RED-Based Technique for Detecting and Avoiding Anomaly Network Congestion
Active Queue Management (AQM) is an intelligent drop of network packets within the network routers as a result of buffer saturation to reduce network congestion. Random Early Detection (RED) mechanism is the most used mechanism among the existing AQMs, as it can avoid network congestion at the early...
| Main Authors: | Montaser, Mohamed Mostafa, Ahmed, Abdulghani Ali |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publisher
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19622/ http://umpir.ump.edu.my/id/eprint/19622/1/19.%20RED-Based%20Technique%20for%20Detecting%20and%20Avoiding%20Anomaly%20Network%20Congestion1.pdf |
Similar Items
Detection and avoidance technique of anomalous congestion at the network gateways
by: Ahmed, Abdulghani Ali
Published: (2018)
by: Ahmed, Abdulghani Ali
Published: (2018)
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017)
by: Lu, Cai An
Published: (2017)
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018)
by: Bariah, Yusob, et al.
Published: (2018)
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic
by: Monowar, Muhammad Mostafa, et al.
Published: (2008)
by: Monowar, Muhammad Mostafa, et al.
Published: (2008)
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Filtration Model For DDoS Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)
by: Ahmed, Abdulghani Ali
Published: (2015)
Feature selection using Rough-DPSO in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Reducing network congestion by separating nets of single-row networks into layers
by: Noraziah, Ahmad, et al.
Published: (2011)
by: Noraziah, Ahmad, et al.
Published: (2011)
Detection of black hole attacks in mobile ad hoc networks via HSA-CBDS method
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
by: Fahad, Ahmed Mohammed, et al.
Published: (2019)
Back Propagation Algorithm-Based Intelligent Model for Botnet Detection
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
by: Nik Quosthoni, Sunaidi, et al.
Published: (2018)
The role of psychological ownership and the technology acceptance model in teachers’ continuance intention of a virtual learning environment
by: Yim, Joanne Sau Ching
Published: (2019)
by: Yim, Joanne Sau Ching
Published: (2019)
Artificial immune system based on real valued negative selection algorithms for anomaly detection
by: Khairi, Rihab Salah
Published: (2015)
by: Khairi, Rihab Salah
Published: (2015)
Epilepsy detection from EEG signals using artificial neural network
by: Sallam, Amer A., et al.
Published: (2019)
by: Sallam, Amer A., et al.
Published: (2019)
Using Transformer Models for Stock Market Anomaly Detection
by: Biriukova, Kseniia, et al.
Published: (2023)
by: Biriukova, Kseniia, et al.
Published: (2023)
Emotional transformation through the effects of somatic therapy techniques in reducing depression among students of skill training institutions
by: Norizan, Yusof
Published: (2025)
by: Norizan, Yusof
Published: (2025)
A Study on the Effect of Stroop Test on the Formation of Students Discipline by Using the Heart Rate Variability (HRV) Technique
by: Shahidah, Hamzah, et al.
Published: (2018)
by: Shahidah, Hamzah, et al.
Published: (2018)
Investigation The Relationship Of Emotional Intelligence (EI) And Organizational Citizenship Behaviour (OCB) In Malaysian Organizations
by: Dehghan, Mostafa
Published: (2011)
by: Dehghan, Mostafa
Published: (2011)
The Effective Impact of Integration of Body Oriented Psychotherapy, Spirituality, and Biofeedback Techniques on Discipline Troubled Students of Technical Training Institution
by: Norizan, Yusof, et al.
Published: (2017)
by: Norizan, Yusof, et al.
Published: (2017)
Efficient flow-based channel assignment schemes for congestion avoidance in wireless mesh networks
by: Abdulla Mogaibel, Hassen Abd-Almotaleb
Published: (2016)
by: Abdulla Mogaibel, Hassen Abd-Almotaleb
Published: (2016)
Alternate methods for anomaly detection in high-energy physics via semi-supervised learning
by: Md. Ali, Mohd. Adli, et al.
