{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T21:14:28Z","timestamp":1771535668166,"version":"3.50.1"},"reference-count":40,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2000,1,1]],"date-time":"2000-01-01T00:00:00Z","timestamp":946684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst., Man, Cybern. C"],"published-print":{"date-parts":[[2000]]},"DOI":"10.1109\/5326.885114","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T18:17:23Z","timestamp":1030213043000},"page":"329-339","source":"Crossref","is-referenced-by-count":158,"title":["Connection admission control in ATM networks using survey-based type-2 fuzzy logic systems"],"prefix":"10.1109","volume":"30","author":[{"given":"J.M.","family":"Mendel","sequence":"first","affiliation":[]},{"given":"N.N.","family":"Karnik","sequence":"additional","affiliation":[]},{"given":"Q.","family":"Liang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(75)90036-5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(93)90273-K"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/49.552068"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/ecja.4410761204"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.1993.390281"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(91)90110-C"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/01969728008927629"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/0045-7906(95)00038-0"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/90.554723"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(88)90186-8"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/25.740058"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/49.611165"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190339"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/5.537109"},{"key":"ref13","article-title":"special issue on computational and artificial intelligence in high speed networks","volume":"15","author":"habib","year":"1997","journal-title":"IEEE J Select Areas Commun Special Issue Artif Intell High-Speed Networks"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1998.686319"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZY.1998.686240"},{"key":"ref16","article-title":"operations on type-2 fuzzy sets","author":"karnik","year":"0","journal-title":"Fuzzy Sets Syst"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(01)00069-X"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/91.811231"},{"key":"ref19","author":"kaufmann","year":"1991","journal-title":"Introduction to Fuzzy Arithmetic Theory and Applications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/41.661305"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(76)80011-3"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1997.595079"},{"key":"ref27","article-title":"computing with words when words can mean different things to different people","author":"mendel","year":"1999","journal-title":"Proc Int ICSC Congr Computational Intelligence Methods Applications 3rd Annu Symp Fuzzy Logic Applications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(93)90125-2"},{"key":"ref29","author":"stallings","year":"1998","journal-title":"High-Speed Networks TCP\/IP and ATM Design Principles"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/49.611160"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/35.592110"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(97)10044-5"},{"key":"ref2","article-title":"an application of type-2 sets to decision making in engineering","author":"chaneau","year":"1987","journal-title":"Analysis of Fuzzy Information&#x2014 Vol II Artificial Intelligence and Decision Systems"},{"key":"ref9","author":"dubois","year":"1980","journal-title":"Fuzzy Sets and Systems Theory and Applications"},{"key":"ref1","author":"box","year":"1994","journal-title":"Time Series Analysis"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/91.917124"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/91.873577"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/3477.662760"},{"key":"ref23","first-page":"1182","article-title":"applications of fuzzy logic to approximate reasoning using linguistic systems","volume":"smc 7","author":"mamdani","year":"1977","journal-title":"IEEE Trans Syst Man and Cybern"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/5.364485"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1997.610055"}],"container-title":["IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5326\/19148\/00885114.pdf?arnumber=885114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:09:09Z","timestamp":1638216549000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/885114\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"references-count":40,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/5326.885114","relation":{},"ISSN":["1094-6977"],"issn-type":[{"value":"1094-6977","type":"print"}],"subject":[],"published":{"date-parts":[[2000]]}}}