{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:57:13Z","timestamp":1760241433593,"version":"build-2065373602"},"reference-count":27,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,2,24]],"date-time":"2018-02-24T00:00:00Z","timestamp":1519430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science and Technology Key Projects","award":["61602034"],"award-info":[{"award-number":["61602034"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["FRF-TP-17-010A2"],"award-info":[{"award-number":["FRF-TP-17-010A2"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Social applications play a very important role in people\u2019s lives, as users communicate with each other through social networks on a daily basis. This presents a challenge: How does one receive high-quality service from social networks at a low cost? Users can access different kinds of wireless networks from various locations. This paper proposes a user access management strategy based on network pricing such that networks can increase its income and improve service quality. Firstly, network price is treated as an optimizing access parameter, and an unascertained membership algorithm is used to make pricing decisions. Secondly, network price is adjusted dynamically in real time according to network load. Finally, selecting a network is managed and controlled in terms of the market economy. Simulation results show that the proposed scheme can effectively balance network load, reduce network congestion, improve the user's quality of service (QoS) requirements, and increase the network\u2019s income.<\/jats:p>","DOI":"10.3390\/s18020664","type":"journal-article","created":{"date-parts":[[2018,2,27]],"date-time":"2018-02-27T03:36:12Z","timestamp":1519702572000},"page":"664","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["User Access Management Based on Network Pricing for Social Network Applications"],"prefix":"10.3390","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5287-5226","authenticated-orcid":false,"given":"Fuhong","family":"Lin","sequence":"first","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7474-4294","authenticated-orcid":false,"given":"Zhibo","family":"Pang","sequence":"additional","affiliation":[{"name":"ABB Corporate Research, Forskargr\u00e4nd 7, SE-721 78 V\u00e4ster\u00e5s, Sweden"}]},{"given":"Xingmin","family":"Ma","sequence":"additional","affiliation":[{"name":"School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, China"}]},{"given":"Qing","family":"Gu","sequence":"additional","affiliation":[{"name":"School of Mechanical Engineering, University of Science and Technology Beijing(USTB), Beijing 100083, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,2,24]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Wu, D., Yan, J., Wang, H., and Wang, R. (2016). Service Demand Discovery Mechanism for Mobile Social Networks. Sensors, 16.","DOI":"10.3390\/s16111982"},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Zhu, J., Zhang, J., Wu, Q., Jia, Y., Zhou, B., Wei, X., and Yu, P. (2017). Constrained Active Learning for Anchor Link Prediction across Multiple Heterogeneous Social Networks. Sensors, 17.","DOI":"10.3390\/s17081786"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Xiong, N., Zhang, L., Zhang, W., Vasilakos, A., and Imran, M. (2017). Design and Analysis of an Efficient Energy Algorithm in Wireless Social Sensor Networks. Sensors, 17.","DOI":"10.3390\/s17102166"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/s11235-016-0195-x","article-title":"Evolution towards fifth generation (5G) wireless networks: Current trends and challenges in the deployment of millimetre wave, massive MIMO, and small cells","volume":"64","author":"Alsharif","year":"2016","journal-title":"Telecommun. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/MCOM.2003.1204756","article-title":"Investigation of radio resource scheduling in WLANs coupled with 3G cellular network","volume":"41","author":"Luo","year":"2003","journal-title":"IEEE Commun. Mag."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11277-015-3025-7","article-title":"Obtaining a Potential Game Through Pricing, to Achieve Optimal Resource Management in Non-cooperative Cognitive Radio Networks","volume":"87","author":"Mostaani","year":"2016","journal-title":"Wirel. Pers. Commun."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1109\/JSYST.2015.2451156","article-title":"Cloud-assisted safety message dissemination in VANET-cellular heterogeneous wireless network","volume":"11","author":"Liu","year":"2015","journal-title":"IEEE Syst. J."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1016\/j.eswa.2015.09.040","article-title":"Fuzzy rule-based faulty node classification and management scheme for large scale wireless sensor networks","volume":"45","author":"Chanak","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2015.12.006","article-title":"Uplink resource allocation in SC-FDMA wireless networks: A survey and taxonomy","volume":"96","author":"Tsiropoulou","year":"2016","journal-title":"Comput. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1109\/TMC.2015.2417871","article-title":"Assessing Performance Gains through Global Resource Control of Heterogeneous Wireless Networks","volume":"15","author":"Amin","year":"2016","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"936","DOI":"10.1109\/TVT.2015.2404927","article-title":"Resource Optimization Based Interference Management for Hybrid Self-Organized Small Cell Network","volume":"65","author":"Hang","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhang, L., Xu, H., Zhuo, F., and Duan, H. (2017). Achieving Congestion Mitigation Using Distributed Power Control for Spectrum Sensor Nodes in Sensor Network-Aided Cognitive Radio Ad Hoc Networks. Sensors, 17.","DOI":"10.3390\/s17092132"},{"key":"ref_13","first-page":"747","article-title":"A Method of Fault Diagnosis Based on Unascertained Set","volume":"30","author":"Liu","year":"2004","journal-title":"Acta Autom. Sin."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Pang, Y., Pan, W., and Liu, K. (2010, January 10\u201312). Unascertained measure assessment on environmental impact of tailings pond. Proceedings of the IEEE 2010 Seventh International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Yantai, China.","DOI":"10.1109\/FSKD.2010.5569161"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1080\/00207721.2016.1218975","article-title":"A multi-valued neutrosophic qualitative flexible approach based on likelihood for multi-criteria decision-making problems","volume":"48","author":"Peng","year":"2017","journal-title":"Int. J. Syst. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.ins.2015.09.035","article-title":"Weighted fuzzy interpolative reasoning for sparse fuzzy rule-based systems based on piecewise fuzzy entropies of fuzzy sets","volume":"329","author":"Chen","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1016\/j.ins.2014.12.005","article-title":"Fuzzy interpolative reasoning based on the ratio of fuzziness of rough-fuzzy sets","volume":"299","author":"Chen","year":"2015","journal-title":"Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1016\/j.fss.2013.08.008","article-title":"Solution of linear differential equations with fuzzy boundary values","volume":"257","author":"Gasilov","year":"2014","journal-title":"Fuzzy Sets Syst."},{"key":"ref_19","first-page":"1","article-title":"Coping with uncertainties in production planning through fuzzy mathematical programming: Application to steel rolling industry","volume":"22","author":"Demirli","year":"2014","journal-title":"Int. J. Oper. Res."},{"key":"ref_20","first-page":"1631","article-title":"Integration of Unascertained Method with Neural Networks and Its Application","volume":"6","author":"Shi","year":"2011","journal-title":"J. Netw."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s00500-013-1081-z","article-title":"A new approach to fuzzy initial value problem","volume":"18","author":"Gasilov","year":"2014","journal-title":"Soft Comput."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ma, L. (2014, January 9\u201311). Risk Evaluation Model of a Supply Chain System Based on Unascertained Theory. Proceedings of the ICLEM 2014: System Planning, Supply Chain Management, and Safety, Shanghai, China.","DOI":"10.1061\/9780784413753.001"},{"key":"ref_23","first-page":"91","article-title":"Enterprise Emergency Logistics Capability Evaluation Research Based on Rough Set and Unascertained Measurement Model","volume":"44","author":"Ren","year":"2014","journal-title":"Int. J. Appl. Math."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1108\/K-10-2013-0235","article-title":"A new information security risk analysis method based on membership degree","volume":"43","author":"Chen","year":"2014","journal-title":"Kybernetes"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2639","DOI":"10.3233\/IFS-130934","article-title":"Model for software quality evaluation with hesitant fuzzy uncertain linguistic information","volume":"26","author":"Li","year":"2014","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1108\/K-01-2014-0012","article-title":"Selection of project delivery approach with unascertained model","volume":"44","author":"Li","year":"2015","journal-title":"Kybernetes"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1504\/IJOR.2013.057486","article-title":"Single server unreliable queueing model with removable service station","volume":"18","author":"Singh","year":"2013","journal-title":"Int. J. Oper. Res."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/2\/664\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T14:56:08Z","timestamp":1760194568000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/18\/2\/664"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,24]]},"references-count":27,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,2]]}},"alternative-id":["s18020664"],"URL":"https:\/\/doi.org\/10.3390\/s18020664","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2018,2,24]]}}}