{"id":"https://openalex.org/W2150115047","doi":"https://doi.org/10.1109/lcn.2003.1243108","title":"AFRED:an adaptive fuzzy-based control algorithm for active queue management","display_name":"AFRED:an adaptive fuzzy-based control algorithm for active queue management","publication_year":2004,"publication_date":"2004-06-22","ids":{"openalex":"https://openalex.org/W2150115047","doi":"https://doi.org/10.1109/lcn.2003.1243108","mag":"2150115047"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2003.1243108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2003.1243108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101504222","display_name":"Chonggang Wang","orcid":"https://orcid.org/0000-0002-6691-5233"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Chonggang Wang","raw_affiliation_strings":["Hong Kong University of Science and Technology, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100374506","display_name":"Bo Li","orcid":"https://orcid.org/0000-0003-2083-9105"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Bo Li","raw_affiliation_strings":["Hong Kong University of Science and Technology, Hong Kong, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, Hong Kong, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008676141","display_name":"K. Sohraby","orcid":"https://orcid.org/0000-0003-1523-1445"},"institutions":[{"id":"https://openalex.org/I78715868","display_name":"University of Arkansas at Fayetteville","ror":"https://ror.org/05jbt9m15","country_code":"US","type":"education","lineage":["https://openalex.org/I78715868"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"K. Sohraby","raw_affiliation_strings":["University of Arkansas, USA"],"affiliations":[{"raw_affiliation_string":"University of Arkansas, USA","institution_ids":["https://openalex.org/I78715868"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111964074","display_name":"Yong Peng","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Peng","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101504222"],"corresponding_institution_ids":["https://openalex.org/I200769079"],"apc_list":null,"apc_paid":null,"fwci":2.2436,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.90245728,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"12","last_page":"20"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/active-queue-management","display_name":"Active queue management","score":0.9622836112976074},{"id":"https://openalex.org/keywords/goodput","display_name":"Goodput","score":0.8279906511306763},{"id":"https://openalex.org/keywords/random-early-detection","display_name":"Random early detection","score":0.8165985345840454},{"id":"https://openalex.org/keywords/queue","display_name":"Queue","score":0.6973322629928589},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6765891909599304},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.5330319404602051},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4946999251842499},{"id":"https://openalex.org/keywords/fuzzy-control-system","display_name":"Fuzzy control system","score":0.4654935598373413},{"id":"https://openalex.org/keywords/network-congestion","display_name":"Network congestion","score":0.4575068950653076},{"id":"https://openalex.org/keywords/queueing-theory","display_name":"Queueing theory","score":0.447005033493042},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.43636658787727356},{"id":"https://openalex.org/keywords/control-theory","display_name":"Control theory (sociology)","score":0.3640221357345581},{"id":"https://openalex.org/keywords/throughput","display_name":"Throughput","score":0.1881629228591919},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.16151544451713562},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.14435559511184692},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11336034536361694}],"concepts":[{"id":"https://openalex.org/C34793927","wikidata":"https://www.wikidata.org/wiki/Q583367","display_name":"Active queue management","level":4,"score":0.9622836112976074},{"id":"https://openalex.org/C94022561","wikidata":"https://www.wikidata.org/wiki/Q1172393","display_name":"Goodput","level":4,"score":0.8279906511306763},{"id":"https://openalex.org/C161965511","wikidata":"https://www.wikidata.org/wiki/Q560448","display_name":"Random early detection","level":5,"score":0.8165985345840454},{"id":"https://openalex.org/C160403385","wikidata":"https://www.wikidata.org/wiki/Q220543","display_name":"Queue","level":2,"score":0.6973322629928589},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6765891909599304},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.5330319404602051},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4946999251842499},{"id":"https://openalex.org/C195975749","wikidata":"https://www.wikidata.org/wiki/Q1475705","display_name":"Fuzzy