediction, and seamless handover protocol. Section 4 verifies the effectiveness of the algorithm in this paper. Finally, Section 5 summarizes this paper and outlines future research directions.

2. System Model

Figure 1 shows the indoor VLC/Wi-Fi heterogeneous network transmission model. Sixteen VLC access points (APs) are deployed in an array on the ceiling for downlink data transmission. At the same time, Wi-Fi AP are centrally located on the ceiling for uplink and partial downlink data transmission. The receiver is equipped with a photoelectric detector. All VLC APs and Wi-Fi APs are connected to a central controller via power lines [18]. The central controller monitors real-time communication transmission, collects channel status information at intervals, and manages user data.

2.1. VLC Channel Model

The indoor VLC channel model consists of both line-of-sight (LOS) and non-line-of-sight (NLOS) links. Although NLOS can provide complementary communication through reflected signals, its received power is typically more than 7 dB lower than the worst line-of-sight link [19]. The path loss of NLOS signals in typical indoor environments (e.g., an office or a factory) with wall reflectivity of about 0.7 can be expressed as follows:
P NLOS = P t H LOS ρ A eff ( d 1 + d 2 ) 2 cos m ( ϕ ) cos ( θ )
where ρ is the reflectivity, P t is the transmit power, H LOS is the channel gain of the LOS link, A eff is the effective receiving area of the receiver, ϕ is the LED transmitting angle, ψ is the PD receiving angle, and m = ln 2 / ln ( cos ϕ 1 / 2 ) is the Lambertian radiation coefficient; d 1 and d 2 are the distances from the transmitting end to the reflecting surface and from the reflecting surface to the receiving end, respectively. Komine T. et al. experimentally determined that the reflected light’s contribution to the total received power of the receiver contribution is very low [20]. As shown in Figure 2, direct light occupies the vast majority of the received light, as high as 95.16%, and the proportion of primary and secondary reflected light is relatively low due to the secondary path loss and reflection efficiency limitations and the NLOS is significantly affected by multipath interference and dynamic masking. Therefore, this paper uses LOS as the primary channel model for indoor visible light communication to study the network handover problem under this link.
The optical channel gain from VLC AP to the user is expressed as
H i , j VLC ( 0 ) = ( m + 1 ) A eff 2 π D i , j 2 cos m ϕ T s ( ψ ) g ( ψ ) cos ( ψ ) , 0 ψ ψ c 0 , ψ > ψ c
where m = ln 2 / ln ( cos ϕ 1 / 2 ) is the Lambertian radiation coefficient; A eff is the effective receiving area of the receiver; D i , j is the linear distance between the transmitter and receiver; ϕ is the light-emitting diode emission angle; ψ is the photoelectric detector receiving angle; T s ( ψ ) is the optical filter gain; g ( ψ ) is the optical concentrator gain; and ψ c is the receiver half field angle, which determines whether the user can receive the optical signal from the line-of-sight link. The optical concentrator gain is given by [21]
g ( ψ ) = n 2 sin 2 ψ c , 0 ψ ψ c 0 , ψ ψ c
where n is the refractive index of the optical receiver. The signal-to-interference-plus-noise ratio (SINR) of user j served by VLC AP i is expressed as
ξ i , j VLC = [ γ P t VLC H i , j VLC ( 0 ) ] 2 k K [ γ P t VLC H k , j VLC ( 0 ) ] 2 + N VLC B VLC
where γ is the photoelectric conversion coefficient of the receiver; P t VLC is the transmitting power; K is the interference set of VLC APs; H k , j VLC ( 0 ) is the interference channel gain of AP to user j ; N VLC is the noise power spectral density (approximately 1 × 10−21 in an indoor environment), and B VLC is the bandwidth of the visible light communication system.

2.2. Wi-Fi Channel Model

The Wi-Fi channel gain for user j is expressed as
G WiFi j = H WiFi 2 10 L ( d j ) + X σ 10
where H WiFi is the channel transfer function, which follows the standard Rayleigh distribution; X σ represents shadow fading in the Wi-Fi channel, typically modeled using a zero-mean lognormal distribution to simulate the random variation in signal strength due to obstacles, with a standard deviation of 10   dB [22]; L ( d j ) denotes the free-space path loss, and d j is the length of the communication link between Wi-Fi AP and user j . The signal-to-noise ratio (SNR) between the Wi-Fi router and user j is formulated by
ξ WiFi j = G WiFi j P WiFi N WiFi B WiFi
where N WiFi is the power spectral density of the noise at the receiver, while B WiFi and P WiFi represent the system bandwidth and transmit power of the Wi-Fi AP, respectively.

2.3. Light-Path Blockage

In downlink visible light communication, the optical path blockage will affect the signal transmission quality. This paper uses two parameters, namely the occurrence rate and occupation rate, to model optical path obstruction. The occurrence rate denoted by λ u is defined as the average number of blockages occurring in the optical path per unit of time. To quantify the effect of blockages, it is assumed that they follow the Poisson point process, which is generally used to model unpredictable stochastic events. The occupation rate η u is defined as the proportion of time occupied by the optical path blockage. The range is 0 < η u < 1 [23].
In practice, when obstacles are near the transmitter or receiver, the LOS path is blocked, leading to a significant reduction in signal-to-noise ratio. User equipment (UE) receives minimal signals from LOS but may detect some NLOS signals. However, the total received signal power from the NLOS path is typically less than 20% [24]. In this paper, it is assumed that the received signal strength of UE is zero during the blockage period.

