{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T04:01:49Z","timestamp":1750564909085,"version":"3.41.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319615417"},{"type":"electronic","value":"9783319615424"}],"license":[{"start":{"date-parts":[[2017,7,5]],"date-time":"2017-07-05T00:00:00Z","timestamp":1499212800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61542-4_7","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T08:02:27Z","timestamp":1499155347000},"page":"73-86","source":"Crossref","is-referenced-by-count":1,"title":["Implementation of a WLAN Triage Testbed Using Fuzzy Logic: Evaluation for Different Number of Clients"],"prefix":"10.1007","author":[{"given":"Kosuke","family":"Ozera","sequence":"first","affiliation":[]},{"given":"Takaaki","family":"Inaba","sequence":"additional","affiliation":[]},{"given":"Shinji","family":"Sakamoto","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,5]]},"reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1504\/IJGUC.2011.040609","volume":"2","author":"Q Cao","year":"2011","unstructured":"Cao, Q., Fujita, S.: Load-balancing schemes for a hierarchical peer-to-peer file search system. Int. J. Grid Util. Comput. 2(2), 164\u2013171 (2011)","journal-title":"Int. J. Grid Util. Comput."},{"unstructured":"Choi, S., Del Prado, J., Mangold, S., et al.: IEEE 802.11e contention-based channel access (EDCF) performance evaluation. In: International Conference on Communications (ICC-2003), vol. 2, pp. 1151\u20131156 (2003)","key":"7_CR2"},{"doi-asserted-by":"crossref","unstructured":"Elmazi, D., Inaba, T., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: Selection of secure actors in wireless sensor and actor networks using fuzzy logic. In: The 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2015), pp. 125\u2013131 (2015)","key":"7_CR3","DOI":"10.1109\/BWCCA.2015.51"},{"issue":"1","key":"7_CR4","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s11036-015-0673-5","volume":"21","author":"D Elmazi","year":"2016","unstructured":"Elmazi, D., Sakamoto, S., Oda, T., Kulla, E., Spaho, E., Barolli, L.: Two fuzzy-based systems for selection of actor nodes inwireless sensor and actor networks: a comparison study considering security parameter effect. Mob. Netw. Appl. 21(1), 53\u201364 (2016)","journal-title":"Mob. Netw. Appl."},{"issue":"4","key":"7_CR5","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNET.2005.1470677","volume":"19","author":"D Gao","year":"2005","unstructured":"Gao, D., Cai, J., Ngan, K.N.: Admission control in IEEE802.11e wireless LANs. IEEE Netw. 19(4), 6\u201313 (2005)","journal-title":"IEEE Netw."},{"issue":"3&4","key":"7_CR6","first-page":"213","volume":"11","author":"T Inaba","year":"2015","unstructured":"Inaba, T., Elmazi, D., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A secure-aware call admission control scheme for wireless cellular networks using fuzzy logic and its performance evaluation. J. Mob. Multimedia 11(3&4), 213\u2013222 (2015)","journal-title":"J. Mob. Multimedia"},{"issue":"4","key":"7_CR7","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1504\/IJSSC.2016.082768","volume":"6","author":"T Inaba","year":"2016","unstructured":"Inaba, T., Obukata, R., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: Performance evaluation of a QoS-aware fuzzy-based CAC for LAN access. Int. J. Space Based Situated Comput. 6(4), 228\u2013238 (2016)","journal-title":"Int. J. Space Based Situated Comput."},{"doi-asserted-by":"crossref","unstructured":"Inaba, T., Ozera, K., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A testbed for admission control in wlans: effects of rssi on connection keep-alive time. In: The 31st IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2017), pp. 722\u2013729. Tamkang University, Taipei, 27\u201329 March 2017","key":"7_CR8","DOI":"10.1109\/WAINA.2017.62"},{"doi-asserted-by":"crossref","unstructured":"Inaba, T., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A QoS-Aware admission control system for WLAN using fuzzy logic. In: The 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2016), pp. 499\u2013505 (2016)","key":"7_CR9","DOI":"10.1109\/WAINA.2016.141"},{"doi-asserted-by":"crossref","unstructured":"Inaba, T., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A testbed for admission control in wlan: a fuzzy approach and its performance evaluation. In: The 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2016), pp. 559\u2013571 (2016)","key":"7_CR10","DOI":"10.1007\/978-3-319-49106-6_55"},{"issue":"1","key":"7_CR11","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1504\/IJGUC.2015.066397","volume":"6","author":"S Javanmardi","year":"2014","unstructured":"Javanmardi, S., Shojafar, M., Shariatmadari, S., Ahrabi, S.S.: Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int. J. Grid Util. Comput. 