Network congestion is still a problem on the internet. The random early detection (RED) algorithm being the most notable and widely implemented congestion algorithm in routers faces the problems of queue instability and large delay arising from the presence of an ineffectual singular linear packet dropping function. This research article presents a refinement to RED, named quadratic exponential random early detection (QERED) algorithm, which exploits the advantages of two drop functions, namely quadratic and exponential in order to enhance the performance of RED algorithm. ns-3 simulation studies using various traffic load conditions to assess and benchmark the effectiveness of QERED with two improved variants of RED affirmed that QERED offers a better performance in terms of average queue size and delay metrics at various network scenarios. Fortunately, to replace/upgrade the implementation for RED algorithm with QERED’s in routers will require minimal effort due to the fact that nothing more besides the packet dropping probability profile got to be adjusted.
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMEditor IJCATR
Internet and its applications are an integral part of our daily life .These days they are widely used for various purposes such as
communication, public services, entertainments, distant educations, etc., each possessing different quality of service (QoS) requirements.
How to provide finer congestion control for network emerges as a major problem. To prevent the problem of congestion control and
synchronization various active queue management (AQM) techniques are used. AQM algorithms execute on network routers and detect
initial congestion by monitoring some functions. When congestion occurs on the link the AQM algorithms detects and provides signals to
the end systems. Various algorithms have been proposed in recent years but RED is one of the most influential techniques among all the
existing ones. This review paper provides the functioning mechanism of the RED technique with the help of its algorithm & its variants
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...IJECEIAES
This research paper suggests and analyse a technique for congestion control in mobile ad hoc networks. The technique is based on a new hybrid approach that uses clustering and queuing techniques. In clustering, in general cluster head transfers the data, following a queuing method based on a RED (Random Early Detection), the mobile environment makes it Mobile RED (or MRED), It majorly depends upon mobility of nodes and mobile environments leads to unpredictable queue size. To simulate this technique, the Network Simulator 2 (or NS2) is used for various scenarios. The simulated results are compared with NRED (Neighbourhood Random Early Detection) queuing technique of congestion control. It has been observed that the results are improved using MRED comparatively.
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...EvaObinna
Congestion in a network may occur when the load on the network is greater than the capacity of the network and consequently, performance degrades. Congestion control is a technique and mechanisms that can either prevent congestion before it happens, or remove congestion after it has happened. This work presents a comparative analysis of Drop Tail, RED and NLRED congestion control algorithm and performed a simulation experiment to show their relative effectiveness. The experiment was done using NS2 simulator on the basis of End-to-End Delay, Throughput, Packet Drop, and Packet Delivery Ratio in a wired network. The simulation result showed that NLRED performs best in high congestion network, while in low cohesive network, Drop Tail gives a good result. Drop Tail, RED and NLRED was also analysed in real audio traffic and the entire results showed that in congested network, NLRED and RED are better while in low congested network Drop Tail is better. This is because in heavy congested network, congestion avoidance mechanism aids the network to gain better performance while in low congested network unnecessary computation avoidance mechanisms degrades the performance of the network. If parameters are set effectively in RED, it will be the best queuing mechanism for that particular network. However, it is of great importance to know which congestion control mechanism is suitable for each network and traffic.
Effective Router Assisted Congestion Control for SDN IJECEIAES
Router Assisted Congestion Control (RACC) was designed to improve endto-end congestion control performance by using prior knowledge on network condition. However, the traditional Internet does not provide such information, which makes this approach is not feasible to deliver. Our paper addresses this network information deficiency issue by proposing a new congestion control method that works on the Software Defined Network (SDN) framework. We call this proposed method as PACEC (Path Associativity Centralized Congestion Control). In SDN, global view of the network information contains the network topology including link properties (i.e., type, capacity, power consumption, etc.). PACEC uses this information to determine the feedback signal, in order for the source to start sending data at a high rate and to quickly reach fair-share rate. The simulation shows that the efficiency and fairness of PACEC are better than Transmission Control Protocol (TCP) and Rate Control Protocol (RCP).
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
Nowadays, Vehicular Ad-Hoc Network (VANET) has got more attention from the researchers. The researchers have studied numerous topics of VANET, such as the routing protocols of VANET and the MAC protocols of VANET. The aim of their works is to improve the network performance of VANET, either in terms of energy consumption or packet delivery ratio (PDR) and delay. For this research paper, the main goal is to find the coefficient of a, b and c of three non-linear equations by using a Newton- Raphson method. Those three non-linear equations are derived from a different value of Medium Access Control (MAC) protocol's parameters. After that, those three coefficient is then will be used in optimization of the VANET in terms of energy, PDR, and delay.
RED: A HIGH LINK UTILIZATION AND FAIR ALGORITHMEditor IJCATR
Internet and its applications are an integral part of our daily life .These days they are widely used for various purposes such as
communication, public services, entertainments, distant educations, etc., each possessing different quality of service (QoS) requirements.
How to provide finer congestion control for network emerges as a major problem. To prevent the problem of congestion control and
synchronization various active queue management (AQM) techniques are used. AQM algorithms execute on network routers and detect
initial congestion by monitoring some functions. When congestion occurs on the link the AQM algorithms detects and provides signals to
the end systems. Various algorithms have been proposed in recent years but RED is one of the most influential techniques among all the
existing ones. This review paper provides the functioning mechanism of the RED technique with the help of its algorithm & its variants
Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-h...IJECEIAES
This research paper suggests and analyse a technique for congestion control in mobile ad hoc networks. The technique is based on a new hybrid approach that uses clustering and queuing techniques. In clustering, in general cluster head transfers the data, following a queuing method based on a RED (Random Early Detection), the mobile environment makes it Mobile RED (or MRED), It majorly depends upon mobility of nodes and mobile environments leads to unpredictable queue size. To simulate this technique, the Network Simulator 2 (or NS2) is used for various scenarios. The simulated results are compared with NRED (Neighbourhood Random Early Detection) queuing technique of congestion control. It has been observed that the results are improved using MRED comparatively.
Comparative Analysis of Drop Tail, Red and NLRED Congestion Control Algorithm...EvaObinna
Congestion in a network may occur when the load on the network is greater than the capacity of the network and consequently, performance degrades. Congestion control is a technique and mechanisms that can either prevent congestion before it happens, or remove congestion after it has happened. This work presents a comparative analysis of Drop Tail, RED and NLRED congestion control algorithm and performed a simulation experiment to show their relative effectiveness. The experiment was done using NS2 simulator on the basis of End-to-End Delay, Throughput, Packet Drop, and Packet Delivery Ratio in a wired network. The simulation result showed that NLRED performs best in high congestion network, while in low cohesive network, Drop Tail gives a good result. Drop Tail, RED and NLRED was also analysed in real audio traffic and the entire results showed that in congested network, NLRED and RED are better while in low congested network Drop Tail is better. This is because in heavy congested network, congestion avoidance mechanism aids the network to gain better performance while in low congested network unnecessary computation avoidance mechanisms degrades the performance of the network. If parameters are set effectively in RED, it will be the best queuing mechanism for that particular network. However, it is of great importance to know which congestion control mechanism is suitable for each network and traffic.
Effective Router Assisted Congestion Control for SDN IJECEIAES
Router Assisted Congestion Control (RACC) was designed to improve endto-end congestion control performance by using prior knowledge on network condition. However, the traditional Internet does not provide such information, which makes this approach is not feasible to deliver. Our paper addresses this network information deficiency issue by proposing a new congestion control method that works on the Software Defined Network (SDN) framework. We call this proposed method as PACEC (Path Associativity Centralized Congestion Control). In SDN, global view of the network information contains the network topology including link properties (i.e., type, capacity, power consumption, etc.). PACEC uses this information to determine the feedback signal, in order for the source to start sending data at a high rate and to quickly reach fair-share rate. The simulation shows that the efficiency and fairness of PACEC are better than Transmission Control Protocol (TCP) and Rate Control Protocol (RCP).
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
Newton-raphson method to solve systems of non-linear equations in VANET perfo...journalBEEI
Nowadays, Vehicular Ad-Hoc Network (VANET) has got more attention from the researchers. The researchers have studied numerous topics of VANET, such as the routing protocols of VANET and the MAC protocols of VANET. The aim of their works is to improve the network performance of VANET, either in terms of energy consumption or packet delivery ratio (PDR) and delay. For this research paper, the main goal is to find the coefficient of a, b and c of three non-linear equations by using a Newton- Raphson method. Those three non-linear equations are derived from a different value of Medium Access Control (MAC) protocol's parameters. After that, those three coefficient is then will be used in optimization of the VANET in terms of energy, PDR, and delay.