3. Network Handover Algorithm Based on Location Prediction

The network algorithm based on location prediction is divided into six parts, as shown in Figure 3. The indoor trajectory grid sequence is formed based on the mobile trajectory data matched by the central controller during signal acquisition. The historical mobility data are analyzed using data mining techniques to form trajectory clusters, and trajectory location prediction is conducted with the HMM. The mobility prediction module predicts the subsequent trajectory based on the user’s current position. The network at the predicted locations prepares in advance to minimize the handover failures caused by handover peaks and adjusts the handover management parameters accordingly.

3.1. Parameter Definition

A single moving trajectory point as follows
p = { p p = ( x , y , t i m e , a n g l e ) }
The sequence of moving trajectories, consisting of multiple moving trajectory points in chronological order, as follows
o r i g i n a l T r a i l = { p 1 , , p n }
Based on the historical trajectory data, the shortest distance between two neighboring and non-repeating trajectory points in the indoor space is calculated, which is defined as the unit length, as follows
d ( p i , p j ) = ( x i x j ) 2 + ( y i y j ) 2
According to the defined unit length, the indoor space model is meshed to generate a meshed indoor space model. The collected trajectory data are projected according to the grid model, and a grid sequence is generated as follows
g r i d S e q u e n c e = { g 1 , g 2 , , g m } , g i = { i d , s t o p t i m e , a n g l e }
where i d is the grid number, s t o p t i m e is the user dwell time, a n g l e is user deflection direction.
User dwell time: In a grid cell, if multiple trajectory points belong to the same grid but at different times, the time difference between these points is called dwell time. If the dwell time exceeds the predefined threshold, the grid cell is considered a dwell state, as shown in Equation (11).
s t o p t i m e = 0 , g j [ i d ] g i 1 [ i d ] g i k [ t i m e ] g i 1 [ t i m e ] < δ t g i k [ t i m e ] g i 1 [ t i m e ] , g i k [ i d ] = g i 1 [ i d ]
Due to the large scale of indoor mobile object trajectories and their redundant characteristics, the original trajectory data include many repetitive and consecutive trajectory points. The large trajectory dataset consumes significant storage space. Therefore, the original trajectory needs to be preprocessed.
The specific steps are as follows:
  • The deflection angle is obtained by calculating the angle between two trajectory points, which serves as the basis for analyzing changes in trajectory direction.
  • The user’s residence time is calculated based on its definition. Redundancies in the trajectory sequence are supplemented to ensure data integrity, facilitating the analysis of user behavior within the grid area.
  • The deflection angle is standardized. The angle interval is divided into eight non-overlapping sub-intervals, and the number of sub-interval angles is counted to analyze the user’s movement distribution and enrich the trajectory prediction.

3.2. Trajectory Clustering

DBSCAN algorithm is a density-based spatial clustering algorithm. It uses a region with sufficient density as the distance center and connects samples of the same category. These connected samples continuously expand the region, this process known as clustering. In dealing with spatiotemporal trajectory data, DBSCAN can effectively deal with data with uneven density. Mobile trajectories are usually not uniformly distributed; for example, an important machine next to the work console and other locations may be very dense. DBSCAN can automatically adapt to the density distribution of the data through the density threshold and fast clustering. In the data collection, there will be noise points caused by measurement errors. DBSCAN can categorize low-density points as “noise” without forcing them to belong to a specific clustering, which makes DBSCAN highly robust when dealing with mobile trajectory data.
The residence time of the user in a particular state and the density of trajectories passing through a grid cell can highlight the importance of that location, such as near a key machine or working console. These important locations are extracted from the processed trajectory data. Then, the DBSCAN algorithm is used to identify high-density regions and group them into clusters. The definition of important location points is provided in Equation (12). A location is regarded as important if any one of the three conditions is satisfied.
s t o p t i m e > δ t n u m ( a n g l e ) > δ a , ( π 4 a n g l e 7 π 4 ) N > δ n
where s t o p t i m e is the dwell time, and δ a is the threshold for the number of deflection angles. In this paper, we assume that user behavior changes when π 4 a n g l e 7 π 4 , and δ n is the threshold for the number of grid trajectory points.

