{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T13:11:50Z","timestamp":1767964310040,"version":"3.49.0"},"reference-count":25,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T00:00:00Z","timestamp":1590105600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Networks and Communications"],"published-print":{"date-parts":[[2020,5,22]]},"abstract":"<jats:p>Congestion is a key topic in computer networks that has been studied extensively by scholars due to its direct impact on a network\u2019s performance. One of the extensively investigated congestion control techniques is random early detection (RED). To sustain RED\u2019s performance to obtain the desired results, scholars usually tune the input parameters, especially the maximum packet dropping probability, into specific value(s). Unfortunately, setting up this parameter into these values leads to good, yet biased, performance results. In this paper, the RED-Exponential Technique (RED_E) is proposed to deal with this issue by dropping arriving packets in an exponential manner without utilizing the maximum packet dropping probability. Simulation tests aiming to contrast E_RED with other Active Queue Management (AQM) methods were conducted using different evaluation performance metrics including mean queue length (<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M1\"><mml:mtext>mql<\/mml:mtext><\/mml:math>), throughput (<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M2\"><mml:mi>T<\/mml:mi><\/mml:math>), average queuing delay (<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M3\"><mml:mi>D<\/mml:mi><\/mml:math>), overflow packet loss probability (<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M4\"><mml:msub><mml:mrow><mml:mi>P<\/mml:mi><\/mml:mrow><mml:mrow><mml:mi>L<\/mml:mi><\/mml:mrow><\/mml:msub><\/mml:math>), and packet dropping probability (<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M5\"><mml:msub><mml:mrow><mml:mi>D<\/mml:mi><\/mml:mrow><mml:mrow><mml:mi>P<\/mml:mi><\/mml:mrow><\/mml:msub><\/mml:math>). The reported results showed that E_RED offered a marginally higher satisfactory performance with reference to <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M6\"><mml:mtext>mql<\/mml:mtext><\/mml:math> and <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M7\"><mml:mi>D<\/mml:mi><\/mml:math> than that found in common AQM methods in cases of heavy congestion. Moreover, RED_E compares well with the considered AQM methods with reference to the above evaluation performance measures using minimum threshold position (<mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\" id=\"M8\"><mml:mi mathvariant=\"normal\">min<\/mml:mi><mml:mtext>\u2009threshold<\/mml:mtext><\/mml:math>) at a router buffer.<\/jats:p>","DOI":"10.1155\/2020\/8090468","type":"journal-article","created":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T23:48:31Z","timestamp":1590191311000},"page":"1-11","source":"Crossref","is-referenced-by-count":16,"title":["An Exponential Active Queue Management Method Based on Random Early Detection"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9372-4558","authenticated-orcid":true,"given":"Hussein","family":"Abdel-Jaber","sequence":"first","affiliation":[{"name":"Faculty of Computer Studies, Department of Information Technology and Computing, Arab Open University, Saudi Arabia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2010.02.007"},{"key":"2","first-page":"282","year":"2005"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/90.720870"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/65.923940"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/s1389-1286(00)00206-1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/90.251892"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2008.07.001"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.05.008"},{"issue":"1","key":"14","first-page":"359\u223c368","volume":"9","year":"2019","journal-title":"International Journal of Electrical and Computer Engineering (IJECE)"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2007.09.003"},{"issue":"1","key":"17","first-page":"22","volume":"3","year":"2012","journal-title":"International Journal of Modeling, Simulation, and Scientific Computing (IJMSSC)"},{"key":"18","volume":"3168","year":"2001","journal-title":"RFC"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2010.08.007"},{"key":"22","volume":"2309","year":"1998","journal-title":"RFC"},{"key":"23","year":"1993"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.04.007"},{"issue":"4","key":"26","first-page":"2247","volume":"11","year":"2015","journal-title":"IEEE Systems Journal"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.12.001"},{"key":"28","doi-asserted-by":"crossref","first-page":"2369","DOI":"10.1016\/j.proeng.2011.08.444","volume":"15","year":"2011","journal-title":"Procedia Engineering"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1142\/s1793962315500282"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcb.2009.2032363"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/s1389-1286(02)00295-5"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0229-4"},{"issue":"5","key":"33","first-page":"1879","volume":"5","year":"2018","journal-title":"International Research Journal of Engineering and Technology (IRJET)"},{"issue":"3","key":"34","doi-asserted-by":"crossref","first-page":"537","DOI":"10.1049\/cje.2017.03.013","volume":"26","year":"2017","journal-title":"Chinese Journal of Electronics"}],"container-title":["Journal of Computer Networks and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2020\/8090468.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2020\/8090468.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jcnc\/2020\/8090468.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,22]],"date-time":"2020-05-22T23:48:34Z","timestamp":1590191314000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/jcnc\/2020\/8090468\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,22]]},"references-count":25,"alternative-id":["8090468","8090468"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8090468","relation":{},"ISSN":["2090-7141","2090-715X"],"issn-type":[{"value":"2090-7141","type":"print"},{"value":"2090-715X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,22]]}}}