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
The Queue Management Techniques play an important role in improving the Quality of Service in Mobile Ad hoc Networks. The need of congestion control and Queue management is inevitable in Mobile Ad hoc Network. Understanding and analyzing the latest AQM Techniques give an insight to improving throughput, packet loss rate, average end to end delay and other parameters that severely affect the performance. The performance of mobile ad hoc networks is evaluated by varying the Channel Error Rate, Bandwidth and Delay at different fragment sizes of different traffic flows. The proposed method performs the network analysis of new Routing protocols. The work proposes to evaluate various Active Queue Management Techniques in a multi traffic environment i.e., sources generating both TCP and UDP traffic classes. The UDP is propagated via CBR and TCP is propagated via FTP. The implementation of the proposed queue management technique has been done in NS 2. In the proposed work we have make NS 2 compatible with GREEN by integrating source code into the ns 2 installation files and using various AQMs in comparison with GREEN to calculate the throughput at various Bandwidths across network. Using various AQMs in comparison with GREEN we have calculated the throughput at various Delays across the network and we have also calculated the throughput at various channels Error Rate across the network. The proposed method has been compared with other primitive AQM techniques so that a repository of best available results can be obtained for design and research purposes. The proposed method has outperformed the existing queue management techniques in number of scenarios. Zulai Khan | Rashmi Raj ""Comparative Analysis of Green Algorithm within Active Queue Management for Mobile Ad Hoc Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23950.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23950/comparative-analysis-of-green-algorithm-within-active-queue-management-for-mobile-ad-hoc-network/zulai-khan
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSIJCI JOURNAL
A multi-layered satellite network consisting of geosynchronous and nano-satellites is suited to perform
space situational awareness. The nano-satellites collect information of space objects and transfer data to
ground stations through the geosynchronous satellites. The dynamic topology of the network, large
propagation delays and bulk data transfers results in a congested network. In this paper, we present a
convex optimization based congestion control algorithm. Using snapshots of the network, operating
parameters such as incoming, outgoing rates and buffer utilization are monitored. The operating
parameters of a satellite are formulated as a convex function and using convex optimization techniques, the
incoming data rates are evaluated to minimize congestion. Performance comparison of our algorithm with
Transmission Control Protocol congestion control mechanism is presented. The simulation results show
that our algorithm reduces congestion while facilitating higher transmission rates.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...IJORCS
In general, nodes in Wireless Sensor Networks (WSNs) are equipped with limited battery and computation capabilities but the occurrence of congestion consumes more energy and computation power by retransmitting the data packets. Thus, congestion should be regulated to improve network performance. In this paper, we propose a congestion prediction and adaptive rate adjustment technique for Wireless Sensor Networks. This technique predicts congestion level using fuzzy logic system. Node degree, data arrival rate and queue length are taken as inputs to the fuzzy system and congestion level is obtained as an outcome. When the congestion level is amidst moderate and maximum ranges, adaptive rate adjustment technique is triggered. Our technique prevents congestion by controlling data sending rate and also avoids unsolicited packet losses. By simulation, we prove the proficiency our technique. It increases system throughput and network performance significantly.
Smart optimization in 802.11p media access control protocol for vehicular ad ...IJECEIAES
The innovative idea presented in this research is that advancements in automotive networks and embedded devices can be used to assess the impact of congestion control on throughput and packet delivery ratio (PDR), or socalled multimedia content delivery. Vehicle networking and the distribution of multimedia content have become essential factors in getting packets to their intended recipients due to the availability of bandwidth. Vehicle-toinfrastructure (V2I) communication systems are crucial in vehicular ad hoc networks (VANETs), which permit vehicles to connect by distributing and delivering traffic data and transmission packet schemes. High levels of mobility and changing network topology necessitate dispersed monitoring and execution for congestion control. The amount of traffic congestion for packet transfers could be reduced by enhancing congestion management in terms of throughput and PDR percentages. In a highway setting, the Taguchi approach has been used to optimize the parameters for congestion control. Based on throughput and PDR performance measures, this technique minimizes superfluous traffic information and lowers the likelihood of network congestion. The simulation results have shown that the proposed approach performs better since it increases network performance while effectively utilizing bandwidth. The effectiveness of the suggested technique is evaluated using a typical VANETs scenario for V2I communication while driving on a highway.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
More Related Content
Similar to Quadratic exponential random early detection: a new enhanced random early detection-oriented congestion control algorithm for routers
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
Abstract One of the most complicated issues is to measuring the delay performance of end to end nodes in Multi-hop Wireless Networks. The two nodes are communicating via hopping over the multiple wireless links. The fact that is each node has to concentrate not only its own generated traffic, but also relayed one. Observing unfairness particularly for transmissions among nodes that are more than one hop Most of the existing works deals with the joint congestion control and scheduling algorithm, which does not focusing the delay performance. In turn, considering the throughput metric alone although for congestion control flows, throughput is the repeated difficult performance metric Packet delay is also important because practical congestion control protocols need to establish the timeouts for the retransmissions based on the packet delay, such parameters could significantly impact the speed of recovery when loss of packets occurred. The related issues on the delay-performance First, for long flows, the end to end delay may grow in terms of square with based on the number of hops. Second, it is difficult to control the end-to-end delay of each flows. TDMA schedules the transmissions in a fair way, in terms of throughput per connection, considering the communication requirements of the active flows of the network. It does not work properly in the multi-hop scenario, because it is generated only for single hop networks, We propose The Leaky Bucket Algorithm, in addition to joint congestion control and scheduling algorithm in multi-hop wireless networks. The proposed algorithm not only achieves the provable throughput and also considering the upper bounds of the delay of each flow. It reduces the transmission time by delivering packets at a constant bit rate even it receives the packet at a busty way. Keywords- Multi-hop wireless networks, congestion control, Performance, Delay, Flow, Throughput.
Comparative Analysis of Green Algorithm within Active Queue Management for Mo...ijtsrd
The Queue Management Techniques play an important role in improving the Quality of Service in Mobile Ad hoc Networks. The need of congestion control and Queue management is inevitable in Mobile Ad hoc Network. Understanding and analyzing the latest AQM Techniques give an insight to improving throughput, packet loss rate, average end to end delay and other parameters that severely affect the performance. The performance of mobile ad hoc networks is evaluated by varying the Channel Error Rate, Bandwidth and Delay at different fragment sizes of different traffic flows. The proposed method performs the network analysis of new Routing protocols. The work proposes to evaluate various Active Queue Management Techniques in a multi traffic environment i.e., sources generating both TCP and UDP traffic classes. The UDP is propagated via CBR and TCP is propagated via FTP. The implementation of the proposed queue management technique has been done in NS 2. In the proposed work we have make NS 2 compatible with GREEN by integrating source code into the ns 2 installation files and using various AQMs in comparison with GREEN to calculate the throughput at various Bandwidths across network. Using various AQMs in comparison with GREEN we have calculated the throughput at various Delays across the network and we have also calculated the throughput at various channels Error Rate across the network. The proposed method has been compared with other primitive AQM techniques so that a repository of best available results can be obtained for design and research purposes. The proposed method has outperformed the existing queue management techniques in number of scenarios. Zulai Khan | Rashmi Raj ""Comparative Analysis of Green Algorithm within Active Queue Management for Mobile Ad Hoc Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23950.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/23950/comparative-analysis-of-green-algorithm-within-active-queue-management-for-mobile-ad-hoc-network/zulai-khan
CONVEX OPTIMIZATION BASED CONGESTION CONTROL IN LAYERED SATELLITE NETWORKSIJCI JOURNAL
A multi-layered satellite network consisting of geosynchronous and nano-satellites is suited to perform
space situational awareness. The nano-satellites collect information of space objects and transfer data to
ground stations through the geosynchronous satellites. The dynamic topology of the network, large
propagation delays and bulk data transfers results in a congested network. In this paper, we present a
convex optimization based congestion control algorithm. Using snapshots of the network, operating
parameters such as incoming, outgoing rates and buffer utilization are monitored. The operating
parameters of a satellite are formulated as a convex function and using convex optimization techniques, the
incoming data rates are evaluated to minimize congestion. Performance comparison of our algorithm with
Transmission Control Protocol congestion control mechanism is presented. The simulation results show
that our algorithm reduces congestion while facilitating higher transmission rates.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Efficient and Fair Bandwidth Allocation AQM Scheme for Wireless NetworksCSCJournals
Heterogeneous Wireless Networks are considered nowadays as one of the potential areas in research and development. The traffic management’s schemes that have been used at the fusion points between the different wireless networks are classical and conventional. This paper is focused on developing a novel scheme to overcome the problem of traffic congestion in the fusion point router interconnected the heterogeneous wireless networks. The paper proposed an EF-AQM algorithm which provides an efficient and fair allocation of bandwidth among different established flows. Finally, the proposed scheme developed, tested and validated through a set of experiments to demonstrate the relative merits and capabilities of a proposed scheme
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...IJORCS
In general, nodes in Wireless Sensor Networks (WSNs) are equipped with limited battery and computation capabilities but the occurrence of congestion consumes more energy and computation power by retransmitting the data packets. Thus, congestion should be regulated to improve network performance. In this paper, we propose a congestion prediction and adaptive rate adjustment technique for Wireless Sensor Networks. This technique predicts congestion level using fuzzy logic system. Node degree, data arrival rate and queue length are taken as inputs to the fuzzy system and congestion level is obtained as an outcome. When the congestion level is amidst moderate and maximum ranges, adaptive rate adjustment technique is triggered. Our technique prevents congestion by controlling data sending rate and also avoids unsolicited packet losses. By simulation, we prove the proficiency our technique. It increases system throughput and network performance significantly.