3.3. Movement Prediction

In this section, clusters generated from clustering important location points in Section 3.2 are utilized as hidden states, and the HMM predicts user movement trajectories. The parameters of the HMM are defined as follows:
Hidden state sequence C : Hidden state sequences are generated by clustering historical grid trajectory sequences { C 1 , C 2 , C m } .
Observed state sequence O : Define the sequence of grid trajectories { g 1 , g 2 , g n } as the observation state.
The state transfer probability matrix A :
A = a 11 a 12 a 1 m a 12 a 12 a i j a i i a m 1 a m 2 a m m , j = 1 m a i j = 1
where a i j represents the state transfer probability between hidden states C i and C j . To satisfy the constraints of the state transfer probability matrix A , a i j is first normalized, and then a i j is calculated.
a i j = [ β a ( i j ) , β s t ( i j ) , β d i s ( i j ) ] ω a ω s t ω d i s
where β a ( i j ) denotes the normalized angular eigenvalue between C i and C j , β s t ( i j ) represents the residence time eigenvalue of C i , β d i s ( i j ) is the reciprocal of the Euclidean distance between C i and C j , and ω a ω s t ω d i s denotes the weight set for the three eigenvalues.
Observation probability matrix B :
B = b 11 b 12 b 1 n b 21 b 2 n b i j b i i b m 1 b m 2 b m n , j = 1 n b i j = 1
where b i j is the transfer probability between grid cells and the clusters of the hidden state sequences, to satisfy the constraints of the state transfer probability matrix B , b i j is first normalized, and then b i j is obtained.
b i j = 1 , g j C i γ a ( i j ) , γ d i s ( i j ) w a w d i s , g j C i
where g j is the grid cell, γ a ( i j ) is the eigenvalue of the normalized angle between C i and g j , and γ d i s ( i j ) is the inverse of the Euclidean distance between C i and g j .
Initial state probability matrix λ = [ 0 , , 1 k , 0 , 1 k , , 0 ] T , the k clusters neighboring indoor entrances are selected and their initial states are set to be uniformly distributed with an initial state probability of 1 k and the rest of the state probabilities are zero.
After determining the parameters of each part of the HMM, we train the model using the Baum–Welch algorithm [25]. In user movement, the user may stay at a specific location for a long time, resulting in the continuous trajectory points projected to the same cluster. The state transfer probability a i j of the classical HMM may become zero, which will cause the prediction failure, and this problem can be solved by introducing a smoothing factor ε a . The user dwell time obeys a long-tailed distribution. Find the maximum dwell time for all grids in cluster C t , as shown in the following equation.
s t o p t i m e ( C t ) = max 1 v k ( s t o p t i m e ( g t v ) )
where g t v denotes the grid point v in Cluster C t , k is the number of grid points in Cluster C t . s t o p t i m e ( C t ) denotes the maximum value of dwell time for all grid points g t v in Cluster C t .
The residence time is mapped using a mapping function L ogistic in the range of [0,1] as follows:
ε a = L ogistic ( s t o p t i m e ( C t ) ) , 0 < ε a max ( a t z )
The smoothing factor ε a dynamically adjusts the state transfer probability. This ensures that the state transfer probability does not drop to zero, even if the state residence time is extended, as follows:
a i j = ε a , i = j ( 1 ε a ) a i j , j i
By introducing ε a , a i j can obtain suitable non-zero values when continuously in the same cluster. In this way, the model can perform effective state transfer even in the case of consecutive identical cluster sequences, avoiding the problem of prediction failure.
After obtaining the trained HMM, we use the Viterbi algorithm for location prediction. We return the obtained maximum hidden state sequence to the grid cells within the cluster, which is the location where the user is most likely to move.

3.4. Seamless Network Handover

Q-learning is a reinforcement learning algorithm based on value iteration and independent of the environment state. It relies on the interaction between the agent and the environment to iteratively learn an optimal strategy and make the best decision. We apply this algorithm to network handover. Due to its low complexity and computational simplicity, it significantly simplifies the network handover implementation process. The algorithm identifies the optimal action for each corresponding state by continuing to explore the action-state space until convergence.
In this paper, the central controller is considered an agent that performs the assignment of network access points. Based on the network state S = ( s 1 , s 2 , s 3 ) , the greedy strategy selects the optimal action from set A = ( a 1 , a 2 , a 3 ) with probability 1 ε , derived from feedback on state transition and reward. Another action is randomly performed with probability ε . The detailed parameters are defined as follows:
  • State: S = ( s 1 , s 2 , s 3 ) ,where s 1 represents the current service network, either VLC or Wi-Fi; s 2 indicates the VLC coverage area to which the user will move in the future; and s 3 indicates the current quality of service, represented by 0 or 1, depending on whether the SINR is below or above the threshold (10 dB).
Action: A = ( a 1 , a 2 , a 3 ) ,where a 1 represents handover to the best VLC, a 2 represents handover to Wi-Fi, and a 3 represents no handover.
Reward function: The reward function combines the key elements of handover success, user satisfaction with the data rate, and handover cost.
R = I ζ β + ( 1 δ ) ( 1 β )
The parameters are defined as follows:
I { 0 , 1 } is the handover success identifier. If the handover is successful, then I = 1 ; if it fails, I = 0 .
ζ = r c u r r e n t r p r e v i o u s represents user satisfaction, which indicates the data rate ratio after handover compared to before handover. The higher the value of ζ , the more significant the improvement in the data rate the user experiences after handover, leading to greater satisfaction with the network service.
δ represents the handover cost. HHO involves only handover between the APs of the same technology and has a low latency of approximately 200 ms. VHO requires cross-technology negotiation and resource reconfiguration. It incurs a higher latency, approximately 500 ms [26]. Based on the measured data and the literature [26], the handover cost is set to δ N H O = 0 , δ H H O = 0.3 , and δ V H O = 0.7 , respectively, to quantify the difference in resource overhead for different handover types.
β { 0 , 1 } is a tradeoff between the data rate and the number of handovers. When β = 1 , the reward function simplifies to R = I ζ . At this point, the reward favors actions that achieve the maximum data rate, with less consideration given to the number of handovers required. In this case, the algorithm will prioritize pursuing a high data rate, even if it may result in more handover actions. When β = 0 , the reward function becomes R = I ( 1 δ ) . At this point, the algorithm prioritizes minimizing the number of handovers. It may sacrifice some data rate to reduce handovers.
Since handover introduces data overhead in addition to information transmission, it can degrade the system performance. Therefore, this paper introduces a sequence number (SN) state synchronization mechanism and an acknowledgment number (Ack) mechanism within the transmission control protocol [27] during network handover to ensure seamless handover and uninterrupted data transmission, as depicted in Figure 4. The specific implementation process is as follows:
  • The central controller periodically collects the user’s location and network status parameters.
  • When the central controller decides that network handover is required, it sends a handover request to the target AP, and the target AP returns an Ack as a handover confirmation.
  • During handover decisions, the central controller sends an SN status request to the UE to synchronize downlink data transmission. It then forwards the SN status reported by UE to the target AP to ensure data continuity.
  • Throughout the negotiation process, the UE maintains communication with the original network until the handover is successful.
In Figure 4, during each iteration, the agent initially observes the environmental state at the current time t and selects an action based on the greedy strategy to obtain immediate rewards. Next, the agent updates the Q-value corresponding to the current state and action based on the maximum expected discounted reward max Q ( s t + 1 , a ) at time t + 1 . The Q-value update equation is as follows:
Q ( s , a ) Q ( s , a ) + α [ r + γ max Q ( s t + 1 , a ) Q ( s , a ) ]
where α represents the learning rate, which affects the update speed of the Q table; r denotes the immediate reward; γ is the discount rate, representing the impact of future rewards on the current step. When γ 0 , the agent focuses more on the reward obtained by the current action; when γ 1 , the agent considers future rewards more heavily. max Q ( s t + 1 , a ) represents the maximum Q value among the available actions in the next state. This process is repeated until the final state is reached, marking the completion of a learning episode. Through repeated learning, the algorithm gradually learns the optimal action for each state, corresponding to the behavior that maximizes the long-term reward in each state, forming the optimal policy set. Over time, the exploration rate gradually decreases, the algorithm gradually shifts from the initial exploration to exploiting the best-known strategy.

