{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T00:04:00Z","timestamp":1775433840977,"version":"3.50.1"},"reference-count":228,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior-Brasil (CAPES)-Finance Code 001"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3436074","type":"journal-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T20:52:24Z","timestamp":1722459144000},"page":"108616-108656","source":"Crossref","is-referenced-by-count":7,"title":["A Comprehensive Step-Wise Survey of Multiple Attribute Decision-Making Mobility Approaches"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4261-9138","authenticated-orcid":false,"given":"Felipe S.","family":"Dantas Silva","sequence":"first","affiliation":[{"name":"LaTARC Research Laboratory, Federal Institute of Education, Science, and Technology of Rio Grande do Norte (IFRN), Natal, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5378-0600","authenticated-orcid":false,"given":"Mathews P. S.","family":"Lima","sequence":"additional","affiliation":[{"name":"LaTARC Research Laboratory, Federal Institute of Education, Science, and Technology of Rio Grande do Norte (IFRN), Natal, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7484-1027","authenticated-orcid":false,"given":"Daniel","family":"Corujo","sequence":"additional","affiliation":[{"name":"Instituto de Telecomunica&#x00E7;&#x00F5;es, Universidade de Aveiro, Aveiro, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9936-3770","authenticated-orcid":false,"given":"Augusto J.","family":"Ven\u00e2ncio Neto","sequence":"additional","affiliation":[{"name":"Leading Advanced Technologies Center of Excellence (LANCE), Federal University of Rio Grande do Norte (UFRN), Natal, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7798-4584","authenticated-orcid":false,"given":"Flavio","family":"Esposito","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Saint Louis University, St. Louis, MO, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.019"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2948075"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.001.1900488"},{"key":"ref5","volume-title":"Imt Traffic Estimates for the Years 2020 to 2030","year":"2015"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2016.2591558"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2550765"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8015274"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.141"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN59219.2023.10329589"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2461602"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.1500244RP"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600119"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110422"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7064897"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2532458"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2018.2851755"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2545539"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2848899"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2842113"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2516538"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2518085"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2556011"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081072"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600940"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.925301"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.4907409"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.07.011"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.01.044"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1800104"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/twc.2017.2754260"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/imws2.2009.5307889"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700126"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2017.8115812"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2846045"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2689725"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2011.051111.00096"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2015.2407402"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2011.276"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2017.8254158"},{"key":"ref41","volume-title":"The Fuzzy Systems Handbook: A Practitioner\u2019s Guide to Building, Using, and Maintaining Fuzzy Systems","author":"Cox","year":"1994"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2689061"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.907072"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2017.8254596"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.864028"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2015.7391183"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700296"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/LCNW.2012.6424049"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477617"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2013-256"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2010.5700412"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3067503"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2924243"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-48318-9_3"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1287\/inte.9.4.94"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3157-6_2"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2016.7537150"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1504\/IJIDS.2018.090667"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2003.12.005"},{"key":"ref60","first-page":"102","article-title":"A simulation based comparative study of normalization procedures in multiattribute decision making","volume-title":"Proc. 6th WSEAS Int. Conf. Artif. Intell., Knowl. Eng. Data Bases","volume":"6","author":"Chakraborty"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/tsmc.2018.2874942"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2014.10"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00044"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/iwcit.2015.7140219"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2012.6152232"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/wgec.2009.35"},{"issue":"12","key":"ref67","first-page":"4678","article-title":"A study on vertical handover algorithms","volume":"2","author":"Ravichandra","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"issue":"1","key":"ref68","first-page":"362","article-title":"Survey of vertical handover decision algorithms","volume":"2","author":"Rajule","year":"2013","journal-title":"Interfaces J. Innov. Eng. Tech."},{"key":"ref69","first-page":"55","article-title":"A survey on vertical handover decision making in next generation heterogeneous wireless networks","volume":"17","author":"Gaikwad","year":"2014","journal-title":"Int. J. Res. Stud. Sci., Eng. Technol."},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.11.010"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.082713.00141"},{"issue":"2","key":"ref72","first-page":"46","article-title":"Multi-criteria handoff decision algorithms in wireless networks","volume":"2","author":"Pahal","year":"2015","journal-title":"J. Mobile Comput. Appl."},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TELSKS.2013.6704898"},{"key":"ref74","first-page":"2005","article-title":"A review of vertical handoff algorithms based on multi attribute decision method","volume":"2","author":"Manjaiah","year":"2013","journal-title":"Int. J. Adv. Res. Comput. Eng. Technol."