Smart optimization in 802.11p media access control protocol for vehicular ad ...IJECEIAES
The innovative idea presented in this research is that advancements in automotive networks and embedded devices can be used to assess the impact of congestion control on throughput and packet delivery ratio (PDR), or socalled multimedia content delivery. Vehicle networking and the distribution of multimedia content have become essential factors in getting packets to their intended recipients due to the availability of bandwidth. Vehicle-toinfrastructure (V2I) communication systems are crucial in vehicular ad hoc networks (VANETs), which permit vehicles to connect by distributing and delivering traffic data and transmission packet schemes. High levels of mobility and changing network topology necessitate dispersed monitoring and execution for congestion control. The amount of traffic congestion for packet transfers could be reduced by enhancing congestion management in terms of throughput and PDR percentages. In a highway setting, the Taguchi approach has been used to optimize the parameters for congestion control. Based on throughput and PDR performance measures, this technique minimizes superfluous traffic information and lowers the likelihood of network congestion. The simulation results have shown that the proposed approach performs better since it increases network performance while effectively utilizing bandwidth. The effectiveness of the suggested technique is evaluated using a typical VANETs scenario for V2I communication while driving on a highway.
Recital Study of Various Congestion Control Protocols in wireless networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Performance Analysis of Mtpr Routing Protocol in Power Deficient Nodepijans
Power conservation in Mobile Ad hoc Network (MANET) is a major challenge even today for researchers.
To conserve it various power aware routing protocols have been proposed. These protocols do not take into
consideration the residual power left in nodes. To find the impact of the same a simulator was designed in
MATLAB-7.01. The routing protocol used in our simulation is Minimum Total Power Routing (MTPR) and
different performance metrics such as path optimality, throughput and hop count were recorded in
presence and absence of power scarce node. The result shows significant impact of power scarce node on
MANET performance.
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Developing a smart system for infant incubators using the internet of things ...IJECEIAES
This research is developing an incubator system that integrates the internet of things and artificial intelligence to improve care for premature babies. The system workflow starts with sensors that collect data from the incubator. Then, the data is sent in real-time to the internet of things (IoT) broker eclipse mosquito using the message queue telemetry transport (MQTT) protocol version 5.0. After that, the data is stored in a database for analysis using the long short-term memory network (LSTM) method and displayed in a web application using an application programming interface (API) service. Furthermore, the experimental results produce as many as 2,880 rows of data stored in the database. The correlation coefficient between the target attribute and other attributes ranges from 0.23 to 0.48. Next, several experiments were conducted to evaluate the model-predicted value on the test data. The best results are obtained using a two-layer LSTM configuration model, each with 60 neurons and a lookback setting 6. This model produces an R 2 value of 0.934, with a root mean square error (RMSE) value of 0.015 and a mean absolute error (MAE) of 0.008. In addition, the R 2 value was also evaluated for each attribute used as input, with a result of values between 0.590 and 0.845.
A review on internet of things-based stingless bee's honey production with im...IJECEIAES
Honey is produced exclusively by honeybees and stingless bees which both are well adapted to tropical and subtropical regions such as Malaysia. Stingless bees are known for producing small amounts of honey and are known for having a unique flavor profile. Problem identified that many stingless bees collapsed due to weather, temperature and environment. It is critical to understand the relationship between the production of stingless bee honey and environmental conditions to improve honey production. Thus, this paper presents a review on stingless bee's honey production and prediction modeling. About 54 previous research has been analyzed and compared in identifying the research gaps. A framework on modeling the prediction of stingless bee honey is derived. The result presents the comparison and analysis on the internet of things (IoT) monitoring systems, honey production estimation, convolution neural networks (CNNs), and automatic identification methods on bee species. It is identified based on image detection method the top best three efficiency presents CNN is at 98.67%, densely connected convolutional networks with YOLO v3 is 97.7%, and DenseNet201 convolutional networks 99.81%. This study is significant to assist the researcher in developing a model for predicting stingless honey produced by bee's output, which is important for a stable economy and food security.
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersIJECEIAES
In real world applications, data are subject to ambiguity due to several factors; fuzzy sets and fuzzy numbers propose a great tool to model such ambiguity. In case of hesitation, the complement of a membership value in fuzzy numbers can be different from the non-membership value, in which case we can model using intuitionistic fuzzy numbers as they provide flexibility by defining both a membership and a non-membership functions. In this article, we consider the intuitionistic fuzzy linear programming problem with intuitionistic polygonal fuzzy numbers, which is a generalization of the previous polygonal fuzzy numbers found in the literature. We present a modification of the simplex method that can be used to solve any general intuitionistic fuzzy linear programming problem after approximating the problem by an intuitionistic polygonal fuzzy number with n edges. This method is given in a simple tableau formulation, and then applied on numerical examples for clarity.
The performance of artificial intelligence in prostate magnetic resonance im...IJECEIAES
Prostate cancer is the predominant form of cancer observed in men worldwide. The application of magnetic resonance imaging (MRI) as a guidance tool for conducting biopsies has been established as a reliable and well-established approach in the diagnosis of prostate cancer. The diagnostic performance of MRI-guided prostate cancer diagnosis exhibits significant heterogeneity due to the intricate and multi-step nature of the diagnostic pathway. The development of artificial intelligence (AI) models, specifically through the utilization of machine learning techniques such as deep learning, is assuming an increasingly significant role in the field of radiology. In the realm of prostate MRI, a considerable body of literature has been dedicated to the development of various AI algorithms. These algorithms have been specifically designed for tasks such as prostate segmentation, lesion identification, and classification. The overarching objective of these endeavors is to enhance diagnostic performance and foster greater agreement among different observers within MRI scans for the prostate. This review article aims to provide a concise overview of the application of AI in the field of radiology, with a specific focus on its utilization in prostate MRI.
Seizure stage detection of epileptic seizure using convolutional neural networksIJECEIAES
According to the World Health Organization (WHO), seventy million individuals worldwide suffer from epilepsy, a neurological disorder. While electroencephalography (EEG) is crucial for diagnosing epilepsy and monitoring the brain activity of epilepsy patients, it requires a specialist to examine all EEG recordings to find epileptic behavior. This procedure needs an experienced doctor, and a precise epilepsy diagnosis is crucial for appropriate treatment. To identify epileptic seizures, this study employed a convolutional neural network (CNN) based on raw scalp EEG signals to discriminate between preictal, ictal, postictal, and interictal segments. The possibility of these characteristics is explored by examining how well timedomain signals work in the detection of epileptic signals using intracranial Freiburg Hospital (FH), scalp Children's Hospital Boston-Massachusetts Institute of Technology (CHB-MIT) databases, and Temple University Hospital (TUH) EEG. To test the viability of this approach, two types of experiments were carried out. Firstly, binary class classification (preictal, ictal, postictal each versus interictal) and four-class classification (interictal versus preictal versus ictal versus postictal). The average accuracy for stage detection using CHB-MIT database was 84.4%, while the Freiburg database's time-domain signals had an accuracy of 79.7% and the highest accuracy of 94.02% for classification in the TUH EEG database when comparing interictal stage to preictal stage.
Analysis of driving style using self-organizing maps to analyze driver behaviorIJECEIAES
Modern life is strongly associated with the use of cars, but the increase in acceleration speeds and their maneuverability leads to a dangerous driving style for some drivers. In these conditions, the development of a method that allows you to track the behavior of the driver is relevant. The article provides an overview of existing methods and models for assessing the functioning of motor vehicles and driver behavior. Based on this, a combined algorithm for recognizing driving style is proposed. To do this, a set of input data was formed, including 20 descriptive features: About the environment, the driver's behavior and the characteristics of the functioning of the car, collected using OBD II. The generated data set is sent to the Kohonen network, where clustering is performed according to driving style and degree of danger. Getting the driving characteristics into a particular cluster allows you to switch to the private indicators of an individual driver and considering individual driving characteristics. The application of the method allows you to identify potentially dangerous driving styles that can prevent accidents.