6(1), 57\u201366 (2014)","journal-title":"Int. J. Grid Util. Comput."},{"key":"7_CR12","volume-title":"Fuzzy Expert Systems","author":"A Kandel","year":"1991","unstructured":"Kandel, A.: Fuzzy Expert Systems. CRC Press, Boca Raton (1991)"},{"key":"7_CR13","volume-title":"Fuzzy Sets, Uncertainty, and Information","author":"GJ Klir","year":"1988","unstructured":"Klir, G.J., Folger, T.A.: Fuzzy Sets, Uncertainty, and Information. Prentice Hall, Upper Saddle River (1988)"},{"doi-asserted-by":"crossref","unstructured":"Kolici, V., Inaba, T., Lala, A., Mino, G., Sakamoto, S., Barolli, L.: A fuzzy-based cac scheme for cellular networks considering security. In: 2014 17th International Conference on Network-Based Information Systems, pp. 368\u2013373. IEEE (2014)","key":"7_CR14","DOI":"10.1109\/NBiS.2014.36"},{"unstructured":"Krithika, P., Pushpavalli, M.: Quality of service optimization in IEEE802.11e networks using enhanced distributed channel access techniques. Int. J. Comput. Netw. Wirel. Commun. (IJCNWC) (2012)","key":"7_CR15"},{"doi-asserted-by":"crossref","unstructured":"Kulla, E., Mino, G., Sakamoto, S., Ikeda, M., Caball\u00e9, S., Barolli, L.: FBMIS: a fuzzy-based multi-interface system for cellular and ad hoc networks. In: The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), pp. 180\u2013185 (2014)","key":"7_CR16","DOI":"10.1109\/AINA.2014.154"},{"issue":"1","key":"7_CR17","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3233\/JHS-150506","volume":"21","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Sakamoto, S., Matsuo, K., Ikeda, M., Barolli, L., Xhafa, F.: Improving reliability of jxta-overlay p2p platform: a comparison study for two fuzzy-based systems. J. High Speed Netw. 21(1), 27\u201342 (2015)","journal-title":"J. High Speed Netw."},{"issue":"7","key":"7_CR18","doi-asserted-by":"crossref","first-page":"2677","DOI":"10.1007\/s00500-015-1667-8","volume":"20","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Sakamoto, S., Matsuo, K., Ikeda, M., Barolli, L., Xhafa, F.: A comparison study for two fuzzy-based systems: improving reliability and security of JXTA-overlay P2P platform. Soft. Comput. 20(7), 2677\u20132687 (2016)","journal-title":"Soft. Comput."},{"issue":"6","key":"7_CR19","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MWC.2003.1265851","volume":"10","author":"S Mangold","year":"2003","unstructured":"Mangold, S., Choi, S., Hiertz, G.R., Klein, O., Walke, B.: Analysis of IEEE 802.11e for QoS support in wireless LANs. Wirel. Commun. 10(6), 40\u201350 (2003). IEEE","journal-title":"Wirel. Commun."},{"key":"7_CR20","first-page":"32","volume":"2","author":"S Mangold","year":"2002","unstructured":"Mangold, S., Choi, S., May, P., Klein, O., Hiertz, G., Stibor, L.: IEEE80211e wireless LAN for quality of service. Proc. Eur. Wirel. 2, 32\u201339 (2002)","journal-title":"Proc. Eur. Wirel."},{"issue":"1","key":"7_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JHS-150504","volume":"21","author":"K Matsuo","year":"2015","unstructured":"Matsuo, K., Elmazi, D., Liu, Y., Sakamoto, S., Mino, G., Barolli, L.: Facs-mp: a fuzzy admission control system with many priorities for wireless cellular networks and its performance evaluation. J. High Speed Net. 21(1), 1\u201314 (2015)","journal-title":"J. High Speed Net."},{"key":"7_CR22","volume-title":"Fuzzy Logic: A Practical Approach","author":"FM McNeill","year":"1994","unstructured":"McNeill, F.M., Thro, E.: Fuzzy Logic: A Practical Approach. Academic Press, Cambridge (1994)"},{"issue":"3","key":"7_CR23","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/175247.175254","volume":"37","author":"T Munakata","year":"1994","unstructured":"Munakata, T., Jani, Y.: Fuzzy systems: an overview. Commun. ACM 37(3), 68\u201376 (1994)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Ozera, K., Inaba, T., Elmazi, D., Sakamoto, S., Oda, T., Barolli, L.: A fuzzy approach for secure clustering in manets: Effects of distance parameter on system performance. In: The 31st IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2017), pp. 251\u2013258. Tamkang University, Taipei, 27\u201329 March 2017","key":"7_CR24","DOI":"10.1109\/WAINA.2017.52"},{"issue":"1","key":"7_CR25","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0005-1098(79)90084-0","volume":"15","author":"TJ Procyk","year":"1979","unstructured":"Procyk, T.J., Mamdani, E.H.: A linguistic self-organizing process controller. Automatica 15(1), 15\u201330 (1979)","journal-title":"Automatica"},{"doi-asserted-by":"crossref","unstructured":"Qashi, R., Bogdan, M., H\u00e4nssgen, K.: Evaluating the QoS of WLANs for the IEEE802.11 EDCF in real-time applications. In: International Conference on Communications and Information Technology (ICCIT-2011), pp. 32\u201335 (2011)","key":"7_CR26","DOI":"10.1109\/ICCITECHNOL.2011.5762689"},{"doi-asserted-by":"crossref","unstructured":"Romdhani, L., Ni, Q., Turletti, T.: Adaptive EDCF: enhanced Service Differentiation for IEEE802.11 wireless Ad-hoc Networks. In: Wireless Communications and Networking (WCNC-2003), vol. 2, pp. 1373\u20131378 (2003)","key":"7_CR27","DOI":"10.1109\/WCNC.2003.1200574"},{"issue":"1","key":"7_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJCNDS.2016.077935","volume":"17","author":"S Sakamoto","year":"2016","unstructured":"Sakamoto, S., Oda, T., Ikeda, M., Barolli, L., Xhafa, F.: Implementation and evaluation of a simulation system based on particle swarm optimisation for node placement problem in wireless mesh networks. Int. J. Commun. Netw. Distrib. Syst. 17(1), 1\u201313 (2016)","journal-title":"Int. J. Commun. Netw. Distrib. Syst."},{"doi-asserted-by":"crossref","unstructured":"Song, N.O., Kwak, B.J., Song, J., Miller, L.E.: Enhancement of IEEE802.11 distributed coordination function with exponential increase exponential decrease backoff algorithm. In: The 57th IEEE Semiannual Vehicular Technology Conference, vol. 4, pp. 2775\u20132778 (2003)","key":"7_CR29","DOI":"10.1109\/VETECS.2003.1208898"},{"issue":"9","key":"7_CR30","doi-asserted-by":"crossref","first-page":"1783","DOI":"10.1007\/s00500-013-1206-4","volume":"18","author":"E Spaho","year":"2014","unstructured":"Spaho, E., Sakamoto, S., Barolli, L., Xhafa, F., Ikeda, M.: Trustworthiness in P2P: performance behaviour of two fuzzy-based systems for JXTA-overlay platform. Soft. Comput. 18(9), 1783\u20131793 (2014)","journal-title":"Soft. Comput."},{"issue":"4","key":"7_CR31","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1504\/IJSSC.2013.058372","volume":"3","author":"K Uchida","year":"2013","unstructured":"Uchida, K., Takematsu, M., Lee, J.H., Honda, J.: A particle swarm optimisation algorithm to generate inhomogeneous triangular cells for allocating base stations in urban and suburban areas. Int. J. Space Based Situated Comput. 3(4), 207\u2013214 (2013)","journal-title":"Int. J. Space Based Situated Comput."},{"doi-asserted-by":"crossref","unstructured":"Wu, H., Peng, Y., Long, K., Cheng, S., Ma, J.: Performance of reliable transport protocol over IEEE802.11 wireless LAN: analysis and enhancement. In: The 21st Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 599\u2013607 (2002)","key":"7_CR32","DOI":"10.1109\/INFCOM.2002.1019305"},{"doi-asserted-by":"crossref","unstructured":"Yang, X., Vaidya, N.H.: Priority scheduling in wireless ad hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 71\u201379 (2002)","key":"7_CR33","DOI":"10.1145\/513800.513809"},{"key":"7_CR34","volume-title":"Fuzzy Logic for the Management of Uncertainty","author":"LA Zadeh","year":"1992","unstructured":"Zadeh, L.A., Kacprzyk, J.: Fuzzy Logic for the Management of Uncertainty. Wiley, Hoboken (1992)"},{"issue":"2","key":"7_CR35","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/TWC.2007.05370","volume":"6","author":"J Zhu","year":"2007","unstructured":"Zhu, J., Fapojuwo, A.O.: A new call admission control method for providing desired throughput and delay performance in IEEE802.11e wireless LANs. IEEE Trans. Wireless Commun. 6(2), 701\u2013709 (2007)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"7_CR36","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-7949-0","volume-title":"Fuzzy Set Theory and Its Applications","author":"HJ Zimmermann","year":"1991","unstructured":"Zimmermann, H.J.: Fuzzy Set Theory and Its Applications. Springer, Heidelberg (1991)"}],"container-title":["Advances in Intelligent Systems and Computing","Innovative Mobile and Internet Services in Ubiquitous Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61542-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T04:10:54Z","timestamp":1750479054000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61542-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,5]]},"ISBN":["9783319615417","9783319615424"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61542-4_7","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,7,5]]}}}