4. Discussion

The simulation parameters for the indoor VLC/Wi-Fi heterogeneous network are shown in Table 1. The maximum number of iterations for the algorithm is set to 3000, with the ε , α , and γ set to 0.1, 0.5, and 0.2, respectively. In this paper, two schemes are introduced for comparison with the proposed algorithms: the traditional standard STD-LTE handover scheme and the improved fuzzy logic handover scheme (FL-HO) [28], with the handover threshold and trigger time set to 1 dB and 320 ms, respectively.

4.1. Performance Indicators

(1)
Throughput
Throughput is a key measure of a user’s data transmission efficiency in a wireless network. It represents the amount of actual data successfully transmitted per unit of time. The throughput calculation in this paper takes into account the user’s SNR and the type of network connected (VLC or Wi-Fi), and the throughput calculation is expressed as:
r j = B VLC 2 log 2 1 + e 2 π ξ VLC i , j , for   VLC   AP B WiFi log 2 1 + ξ WiFi j , for   WiFi   AP
where ξ VLC i , j and ξ WiFi j are the SNR between the user and the AP, and B VLC and B WiFi are the bandwidths of VLC and Wi-Fi, respectively.
(2)
Handover rate
The handover rate is an important measure of the frequency of the handover in a network. It is often used to evaluate the efficiency and stability of network handover algorithms. The calculation of the handover rate is expressed as follows:
Handover Rate = N HO T
where N HO is the number of handovers occurring during the observation time T . Frequent handover not only consumes additional network resources but also interrupts data transmission, significantly affecting the user experience and the overall stability of the network.
(3)
Fairness
Jain’s fairness index is an important index to measure the fairness of resource allocation in network handover, and the calculation of fairness is expressed as:
J = i = 1 N x i 2 N i = 1 N ( x i ) 2
where N denotes the number of users and x i denotes the amount of resources allocated to the user (e.g., bandwidth, throughput), which in this paper refers to the user’s throughput. The range of values is [0, 1]. This index can help evaluate whether users have fair access to network resources when the handover is between different access technologies. A high fairness index implies that the difference in throughput between users is slight, and the allocation of network resources is more balanced.

4.2. Performance Analysis

4.2.1. Trajectory Prediction Analysis

In order to verify the influence of the parameters on the prediction accuracy, this paper tests the influence of different values of the smoothing factor ε a on the prediction accuracy, as shown in Table 2. The experiments show that, when ε a varies from 0 to 1, the model’s prediction accuracy tends to increase and decrease. The accuracy is highest when ε a = 0.5 . When ε a < 0.3 , the model cannot effectively alleviate the user stay problem. When ε a > 0.7 , excessive smoothing leads to the loss of trajectory dynamic features and a significant increase in the error rate. This indicates that moderate smoothing can effectively alleviate the problem of zero-state transfer probability, but excessive smoothing will blur the dynamic characteristics of the trajectory.
This paper selects five sets of user trajectories from the dataset to simulate both the classical and the improved HMM. Figure 5 illustrates the comparison of prediction errors before and after the improvement, showing that the prediction error rate of the classical HMM is generally higher than that of the improved HMM. This is because the indoor space is limited, causing mobile objects to be constrained in their movement, resulting in many repetitive trajectories. Consequently, the classical HMM will have a transition probability of 0, leading to prediction failure. On the other hand, the improved HMM enhances the prediction accuracy by addressing the state dwell problem.
Figure 6 compares the prediction accuracy under different data repetition rates. It shows that the difference in prediction accuracy between the classical and improved HMM is slight when the trajectory repetition rate is low. However, as the user continues to move and the trajectory repetition rate increases, the rate of decrease in the prediction accuracy for the classical HMM becomes more extensive. In contrast, the decrease for the improved HMM is more minor.

4.2.2. Network Handover Analysis

(1)
Average throughput
Figure 7 demonstrates the variation of system throughput with user speed. It can be seen that when the user speed is low (v < 1 m/s), the difference in throughput among the three handover methods is not apparent. As the user speed increases, the channel conditions change more frequently, leading to an increase in the number of handovers and a decrease in throughput. At normal walking speed (v = 2 m/s), the throughput is slightly higher than the two compared algorithms. This is because the method in this paper still maintains a specific exploratory ability while accumulating certain knowledge and can better adapt to the dynamically changing network environment. The handover mechanism of STD-LTE is based on a fixed threshold that triggers frequent handovers in the face of fast user movement, which reduces the adequate transmission time. The decision rule of the FL-HO scheme is fixed, and the decision-making is not precise enough in high-speed movement. In contrast, the algorithm in this paper is based on user trajectory prediction and reinforcement learning, which can dynamically adjust the handover strategy according to the network state. When the user is moving at low speed or in a stationary state, the decision-making process is slower and the algorithm accumulates less experience. As a result, the throughput is lower than that of the FL-HO algorithm at v < 1.5 m/s. As the speed increases, the algorithm is triggered more frequently, and it can learn faster to select a more suitable network (e.g., Wi-Fi) for fast-moving users. When the user speed is 4 m/s, the throughput of the algorithm in this paper is about 42% higher than that of the traditional STD-LTE scheme and about 27% higher than that of the FL-HO scheme.
Figure 8 shows the variation of the system throughput with the number of room users in the case of humans’ normal indoor walking speed of 2 m/s. With the increase in the number of users, the throughput of STD-LTE and fuzzy logic methods gradually decreases, while the throughput of this paper’s algorithm remains relatively stable. When the number of users is 22–26 people, the throughput slightly decreases because of the increased competition for the system resources. However, it is still higher than the other two comparison algorithms. When the number of users reaches 26, the throughput is 462 Mbps, about 33% higher than the STD-LTE scheme, and about 15% higher than the FL-HO scheme.
Figure 9 demonstrates the effect of the different optical path-blocking incidence λ on the system throughput, where the number of users in the room is set to 15 and the speed is 2 m/s. The optical path blocking rate indicates the average number of times that the optical path is blocked per unit of time. Modeling the optical path blocking as a Poisson process, uniformly distributed between 0 and 1, ensures that the average number of blocking events occurring per unit of time is constant and each blocking event occurs independently. When λ = 2 , the frequency of blockings are low, and handovers are primarily driven by user mobility. The throughput of our proposed scheme is 28% higher than that of STD-LTE scheme. The FL-HO scheme which also considers user mobility in its decision-making process has a performance close to that of the proposed scheme when λ is low. As λ increases, the throughput of all schemes decreases. However, the decreasing trend of our proposed scheme is slower. When λ increases from 2 times/minute to 10 times/minute, the throughput achieved by the proposed scheme drops from 461 Mbps to 408 Mbps (only 11%). The throughput of STD-LTE decreases by 35%, and the throughput of FL-HO decreases by 22%. This demonstrates that our algorithm maintains a good performance even under frequent optical path blockings.
(2)
Handover rate
Figure 10 discusses the changes in the horizontal and VHO rates due to different speeds. As users traverse the network coverage areas at higher speeds, the handover rate increases proportionally. When speed increases from 0.5 m/s to 4.0 m/s, the horizontal and VHO rates show a general upward trend across all schemes, but the handover rate of the proposed algorithm rises more gradually. When v = 4 m/s, the proposed algorithm reduces the HHO rate by 42% and 26%, and the VHO rate by 32% and 15% compared to STD-LTE scheme and FL-HO scheme. This occurs because the proposed algorithm dynamically adjusts its handover strategy based on current network conditions, learning through interactions with the environment. Therefore, as user speed increases, the learning process accelerates with more frequent handovers, allowing the decision-making process to find the optimal action for future states more quickly.
Figure 11 shows the variation of the handover rate for different optical path-blocking scenarios. When the optical path blockage occurs, the UE needs to handover to other access points, increasing the handover rate, verified for both comparison schemes in the figure. In contrast, our proposed scheme reduces the HHO rate from 0.48 to 0.31 as optical path blockings increase. This reduction occurs because our scheme predicts the user’s next position, identifies whether the user will enter a blocking region, and avoids unnecessary handovers in these areas. When λ increases from 5 to 10 times per minute, the VHO rate increases from 0.53 to 0.62, a slight increase of 17%. At λ = 10 times per minute, the scheme proposed in this paper reduces the handover rate most significantly, reducing the horizontal and vertical handover rates by 56% and 53%, respectively, compared to STD-LTE. Compared with the FL-HO scheme, it reduces the handover rate by 35% and 17%, respectively. While our algorithm demonstrates effectiveness in reducing the handover rate under typical conditions, the method struggles to precisely determine user positioning and optimal network access points under severe indoor interference scenarios. This limitation manifests particularly in industrial environments with electromagnetic interference affecting Wi-Fi transmission, or when randomly positioned obstacles disrupt VLC line-of-sight links, potentially triggering excessive network handovers.
(3)
User fairness
Figure 12 shows the variation of user fairness between different algorithms under different numbers of users. As can be seen from the figure, the fairness of STD-LTE decreases significantly with the increase in the number of users. When the VLC signal strength decreases, STD-LTE decides to handover based only on the signal strength, and users will handover to Wi-Fi for communication to pursue a better signal quality. However, the bandwidth resources of Wi-Fi APs are limited, and an increase in the number of user connections reduces the average available bandwidth per user, decreasing the average throughput. At the same time, VLC AP resources may remain underutilized, and the average throughput of users served by VLC APs may increase. This imbalance in resource allocation widens the throughput difference between users, leading to decreased fairness. The higher fairness of the scheme proposed in this paper and the FL-HO scheme is achieved because the FL-HO scheme constructs a centralized optimization problem, which takes the handover cost due to optical path blocking and user movement as the primary considerations. The scheme proposed in this paper can determine the user’s movement trend and demand in advance, and the designed reward function introduces the handover cost, balancing parameter, encouraging the algorithm to select the AP that can satisfy the user’s data rate demand and has low handover cost while guaranteeing the success of handover. For high-speed mobile users, the algorithm will tend to select Wi-Fi directly because the frequent handover to VLC may lead to the optical link blocking and low data rate, obtaining lower rewards; while for low-speed mobile users, direct HHO can obtain higher rewards, ensuring the fairness of the overall network.
(4)
Convergence case
Figure 13 shows the reward convergence of the algorithm for different numbers of user connections, and the number of iterations required for the algorithm to converge increases gradually with the number of people. This is due to the rise in network complexity, increase in state space and action space, increase in diversity of different users’ movement trajectories, data requirements, and optical link occlusion scenarios, resulting in the algorithm requiring more iterations to explore and learn from these complexities. Despite increasing users leading to slower convergence and lower reward values, the algorithm can gradually converge to a steady state, showing good robustness.

