{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:40:04Z","timestamp":1751416804164,"version":"3.41.0"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319759272"},{"type":"electronic","value":"9783319759289"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-75928-9_1","type":"book-chapter","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T07:14:14Z","timestamp":1519370054000},"page":"1-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Implementation of a New Function for Preventing Short Reconnection in a WLAN Triage System"],"prefix":"10.1007","author":[{"given":"Kosuke","family":"Ozera","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Takaaki","family":"Inaba","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Kevin","family":"Bylykbashi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shinji","family":"Sakamoto","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,2,24]]},"reference":[{"issue":"2","key":"1_CR1","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1504\/IJGUC.2011.040609","volume":"2","author":"Q Cao","year":"2011","unstructured":"Cao, Q., Fujita, S.: Load-balancing schemes for a hierarchical peer-to-peer file search system. Int. J. Grid Util. Comput. 2(2), 164\u2013171 (2011)","journal-title":"Int. J. Grid Util. Comput."},{"unstructured":"Choi, S., Del Prado, J., Mangold, S., et al.: IEEE 802.11e Contention-based Channel Access (EDCF) performance evaluation. In: International Conference on Communications (ICC-2003), vol. 2, pp. 1151\u20131156 (2003)","key":"1_CR2"},{"doi-asserted-by":"crossref","unstructured":"Elmazi, D., Inaba, T., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: Selection of secure actors in wireless sensor and actor networks using fuzzy logic. In: The 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2015), pp. 125\u2013131 (2015)","key":"1_CR3","DOI":"10.1109\/BWCCA.2015.51"},{"issue":"1","key":"1_CR4","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s11036-015-0673-5","volume":"21","author":"D Elmazi","year":"2016","unstructured":"Elmazi, D., Sakamoto, S., Oda, T., Kulla, E., Spaho, E., Barolli, L.: Two fuzzy-based systems for selection of actor nodes inwireless sensor and actor networks: a comparison study considering security parameter effect. Mob. Netw. Appl. 21(1), 53\u201364 (2016)","journal-title":"Mob. Netw. Appl."},{"issue":"4","key":"1_CR5","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MNET.2005.1470677","volume":"19","author":"D Gao","year":"2005","unstructured":"Gao, D., Cai, J., Ngan, K.N.: Admission control in IEEE802.11e wireless LANs. IEEE Netw. 19(4), 6\u201313 (2005)","journal-title":"IEEE Netw."},{"issue":"3&4","key":"1_CR6","first-page":"213","volume":"11","author":"T Inaba","year":"2015","unstructured":"Inaba, T., Elmazi, D., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A secure-aware call admission control scheme for wireless cellular networks using fuzzy logic and its performance evaluation. J. Mob. Multimed. 11(3&4), 213\u2013222 (2015)","journal-title":"J. Mob. Multimed."},{"doi-asserted-by":"crossref","unstructured":"Inaba, T., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A QoS-aware admission control system for WLAN using fuzzy logic. In: The 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2016), pp. 499\u2013505 (2016)","key":"1_CR7","DOI":"10.1109\/WAINA.2016.141"},{"doi-asserted-by":"crossref","unstructured":"Inaba, T., Sakamoto, S., Oda, T., Ikeda, M., Barolli, L.: A testbed for admission control in WLAN: a fuzzy approach and its performance evaluation. In: The 11th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA-2016), pp. 559\u2013571 (2016)","key":"1_CR8","DOI":"10.1007\/978-3-319-49106-6_55"},{"issue":"1","key":"1_CR9","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1504\/IJGUC.2015.066397","volume":"6","author":"S Javanmardi","year":"2014","unstructured":"Javanmardi, S., Shojafar, M., Shariatmadari, S., Ahrabi, S.S.: Fr trust: a fuzzy reputation-based model for trust management in semantic P2P grids. Int. J. Grid Util. Comput. 6(1), 57\u201366 (2014)","journal-title":"Int. J. Grid Util. Comput."