Hyperspectral object classification using hybrid spectral-spatial fusion and ...IJECEIAES
Because of its spectral-spatial and temporal resolution of greater areas, hyperspectral imaging (HSI) has found widespread application in the field of object classification. The HSI is typically used to accurately determine an object's physical characteristics as well as to locate related objects with appropriate spectral fingerprints. As a result, the HSI has been extensively applied to object identification in several fields, including surveillance, agricultural monitoring, environmental research, and precision agriculture. However, because of their enormous size, objects require a lot of time to classify; for this reason, both spectral and spatial feature fusion have been completed. The existing classification strategy leads to increased misclassification, and the feature fusion method is unable to preserve semantic object inherent features; This study addresses the research difficulties by introducing a hybrid spectral-spatial fusion (HSSF) technique to minimize feature size while maintaining object intrinsic qualities; Lastly, a soft-margins kernel is proposed for multi-layer deep support vector machine (MLDSVM) to reduce misclassification. The standard Indian pines dataset is used for the experiment, and the outcome demonstrates that the HSSF-MLDSVM model performs substantially better in terms of accuracy and Kappa coefficient.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
ML for identifying fraud using open blockchain data.pptx
Quadratic exponential random early detection: a new enhanced random early detection-oriented congestion control algorithm for routers
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 13, No. 1, February 2023, pp. 669~679
ISSN: 2088-8708, DOI: 10.11591/ijece.v13i1.pp669-679 669
Journal homepage: http://ijece.iaescore.com
Quadratic exponential random early detection: a new enhanced
random early detection-oriented congestion control algorithm
for routers
Samuel Oluwatosin Hassan1
, Adewole Usman Rufai2
, Vivian Ogochukwu Nwaocha3
, Samson Ojo
Ogunlere4
, Aderonke Adelola Adegbenjo5
, Michael Olugbenga Agbaje5
, Theophilus Aniemeka Enem6
1
Department of Mathematical Sciences, Olabisi Onabanjo University, Ago-Iwoye, Nigeria
2
Department of Computer Sciences, University of Lagos, Lagos, Nigeria
3
Department of Computer Science, National Open University, Abuja, Nigeria
4
Information Technology Department, Babcock University, Ilishan-Remo, Nigeria
5
Computer Science Department, Babcock University, Ilishan-Remo, Nigeria
6
Cyber Security Department, Air Force Institute of Technology, Kaduna, Nigeria
Article Info ABSTRACT
Article history:
Received Jan 16, 2022
Revised Jul 13, 2022
Accepted Jul 27, 2022
Network congestion is still a problem on the internet. The random early
detection (RED) algorithm being the most notable and widely implemented
congestion algorithm in routers faces the problems of queue instability and
large delay arising from the presence of an ineffectual singular linear packet
dropping function. This research article presents a refinement to RED,
named quadratic exponential random early detection (QERED) algorithm,
which exploits the advantages of two drop functions, namely quadratic and
exponential in order to enhance the performance of RED algorithm. ns-3
simulation studies using various traffic load conditions to assess and
benchmark the effectiveness of QERED with two improved variants of RED
affirmed that QERED offers a better performance in terms of average queue
size and delay metrics at various network scenarios. Fortunately, to
replace/upgrade the implementation for RED algorithm with QERED’s in
routers will require minimal effort due to the fact that nothing more besides
the packet dropping probability profile got to be adjusted.
Keywords:
Active queue management
algorithm
Congestion control
Delay
Network routers
Quadratic exponential random
early detection This is an open access article under the CC BY-SA license.
Corresponding Author:
Samuel Oluwatosin Hassan
Department of Mathematical Sciences, Olabisi Onabanjo University
Ago-Iwoye, Nigeria
Email: samuel.hassan@oouagoiwoye.edu.ng
1. INTRODUCTION
In today’s world, the internet has been described as an advanced technology which drives speedy
development of the society as it supports contemporary communication, information sharing and services [1],
[2]. Congestion control still continues as an active research area in the current internet due to huge magnitude
of traffic triggered by users accessing internet services [3]–[7]. Network congestion refers to a condition in
which the amount of generated traffic grows and exceeds network’s resources processing capacity [3], [8]. It
is one of the crucial problems that affect quality of network service [9], [10]. Therefore, to make certain of a
better network performance, it is imperative to develop algorithms that avoid network traffic congestion [9],
[11]–[13].
Aside the well-known responsibility of packet forwarding, the router plays an important role of
implementing algorithms needed for congestion control in the network. Traditionally, drop-tail queue
management algorithm, as its name implies, operates the first-in, first-out (FIFO) procedure which accepts all
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 669-679
670
incoming packets into the queue of router’s buffer until full capacity is reached [14]. The weaknesses of
drop-Tail algorithm include full queues, high packet loss rate, and large delay in data delivery, network
deadlock and global synchronization [14]–[16].
Zeng et al. [17] described the active queue management (AQM) algorithm employed by routers as a
more efficient way to relieve congestion. AQM algorithm detects congestion at an early stage and delivers a
feedback signal (through dropping of packets) to traffic sources to slow down their transmission rate before
the buffer is fully occupied [18]–[20]. AQM algorithms aimed at reducing packet loss rate, keeping average
queue size small, increasing throughput and reducing delay [15]. The internet engineering task force (IETF)
has recommended the widespread deployment of AQM algorithms in internet devices (in particular, the
router) as a solution for controlling congestion [14].
One notable representative AQM is the random early detection (RED) [21], as it is called. RED
detects incipient congestion by determining the average queue size (ave) using a low pass filter exponential
weighted moving average (EWMA) method (according to (1)). The result is compared with two
pre-determined queue thresholds for average queue size, namely minimum threshold (minTh) and maximum
threshold (maxTh).
𝑎𝑣𝑒 = (1 − 𝑤𝑞) × 𝑎𝑣𝑒′
+ (𝑤𝑞 × 𝑞𝑐) (1)
where 𝑞𝑐 refers to the current queue size, 𝑎𝑣𝑒′
refers to the previously calculated 𝑎𝑣𝑒, and 𝑤𝑞 is a
pre-configured weight parameter to calculate 𝑎𝑣𝑒and ranges between 0 and 1.
Further, when the computed 𝑎𝑣𝑒 is less than 𝑚𝑖𝑛𝑇ℎ threshold, all incoming packets are enqueued.
When 𝑎𝑣𝑒 is between minTh and maxTh thresholds, incoming packets are dropped with a probability that
increases linearly from 0 to Pmax (that is, the maximum packet dropping probability). However, when 𝑎𝑣𝑒 is
greater than maxTh, all arriving packets are dropped with a probability equal to 1. Therefore, the initial
dropping probability (Pb) strategy of RED (dependent on 𝑎𝑣𝑒) is given as (2).
𝑃𝑏 = {
0 𝑤ℎ𝑒𝑛 𝑎𝑣𝑒 ∈ [0, 𝑚𝑖𝑛𝑇ℎ),
𝑃𝑚𝑎𝑥 (
𝑎𝑣𝑒−𝑚𝑖𝑛𝑇ℎ
𝑚𝑎𝑥𝑇ℎ−𝑚𝑖𝑛𝑇ℎ
) 𝑤ℎ𝑒𝑛 𝑎𝑣𝑒 ∈ [𝑚𝑖𝑛𝑇ℎ, 𝑚𝑎𝑥𝑇ℎ),
1 𝑤ℎ𝑒𝑛 𝑎𝑣𝑒 ∈ [𝑚𝑎𝑥𝑇ℎ, +∞),
(2)
Finally, the packet dropping probability (Pa) is computed as (3):
𝑃𝑎 = 𝑃𝑏 ×
1
1−(𝑐𝑜𝑢𝑛𝑡×𝑃𝑏)
(3)
where count refers to the number of admitted packets since the last packet dropped.
To tackle the delay problem of RED, Abu-Shareha [22] proposed a delay-controller RED (DcRED)
algorithm. The algorithm extends RED by computing a delay parameter (which relies on the queue size,
departure rate, and arrival rate), at every packet arrival into the router’s buffer to determine the dropping
probability. Gentle RED (GRED) algorithm [23] aimed at increasing the throughput performance of RED.
GRED utilizes three queue thresholds, namely minTh, maxTh, and two times maxTh. A linear packet
dropping function is applied when ave varies between minTh and maxTh. Similarly, a linear packet dropping
function is applied when ave is between maxTh and two times maxTh thresholds. QRTRED algorithm [24]
relies on the computation of a metric named QRT which is used to determine the state of the network traffic
and dynamically adjust the minTh and maxTh thresholds. The algorithm obtained improved link utilization.