5. Conclusions

To improve the efficiency and stability of indoor VLC/Wi-Fi heterogeneous network handover, this paper proposes a network handover algorithm based on mobility trajectory prediction, suitable for VHO and HHO in heterogeneous networks. The algorithm simplifies the indoor spatial model, and by analyzing the user’s historical movement data and combining it with the improved HMM algorithm, the user’s position at the next moment can be accurately predicted, enabling more accurate handover decisions. Specifically, when the user speed is 4 m/s, the proposed algorithm improves throughput performance by approximately 42% compared to the traditional handover algorithm. As the number of users increases, the proposed algorithm better maintains high fairness. When the number of connected users reaches 26, the throughput is improved by about 33% over the traditional algorithm. In terms of handover rate, as the user speed increases, the algorithm proposed in this paper can reduce the HHO rate by 42% and the VHO rate by 32%.
Although the proposed algorithm performs well in most scenarios, the trajectory prediction module relies on the completeness and consistency of historical data. The prediction accuracy may decline when sudden changes occur in the user’s movement pattern or when the data are insufficient. An online learning framework can be introduced to enable the model to dynamically update parameters and adapt to changes in user behavior in real-time. The network handover algorithm proposed in this paper accounts for two key factors: user mobility and network signal quality. However, when additional environmental factors are introduced, such as network load and user preferences, the state space becomes more complex. As a result, Q-learning may experience slower convergence and higher computational complexity. Future research can further explore advanced multi-objective optimization methods to better balance these parameters. Moreover, advanced reinforcement learning algorithms can be implemented to handle high-dimensional state spaces, ensuring more stable communication services for users.

Author Contributions

Conceptualization, C.K. and M.W.; Data curation, C.K. and M.W.; Formal analysis, C.K.; Funding acquisition, C.K. and H.Q.; Investigation, C.K.; Methodology, C.K. and M.W.; Project administration, M.W.; Resources, M.W.; Software, M.W.; Supervision, C.K.; Validation, C.K., M.W., H.Q. and X.K.; Writing—original draft, M.W.; Writing—review and editing, C.K., M.W., H.Q. and X.K. All authors have read and agreed to the published version of the manuscript.

Funding

The National Natural Science Foundation of China [No. 61377080]; Special Research Program of Shaanxi Provincial Department of Education [22JK0530]; Xi’an Science and Technology Plan Project [No. 23KGDW0018-2023]; Natural Science Basic Research Program of Shaanxi [Program No. 2024JC-YBMS-557, 2024JC-YBMS-562]; Shaanxi Fundamental Science Research Project for Mathematics and Physics [Grant No. 23JSQ024]; Key Industrial Innovation Projects in Shaanxi Province [No. 2017ZDCXL-GY-06-01]; the Xi’an Science and Technology Plan [22GXFW0115]; the Scientific Research Team of Xi’an University [D202309].

Institutional Review Board Statement

This study did not require ethical approval.