control system","level":3,"score":0.4654935598373413},{"id":"https://openalex.org/C195563490","wikidata":"https://www.wikidata.org/wiki/Q180368","display_name":"Network congestion","level":3,"score":0.4575068950653076},{"id":"https://openalex.org/C22684755","wikidata":"https://www.wikidata.org/wiki/Q847526","display_name":"Queueing theory","level":2,"score":0.447005033493042},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.43636658787727356},{"id":"https://openalex.org/C47446073","wikidata":"https://www.wikidata.org/wiki/Q5165890","display_name":"Control theory (sociology)","level":3,"score":0.3640221357345581},{"id":"https://openalex.org/C157764524","wikidata":"https://www.wikidata.org/wiki/Q1383412","display_name":"Throughput","level":3,"score":0.1881629228591919},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.16151544451713562},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.14435559511184692},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11336034536361694},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/lcn.2003.1243108","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2003.1243108","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1804414343","https://openalex.org/W1965963022","https://openalex.org/W2087255159","https://openalex.org/W2111966743","https://openalex.org/W2119007268","https://openalex.org/W2120398332","https://openalex.org/W2125134431","https://openalex.org/W2129348840","https://openalex.org/W2144195358","https://openalex.org/W2150517223","https://openalex.org/W2155981613","https://openalex.org/W2158733823","https://openalex.org/W4237998605","https://openalex.org/W6679258514","https://openalex.org/W6681036947"],"related_works":["https://openalex.org/W1973251725","https://openalex.org/W3144326900","https://openalex.org/W3013694835","https://openalex.org/W1884496646","https://openalex.org/W4229953098","https://openalex.org/W1518489902","https://openalex.org/W2799645566","https://openalex.org/W4224240262","https://openalex.org/W2121956384","https://openalex.org/W2352169350"],"abstract_inverted_index":{"This":[0,108],"paper":[1,109],"studies":[2],"the":[3,13,31,119,131,154,179,183],"active":[4],"queue":[5,133,180,200],"management":[6],"(AQM)":[7],"in":[8,34],"high-speed":[9],"routers.":[10],"One":[11],"of":[12,141],"original":[14],"and":[15,69,176,191,198,204],"popularly":[16],"implemented":[17],"AQM":[18],"algorithms":[19],"is":[20,27,75,143],"random":[21],"early":[22],"detection":[23],"(RED).":[24],"But":[25],"it":[26,101,145],"hard":[28],"to":[29,44,126,151,159,182],"configure":[30],"parameters":[32],"involved":[33],"RED.":[35],"Although":[36],"there":[37],"are":[38,79],"some":[39,50,87],"new":[40],"TCP-modeling":[41],"based":[42,81],"approaches":[43,78],"overcome":[45],"this,":[46],"they":[47],"really":[48],"show":[49,171],"instability":[51],"under":[52,89],"such":[53,106],"dynamical":[54,90],"environments":[55],"with":[56,189],"diverse":[57],"connections":[58],"(adaptive":[59],"or":[60,64,186],"non-":[61],"adaptive,":[62],"short":[63],"long),":[65],"link":[66],"rate,":[67],"RTT,":[68],"buffer":[70],"size.":[71],"The":[72,138],"major":[73],"reason":[74],"that":[76,144,172],"these":[77],"primarily":[80],"on":[82],"TCP":[83],"model,":[84,100],"which":[85,117],"has":[86],"mismatches":[88],"environment.":[91,107],"Since":[92],"fuzzy-logic":[93],"control":[94,99,114,178],"does":[95],"not":[96],"need":[97],"precise":[98],"may":[102],"be":[103],"suitable":[104],"for":[105,165],"designs":[110,147],"an":[111,148],"adaptive":[112,149],"fuzzy-based":[113],"algorithm":[115],"(AFRED),":[116],"computes":[118],"packet":[120],"drop":[121],"(or":[122],"marking)":[123],"probability":[124],"according":[125],"pre-configured":[127],"fuzzy":[128,155],"logic":[129],"using":[130],"instant":[132],"length":[134,181,201],"as":[135,158],"input":[136],"variable.":[137],"important":[139],"feature":[140],"AFRED":[142,161,173,194],"also":[146],"mechanism":[150],"dynamically":[152],"readjust":[153],"rule":[156],"so":[157],"make":[160],"itself":[162],"extensively":[163],"stable":[164,199],"many":[166],"dynamic":[167],"environments.":[168],"Simulation":[169],"results":[170],"can":[174],"effectively":[175],"stably":[177],"expected":[184],"value":[185],"so.":[187],"Compared":[188],"RED":[190,203],"PI":[192],"algorithm,":[193],"obtains":[195],"higher":[196],"goodput":[197],"than":[202],"PI,":[205],"even":[206],"if":[207],"introducing":[208],"UDP":[209],"flows.":[210]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":4}],"updated_date":"2026-04-15T08:11:43.952461","created_date":"2025-10-10T00:00:00"}