Nonlinear RED (NLRED) algorithm [7] operates similar to RED except that a quadratic packet
drop function is utilized when ave varies between minTh and maxTh queue thresholds and increased Pmax by
a factor of 1.5. This was done with the intention of addressing the aggressive problem of RED at heavy
congestion. NLRED achieved an improved throughput performance. Double slope RED (DSRED) algorithm
[25] is an enhanced version of RED such that it utilizes three queue thresholds which are minTh, maxTh, and
a mid-point threshold (set as (minTh + maxTh)/2). When ave is between minTh and mid-point thresholds, a
linear dropping function is used. When ave is between the mid-point and maxTh thresholds, another linear
dropping function is used. The slopes of these two linear functions are complementary and adjustable by a
mode selector. The algorithm obtained an improved throughput performance. Feng et al. [26] improved
RED by employing three dropping functions, which are nonlinear, linear, and nonlinear between minTh and
maxTh thresholds. TRED exhibits a trade-off between two performance metrics: delay and throughput.
MRED algorithm [27], an improved version of GRED applied a quadratic drop function when ave
varies between minTh and maxTh threshold values (instead of a linear function used in GRED). MRED
3. Int J Elec & Comp Eng ISSN: 2088-8708
Quadratic exponential random early detection: a new enhanced … (Samuel Oluwatosin Hassan)
671
achieved an increased throughput performance. Baklizi et al. [28] proposed a dynamic GRED (DGRED)
which is a modified version of GRED. The algorithm aimed at stabilizing ave at a computed specified value
between minTh and maxTh while dynamically adjusting the queue thresholds: maxTh and two times maxTh
in order to provide an improved performance in terms of packet loss rate. Baklizi et al. [29] suggested the
stabilized DGRED (SDGRED) algorithm, a modified version of DGRED whereby the maxTh and two times
maxTh queue thresholds were dynamically adjusted and aimed at stabilizing ave at a computed specified
value between minTh and two times maxTh queue thresholds in order to obtain a reduced packet loss rate and
queuing delay. Weight queue dynamic AQM (WQDAQM) algorithm [30] is an improvement over SDGRED
algorithm. Based on the traffic load, WQDAQM dynamically adjust the queue weight and the two queue
thresholds, namely maxTh and two times maxTh in order to perform packet dropping. The algorithm aimed at
stabilizing the queue weight between minTh and maxTh. Therefore, the algorithm obtained an improved
performance in terms of average queue size, packet loss rate and delay.
VRED algorithm [31] relies on the computation of the queue size growth velocity which is utilized
as an indicator for congestion instead of average queue size (as in RED). VRED achieved an improved
utilization. RED exponential (RED_E) algorithm [4] is an improved RED in the sense that the linear packet
dropping function was replaced with an exponential (nonlinear) packet drop function which does not require
Pmax parameter. RED_E was reported to obtain an improved performance in terms of delay especially at
heavy congestion scenario. Adamu [3] developed the self-adaptive RED (SARED) algorithm which relies on
the computation of average queue size and current network traffic condition as indicators for congestion.
Therefore, at low and moderate network traffic scenarios, a nonlinear packet dropping function is utilized in
order to improve the throughput performance. However, at heavy network traffic scenario, a linear packet
dropping function is utilized in order to improve the link utilization.
Mohammed et al. [10] developed the dynamic queue RED (DQRED) algorithm which operates by
classifying incoming packets into the router’s buffer into three different virtual queues: one for user data
protocol (UDP)-based video applications, another for UDP-based audio applications, and the last third queue
for transmission control protocol (TCP) based applications. Packets from these queues are dynamically
scheduled with regards to the number of enqueued packets in each. The RED algorithm is implemented in
each queue. Attiya and El-Khobby [32] proposed an algorithm which employs a classifier in order to split
incoming packets into the router’s buffer using three virtual queues, namely high priority UDP-based video
traffic, medium priority UDP-based audio traffic, and low priority TCP-based traffic. Packets from these
queues are scheduled according to ratio 3:2:1. All the three queues have RED algorithm implementation. The
modified algorithm obtained an improved performance in terms of delay and packet loss which are essential
for real-time applications. Su et al. [33] employed the Q-learning algorithm to determine and adjust Pmax
parameter for deployment in RED. The modified version was named q-learning RED (QRED). The algorithm
obtained an improved throughput and packet loss rate.
Flexible RED (FXRED) algorithm [12] operates a self-adaptive mechanism similar to SARED
except that a nonlinear packet dropping function is utilized for a low and moderate network traffic conditions
in order to obtain an improved throughput and link utilization while a linear packet dropping function for a
high network traffic condition in order to obtain an improved delay. The former conditions refer to a situation
where ave is between minTh and a mid-point threshold set as (minTh + maxTh)/2 while the latter condition
refers to a situation where ave is between the mid-point and maxTh thresholds. Smart RED (SmRED)
algorithm [34] improved RED by using three queue thresholds, namely minTh, Target (set as minTh +
(maxTh-minTh)/2) and maxTh. SmRED utilizes a nonlinear (quadratic) packet drop function when ave is
between minTh and Target in order to obtain an improved link utilization; utilizes a (symmetric) square root
packet drop function when ave is between Target and maxTh in order to obtain a reduced delay.
MultiRED (MRED) [35] utilizes a classifier to split incoming packets into the router queue using
two virtual queues: one for TCP-type traffic applications, and the other for UDP-type traffic applications.
Each of these queues has RED algorithm implementation. MRED achieved a reduced packet loss rate
especially for sensitive traffic flows. Kumhar et al. [36] proposed a quadratic RED (QRED) algorithm. To
overcome instability problem of RED, QRED replaced the linear drop function of RED with a quadratic drop
function (expressed in (4) and (5)):
𝑃𝑏 = (
𝑎𝑣𝑒−𝑚𝑖𝑛𝑇ℎ
𝑚𝑎𝑥𝑄−𝑚𝑖𝑛𝑇ℎ
)2
(4)
or
𝑃𝑏 = 1 − (
𝑚𝑎𝑥𝑄−𝑎𝑣𝑒
𝑚𝑎𝑥𝑄−𝑚𝑖𝑛𝑇ℎ
)2
(5)
where maxQ indicates the buffer size.
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 669-679
672
To tackle the instability issue of RED algorithm, Gimenez et al. [37] developed the Beta RED
algorithm which utilizes a (nonlinear) Beta distribution packet drop function in lieu of the linear packet drop
function utilized by RED. Suwannapong and Khunboa [38] deploys two dropping functions which are linear
(between minTh and maxTh) and exponential (between maxTh and K: in which K is the size of buffer). While
RED directly applies the linear dropping function between minTh and maxTh, the model suggested in [39]
does not. It instead exploits the count variable and drop packets based on (6):
𝑃𝑏 = 1 − (
𝑝1(− log(𝑝1))
𝑐𝑜𝑢𝑛𝑡+1
) (6)
in which p1 refers to RED’s linear dropping function as (7).
𝑝1 = 𝑃𝑚𝑎𝑥(
𝑎𝑣𝑒−𝑚𝑖𝑛𝑇ℎ
𝑚𝑎𝑥𝑇ℎ−𝑚𝑖𝑛𝑇ℎ
) (7)
Enhanced congestion control-RED (CoCo-RED) [40] is a refined version of CoCo-RED algorithm
in which minTh and maxTh are adjusted depending on the congestion level. Kar et al. [20] described the
dropping probability as the central part of an AQM algorithm. Also, Koo et al. [41] developing an AQM
algorithm with a good drop probability was described as the hallmark of congestion control. Therefore, the
main contribution of this paper is to propose an improved, RED-based algorithm named quadratic
exponential random early detection (QERED), which utilizes a quadratic and an exponential packet dropping
functions to distinguish between light-and moderate-network traffic load scenarios and a heavy network
traffic load scenario with the aim of addressing the instability of queue size and large delay shortcomings of
RED.
2. QUADRATIC EXPONENTIAL RANDOM EARLY DETECTION
In this section, we present a detailed description of a refined algorithm, referred to as QERED. Like
RED algorithm, QERED works by measuring congestion level through the computation of the average queue
size (earlier given in (1)). However, QERED as its name implies, replaces the RED’s linear relationship
between the packet dropping probability and average queue size with an interplay of a quadratic and an
exponential drop function. The packet drop probability function for QERED algorithm is depicted in
Figure 1. The proposed QERED algorithm distinguishes between two traffic scenarios: one is light and
moderate loads, the other is heavy load. The distinction between these two network traffic load situations was
accomplished through the introduction of a Target threshold parameter given in (8).
