{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T14:10:06Z","timestamp":1746367806229,"version":"3.40.4"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319112886"},{"type":"electronic","value":"9783319112893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11289-3_5","type":"book-chapter","created":{"date-parts":[[2014,9,5]],"date-time":"2014-09-05T01:07:33Z","timestamp":1409879253000},"page":"40-48","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy Logic-Based Adaptive Communication Management on Wireless Network"],"prefix":"10.1007","author":[{"given":"Taeyoung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Youngshin","family":"Han","sequence":"additional","affiliation":[]},{"given":"Jaekwon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jongsik","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"5_CR1","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/JPROC.2011.2182095","volume":"100","author":"D. Raychaudhuri","year":"2012","unstructured":"Raychaudhuri, D., Mandayam, N.B.: Frontiers of wireless and mobile communications. Proceedings of the IEEE\u00a0100(4), 824\u2013840 (2012)","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"5_CR2","doi-asserted-by":"publisher","first-page":"1872","DOI":"10.1109\/TIT.2011.2110110","volume":"57","author":"A.S. Avestimehr","year":"2011","unstructured":"Avestimehr, A.S., Diggavi, S.N., Tse, D.N.: Wireless network information flow: A deterministic approach. IEEE Transactions on Information Theory\u00a057(4), 1872\u20131905 (2011)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"10","key":"5_CR3","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1109\/LCOMM.2011.081011.110885","volume":"15","author":"K. Shin","year":"2011","unstructured":"Shin, K., Kim, J., Choi, S.B.: Loss recovery scheme for TCP using MAC MIB over wireless access networks. IEEE Communications Letters\u00a015(10), 1059\u20131061 (2011)","journal-title":"IEEE Communications Letters"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Maisuria, J.V., Patel, R.M.: Overview of Techniques for Improving QoS of TCP over Wireless Links. In: 2012 International Conference on Communication Systems and Network Technologies (CSNT), pp. 366\u2013370. IEEE (2012)","DOI":"10.1109\/CSNT.2012.86"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Nguyen, T.H., Park, M., Youn, Y., Jung, S.: An improvement of TCP performance over wireless networks. In: 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 214\u2013219. IEEE (2013)","DOI":"10.1109\/ICUFN.2013.6614814"},{"key":"5_CR6","first-page":"455","volume":"2","author":"S. Tiyyagura","year":"2011","unstructured":"Tiyyagura, S., Nutangi, R., Reddy, P.C.: An improved snoop for TCP Reno and TCP sack in wired-cum-wireless networks. Ind. J. Comput. Sci. Eng.\u00a02, 455\u2013460 (2011)","journal-title":"Ind. J. Comput. Sci. Eng."},{"key":"5_CR7","unstructured":"Rajasekaran, S., Pai, G.V.: Neural networks, Fuzzy logic and Genetic algorithms. PHI Learning Private Limited (2011)"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/21.52551","volume":"20","author":"C.C. Lee","year":"1990","unstructured":"Lee, C.C.: Fuzzy Logic in Control Systems: Fuzzy Logic Controller. IEEE Trans. Systems, Man and Cybernetics\u00a020, 404\u2013435 (1990)","journal-title":"IEEE Trans. Systems, Man and Cybernetics"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Zeigler, B., Moon, Y., Kim, D., Ball, G.: The DEVS environment for high performance modeling and simulation, Computational Science and Engineering. IEEE CS&E, 61\u201371 (1997)","DOI":"10.1109\/99.615432"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence. Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11289-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T13:28:09Z","timestamp":1746365289000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11289-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319112886","9783319112893"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11289-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}