Informed Consent Statement

This study did not require ethical approval.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Marshoud, H.; Muhaidat, S.; Sofotasios, P.C.; Hussain, S.; Imran, M.A.; Sharif, B.S. Optical Non-Orthogonal Multiple Access for Visible Light Communication. IEEE Wirel. Commun. 2018, 25, 82–88. [Google Scholar] [CrossRef]
  2. Liu, H.; Yang, S.; Chen, Y.; Yuan, X.; Chen, J.; Chen, K.; Chen, H. Resource allocation based on differentiated user services for indoor hybrid multi-color VLC/WiFi networks. Opt. Commun. 2023, 530, 129072. [Google Scholar] [CrossRef]
  3. Hu, Q.; Gan, C.; Gong, G.; Zhu, Y. Adaptive cross-layer handover algorithm based on MPTCP for hybrid LiFi-and-WiFi networks. Ad Hoc Netw. 2022, 134, 102923. [Google Scholar] [CrossRef]
  4. Bao, X.; Okine, A.A.; Adjardjah, W.; Zhang, W.; Dai, J. Channel adaptive dwell timing for handover decision in VLC-WiFi heterogeneous networks. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 1–15. [Google Scholar] [CrossRef]
  5. Okine, A.A.; Bao, X.; Mongoungou, J.; Adjardjah, W.; Zhang, W. A Hybrid Application-Aware VHO Scheme for Coexisting VLC and WLAN Indoor Networks. J. Netw. Syst. Manag. 2022, 30, 52. [Google Scholar] [CrossRef]
  6. Babalola, O.P.; Balyan, V. Vertical handover prediction based on hidden markov model in heterogeneous VLC-WiFi system. Sensors 2022, 22, 2473. [Google Scholar] [CrossRef]
  7. Liang, S.; Zhang, Y.; Fan, B.; Tian, H. Multi-attribute vertical handover decision-making algorithm in a hybrid VLC-femto system. IEEE Commun. Lett. 2017, 21, 1521–1524. [Google Scholar] [CrossRef]
  8. Wu, X.; Soltani, M.D.; Zhou, L.; Safari, M.; Haas, H. Hybrid LiFi and WiFi networks: A survey. IEEE Commun. Surv. Tutor. 2021, 23, 1398–1420. [Google Scholar] [CrossRef]
  9. Wang, Y.; Haas, H. Dynamic load balancing with handover in hybrid Li-Fi and Wi-Fi networks. J. Light. Technol. 2015, 33, 4671–4682. [Google Scholar] [CrossRef]
  10. Ji, H.; Wu, X.; Wang, Q.; Redmond, S.J.; Tavakkolnia, I. Adaptive target-condition neural network: DNN-aided load balancing for hybrid LiFi and WiFi networks. IEEE Trans. Wirel. Commun. 2023, 23, 7307–7318. [Google Scholar] [CrossRef]
  11. Ester, M.; Kriegel, H.-P.; Sander, J.; Xu, X. A density-based algorithm for discovering clusters in large spatial databases with noise. Proc. Kdd 1996, 96, 226–231. [Google Scholar]
  12. Amini, A.; Wah, T.Y.; Saboohi, H. On density-based data streams clustering algorithms: A survey. J. Comput. Sci. Technol. 2014, 29, 116–141. [Google Scholar] [CrossRef]
  13. Cheng, D.; Yue, G.; Pei, T.; Wu, M. Clustering indoor positioning data using E-DBSCAN. ISPRS Int. J. Geo-Inf. 2021, 10, 669. [Google Scholar] [CrossRef]
  14. Lan, D.T.; Yoon, S. Trajectory clustering-based anomaly detection in indoor human movement. Sensors 2023, 23, 3318. [Google Scholar] [CrossRef]
  15. Alshamaa, D.; Chkeir, A.; Mourad-Chehade, F.; Honeine, P. A Hidden Markov Model for Indoor Trajectory Tracking of Elderly People. In Proceedings of the 2019 IEEE Sensors Applications Symposium (SAS), Sophia Antipolis, France, 11–13 March 2019; pp. 1–6. [Google Scholar]
  16. Qiao, S.; Shen, D.; Wang, X.; Han, N.; Zhu, W. A self-adaptive parameter selection trajectory prediction approach via hidden Markov models. IEEE Trans. Intell. Transp. Syst. 2014, 16, 284–296. [Google Scholar] [CrossRef]
  17. Wang, B.; Hu, Y.; Shou, G.; Guo, Z. Trajectory Prediction in Campus Based on Markov Chains. In Proceedings of the Big Data Computing and Communications: Second International Conference, BigCom 2016, Shenyang, China, 29–31 July 2016; pp. 145–154. [Google Scholar]
  18. Liu, H.; Zhu, P.; Chen, Y.; Huang, M. Power allocation for downlink hybrid power line and visible light communication system. IEEE Access 2020, 8, 24145–24152. [Google Scholar] [CrossRef]
  19. Dong, J.; Zhang, Y.; Zhu, Y. Convex relaxation for illumination control of multi-color multiple-input-multiple-output visible light communications with linear minimum mean square error detection. Appl. Opt. 2017, 56, 6587–6595. [Google Scholar] [CrossRef] [PubMed]
  20. Komine, T.; Nakagawa, M. Fundamental analysis for visible-light communication system using LED lights. Consum. Electron. IEEE Trans. 2004, 50, 100–107. [Google Scholar] [CrossRef]
  21. Ke, X.; Ding, D. Wireless Optical Communication, 2nd ed.; Science Press: Beijing, China, 2022. [Google Scholar]
  22. Arunkumar, R.; Thanasekhar, B. Heterogeneous Lifi–WiFi with multipath transmission protocol for effective access point selection and load balancing. Wirel. Netw. 2024, 30, 2423–2437. [Google Scholar] [CrossRef]
  23. Wu, X.; Haas, H. Mobility-aware load balancing for hybrid LiFi and WiFi networks. J. Opt. Commun. Netw. 2019, 11, 588–597. [Google Scholar] [CrossRef]