𝑇𝑎𝑟𝑔𝑒𝑡 = 𝑚𝑖𝑛𝑇ℎ + (
𝑚𝑖𝑛𝑇ℎ+𝑚𝑎𝑥𝑇ℎ
3
) (8)
Specifically, the light-and moderate-traffic load scenarios account for situations when ave is close to
the minimum threshold and when ave is near Target, respectively. Therefore, a quadratic drop function
(expressed in (9)) is applied to drop packets because network congestion is not yet serious. Thus, a smaller
packet dropping probability is achieved.
𝑃𝑏 = 9𝑃𝑚𝑎𝑥(
𝑎𝑣𝑒−𝑚𝑖𝑛𝑇ℎ
𝑚𝑎𝑥𝑇ℎ+𝑚𝑖𝑛𝑇ℎ
)2
(9)
Also, heavy traffic load scenario refers to conditions when ave is between Target and the maximum
threshold. Therefore, an exponential drop function (expressed in (10)) is applied to drop packets because
network congestion is serious. Thus, there is a need to ease congestion in the network through the use of a
higher packet dropping probability.
𝑃𝑏 = 𝑒
log (𝑃𝑚𝑎𝑥)×(
3(𝑚𝑎𝑥𝑇ℎ−𝑎𝑣𝑒)
2(𝑚𝑎𝑥𝑇ℎ−2𝑚𝑖𝑛𝑇ℎ)
)
(10)
In other words, the initial dropping probability strategy of QERED is expressed as (11):
𝑃𝑏 =
{
0 𝑤ℎ𝑒𝑛 𝑎𝑣𝑒 ∈ [0, 𝑚𝑖𝑛𝑇ℎ),
9𝑃𝑚𝑎𝑥(
𝑎𝑣𝑒−𝑚𝑖𝑛𝑇ℎ
𝑚𝑎𝑥𝑇ℎ+𝑚𝑖𝑛𝑇ℎ
)2
𝑤ℎ𝑒𝑛 𝑎𝑣𝑒 ∈ [𝑚𝑖𝑛𝑇ℎ, 𝑇𝑎𝑟𝑔𝑒𝑡),
𝑒
log(𝑃𝑚𝑎𝑥)×(
3(𝑚𝑎𝑥𝑇ℎ−𝑎𝑣𝑒)
2(𝑚𝑎𝑥𝑇ℎ−2𝑚𝑖𝑛𝑇ℎ)
)
𝑤ℎ𝑒𝑛 𝑎𝑣𝑒 ∈ [𝑇𝑎𝑟𝑔𝑒𝑡, 𝑚𝑎𝑥𝑇ℎ),
1 𝑤ℎ𝑒𝑛 𝑎𝑣𝑒 ∈ [𝑚𝑎𝑥𝑇ℎ, +∞),
(11)
5. Int J Elec & Comp Eng ISSN: 2088-8708
Quadratic exponential random early detection: a new enhanced … (Samuel Oluwatosin Hassan)
673
Algorithm 1 presents the pseudo-code for QERED algorithm.
Algorithm 1. Pseudo-code for QERED algorithm
1: Preset input parameters: minTh, maxT h, Pmax, wq
2: Set ave = 0
3: Set 𝑇𝑎𝑟𝑔𝑒𝑡 = 𝑚𝑖𝑛𝑇ℎ + (
𝑚𝑖𝑛𝑇ℎ+𝑚𝑎𝑥𝑇ℎ
3
)
4: For every incoming packet
5: Calculate the average queue size ave according to (1)
6: if ave < minTh then
7: The packet will be admitted into queue of router’s buffer
8: else if minTh ≤ ave < Target then
9: A quadratic function (given in (9)) is employed to calculate the packet dropping
probability
10: The incoming packet is dropped based on the calculated probability
11: else if Target ≤ ave < maxTh then
12: An exponential function (given in (10)) is employed to calculate the packet dropping
probability
13: The incoming packet is dropped based on the calculated probability
14: else if maxTh ≤ ave then
15: The incoming packet is rejected
16: end if
Figure 1. QERED drop function curve
3. RESULTS AND DISCUSSION
3.1. Simulation configuration
We implement the proposed QERED algorithm in network simulator version 3 (ns-3) [42]. The
network topology considered in our simulation experiment is depicted in Figure 2. The topology has two
intermediate devices-routers (which are R1 and R2), primarily for the purpose of directing data packet flows.
Traffics are generated from N TCP/New-Reno sources. The bottleneck link is between router R1 and router
R2, it has a bandwidth of 10 Mbps and a propagation delay of 100 ms. Every other link (either connecting the
sources to router R1 or connecting router R2 to destination device, D) has a capacity of 100 Mbps and 3 ms
propagation delay. The size of packets by default is 1000 bytes. AQM algorithms are implemented and
deployed in the queue of router R1 with a specified buffer size of 250 packets. For SmRED, we set
minTh=30 packets, Target=60 packets, maxTh=90 packets, Pmax=0.1, and wq=0.002. For RED_E, we set
minTh=30, maxTh=90 packets, and wq=0.002. For QERED, we set minTh=30 packets, Target=70 packets,
maxTh=90 packets, Pmax=0.1, and wq=0.002. Simulation time is specified as 100 sec.
Based on Figure 2, three experiments involving light, moderate and heavy traffic loads were
conducted in order to evaluate the performance of RED_E, SmRED, and QERED algorithms. Comparison
was done using average queue size, throughput, and delay as performance measures. The light, moderate, and
heavy traffic loads involve N=5, N=20, and N=50 TCP flows respectively.
3.2. Scenario 1: light traffic
From Figure 3(a), we see that the proposed QERED algorithm regulates the oscillatory behavior of
average queue size better than RED_E and SmRED algorithms. Statistical results presented in Table 1 shows
that QERED obtained the lowest value in terms of average queue size. Therefore, in terms maintaining the
average queue size at a stable and small value, QERED clearly outperformed RED_E and SmRED.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 669-679
674
It can be observed from Figure 3(b) that the oscillation in delay is better controlled with QERED.
Analysis presented in Table 1 further confirms that QERED achieved the least value. Thus, QERED has
greater benefit in terms of delay. Figure 3(c) presents the throughput performance. From the figure, it can be
seen that SmRED obtained the best performance in terms of throughput among all the three algorithms.
However, QERED obtained a better result than RED_E. Table 1 confirms this result.
Figure 2. Simulation topology
(a) (b)
(c)
Figure 3. Light traffic load: (a) average queue size, (b) delay, and (c) throughput
Table 1. Performance comparison under light traffic load
AQM algorithm Average queue size (Packets) Delay (ms) Std-Deviation (ms) Throughput (Mbps)
SmRED 15.4349 1.4234 0.1002 9.4980
RED_E 23.0978 1.4254 0.1158 9.0002
QERED 12.1596 1.3807 0.0995 9.3276
7. Int J Elec & Comp Eng ISSN: 2088-8708
Quadratic exponential random early detection: a new enhanced … (Samuel Oluwatosin Hassan)
675
3.3. Scenario 2: moderate traffic
Figure 4(a) presents the average queue size performance of SmRED, RED_E and QERED
algorithms. It is clearly seen that QERED better regulates and keeps the average queue size smaller than
SmRED and RED_E algorithms. Analysis presented in Table 2 also confirms that the proposed QERED
algorithm obtained the best performance in regard to average queue size metric.
From the delay graph plotted in Figure 4(b), it can be observed that the proposed QERED algorithm
obtained a better performance than SmRED and RED_E algorithms. In fact, it can be confirmed from the
statistical results in Table 2 that QERED has a superior delay performance. The throughput results presented
in Figure 4(c) shows that RED_E algorithm has the best performance. Table 2 shows the analysis. This result
is a pointer to the fact that under this scenario, QERED obtained a reduced delay at the expense of
throughput.
(a) (b)
(c)
Figure 4. Moderate traffic load: (a) average queue size, (b) delay, and (c) throughput
Table 2. Performance comparison under moderate traffic load
AQM algorithm Average queue size (Packets) Delay (ms) Std-Deviation (ms) Throughput (Mbps)
SmRED 22.4637 5.7066 0.4529 9.6450
RED_E 41.1539 6.3240 0.5280 9.7973
QERED 21.0029 5.6657 0.4470 9.5314
3.4. Scenario 3: heavy traffic
The graph shown in Figure 5(a) compares the average queue size for RED_E, SmRED, and QERED
algorithms. As illustrated, at heavy traffic load when congestion is aggravated, QERED algorithm
significantly reduces and stabilizes the average queue size. As presented in Table 3, QERED obtained the
lowest value when compared with the other two algorithms. The reason is because, the exponential drop
function utilized by QERED rises faster. As a result, more packets are dropped with QERED when heavy
congestion occurs.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 669-679
676
The plot depicted in Figure 5(b) compares the performance of the three algorithms in terms of delay.