},{"key":"1_CR10","volume-title":"Fuzzy Sets, Uncertainty, and Information","author":"GJ Klir","year":"1988","unstructured":"Klir, G.J., Folger, T.A.: Fuzzy Sets, Uncertainty, and Information. Prentice Hall, Englewood Cliffs (1988)"},{"doi-asserted-by":"crossref","unstructured":"Kolici, V., Inaba, T., Lala, A., Mino, G., Sakamoto, S., Barolli, L.: A fuzzy-based CAC scheme for cellular networks considering security. In: 2014 17th International Conference on Network-Based Information Systems, pp. 368\u2013373. IEEE (2014)","key":"1_CR11","DOI":"10.1109\/NBiS.2014.36"},{"doi-asserted-by":"crossref","unstructured":"Kulla, E., Mino, G., Sakamoto, S., Ikeda, M., Caball\u00e9, S., Barolli, L.: FBMIS: a fuzzy-based multi-interface system for cellular and ad hoc networks. In: The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), pp. 180\u2013185 (2014)","key":"1_CR12","DOI":"10.1109\/AINA.2014.154"},{"issue":"1","key":"1_CR13","doi-asserted-by":"crossref","first-page":"27","DOI":"10.3233\/JHS-150506","volume":"21","author":"Y Liu","year":"2015","unstructured":"Liu, Y., Sakamoto, S., Matsuo, K., Ikeda, M., Barolli, L., Xhafa, F.: Improving reliability of JXTA-overlay P2P platform: a comparison study for two fuzzy-based systems. J. High Speed Netw. 21(1), 27\u201342 (2015)","journal-title":"J. High Speed Netw."},{"issue":"7","key":"1_CR14","doi-asserted-by":"crossref","first-page":"2677","DOI":"10.1007\/s00500-015-1667-8","volume":"20","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Sakamoto, S., Matsuo, K., Ikeda, M., Barolli, L., Xhafa, F.: A comparison study for two fuzzy-based systems: improving reliability and security of jxta-overlay p2p platform. Soft Comput. 20(7), 2677\u20132687 (2016)","journal-title":"Soft Comput."},{"issue":"6","key":"1_CR15","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MWC.2003.1265851","volume":"10","author":"S Mangold","year":"2003","unstructured":"Mangold, S., Choi, S., Hiertz, G.R., Klein, O., Walke, B.: Analysis of IEEE 802.11e for QoS support in wireless LANs. IEEE Wirel. Commun. 10(6), 40\u201350 (2003)","journal-title":"IEEE Wirel. Commun."},{"unstructured":"Mangold, S., Choi, S., May, P., Klein, O., Hiertz, G., Stibor, L.: IEEE802.11e wireless LAN for quality of service. Proc. Eur. Wirel. 2, 32\u201339 (2002)","key":"1_CR16"},{"issue":"1","key":"1_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JHS-150504","volume":"21","author":"K Matsuo","year":"2015","unstructured":"Matsuo, K., Elmazi, D., Liu, Y., Sakamoto, S., Mino, G., Barolli, L.: FACS-MP: a fuzzy admission control system with many priorities for wireless cellular networks and its performance evaluation. J. High Speed Netw. 21(1), 1\u201314 (2015)","journal-title":"J. High Speed Netw."},{"key":"1_CR18","volume-title":"Fuzzy Logic: A Practical Approach","author":"FM McNeill","year":"1994","unstructured":"McNeill, F.M., Thro, E.: Fuzzy Logic: A Practical Approach. Academic Press, London (1994)"},{"issue":"3","key":"1_CR19","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1145\/175247.175254","volume":"37","author":"T Munakata","year":"1994","unstructured":"Munakata, T., Jani, Y.: Fuzzy systems: an overview. Commun. ACM 37(3), 68\u201376 (1994)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Ozera, K., Inaba, T., Elmazi, D., Sakamoto, S., Oda, T., Barolli, L.: A fuzzy approach for secure clustering in manets: effects of distance parameter on system performance. In: The 31st IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA-2017), pp. 251\u2013258. Tamkang University, Taipei, Taiwan, 27\u201329 March 2017 (2017)","key":"1_CR20","DOI":"10.1109\/WAINA.2017.52"},{"unstructured":"Ozera, K., Inaba, T., Sakamoto, S., Barolli, L.: Implementation of a wlan triage testbed using fuzzy logic: Evaluation for different number of clients","key":"1_CR21"},{"issue":"1","key":"1_CR22","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/0005-1098(79)90084-0","volume":"15","author":"TJ Procyk","year":"1979","unstructured":"Procyk, T.J., Mamdani, E.H.: A linguistic self-organizing process controller. Automatica 15(1), 15\u201330 (1979)","journal-title":"Automatica"},{"doi-asserted-by":"crossref","unstructured":"Qashi, R., Bogdan, M., H\u00e4nssgen, K.: Evaluating the QoS of WLANs for the IEEE802.11 EDCF in real-time applications. In: International Conference on Communications and Information Technology (ICCIT-2011), pp. 32\u201335 (2011)","key":"1_CR23","DOI":"10.1109\/ICCITECHNOL.2011.5762689"},{"unstructured":"Romdhani, L., Ni, Q., Turletti, T.: Adaptive EDCF: enhanced service differentiation for IEEE802.11 wireless ad-hoc networks. Wirel. Commun. Netw. (WCNC-2003) 2, 1373\u20131378 (2003)","key":"1_CR24"},{"issue":"1","key":"1_CR25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1504\/IJCNDS.2016.077935","volume":"17","author":"S Sakamoto","year":"2016","unstructured":"Sakamoto, S., Oda, T., Ikeda, M., Barolli, L., Xhafa, F.: Implementation and evaluation of a simulation system based on particle swarm optimisation for node placement problem in wireless mesh networks. Int. J. Commun. Netw. Distrib. Syst. 17(1), 1\u201313 (2016)","journal-title":"Int. J. Commun. Netw. Distrib. Syst."},{"doi-asserted-by":"crossref","unstructured":"Song, N.O., Kwak, B.J., Song, J., Miller, L.E.: Enhancement of IEEE 802.11 distributed coordination function with exponential increase exponential decrease backoff algorithm. In: The 57th IEEE Semiannual Vehicular Technology Conference, vol. 4, pp. 2775\u20132778 (2003)","key":"1_CR26","DOI":"10.1109\/VETECS.2003.1208898"},{"issue":"9","key":"1_CR27","doi-asserted-by":"crossref","first-page":"1783","DOI":"10.1007\/s00500-013-1206-4","volume":"18","author":"E Spaho","year":"2014","unstructured":"Spaho, E., Sakamoto, S., Barolli, L., Xhafa, F., Ikeda, M.: Trustworthiness in P2P: performance behaviour of two fuzzy-based systems for JXTA-overlay platform. Soft Comput. 18(9), 1783\u20131793 (2014)","journal-title":"Soft Comput."},{"issue":"4","key":"1_CR28","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1504\/IJSSC.2013.058372","volume":"3","author":"K Uchida","year":"2013","unstructured":"Uchida, K., Takematsu, M., Lee, J.H., Honda, J.: A particle swarm optimisation algorithm to generate inhomogeneous triangular cells for allocating base stations in urban and suburban areas. Int. J. Space-Based Situated Comput. 3(4), 207\u2013214 (2013)","journal-title":"Int. J. Space-Based Situated Comput."},{"doi-asserted-by":"crossref","unstructured":"Wu, H., Peng, Y., Long, K., Cheng, S., Ma, J.: Performance of reliable transport protocol over IEEE 802.11 wireless LAN: analysis and enhancement. In: The 21st Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2, pp. 599\u2013607 (2002)","key":"1_CR29","DOI":"10.1109\/INFCOM.2002.1019305"},{"doi-asserted-by":"crossref","unstructured":"Yang, X., Vaidya, N.H.: Priority scheduling in wireless ad hoc networks. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 71\u201379 (2002)","key":"1_CR30","DOI":"10.1145\/513800.513809"},{"key":"1_CR31","volume-title":"Fuzzy Logic for the Management of Uncertainty","author":"LA Zadeh","year":"1992","unstructured":"Zadeh, L.A., Kacprzyk, J.: Fuzzy Logic for the Management of Uncertainty. John Wiley & Sons Inc., New York (1992)"},{"issue":"2","key":"1_CR32","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/TWC.2007.05370","volume":"6","author":"J Zhu","year":"2007","unstructured":"Zhu, J., Fapojuwo, A.O.: A new call admission control method for providing desired throughput and delay performance in IEEE 802.11e Wireless LANs. IEEE Trans. Wirel. Commun. 6(2), 701\u2013709 (2007)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"1_CR33","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-7949-0","volume-title":"Fuzzy Set Theory and Its Applications","author":"HJ Zimmermann","year":"1991","unstructured":"Zimmermann, H.J.: Fuzzy Set Theory and Its Applications. Springer Science & Business Media, Netherlands (1991)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-75928-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:08:34Z","timestamp":1751414914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-75928-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319759272","9783319759289"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-75928-9_1","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2018]]}}}