Published: (2020)
by: Md. Ali, Mohd. Adli, et al.
Published: (2020)
Positional differences in the performance of volleyball players for anthropometric and psychological readiness in a congested fixture tournament
by: Rabiu Muazu, Musa, et al.
Published: (2022)
by: Rabiu Muazu, Musa, et al.
Published: (2022)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Evaluating oversampling techniques for network intrusion detection data
by: Chan, Jia Lin
Published: (2022)
by: Chan, Jia Lin
Published: (2022)
Performance enhancement of AIMD algorithm for congestion avoidance and control
by: Jasem, Hayder Natiq
Published: (2011)
by: Jasem, Hayder Natiq
Published: (2011)
Optimising traffic control for a congested intersectton
by: Rahmat, Riza Atiq, et al.
Published: (2002)
by: Rahmat, Riza Atiq, et al.
Published: (2002)
Epilepsy detection using EEG signals
by: Amer, Salam, et al.
Published: (2018)
by: Amer, Salam, et al.
Published: (2018)
Robust Techniques For DS-CDMA Systems In Impulsive Noise Channels
by: Lim, Heng Siong
Published: (2008)
by: Lim, Heng Siong
Published: (2008)
Job Titles Matching Using Bayesian Network
by: Abu Bakar, Azuraini
Published: (2011)
by: Abu Bakar, Azuraini
Published: (2011)
Stress relief techniques
by: Hamdan, Suhana
Published: (2011)
by: Hamdan, Suhana
Published: (2011)
Effects of personality traits (big five) on expatriates adjustment and job performance
by: Bhatti, Muhammad Awais, et al.
Published: (2014)
by: Bhatti, Muhammad Awais, et al.
Published: (2014)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Factors that influence international students mental health at Universiti Utara Malaysia during covid-19 pandemic
by: Abdirazak, Barre Ahmed
Published: (2020)
by: Abdirazak, Barre Ahmed
Published: (2020)
Identifying and detecting unlawful behavior in video images using genetic algorithm / Shahirah Mohamed Hatim
by: Mohamed Hatim, Shahirah
Published: (2016)
by: Mohamed Hatim, Shahirah
Published: (2016)
Modelling dynamics of victims' stress during natural disaster
by: Ali, Hayder Mohammed Ali
Published: (2014)
by: Ali, Hayder Mohammed Ali
Published: (2014)
Ant-based vehicle congestion avoidance framework using vehicular networks / Mohammad Reza Jabbarpour Sattari
by: Sattari, Mohammad Reza Jabbarpour
Published: (2015)
by: Sattari, Mohammad Reza Jabbarpour
Published: (2015)
Hubungan di antara kepuasan kerja dan stres terhadap kecekapan kerja pasukan respon ambulans (PRA) negeri Melaka
by: Ali, Kharulanuar
Published: (2022)
by: Ali, Kharulanuar
Published: (2022)
Application of data compression technique in congested networks
by: Kho, Lee Chin, et al.
Published: (2016)
by: Kho, Lee Chin, et al.
Published: (2016)
HTV 201 - THINKING TECHNIQUES MAR 05.
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (2005)
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (2005)
HTV 201 - THINKING TECHNIQUES MAC 05.
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (2005)
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (2005)
HTV 201 - THINKING TECHNIQUES MAC 05.
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (2005)
by: PPIK, Pusat Pengajian Ilmu Kemanusiaan
Published: (2005)
Similar Items
-
Detection and avoidance technique of anomalous congestion at the network gateways
by: Ahmed, Abdulghani Ali
Published: (2018) -
Traffic Scene Anomaly Detection
by: Lu, Cai An
Published: (2017) -
Anomaly Detection in Time Series Data Using Spiking Neural Network
by: Bariah, Yusob, et al.
Published: (2018) -
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic
by: Monowar, Muhammad Mostafa, et al.
Published: (2008) -
Investigation Model for Ddos Attack Detection in Real-Time
by: Ahmed, Abdulghani Ali
Published: (2015)