{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T04:13:02Z","timestamp":1750824782643,"version":"3.41.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319655208"},{"type":"electronic","value":"9783319655215"}],"license":[{"start":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T00:00:00Z","timestamp":1503532800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-65521-5_3","type":"book-chapter","created":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T02:33:50Z","timestamp":1503455630000},"page":"27-41","source":"Crossref","is-referenced-by-count":0,"title":["A Comparison Study of WLAN and WLAN Triage Systems Considering Throughput Parameter"],"prefix":"10.1007","author":[{"given":"Kosuke","family":"Ozera","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takaaki","family":"Inaba","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shinji","family":"Sakamoto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2017,8,24]]},"reference":[{"issue":"2","key":"3_CR1","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1504\/IJGUC.2011.040609","volume":"2","author":"Q Cao","year":"2011","unstructured":"Cao, Q., Fujita, S.: Load-balancing schemes for a hierarchical peer-to-peer file search system. Int. J. Grid Util. Comput. 2(2), 164\u2013171 (2011)","journal-title":"Int. J. Grid Util. Comput."},{"key":"3_CR2","unstructured":"Choi, S., Del\u00a0Prado, J., Mangold, S., et\u00a0al.: IEEE 802.11e contention-based channel access (EDCF) performance evaluation. In: International Conference on Communications (ICC-2003), vol. 2, pp. 1151\u20131156 (2003)"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Elmazi, D., Inaba, T., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: Selection of secure actors in wireless sensor and actor networks using fuzzy logic. In: The 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2015), pp. 125\u2013131 (2015)","DOI":"10.1109\/BWCCA.2015.51"},{"issue":"1","key":"3_CR4","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s11036-015-0673-5","volume":"21","author":"D Elmazi","year":"2016","unstructured":"Elmazi, D., Sakamoto, S., Oda, T., Kulla, E., Spaho, E., Barolli, L.: Two fuzzy-based systems for selection of actor nodes inwireless sensor and actor networks: a comparison study considering security parameter effect. Mob. Netw. Appl. 21(1), 53\u201364 (2016)","journal-title":"Mob. Netw. Appl."},{"issue":"4","key":"3_CR5","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNET.2005.1470677","volume":"19","author":"D Gao","year":"2005","unstructured":"Gao, D., Cai, J., Ngan, K.N.: Admission control in IEEE802.11e wireless LANs. IEEE Netw. 19(4), 6\u201313 (2005)","journal-title":"IEEE Netw."},{"issue":"3&4","key":"3_CR6","first-page":"213","volume":"11","author":"T Inaba","year":"2015","unstructured":"Inaba, T., Elmazi, D., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A secure-aware call admission control scheme for wireless cellular networks using fuzzy logic and its performance evaluation. J. Mob. Multimed. 11(3&4), 213\u2013222 (2015)","journal-title":"J. Mob. Multimed."},{"issue":"4","key":"3_CR7","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1504\/IJSSC.2016.082768","volume":"6","author":"T Inaba","year":"2016","unstructured":"Inaba, T., Obukata, R., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: Performance evaluation of a QoS-aware fuzzy-based CAC for LAN access. Int. J. Space-Based Situated Comput. 6(4), 228\u2013238 (2016)","journal-title":"Int. J. Space-Based Situated Comput."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Inaba, T., Ozera, K., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A testbed for admission control in WLANs: effects of RSSI on connection keep-alive time. In: The 31st IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2017), 27\u201329 March 2017, Tamkang University, Taipei, Taiwan, pp. 722\u2013729 (2017)","DOI":"10.1109\/WAINA.2017.62"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Inaba, T., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A QoS-aware admission control system for WLAN using fuzzy logic. In: The 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2016), pp. 499\u2013505 (2016)","DOI":"10.1109\/WAINA.2016.141"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Inaba, T., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A testbed for admission control in WLAN: a fuzzy approach and its performance evaluation. In: The 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2016), pp. 559\u2013571 (2016)","DOI":"10.1007\/978-3-319-49106-6_55"},{"issue":"1","key":"3_CR11","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1504\/IJGUC.2015.066397","volume":"6","author":"S Javanmardi","year":"2014","unstructured":"Javanmardi, S., Shojafar, M., Shariatmadari, S., Ahrabi, S.S.: Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int. J. Grid Util. Comput. 