},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-66030-7_8"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1201\/9781003129103-20"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ITNEC56291.2023.10082485"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/iscc.2011.5983882"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/s41650-018-0009-2"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/INFOTEH57020.2023.10094090"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TELSIKS57806.2023.10315998"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3403953"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3168717"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3284905"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ntms.2015.7266522"},{"issue":"5","key":"ref86","first-page":"10","article-title":"Survey on evaluation models of vertical handoff decision algorithms","volume":"135","author":"Jadhav","year":"2016","journal-title":"Int. J. Comput. Appl."},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1301-4"},{"issue":"2","key":"ref88","first-page":"93","article-title":"An overview of multi-attribute decision making (MADM) vertical handover using systematic mapping","volume":"10","author":"Allias","year":"2018","journal-title":"J. Telecommun., Electron. Comput. Eng. (JTEC)"},{"key":"ref89","first-page":"68","article-title":"Systematic mapping studies in software engineering","volume-title":"Proc. 12th Int. Conf. Eval. Assessment Softw. Eng. (EASE)","author":"Petersen"},{"issue":"5","key":"ref90","first-page":"1575","article-title":"Comprehensive survey on multi attribute decision making methods for wireless ad hoc networks","volume":"20","author":"Kim","year":"2019","journal-title":"J. Internet Technol."},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/j.rineng.2024.101918"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.3390\/s20113078"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3079095"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1007\/BF00933438"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/UKSim.2016.41"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2016.7577181"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(90)90057-I"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/icmit.2006.262391"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/wocn.2008.4542508"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/lcn.2010.5735809"},{"issue":"1","key":"ref101","first-page":"1","article-title":"Some results on random weighting method","volume":"3","author":"Zheng","year":"1987","journal-title":"Appl. Probab. Statist."},{"key":"ref102","volume-title":"MATLAB, The Language of Technical Computing","year":"2024"},{"key":"ref103","volume-title":"Technical Specification Group Services and System Aspects; Quality of Service (QoS) Concept and Architecture (Release 7)","year":"2008"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/1454659.1454671"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/0305-0548(94)00059-H"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN57023.2022.10051092"},{"key":"ref107","volume-title":"Decision Making With Dependence and Feedback: The Analytic Network Process","volume":"4922","author":"Saaty","year":"1996"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/springerreference_5234"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s11518-006-0158-y"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1016\/j.wasman.2005.11.020"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2015.7324654"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICTEL.2013.6632067"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/aict.2009.68"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2011.6096911"},{"key":"ref115","first-page":"1","volume-title":"IEEE Standard for Information Technology\u2014Local and Metropolitan Area Networks\u2014Specific Requirements\u2014Part 11: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications\u2014Amendment 8: Medium Access Control (MAC) Quality of Service Enhancements","year":"2005"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2012.6297413"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.06.005"},{"key":"ref118","volume-title":"The Network Simulator NS-2 NIST Add-on","author":"Rouil","year":"2007"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/wmnc.2013.6549009"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/SITA.2013.6560784"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-1627-1_2"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/taes.2017.2701918"},{"key":"ref123","article-title":"Vertical handover decision schemes using SAW and WPM for network selection in heterogeneous wireless networks","author":"Savitha","year":"2011","journal-title":"arXiv:1109.4490"},{"key":"ref124","volume-title":"Executive Decisions and Operations Research","author":"Miller","year":"1969"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928843"},{"key":"ref126","first-page":"79","article-title":"Manual de reference du programme electre","volume":"25","author":"Benayoun","year":"1966","journal-title":"Note de Synthese et Formation"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03819-8_7"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/glocom.2015.7417613"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1287\/opre.15.3.537"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2006.1682964"},{"key":"ref131","article-title":"Utilization and comparison of multi attribute decision making techniques to rank Bayesian network options","author":"Karami","year":"2011"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/afrcon.2013.6757805"},{"key":"ref133","first-page":"1","article-title":"Optimal network selection using MADM algorithms","volume-title":"Proc. 2nd Int. Conf. Recent Adv. Eng. Comput. Sci. (RAECS)","author":"Singh"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/icccn.2012.6289261"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2418-1"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0670-1"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.31.6.647"},{"issue":"6","key":"ref138","first-page":"64","article-title":"Application of MADM algorithms to network selection","volume":"3","author":"Anupama","year":"2015","journal-title":"Int. J. Innov. Res. Electr., Electron., Instrum. Control Eng."},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1108\/20439371211260081"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/CompComm.2016.7924942"},{"key":"ref141","first-page":"1","article-title":"Programski paket VIKOR za visekriterijumsko kompromisno rangiranje","volume-title":"Proc. 17th Int. Symp. Oper. Res.","author":"Opricovic"},{"key":"ref142","first-page":"29","article-title":"Performance of VIKOR MADM method for vertical handoffs in heterogeneous networks with various weighting methods","volume-title":"Proc. 8th Int. Conf. Adv. Comput. Commun. Technol.","author":"Baghla"},{"issue":"3","key":"ref143","first-page":"131","article-title":"The new method of multicriteria complex proportional assessment of projects","volume":"1","author":"Zavadskas","year":"1994","journal-title":"Technol. Econ. Develop. Economy"},{"key":"ref144","article-title":"Selection schemes for multiple calls in next generation wireless networks","author":"Orimolade","year":"2017"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.msea.2006.06.006"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1142\/2446"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7715"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2008.472"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511626630"},{"key":"ref150","first-page":"1","article-title":"Optimized heterogeneous wireless network with scoring methods","volume-title":"Proc. Int. Conf. Workshop Recent Trends Technol. (TCET), Int. J. Comput. Appl. (IJCA)","author":"Agrawal"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.3846\/tede.2010.01"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.15388\/Informatica.2012.346"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/afrcon.2015.7331973"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502475"},{"issue":"53","key":"ref155","first-page":"2745","article-title":"New multi access selection method based on Mahalanobis distance","volume":"6","author":"Lahby","year":"2012","journal-title":"Appl. Math. Sci."