1 |
B. Braden, "Recommendations on Queue Management and Congestion Avoidance in the Internet," RFC 2309, 1998. DOI: https://tools.ietf.org/html/rfc2309
|
2 |
Woo-June Kim, Byeong Gi Lee, "FRED-fair random early detection algorithm for TCP over ATM networks", IEEE IET Vol34. issue 2, pp. 152-154, 22 Jam. 1998. DOI: 10.1049/el:19980049
|
3 |
W. C. Feng, Kang G. Shin, Dilip D. Kandlur and Debanjan Saha, "The BLUE Active Queue Management Algorithms," IEEE/ACM Trans. of Networking, Vol.10, No.4, pp.513-528, 2002. DOI: 10.1109/TNET.2002.801399
DOI
|
4 |
Z. Liu, X. Hu, "An Adaptive AQM lgorithm Based on a Novel Information Compression Model" IEEE Access, vol2, issue 1, pp.31180-31190, 2018 DOI: 10.1109/ACCESS.2018.2844407
|
5 |
H, Jorgensen, Toke, "Analyzing the latency of sparse flows in the FQ-CoDel queue management algorithm", IEEE Communications Letters, vol.22, issue 11, pp.2266-2269 DOI: 10.1109/LCOMM.2018.2871457
DOI
|
6 |
V. Misra,W.-B. Gong, and D. Towsley, 'Fluid-based analysis of a network of AQM routers supporting TCP ows with an application to RED,'ACM SIGCOMM Comput. Commun. Rev., vol. 30, no. 4, pp. 151160,2000.
DOI
|
7 |
Y. S. Im, E. Y. Kang, "MPEG-2 Video Watermarking in Quantized DCT Domain," The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 11, No. 1, pp. 81-86, 2011. DOI: https://doi.org/10.7236/JIIBC.2014.14.2.17
DOI
|
8 |
I. Jeon, S. Kang, H. Yang, "Development of Security Quality Evaluate Basis and Measurement of Intrusion Prevention System," Journal of the Korea Academia-Industrial cooperation Society(JKAIS), Vol. 11, No. 1, pp. 81-86, 2010. DOI: https://doi.org/10.5762/KAIS.2010.11.4.1.1449
|
9 |
Eun-Gyu Ham, Chang-Bok Kim, "Model Implementation of Reinforcement Learning for Trading Prediction Using Deep Q Network ," The Journal of KIIT, Vol. 17, No. 4, pp. 1-8, 2019. DOI: 10.14801/jkiit.2019.17.4.1
|
10 |
General Dynamics Mission Systems, WIN-T The mobile expeditionary soldier's network, pp. 27-28, Mar. 2017.
|
11 |
J. Park, "Network Configuration Scheme to Improve reliability Based on Tactical Wireless Network", KIMST conference pp.699-610, oct., 2017
|
12 |
Jang-wee Research Institute for National Defence in Ajou University, "Guarantee of InformationCirculation for Weapon-system in All-IP Tactical Network," Research Report, 2014.
|