6(1), 57\u201366 (2014)","journal-title":"Int. J. Grid Util. Comput."},{"key":"3_CR12","volume-title":"Fuzzy Expert Systems","author":"A Kandel","year":"1991","unstructured":"Kandel, A.: Fuzzy Expert Systems. CRC Press, Boca Raton (1991)"},{"key":"3_CR13","volume-title":"Fuzzy Sets, Uncertainty, and Information","author":"GJ Klir","year":"1988","unstructured":"Klir, G.J., Folger, T.A.: Fuzzy Sets, Uncertainty, and Information. Prentice Hall, Englewood Cliffs (1988)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Kolici, V., Inaba, T., Lala, A., Mino, G., Sakamoto, S., Barolli, L.: A fuzzy-based CAC scheme for cellular networks considering security. In: 2014 17th International Conference on Network-Based Information Systems, pp. 368\u2013373. IEEE (2014)","DOI":"10.1109\/NBiS.2014.36"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Kulla, E., Mino, G., Sakamoto, S., Ikeda, M., Caball\u00e9, S., Barolli, L.: Fbmis: a fuzzy-based multi-interface system for cellular and ad hoc networks. In: The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), pp. 180\u2013185 (2014)","DOI":"10.1109\/AINA.2014.154"},{"issue":"1","key":"3_CR16","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3233\/JHS-150506","volume":"21","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Sakamoto, S., Matsuo, K., Ikeda, M., Barolli, L., Xhafa, F.: Improving reliability of jxta-overlay p2p platform: a comparison study for two fuzzy-based systems. J. High Speed Netw. 21(1), 27\u201342 (2015)","journal-title":"J. High Speed Netw."},{"issue":"7","key":"3_CR17","doi-asserted-by":"crossref","first-page":"2677","DOI":"10.1007\/s00500-015-1667-8","volume":"20","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Sakamoto, S., Matsuo, K., Ikeda, M., Barolli, L., Xhafa, F.: A comparison study for two fuzzy-based systems: improving reliability and security of jxta-overlay p2p platform. Soft. Comput. 20(7), 2677\u20132687 (2016)","journal-title":"Soft. Comput."},{"issue":"6","key":"3_CR18","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MWC.2003.1265851","volume":"10","author":"S Mangold","year":"2003","unstructured":"Mangold, S., Choi, S., Hiertz, G.R., Klein, O., Walke, B.: Analysis of IEEE 802.11e for QoS support in wireless LANs. IEEE Wirel. Commun. 10(6), 40\u201350 (2003)","journal-title":"IEEE Wirel. Commun."},{"key":"3_CR19","unstructured":"Mangold, S., Choi, S., May, P., Klein, O., Hiertz, G., Stibor, L.: IEEE802.11e wireless LAN for quality of service. In: Proceedings of the European Wireless, vol. 2, pp. 32\u201339 (2002)"},{"issue":"1","key":"3_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JHS-150504","volume":"21","author":"K Matsuo","year":"2015","unstructured":"Matsuo, K., Elmazi, D., Liu, Y., Sakamoto, S., Mino, G., Barolli, L.: Facs-mp: a fuzzy admission control system with many priorities for wireless cellular networks and its performance evaluation. J. High Speed Netw. 21(1), 1\u201314 (2015)","journal-title":"J. High Speed Netw."},{"key":"3_CR21","volume-title":"Fuzzy Logic: A Practical Approach","author":"FM McNeill","year":"1994","unstructured":"McNeill, F.M., Thro, E.: Fuzzy Logic: A Practical Approach. Academic Press, San Diego (1994)"},{"issue":"3","key":"3_CR22","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/175247.175254","volume":"37","author":"T Munakata","year":"1994","unstructured":"Munakata, T., Jani, Y.: Fuzzy systems: an overview. Commun. ACM 37(3), 68\u201376 (1994)","journal-title":"Commun. ACM"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Ozera, K., Inaba, T., Elmazi, D., Sakamoto, S., Oda, T., Barolli, L.: A fuzzy approach for secure clustering in manets: effects of distance parameter on system performance. In: The 31st IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2017), 27\u201329 March 2017, Tamkang University, Taipei, Taiwan, pp. 251\u2013258 (2017)","DOI":"10.1109\/WAINA.2017.52"},{"issue":"1","key":"3_CR24","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0005-1098(79)90084-0","volume":"15","author":"TJ Procyk","year":"1979","unstructured":"Procyk, T.J., Mamdani, E.H.: A linguistic self-organizing process controller. Automatica 15(1), 15\u201330 (1979)","journal-title":"Automatica"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Qashi, R., Bogdan, M., H\u00e4nssgen, K.: Evaluating the QoS of WLANs for the IEEE802.11 EDCF in real-time applications. In: International Conference on Communications and Information Technology (ICCIT 2011), pp. 32\u201335 (2011)","DOI":"10.1109\/ICCITECHNOL.2011.5762689"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Romdhani, L., Ni, Q., Turletti, T.: Adaptive EDCF: enhanced service differentiation for IEEE802.11 wireless ad-hoc networks. In: Wireless Communications and Networking (WCNC-2003), vol. 2, pp. 1373\u20131378 (2003)","DOI":"10.1109\/WCNC.2003.1200574"},{"issue":"1","key":"3_CR27","first-page":"1","volume":"17","author":"S Sakamoto","year":"2016","unstructured":"Sakamoto, S., Oda, T., Ikeda, M., Barolli, L., Xhafa, F.: Implementation and evaluation of a simulation system based on particle swarm optimisation for node placement problem in wireless mesh networks. Int. J. Commun. Netw. Distrib. Sys. 17(1), 1\u201313 (2016)","journal-title":"Int. J. Commun. Netw. Distrib. Sys."},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Song, N.O., Kwak, B.J., Song, J., Miller, L.E.: Enhancement of IEEE802.11 distributed coordination function with exponential increase exponential decrease backoff algorithm. In: The 57th IEEE Semiannual Vehicular Technology Conference, vol. 4, pp. 2775\u20132778 (2003)","DOI":"10.1109\/VETECS.2003.1208898"},{"issue":"9","key":"3_CR29","doi-asserted-by":"crossref","first-page":"1783","DOI":"10.1007\/s00500-013-1206-4","volume":"18","author":"E Spaho","year":"2014","unstructured":"Spaho, E., Sakamoto, S., Barolli, L., Xhafa, F., Ikeda, M.: Trustworthiness in p2p: performance behaviour of two fuzzy-based systems for jxta-overlay platform. Soft. Comput. 18(9), 1783\u20131793 (2014)","journal-title":"Soft. Comput."},{"issue":"4","key":"3_CR30","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1504\/IJSSC.2013.058372","volume":"3","author":"K Uchida","year":"2013","unstructured":"Uchida, K., Takematsu, M., Lee, J.H., Honda, J.: A particle swarm optimisation algorithm to generate inhomogeneous triangular cells for allocating base stations in urban and suburban areas. Int. J. Space-Based Situated Comput. 3(4), 207\u2013214 (2013)","journal-title":"Int. J. Space-Based Situated Comput."},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Wu, H., Peng, Y., Long, K., Cheng, S., Ma, J.: Performance of reliable transport protocol over IEEE802.11 wireless LAN: analysis and enhancement. In: The 21st Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 599\u2013607 (2002)","DOI":"10.1109\/INFCOM.2002.1019305"},{"key":"3_CR32","doi-asserted-by":"crossref","unstructured":"Yang, X., Vaidya, N.H.: Priority scheduling in wireless ad hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 71\u201379 (2002)","DOI":"10.1145\/513800.513809"},{"key":"3_CR33","volume-title":"Fuzzy Logic for the Management of Uncertainty","author":"LA Zadeh","year":"1992","unstructured":"Zadeh, L.A., Kacprzyk, J.: Fuzzy Logic for the Management of Uncertainty. Wiley, New York (1992)"},{"issue":"2","key":"3_CR34","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/TWC.2007.05370","volume":"6","author":"J Zhu","year":"2007","unstructured":"Zhu, J., Fapojuwo, A.O.: A new call admission control method for providing desired throughput and delay performance in IEEE802.11e wireless LANs. IEEE Trans. Wirel. Commun. 6(2), 701\u2013709 (2007)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"3_CR35","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-7949-0","volume-title":"Fuzzy Set Theory and Its Applications","author":"HJ Zimmermann","year":"1991","unstructured":"Zimmermann, H.J.: Fuzzy Set Theory and Its Applications. Springer, Heidelberg (1991)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Network-Based Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65521-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T00:52:16Z","timestamp":1750812736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65521-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,24]]},"ISBN":["9783319655208","9783319655215"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65521-5_3","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2017,8,24]]}}}