As demonstrated, QERED algorithm outperformed both RED_E and SmRED. Analysis provided in Table 3
confirms that QERED reduces the delay better than RED_E and SmRED. Also, the variance in delay is
lowest with QERED.
Figure 5(c) compares the throughput performance of RED_E, SmRED and QERED under heavy
traffic load condition. It is evident that SmRED obtained the best performance. Analysis provided in Table 3
confirms that QERED obtained the least value among the three algorithms. Again, this throughput result is a
pointer to the fact that under this scenario, QERED obtained a reduced delay at the expense of throughput.
(a) (b)
(c)
Figure 5. Heavy traffic load (a) average queue size, (b) delay, and (c) throughput
Table 3. Performance comparison under heavy traffic load
AQM Algorithm Average Queue Size (Packets) Delay (ms) Std-Deviation (ms) Throughput (Mbps)
SmRED 43.6304 15.0049 1.8609 9.8273
RED_E 44.3700 14.8843 1.8481 9.6355
QERED 31.7554 14.2488 1.7728 9.5809
4. CONCLUSION
In this paper, the RED algorithm is re-investigated, and an improved, RED-oriented algorithm
named QERED has been proposed. QERED utilizes the mixture of quadratic and exponential packet
dropping strategy in lieu of an ineffectual linear packet dropping strategy utilized in RED. Demonstrations in
ns-3 simulator revealed that QERED algorithm evidently outperformed two representative AQM algorithms
which are RED_E and SmRED in terms of average queue size stability and delay performance measures
under three traffic load conditions (which are light, moderate, and heavy). In future work, we plan to validate
QERED’s algorithm implementation in Linux kernel and eventually assess its performance alongside some
selected AQM algorithms on a real network.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Quadratic exponential random early detection: a new enhanced … (Samuel Oluwatosin Hassan)
677
REFERENCES
[1] J. Shi, Y. B. Leau, K. Li, and J. H. Obit, “A comprehensive review on hybrid network traffic prediction model,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 2, pp. 1450–1459, Apr. 2021, doi:
10.11591/ijece.v11i2.pp1450-1459.
[2] R. Alsabah, M. Aljshamee, A. M. Abduljabbar, and A. Al-Sabbagh, “An insight into internet sector in Iraq,” International
Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 6, pp. 5137–5143, Dec. 2021, doi:
10.11591/ijece.v11i6.pp5137-5143.
[3] A. Adamu, “SARED: A self-adaptive active queue management scheme for improving quality of service in network systems,”
Computer Science, vol. 22, no. 2, pp. 253–267, Apr. 2021, doi: 10.7494/csci.2021.22.2.4020.
[4] H. Abdel-Jaber, “An exponential active queue management method based on random early detection,” Journal of Computer
Networks and Communications, vol. 2020, pp. 1–11, May 2020, doi: 10.1155/2020/8090468.
[5] X. Yang, C. Song, J. Sun, and X. Wang, “Simulation and implementation of adaptive fuzzy PID,” Journal of Networks, vol. 9,
no. 10, pp. 2574–2581, Oct. 2014, doi: 10.4304/jnw.9.10.2574-2581.
[6] N. Hamadneh, M. Obiedat, A. Qawasmeh, and M. Bsoul, “HRED, an active queue management algorithm for TCP congestion
control,” Recent Patents on Computer Science, vol. 12, no. 3, pp. 212–217, 2019, doi: 10.2174/2213275912666181205155828.
[7] K. Zhou, K. L. Yeung, and V. O. K. Li, “Nonlinear RED: A simple yet efficient active queue management scheme,” Computer
Networks, vol. 50, no. 18, pp. 3784–3794, Dec. 2006, doi: 10.1016/j.comnet.2006.04.007.
[8] L. Pei, F. Wu, and S. Wang, “Periodic, quasi-periodic and chaotic oscillations in two heterogeneous AIMD/RED network
congestion models with state-dependent round-trip delays,” International Journal of Bifurcation and Chaos, vol. 31, no. 06,
pp. 2150121–2150124, May 2021, doi: 10.1142/S0218127421501248.
[9] T. A. Assegie and H. D. Bizuneh, “Improving network performance with an integrated priority queue and weighted fair queue
scheduling,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 19, no. 1, pp. 241–247, Jul.
2020, doi: 10.11591/ijeecs.v19.i1.pp241-247.
[10] H. Mohammed, G. Attiya, and S. El-Dolil, “Active queue management for congestion control: Performance evaluation, new
approach, and comparative study,” International Journal of Computing and Network Technology, vol. 05, no. 02, pp. 37–49, May
2017, doi: 10.12785/ijcnt/050201.
[11] M. M. Hamdi, H. F. Mahdi, M. S. Abood, R. Q. Mohammed, A. D. Abbas, and A. H. Mohammed, “A review on queue
management algorithms in large networks,” IOP Conference Series: Materials Science and Engineering, vol. 1076, no. 1, Feb.
2021, doi: 10.1088/1757-899X/1076/1/012034.
[12] A. Adamu, V. Shorgin, S. Melnikov, and Y. Gaidamaka, “Flexible random early detection algorithm for queue management in
routers,” in Distributed Computer and Communication Networks: 23rd International Conference, DCCN 2020, 2020,
pp. 196–208, doi: 10.1007/978-3-030-66471-8_16.
[13] S. Sunassee, A. Mungur, S. Armoogum, and S. Pudaruth, “A comprehensive review on congestion control techniques in
networking,” in 2021 5th International Conference on Computing Methodologies and Communication (ICCMC), Apr. 2021,
pp. 305–312, doi: 10.1109/ICCMC51019.2021.9418329.
[14] F. Baker and G. Fairhurst, “IETF recommendations regarding active queue management,” RFC 2309, Jul. 2015, doi:
10.17487/RFC7567.
[15] B. Braden et al., “Recommendations on queue management and congestion avoidance in the internet,” Internet Performance
Recommendations, RFC 2309, Apr. 1998, doi: 10.17487/rfc2309.
[16] C. Brandauer, G. Iannaccone, C. Diot, T. Ziegler, S. Fdida, and M. May, “Comparison of tail drop and active queue management
performance for bulk-data and Web-like Internet traffic,” in Proceedings. Sixth IEEE Symposium on Computers and
Communications, 2001, pp. 122–129, doi: 10.1109/ISCC.2001.935364.
[17] L. Zeng, H. Ni, and R. Han, “The yellow active queue management algorithm in ICN routers based on the monitoring of
bandwidth competition,” Electronics, vol. 10, no. 7, Mar. 2021, doi: 10.3390/electronics10070806.
[18] M. Q. Sulttan, M. H. Jaber, and S. W. Shneen, “Proportional-integral genetic algorithm controller for stability of TCP network,”
International Journal of Electrical and Computer Engineering (IJECE), vol. 10, no. 6, pp. 6225–6232, Dec. 2020, doi:
10.11591/ijece.v10i6.pp6225-6232.
[19] M. Barczyk and A. Chydzinski, “AQM based on the queue length: A real-network study,” PLOS ONE, vol. 17, no. 2, Feb. 2022,
doi: 10.1371/journal.pone.0263407.
[20] S. Kar, B. Alt, H. Koeppl, and A. Rizk, “PAQMAN: A principled approach to active queue management,” arXiv:2202.10352v1,
Feb. 2022.
[21] S. Floyd and V. Jacobson, “Random early detection gateways for congestion avoidance,” IEEE/ACM Transactions on
Networking, vol. 1, no. 4, pp. 397–413, 1993, doi: 10.1109/90.251892.
[22] A. A. Abu-Shareha, “Controlling delay at the router buffer using modified random early detection,” International Journal of
Computer Networks & Communications, vol. 11, no. 6, pp. 63–75, Nov. 2019, doi: 10.5121/ijcnc.2019.11604.
[23] S. Floyd, “Recommendation on using the ‘gentle’ variant of RED,” www.icir.org/floyd/red/gentle.html, 2000, [Online]. Available:
https://cir.nii.ac.jp/crid/1571135650186783744 (accessed June 15, 2022).
[24] S. Jamali, N. Alipasandi, and B. Alipasandi, “An improvement over random early detection algorithm: A self-tuning approach,”
An Improvement over Random Early Detection Algorithm: A Self-tuning Approach, vol. 2, no. 2, pp. 57–61, 2014.
[25] Bing Zheng and M. Atiquzzaman, “DSRED: an active queue management scheme for next generation networks,” in Proceedings
25th Annual IEEE Conference on Local Computer Networks. LCN 2000, 2000, pp. 242–251, doi: 10.1109/LCN.2000.891036.
[26] C.-W. Feng, L.-F. Huang, C. Xu, and Y.-C. Chang, “Congestion control scheme performance analysis based on nonlinear RED,”
IEEE Systems Journal, vol. 11, no. 4, pp. 2247–2254, Dec. 2017, doi: 10.1109/JSYST.2014.2375314.
[27] Y. Zhang, J. Ma, Y. Wang, and C. Xu, “MRED: An improved nonlinear RED algorithm,” in 2011 International Conference on
Computer and Automation Engineering (ICCAE 2011), 2012, vol. 44, doi: 10.7763/IPCSIT.2012.V44.2.
[28] M. Baklizi, H. Abdel-Jaber, M. Abualhaj, N. Abdullah, S. Ramadass, and D. A. Almomani, “Dynamic stochastic early discovery:
A new congestion control technique to improve networks performance,” Dynamic stochastic early discovery: A new congestion
control technique to improve networks performance, vol. 9, no. 3, pp. 1113–1126, 2013.
[29] M. Baklizi, “Stabilizing average queue length in active queue management method,” International Journal of Advanced
Computer Science and Applications, vol. 10, no. 3, 2019, doi: 10.14569/IJACSA.2019.0100310.
[30] M. Baklizi, “Weight queue dynamic active queue management algorithm,” Symmetry, vol. 12, no. 12, Dec. 2020, doi:
10.3390/sym12122077.
[31] S. Jamali, B. Alipasandi, and N. Alipasandi, “VRED: An improvement over RED algorithm by using queue length growth
velocity,” Journal of Advances in Computer Research, vol. 4, no. 1, pp. 31–38, 2013.
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 1, February 2023: 669-679
678
[32] G. Attiya and H. El-Khobby, “Improving internet quality of service through active queue management in routers,” International
Journal of Computer Science Issues, vol. 9, no. 1, pp. 279–286, 2012.
[33] Y. Su, L. Huang, and C. Feng, “QRED: A Q-learning-based active queue management scheme,” Journal of Internet Technology,
vol. 19, no. 4, pp. 1169–1178, 2018, doi: 10.3966/160792642018081904019.
[34] A. K. Paul, H. Kawakami, A. Tachibana, and T. Hasegawa, “An AQM based congestion control for eNB RLC in 4G/LTE
network,” in 2016 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), May 2016, pp. 1–5, doi:
10.1109/CCECE.2016.7726792.
[35] E.-B. Fgee, A. Smeda, and K. AbouElgaseem, “MRED: An algorithm to insure high QoS in IP networks,” Journal of
Communications, vol. 12, no. 4, pp. 200–206, 2017, doi: 10.12720/jcm.12.4.200-206.
[36] D. Kumhar, A. Kumar, and A. Kewat, “QRED: an enhancement approach for congestion control in network communications,”
International Journal of Information Technology, vol. 13, no. 1, pp. 221–227, Feb. 2021, doi: 10.1007/s41870-020-00538-1.
[37] A. Giménez, M. A. Murcia, J. M. Amigó, O. Martínez-Bonastre, and J. Valero, “New RED-type TCP-AQM algorithms based on
beta distribution drop functions,” arXiv:2201.01105v1, Jan. 2022.
[38] Suwannapong and Khunboa, “Congestion control in CoAP observe group communication,” Sensors, vol. 19, no. 15, Aug. 2019,
doi: 10.3390/s19153433.
[39] S. Patel and Karmeshu, “A new modified dropping function for congested AQM networks,” Wireless Personal Communications,
vol. 104, no. 1, pp. 37–55, Jan. 2019, doi: 10.1007/s11277-018-6007-8.
[40] C. Suwannapong and C. Khunboa, “EnCoCo-RED: Enhanced congestion control mechanism for CoAP observe group
communication,” Ad Hoc Networks, vol. 112, pp. 1–10, Mar. 2021, doi: 10.1016/j.adhoc.2020.102377.
[41] Jahon Koo, Byunghun Song, Kwangsue Chung, Hyukjoon Lee, and Hyunkook Kahng, “MRED: a new approach to random early
detection,” in Proceedings 15th International Conference on Information Networking, 2001, pp. 347–352, doi:
10.1109/ICOIN.2001.905450.
[42] ns-3, “The network simulator ns-3” ns-3. [Online]. Available: https://www.nsnam.org (accessed February 26, 2022).
BIOGRAPHIES OF AUTHORS
Samuel Oluwatosin Hassan received his M.Sc. and Ph.D. degrees in Computer
Science from Obafemi Awolowo University, Ile-Ife, Nigeria. Currently, he is a Lecturer in the
Department of Mathematical Sciences (Computer Science Unit), Olabisi Onabanjo University,
Ago-Iwoye, Nigeria. He is a Certified Information Technology Practitioner (C.itp). He is a
Member of Computer Professionals (Registration Council) of Nigeria (CPN), International
Association of Engineers (IAENG). He is also a member of the following societies: Nigeria
Computer Society (NCS), the IAENG Society of Computer Science, the IAENG Society of
Internet Computing and Web Services, the IAENG Society of Scientific Computing, the
IAENG Society of Software Engineering, and the IAENG Society of Wireless Networks.
He is also a Member of MathTech Thinking Foundation, (MTTF) and a certified MTTF-
Advisor. His research interests span computational mathematics, computer networks and
communications, mathematical modeling and simulation, and Internet congestion control. He
can be contacted at samuel.hassan@oouagoiwoye.edu.ng.
Adewole Usman Rufai is a Senior Lecturer in the Department of Computer
Sciences, University of Lagos, Nigeria. His tertiary education includes the following: Bachelor
of Science degree in Mathematics obtained from the University of Ilorin, PGD, M.Sc., Ph.D.
(Computer Science), and MBA (Finance) all from the University of Lagos. He is a Fellow of
the Nigeria Computer Society, a Certified Information Technology Practitioner, and a Member
of the Computer Professionals Registration Council of Nigeria and a Member of Association
of Computer Machinery. His areas of research include Software Engineering, Cognitive
Computing, and Cyber Security. He can be contacted at arufai@unilag.edu.ng.
Vivian Ogochukwu Nwaocha is an Associate Professor of Computer Science and
the Deputy Director, Africa Centre of Excellence on Technology Enhanced Learning at the
National Open University of Nigeria. She holds a PhD in Computer Science, MSc. in
Computer Science, PGD in Computer Engineering and a B.Eng. in Metallurgical and Materials
Engineering. She has over thirteen years of experience in inclusive open and distance learning
and has served as the Head of Department of Computer Science at the National Open
University of Nigeria. She is a member of Computer Professionals Registration Council of
Nigeria, Nigeria Computer Society, Association for Computing Machinery, Polearm Academy,
and several international professional and scientific associations. She can be contacted at
onwaocha@noun.edu.ng.
11. Int J Elec & Comp Eng ISSN: 2088-8708
Quadratic exponential random early detection: a new enhanced … (Samuel Oluwatosin Hassan)
679
Samson Ojo Ogunlere is an Associate Professor at Babcock University,
Information Technology (IT) Department in IT and Computer related courses. He is a
registered member of Nigeria Society of Engineers (MNSE), Council for Regulation of
Engineering in Nigeria (COREN), Chartered Information Technology Practitioner (C.itp),
Member Computer Professionals Registration Council of Nigeria (MCPN) and Nigeria
Computer Society (NCS) with many years of working experiences in IT and Computer
Industries. He is also a member of Computer Science and IT Department Research group in
Babcock University, Ogun State, Nigeria. He can be contacted at ogunleres@babcock.edu.ng.
Aderonke Adelola Adegbenjo is a Senior Lecturer in the Department of
Computer Science, Babcock University, Nigeria. A graduate of Babcock University, Ilishan
Remo, Ogun State, Nigeria. Master’s degree in Computer Science Department at the
Univeristy of Ibadan and MPhil degree at Babcock University and Ph.D. in the same
institution, Babcock University. She is a member of Computer Professionals (Registration
Council of Nigeria). Her research interest is in Networking. She can be contacted at
adegbenjoa@babcock.edu.ng.
Michael Olugbenga Agbaje is an Associate Professor of Computer Science and
Information security in the Department of Computer Science, Babcock University, Nigeria.
Holds a Doctorate Degree from the Department of Computer Science, Babcock University,
Nigeria. He can be contacted at agbajem@babcock.edu.ng.
Theophilus Aniemeka Enem holds a PhD in Computer Science from Babcock
University, Ilishan-Remo, Ogun State, Nigeria. He has several years’ experience of teaching
computer science and cyber security courses at the university level. Currently, the HOD of
Cyber Security Department, Air Force Institute of Technology, Kaduna, Nigeria. Enem is a
full member of the Nigeria Computer Society (NCS) and the Computer Professional
Registration Council of Nigeria (CPN). His areas of interest are Networking,
Telecommunications, and Forensic Science. He has published works in several journals of
international repute. He can be contacted at ta.enem@afit.edu.ng.