2006
DOI: 10.1109/tsmcc.2005.855492
|View full text |Cite
|
Sign up to set email alerts
|

Neuro-Fuzzy Control for MPEG Video Transmission Over Bluetooth

Abstract: The application of a neuro-fuzzy (NF) controller to moving picture expert group (MPEG-2) video transmission over a Bluetooth asynchronous connectionless (ACL) is presented in this paper. MPEG variable bit rate (VBR) data sources experience unpredictability, long delay, and excessive loss, due to sudden variations in bit rate. Therefore, it is practically impossible to transmit MPEG-2 VBR video sources over a Bluetooth channel with a limited transmission speed and considerable wireless interferences without los… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Tokens are used to prove identity electronically as well as being used as electronic key to access something. Tokens can be used instead of the password security feature or used in conjunction with a password [9]. (1) Disconnected Token.…”
Section: Des (Data Encryption Standard)mentioning
confidence: 99%
“…Tokens are used to prove identity electronically as well as being used as electronic key to access something. Tokens can be used instead of the password security feature or used in conjunction with a password [9]. (1) Disconnected Token.…”
Section: Des (Data Encryption Standard)mentioning
confidence: 99%
“…The HCI provides inter-operability between lower-layers and higher-layers (Kazemian & Li, 2006b;Morak, et al, 2012). The HCI exists on the Bluetooth device, and provides a command interface for the baseband and link manager.…”
Section: Host Controller Interface (Hci)mentioning
confidence: 99%
“…Fuzzy clustering schemes have been used for intrusion detection in wired environments. Process, system, and network state information have been captured and analyzed using the Fuzzy c-Medoids algorithm to detect anomalous behavior [10,11,12,13,14,15].…”
Section: Introductionmentioning
confidence: 99%