Detection of Black Hole Attacks in Mobile Ad Hoc Networks Using Optimization-Based Routing Algorithms

D Sunitha, PH Latha - 2024 Third International Conference on …, 2024 - ieeexplore.ieee.org
… mainly because it suffers from a black hole attack. This research focuses on the detection of
Black Hole attacks using advanced optimization algorithms, namely Grey Wolf Optimization (…

A novel feature selection method using whale optimization algorithm and genetic operators for intrusion detection system in wireless mesh network

R Vijayanand, D Devaraj - IEEE Access, 2020 - ieeexplore.ieee.org
… In [9], the differential evolution algorithms were improved by … attacks, such as black hole and
worm hole, to damage the … node has an intrusion detection engine to detect attacks from the …

A genetic algorithm for a global optimization problem arising in the detection of gravitational waves

D Di Serafino, S Gomez, L Milano, F Riccio… - Journal of Global …, 2010 - Springer
… /or black holes), from noisy data obtained by interferometric detectors, the matched … algorithms
(GAs) are a class of evolutionary algorithms which apply the principles of natural evolution

Evolutionary computation, optimization, and learning algorithms for data science

FG Mohammadi, MH Amini, HR Arabnia - Optimization, Learning, and …, 2020 - Springer
… The summary of evolutionary algorithms discussed in this chapter is as follows: genetic …
Then, we provide detailed and practical examples of applying evolutionary algorithms with a …

Automatic inspection of metallic surface defects using genetic algorithms

H Zheng, LX Kong, S Nahavandi - Journal of materials processing …, 2002 - Elsevier
… Inspection algorithms The purpose of the inspection algorithm is to detect and identify possible
… Here, we focus on the holes and cracks on the surfaces of aluminium, which are two very …

The repair strategy for event coverage holes based on mobile robots in wireless sensor and robot networks

Y Zhuang, C Wu, H Wu, H Chu, Y Gao, L Li - Sensors, 2019 - mdpi.com
… In this paper, a joint event coverage hole repair algorithm on the basis of global repair and
… to heal event coverage holes in WSRNs. The differential evolution algorithm is applied for …

REVOHPR: relay-based void hole prevention and repair by virtual routing in clustered multi-AUV underwater wireless sensor network

A Chaaf, MSA Muthanna, A Muthanna, S Alhelaly… - 2021 - preprints.org
… , routing, sleep scheduling, and void hole detection and repair in UWSN. Section III … void
hole avoidance. Section IV describes the research methodology, pseudocode and algorithms in …

A survey of evolutionary algorithms using metameric representations

M Ryerkerk, R Averill, K Deb, E Goodman - Genetic Programming and …, 2019 - Springer
Evolutionary algorithms have been used to solve a number of variable-length problems, many
of which share a common representation. A set of design variables is repeatedly defined, …

[PDF][PDF] Semi-supervised learning based coverage hole detection in cellular networks

SA Al-Ahmed, MZ Shakir - ITU Journal on Future and Evolving Technologies, 2022 - itu.int
… A simple Coverage Hole (CH) may degrade the performance and the reputation of any …
and complex especially for CH analysis and detection from mobile network data. Therefore, we …

Hybridizing neural network with multi-verse, black hole, and shuffled complex evolution optimizer algorithms predicting the dissolved oxygen

H Moayedi, A Mosavi - 2021 - preprints.org
… In the fifth step, each complex is evolved by the competitive complex evolution algorithm.
Later, in a process named shuffling of the complexes, all complexes are replaced in the array D…