{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:17:30Z","timestamp":1729671450598,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9]]},"DOI":"10.1109\/efta.2007.4416776","type":"proceedings-article","created":{"date-parts":[[2008,1,4]],"date-time":"2008-01-04T20:59:03Z","timestamp":1199480343000},"page":"249-256","source":"Crossref","is-referenced-by-count":3,"title":["Intelligent control in automation based on wireless traffic analysis"],"prefix":"10.1109","author":[{"given":"Kurt","family":"Derr","sequence":"first","affiliation":[]},{"given":"Milos","family":"Manic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","first-page":"795","article-title":"General Fuzzy Systems as Extensions of the Takagi-Sugeno Methodology","author":"mastorakis","year":"2004","journal-title":"WSEAS Transactions on Systems"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSMCC.2005.855492"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/FUZZ.2003.1206614"},{"key":"ref12","first-page":"54","article-title":"Fuzzy-Based Intra-Piconet Scheduling in Bluetooth","author":"suliman","year":"2005","journal-title":"Proceedings of the 2005 Finnish Signal Processing Symposium"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1023\/A:1011329512150"},{"key":"ref14","article-title":"A Fuzzy Data Mining Based Intrusion Detection Model","author":"jin","year":"2004","journal-title":"Workshop on Future Trends of Distributed Computing Systems"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/NAFIPS.2000.877441"},{"year":"2007","article-title":"Escort Memory Systems Goes Mobile With the Element RFID Bluetooth Reader","key":"ref16"},{"year":"2006","article-title":"Briefing: ABB's Trend with Wireless Automation Applications","key":"ref17"},{"year":"2007","article-title":"Automation World","key":"ref18"},{"key":"ref19","first-page":"388","article-title":"A Neuro Fuzzy Controller Learning by Fuzzy Error Propagation","author":"nauck","year":"1992","journal-title":"Proceedings of the Conference of North American Fuzzy Information Processing Society NAFIPS"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/BF00337288"},{"year":"2007","article-title":"Industrial Automation","key":"ref4"},{"key":"ref27","first-page":"335","article-title":"Data Mining","author":"han","year":"2006"},{"year":"2007","author":"steigmann","article-title":"Wireless networking seeks role in factory automation","key":"ref3"},{"key":"ref6","first-page":"304","article-title":"Neural modeling of Ethernet traffic over ATM networks","author":"casilari","year":"1998","journal-title":"EANN '98 June"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-00784-6","article-title":"Self-Organization and Associative Memory","author":"kohonen","year":"1988"},{"key":"ref5","article-title":"&#x2018;BlueBag&#x2019; PC sniffs out Bluetooth flaws","author":"mcmillan","year":"2006","journal-title":"IDG News Service"},{"key":"ref8","article-title":"Artifical Neural Networks for Misuse Detection","author":"cannady","year":"1998","journal-title":"National Information Systems Security Conference"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/IJCNN.2000.861501","article-title":"Queueing Network Modeling with Distributed Neural Networks for Service Quality Estimation in B-ISDN Networks","author":"aussem","year":"2000","journal-title":"Proceedings IEEEINNS-ENNS International Joint Conference on Neural Networks"},{"year":"2005","journal-title":"Bluetooth SIG (Special Interest Group) Press Release","article-title":"Bluetooth Shipments Climb to Five Million Per Week","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.ins.2005.02.008"},{"year":"2006","journal-title":"Bluetooth SIG (Special Interest Group) Press Release","article-title":"Bluetooth SIG Announces Best of CES Contest Winners","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/MCI.2007.380672"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICNN.1994.374401"},{"year":"1992","author":"jang","journal-title":"Neuro-Fuzzy Modeling Architectures Analyses and Applications","key":"ref21"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/91.660805","article-title":"An Online Self Constructing Neural Fuzzy Inference Network and its Applications","volume":"6","author":"feng","year":"1998","journal-title":"IEEE Transactions on Fuzzy Systems"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1109\/ICNN.1993.298575"},{"key":"ref26","first-page":"207","article-title":"Fuzzy Modeling and Genetic Algorithms for Data Mining and Exploration","author":"cox","year":"2005"},{"key":"ref25","first-page":"423","article-title":"Pattern Recognition and Machine Learning","author":"bishop","year":"2006"}],"event":{"name":"2007 IEEE Conference on Emerging Technologies & Factory Automation (EFTA 2007)","start":{"date-parts":[[2007,9,25]]},"location":"Patras, Greece","end":{"date-parts":[[2007,9,28]]}},"container-title":["2007 IEEE Conference on Emerging Technologies &amp; Factory Automation (EFTA 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4416742\/4416743\/04416776.pdf?arnumber=4416776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T02:40:32Z","timestamp":1497753632000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4416776\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/efta.2007.4416776","relation":{},"subject":[],"published":{"date-parts":[[2007,9]]}}}