},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/s0169-7439(99)00047-7"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.5755\/j01.eee.122.6.1810"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/SoftCOM.2013.6671853"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.2.263-272"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2014.6912459"},{"key":"ref161","doi-asserted-by":"crossref","DOI":"10.1002\/9780470512517","volume-title":"Comput. Intelligence: Introduction","author":"Engelbrecht","year":"2007"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/SITA.2014.6847292"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1504\/IJCSE.2015.068835"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.02.026"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.15388\/informatica.2015.57"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.04.012"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511563"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.10.011"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.37936\/ecti-eec.2017152.171312"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2017.8072023"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.12783\/dtetr\/apop2017\/18750"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.22266\/ijies2017.1231.19"},{"issue":"16","key":"ref173","first-page":"5495","article-title":"Multi-attribute network selection and evaluation models for vertical handoff in heterogeneous networks","volume":"12","author":"Kumari","year":"2017","journal-title":"Int. J. Appl. Eng. Res."},{"key":"ref174","first-page":"19","article-title":"A review of multi criteria decision making with dependency between criteria","volume":"5","author":"\u00d6zt\u00fcrk","year":"2006","journal-title":"Multi-Criteria Decis. Making"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.04.020"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/3ICT53449.2021.9581462"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103358"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2006.11.021"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.3390\/su9081433"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92137-0_33"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2013.114"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.5194\/nhess-16-1019-2016"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2016.11.191"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-5137-9.ch003"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.22201\/icat.16656423.2012.10.4.372"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.015"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2014.7238357"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-1495-4"},{"key":"ref189","article-title":"Improving spatiality in decision making for river basin management","author":"Nijssen","year":"2013"},{"issue":"2","key":"ref190","first-page":"56","article-title":"An analysis of multi-criteria decision making methods","volume":"10","author":"Velasquez","year":"2013","journal-title":"Int. J. Oper. Res."},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEE.2010.5608646"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.697"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2014.6968418"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1050.0216"},{"key":"ref195","volume-title":"Multiple Criteria Decision Making","author":"Zeleny","year":"1982"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3157-6_2"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/ISACV.2015.7106165"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.01.003"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.3390\/info6030399"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1080\/03155986.1994.11732238"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/SOFTCOM.2008.4669464"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2008.06.019"},{"issue":"2","key":"ref203","first-page":"37","article-title":"Performance evaluation and comparison of MADM algorithms for subjective and objective weights in heterogeneous networks","volume":"2","author":"Nancy","year":"2013","journal-title":"Int. J. Emerg. Trends Electr. Electron. (IJETEE)"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2363139"},{"key":"ref205","volume-title":"Global Mobile Data Traffic Forecast Update, 2016\u20132021 White Paper","year":"2017"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2011.2104671"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/csndsp.2012.6292642"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2018.2874692"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2017.2750709"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/cnsm.2015.7367387"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.037"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2014.11.018"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/tpwrs.2009.2036822"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1153-7_31"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1007\/s11269-014-0742-8"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2008.12.001"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2009.01.021"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-23081-5_5"},{"key":"ref220","article-title":"The fundamentals of grey theory","author":"Deng","year":"2024"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.3390\/su8010037"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1016\/0097-3165(77)90051-6"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.01.011"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2010.2046212"},{"issue":"2","key":"ref225","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3846\/20294913.2011.580566","article-title":"Multimoora for the EU member states updated with fuzzy number theory","volume":"17","author":"Brauers","year":"2011","journal-title":"Technol. Econ. Develop. Economy"},{"issue":"1","key":"ref226","first-page":"55","article-title":"Qos requirements of network applications on the internet","volume":"4","author":"Chen","year":"2004","journal-title":"Inf. Knowl. Syst. Manage."},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575128"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1016\/S0098-3004(99)00141-7"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10616121.pdf?arnumber=10616121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T17:29:21Z","timestamp":1727717361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10616121\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":228,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3436074","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}