  24. Chen, C.; Basnayaka, D.A.; Wu, X.; Haas, H. Efficient analytical calculation of non-line-of-sight channel impulse response in visible light communications. J. Light. Technol. 2017, 36, 1666–1682. [Google Scholar] [CrossRef]
  25. Mor, B.; Garhwal, S.; Kumar, A. A systematic review of hidden Markov models and their applications. Arch. Comput. Methods Eng. 2021, 28, 1429–1448. [Google Scholar] [CrossRef]
  26. Kwon, H.; Cheon, K.-y.; Park, A. Analysis of WLAN to UMTS Handover. In Proceedings of the 2007 IEEE 66th Vehicular Technology Conference, Baltimore, MD, USA, 30 September–3 October 2007; pp. 184–188. [Google Scholar]
  27. Jasti, L.P.; Kumar, R.; Vrind, T.; Pathak, L. Novel Schemes to prioritize the TCP ACK for throughput improvement in B4G and 5G networks. EAI Endorsed Trans. Cloud Syst. 2019, 5, e5. [Google Scholar] [CrossRef]
  28. Wu, X.; Haas, H. Load balancing for hybrid LiFi and WiFi networks: To tackle user mobility and light-path blockage. IEEE Trans. Commun. 2019, 68, 1675–1683. [Google Scholar] [CrossRef]
Figure 1. Indoor VLC/Wi-Fi heterogeneous network model.
Figure 1. Indoor VLC/Wi-Fi heterogeneous network model.
Applsci 15 02188 g001
Figure 2. Normalized impulse response percentage of direct and reflected light [20].
Figure 2. Normalized impulse response percentage of direct and reflected light [20].
Applsci 15 02188 g002
Figure 3. Overall flow chart.
Figure 3. Overall flow chart.
Applsci 15 02188 g003
Figure 4. Schematic of seamless handover algorithm.
Figure 4. Schematic of seamless handover algorithm.
Applsci 15 02188 g004
Figure 5. Comparison of the prediction error before and after improvement.
Figure 5. Comparison of the prediction error before and after improvement.
Applsci 15 02188 g005
Figure 6. Comparison of prediction accuracy at different repetition rates.
Figure 6. Comparison of prediction accuracy at different repetition rates.
Applsci 15 02188 g006
Figure 7. Variation of the average throughput for different users’ speed.
Figure 7. Variation of the average throughput for different users’ speed.
Applsci 15 02188 g007
Figure 8. Variation of the average throughput for different numbers of people.
Figure 8. Variation of the average throughput for different numbers of people.
Applsci 15 02188 g008
Figure 9. Variation of the average throughput for different optical path-blocking scenarios.
Figure 9. Variation of the average throughput for different optical path-blocking scenarios.
Applsci 15 02188 g009
Figure 10. Variation of the handover rate for different users’ speed.
Figure 10. Variation of the handover rate for different users’ speed.
Applsci 15 02188 g010
Figure 11. Variation of the handover rate for different optical path-blocking scenarios.
Figure 11. Variation of the handover rate for different optical path-blocking scenarios.
Applsci 15 02188 g011
Figure 12. Variation of user fairness of each scheme with different number of users.
Figure 12. Variation of user fairness of each scheme with different number of users.
Applsci 15 02188 g012
Figure 13. Convergence with different number of users.
Figure 13. Convergence with different number of users.
Applsci 15 02188 g013
Table 1. Simulation parameters.
Table 1. Simulation parameters.
ParameterValue
Room size (length by width by height)15 m × 15 m × 3 m
The cost of VHO, C V 500 ms
The cost of HHO, C H 200 ms
The physical area of the PD, A eff 1 cm2
Field of view semi-angle of the PD, ψ c 90°
Detector responsivity, γ 0.53 A/W
Half-intensity radiation angle, ϕ 1 / 2 60°
System bandwidth per VLC, B VLC 20 MHz
Transmitted optical power per VLC, P t VLC 3.5 W
Noise power spectral density in VLC, N VLC 10−21 A2/Hz
System bandwidth per Wi-Fi, B WiFi 20 MHz
Transmitted power per Wi-Fi, P WiFi 15 dBm
Noise power spectral density in Wi-Fi, N WiFi −174 dBm/Hz
Table 2. Effect of smoothing factor on prediction accuracy.
Table 2. Effect of smoothing factor on prediction accuracy.
Smoothing FactorPrediction Accuracy
0.10.68
0.30.72
0.50.82
0.70.71
0.80.64
0.90.56
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ke, C.; Wang, M.; Qin, H.; Ke, X. Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks. Appl. Sci. 2025, 15, 2188. https://doi.org/10.3390/app15042188

AMA Style

Ke C, Wang M, Qin H, Ke X. Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks. Applied Sciences. 2025; 15(4):2188. https://doi.org/10.3390/app15042188

Chicago/Turabian Style

Ke, Chenghu, Mengfan Wang, Huanhuan Qin, and Xizheng Ke. 2025. "Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks" Applied Sciences 15, no. 4: 2188. https://doi.org/10.3390/app15042188

APA Style

Ke, C., Wang, M., Qin, H., & Ke, X. (2025). Research on Network Handover Based on User Movement Prediction in Visible Light Communication and Wi-Fi Heterogeneous Networks. Applied Sciences, 15(4), 2188. https://doi.org/10.3390/app15042188

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop