{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T14:17:41Z","timestamp":1762093061585,"version":"build-2065373602"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T00:00:00Z","timestamp":1694563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s11227-023-05595-4","type":"journal-article","created":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T11:02:16Z","timestamp":1694602936000},"page":"4378-4400","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Probabilistic estimation of comprehensive utility based on user preference and network condition for network selection in future in HetNet"],"prefix":"10.1007","volume":"80","author":[{"given":"Ashok Kumar","family":"Yadav","sequence":"first","affiliation":[]},{"given":"Karan","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Pramod Kumar","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,13]]},"reference":[{"key":"5595_CR1","volume":"26","author":"PKR Maddikunta","year":"2022","unstructured":"Maddikunta PKR, Pham Q-V, Prabadevi B, Deepa N, Dev K, Gadekallu TR, Ruby R, Liyanage M (2022) Industry 5.0: a survey on enabling technologies and potential applications. J Indust Inf Integr 26:100257","journal-title":"J Indust Inf Integr"},{"key":"5595_CR2","doi-asserted-by":"publisher","first-page":"70169","DOI":"10.1109\/ACCESS.2019.2919489","volume":"7","author":"G Naik","year":"2019","unstructured":"Naik G, Choudhury B, Park J-M (2019) IEEE 802.11 bd & 5g nr v2x: evolution of radio access technologies for v2x communications. IEEE Access 7:70169\u201370184","journal-title":"IEEE Access"},{"issue":"4","key":"5595_CR3","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TWC.2019.2963829","volume":"19","author":"TM Duong","year":"2020","unstructured":"Duong TM, Kwon S (2020) Vertical handover analysis for randomly deployed small cells in heterogeneous networks. IEEE Trans Wirel Commun 19(4):2282\u20132292","journal-title":"IEEE Trans Wirel Commun"},{"key":"5595_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.phycom.2018.11.003","volume":"32","author":"N Al-Falahy","year":"2019","unstructured":"Al-Falahy N, Alani OY (2019) Millimetre wave frequency band as a candidate spectrum for 5g network architecture: a survey. Phys Commun 32:120\u2013144","journal-title":"Phys Commun"},{"issue":"4","key":"5595_CR5","doi-asserted-by":"publisher","first-page":"2947","DOI":"10.1007\/s11276-021-02625-y","volume":"27","author":"M Cicio\u011flu","year":"2021","unstructured":"Cicio\u011flu M (2021) Multi-criteria handover management using entropy-based saw method for sdn-based 5g small cells. Wirel Netw 27(4):2947\u20132959","journal-title":"Wirel Netw"},{"issue":"4","key":"5595_CR6","first-page":"1","volume":"6","author":"K Teknomo","year":"2006","unstructured":"Teknomo K (2006) Analytic hierarchy process (ahp) tutorial. Revoledu Com 6(4):1\u201320","journal-title":"Revoledu Com"},{"issue":"17","key":"5595_CR7","doi-asserted-by":"publisher","first-page":"13051","DOI":"10.1016\/j.eswa.2012.05.056","volume":"39","author":"M Behzadian","year":"2012","unstructured":"Behzadian M, Otaghsara SK, Yazdani M, Ignatius J (2012) A state-of the-art survey of topsis applications. Exp Syst Appl 39(17):13051\u201313069","journal-title":"Exp Syst Appl"},{"issue":"2","key":"5595_CR8","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1016\/j.ejor.2006.01.020","volume":"178","author":"S Opricovic","year":"2007","unstructured":"Opricovic S, Tzeng G-H (2007) Extended vikor method in comparison with outranking methods. Eur J Oper Res 178(2):514\u2013529","journal-title":"Eur J Oper Res"},{"issue":"1","key":"5595_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1108\/20439371311293651","volume":"3","author":"S Liu","year":"2013","unstructured":"Liu S, Yang Y, Cao Y, Xie N (2013) A summary on the research of GRA models. Grey Syst Theory Appl 3(1):7\u201315","journal-title":"Grey Syst Theory Appl"},{"key":"5595_CR10","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.eswa.2016.08.064","volume":"65","author":"S Kubler","year":"2016","unstructured":"Kubler S, Robert J, Derigent W, Voisin A, Le Traon Y (2016) A state-of the-art survey & testbed of fuzzy ahp (fahp) applications. Exp Syst Appl 65:398\u2013422","journal-title":"Exp Syst Appl"},{"issue":"12","key":"5595_CR11","doi-asserted-by":"publisher","first-page":"7745","DOI":"10.1016\/j.eswa.2010.04.066","volume":"37","author":"C-C Sun","year":"2010","unstructured":"Sun C-C (2010) A performance evaluation model by integrating fuzzy ahp and fuzzy topsis methods. Exp Syst Appl 37(12):7745\u20137754","journal-title":"Exp Syst Appl"},{"issue":"6","key":"5595_CR12","doi-asserted-by":"publisher","first-page":"2517","DOI":"10.1016\/j.energy.2010.02.051","volume":"35","author":"T Kaya","year":"2010","unstructured":"Kaya T, Kahraman C (2010) Multicriteria renewable energy planning using an integrated fuzzy vikor & ahp methodology: The case of istanbul. Energy 35(6):2517\u20132527","journal-title":"Energy"},{"issue":"10","key":"5595_CR13","doi-asserted-by":"publisher","first-page":"4738","DOI":"10.1016\/j.matdes.2010.05.014","volume":"31","author":"R Rao","year":"2010","unstructured":"Rao R, Patel B (2010) A subjective and objective integrated multiple attribute decision making method for material selection. Mater Des 31(10):4738\u20134747","journal-title":"Mater Des"},{"key":"5595_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.adhoc.2018.01.011","volume":"72","author":"H-W Yu","year":"2018","unstructured":"Yu H-W, Zhang B (2018) A heterogeneous network selection algorithm based on network attribute and user preference. AD Hoc Netw 72:68\u201380","journal-title":"AD Hoc Netw"},{"issue":"06","key":"5595_CR15","doi-asserted-by":"publisher","first-page":"2050092","DOI":"10.1142\/S0218126620500929","volume":"29","author":"M Subramani","year":"2020","unstructured":"Subramani M, Kumaravelu VB (2020) A three-stage fuzzy-logic-based handover necessity estimation and target network selection scheme for next generation heterogeneous networks. J Circ Syst Comput 29(06):2050092","journal-title":"J Circ Syst Comput"},{"key":"5595_CR16","doi-asserted-by":"crossref","unstructured":"Liu D, Zhang D, Chen J, Pan Z (2018) A heterogeneous network access selection algorithm based on improved critic. In: 2018 IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 381\u2013387. IEEE","DOI":"10.1109\/IAEAC.2018.8577486"},{"issue":"01","key":"5595_CR17","doi-asserted-by":"publisher","first-page":"2150009","DOI":"10.1142\/S0218126621500092","volume":"30","author":"M Subramani","year":"2021","unstructured":"Subramani M, Kumaravelu VB, Murugadass A (2021) Fuzzy logic-based handover requirement analysis and access network selection for device-to-device communication. J Circ Syst Comput 30(01):2150009","journal-title":"J Circ Syst Comput"},{"issue":"03","key":"5595_CR18","doi-asserted-by":"publisher","first-page":"2050010","DOI":"10.1142\/S0219265920500103","volume":"20","author":"H Yu","year":"2020","unstructured":"Yu H, Guo M, Yu J (2020) A novel heterogeneous wireless network selection algorithm based on infahp and igra. J Interconnect Netw 20(03):2050010","journal-title":"J Interconnect Netw"},{"key":"5595_CR19","doi-asserted-by":"crossref","unstructured":"Yadav AK, Alam H, Singh VK, Kumar A (2022) Performance analysis of network selection technique for handover strategies in heterogeneous 5g network. In: 2022 IEEE World Conference on Applied Intelligence and Computing (AIC), pp. 818\u2013824. IEEE","DOI":"10.1109\/AIC55036.2022.9848989"},{"key":"5595_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102924","volume":"134","author":"Y Zhong","year":"2022","unstructured":"Zhong Y, Wang H, Lv H, Guo F (2022) A vertical handoff decision scheme using subjective-objective weighting and grey relational analysis in cognitive heterogeneous networks. Ad Hoc Netw 134:102924","journal-title":"Ad Hoc Netw"},{"key":"5595_CR21","doi-asserted-by":"publisher","first-page":"74071","DOI":"10.1109\/ACCESS.2022.3186149","volume":"10","author":"X Guo","year":"2022","unstructured":"Guo X, Omar MH, Zaini KM, Liang G, Lin M, Gan Z (2022) Multiattribute access selection algorithm for heterogeneous wireless networks based on fuzzy network attribute values. IEEE Access 10:74071\u201374081","journal-title":"IEEE Access"},{"key":"5595_CR22","volume":"30","author":"AK Yadav","year":"2021","unstructured":"Yadav AK, Singh K, Ahmadian A, Mohan S, Shah SBH, Alnumay WS (2021) Emmm: Energy-efficient mobility management model for context-aware transactions over mobile communication. Sustain Comput Inf Syst 30:100499","journal-title":"Sustain Comput Inf Syst"},{"key":"5595_CR23","doi-asserted-by":"crossref","unstructured":"Wang X-q, Guo Q (2010) The priority of fuzzy complementary judgment matrix and its application in procurement tenders for government project. In: 2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management, pp. 148\u2013151. IEEE","DOI":"10.1109\/ICIEEM.2010.5646633"},{"issue":"309","key":"5595_CR24","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1080\/01621459.1965.10480774","volume":"60","author":"HV Roberts","year":"1965","unstructured":"Roberts HV (1965) Probabilistic prediction. J Am Stat Assoc 60(309):50\u201362","journal-title":"J Am Stat Assoc"},{"key":"5595_CR25","volume-title":"Handbook of the normal distribution","author":"JK Patel","year":"1996","unstructured":"Patel JK, Read CB (1996) Handbook of the normal distribution, vol 150. CRC Press, Florida"},{"key":"5595_CR26","volume-title":"Lognormal distributions","author":"EL Crow","year":"1987","unstructured":"Crow EL, Shimizu K (1987) Lognormal distributions. Marcel Dekker, New York"},{"key":"5595_CR27","volume-title":"Handbook of the logistic distribution","author":"N Balakrishnan","year":"2013","unstructured":"Balakrishnan N (2013) Handbook of the logistic distribution. CRC Press"},{"key":"5595_CR28","doi-asserted-by":"publisher","first-page":"1187","DOI":"10.1214\/aoms\/1177704481","volume":"25","author":"EW Stacy","year":"1962","unstructured":"Stacy EW (1962) A generalization of the gamma distribution. Ann Math Stat 25:1187\u20131192","journal-title":"Ann Math Stat"},{"key":"5595_CR29","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/BF02291180","volume":"38","author":"EB Andersen","year":"1973","unstructured":"Andersen EB (1973) A goodness of fit test for the rasch model. Psychometrika 38:123\u2013140","journal-title":"Psychometrika"},{"issue":"399","key":"5595_CR30","first-page":"918","volume":"82","author":"FW Scholz","year":"1987","unstructured":"Scholz FW, Stephens MA (1987) K-sample anderson-darling tests. J Am Stat Assoc 82(399):918\u2013924","journal-title":"J Am Stat Assoc"},{"issue":"1","key":"5595_CR31","first-page":"89","volume":"14","author":"Z Hanusz","year":"2016","unstructured":"Hanusz Z, Tarasinska J, Zielinski W (2016) Shapiro-wilk test with known mean. REVSTAT Stat J 14(1):89\u2013100","journal-title":"REVSTAT Stat J"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05595-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05595-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05595-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T11:20:32Z","timestamp":1705922432000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05595-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,13]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["5595"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05595-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2023,9,13]]},"assertion":[{"value":"17 August 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The manuscript has been approved by all authors and has never been published, or under consideration for publication elsewhere. We have not submitted our manuscript to a preprint server prior to submission to the Journal of Supercomputing.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}]}}