• Title/Summary/Keyword: black hole algorithm

Search Result 13, Processing Time 0.023 seconds

Stackelberg Game between Multi-Leader and Multi-Follower for Detecting Black Hole and Warm Hole Attacks In WSN

  • S.Suganthi;D.Usha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.159-167
    • /
    • 2023
  • Objective: • To detect black hole and warm hole attacks in wireless sensor networks. • To give a solution for energy depletion and security breach in wireless sensor networks. • To address the security problem using strategic decision support system. Methods: The proposed stackelberg game is used to make the spirited relations between multi leaders and multi followers. In this game, all cluster heads are acts as leaders, whereas agent nodes are acts as followers. The game is initially modeled as Quadratic Programming and also use backtracking search optimization algorithm for getting threshold value to determine the optimal strategies of both defender and attacker. Findings: To find optimal payoffs of multi leaders and multi followers are based on their utility functions. The attacks are easily detected based on some defined rules and optimum results of the game. Finally, the simulations are executed in matlab and the impacts of detection of black hole and warm hole attacks are also presented in this paper. Novelty: The novelty of this study is to considering the stackelberg game with backtracking search optimization algorithm (BSOA). BSOA is based on iterative process which tries to minimize the objective function. Thus we obtain the better optimization results than the earlier approaches.

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong;Yi, Ping;Wang, Junfeng;Yang, Hongshen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1721-1736
    • /
    • 2013
  • Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.

DIntrusion Detection in WSN with an Improved NSA Based on the DE-CMOP

  • Guo, Weipeng;Chen, Yonghong;Cai, Yiqiao;Wang, Tian;Tian, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5574-5591
    • /
    • 2017
  • Inspired by the idea of Artificial Immune System, many researches of wireless sensor network (WSN) intrusion detection is based on the artificial intelligent system (AIS). However, a large number of generated detectors, black hole, overlap problem of NSA have impeded further used in WSN. In order to improve the anomaly detection performance for WSN, detector generation mechanism need to be improved. Therefore, in this paper, a Differential Evolution Constraint Multi-objective Optimization Problem based Negative Selection Algorithm (DE-CMOP based NSA) is proposed to optimize the distribution and effectiveness of the detector. By combining the constraint handling and multi-objective optimization technique, the algorithm is able to generate the detector set with maximized coverage of non-self space and minimized overlap among detectors. By employing differential evolution, the algorithm can reduce the black hole effectively. The experiment results show that our proposed scheme provides improved NSA algorithm in-terms, the detectors generated by the DE-CMOP based NSA more uniform with less overlap and minimum black hole, thus effectively improves the intrusion detection performance. At the same time, the new algorithm reduces the number of detectors which reduces the complexity of detection phase. Thus, this makes it suitable for intrusion detection in WSN.

Analyzing the bearing capacity of shallow foundations on two-layered soil using two novel cosmology-based optimization techniques

  • Gor, Mesut
    • Smart Structures and Systems
    • /
    • v.29 no.3
    • /
    • pp.513-522
    • /
    • 2022
  • Due to the importance of accurate analysis of bearing capacity in civil engineering projects, this paper studies the efficiency of two novel metaheuristic-based models for this objective. To this end, black hole algorithm (BHA) and multi-verse optimizer (MVO) are synthesized with an artificial neural network (ANN) to build the proposed hybrid models. Based on the settlement of a two-layered soil (and a shallow footing) system, the stability values (SV) of 0 and 1 (indicating the stability and failure, respectively) are set as the targets. Each model predicted the SV for 901 stages. The results indicated that the BHA and MVO can increase the accuracy (i.e., the area under the receiving operating characteristic curve) of the ANN from 94.0% to 96.3 and 97.2% in analyzing the SV pattern. Moreover, the prediction accuracy rose from 93.1% to 94.4 and 95.0%. Also, a comparison between the ANN's error decreased by the BHA and MVO (7.92% vs. 18.08% in the training phase and 6.28% vs. 13.62% in the testing phase) showed that the MVO is a more efficient optimizer. Hence, the suggested MVO-ANN can be used as a reliable approach for the practical estimation of bearing capacity.

Development of a Markov Chain Monte Carlo parameter estimation pipeline for compact binary coalescences with KAGRA GW detector (카그라 마코브 체인 몬테칼로 모수 추정 파이프라인 분석 개발과 밀집 쌍성의 물리량 측정)

  • Kim, Chunglee;Jeon, Chaeyeon;Lee, Hyung Won;Kim, Jeongcho;Tagoshi, Hideyuki
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.45 no.1
    • /
    • pp.51.3-52
    • /
    • 2020
  • We present the status of the development of a Markov Chain Monte Carlo (MCMC) parameter estimation (PE) pipeline for compact binary coalescences (CBCs) with the Japanese KAGRA gravitational-wave (GW) detector. The pipeline is included in the KAGRA Algorithm Library (KAGALI). Basic functionalities are benchmarked from the LIGO Algorithm Library (LALSuite) but the KAGRA MCMC PE pipeline will provide a simpler, memory-efficient pipeline to estimate physical parameters from gravitational waves emitted from compact binaries consisting of black holes or neutron stars. Applying inspiral-merge-ringdown and inspiral waveforms, we performed simulations of various black hole binaries, we performed the code sanity check and performance test. In this talk, we present the situation of GW observation with the Covid-19 pandemic. In addition to preliminary PE results with the KAGALI MCMC PE pipeline, we discuss how we can optimize a CBC PE pipeline toward the next observation run.

  • PDF

Updating calibration of CIV-based single-epoch black hole mass estimators

  • Park, Daeseong;Barth, Aaron J.;Woo, Jong-Hak;Malkan, Matthew A.;Treu, Tommaso;Bennert, Vardha N.;Pancoast, Anna
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.2
    • /
    • pp.61.1-61.1
    • /
    • 2016
  • Black hole (BH) mass is a fundamental quantity to understand BH growth, galaxy evolution, and connection between them. Thus, obtaining accurate and precise BH mass estimates over cosmic time is of paramount importance. The rest-frame UV CIV ${\lambda}1549$ broad emission line is commonly used for BH mass estimates in high-redshift AGNs (i.e., $2{\leq}z{\leq}5$) when single-epoch (SE) optical spectra are available. Achieving correct and accurate calibration for CIV-based SE BH mass estimators against the most reliable reverberation-mapping based BH mass estimates is thus practically important and still useful. By performing multi-component spectral decomposition analysis to obtained high-quality HST UV spectra for the updated sample of local reverberation-mapped AGNs including new HST STIS observations, CIV emission line widths and continuum luminosities are consistently measured. Using a Bayesian hierarchical model with MCMC sampling based on Hamiltonian Monte Carlo algorithm (Stan NUTS), we provide the most consistent and accurate calibration of CIV-based BH mass estimators for the three line width characterizations, i.e., full width at half maximum (FWHM), line dispersion (${\sigma}_{line}$), and mean absolute deviation (MAD), in the extended BH mass dynamic range of log $M_{BH}/M_{\odot}=6.5-9.1$.

  • PDF

Implementation of recognition system on extracting inferior goods of radiation fin (방열판 불량품 추출을 위한 식별 시스템 구현)

  • Sim, Woo-Sung;Huh, Do-Geun;Lee, Yong-Sik
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.6 no.1
    • /
    • pp.91-97
    • /
    • 2000
  • In this paper, the illuminator is designed to recognize the shape and the existence of holes of radiation fin in the point that the light reflection characteristics are different according to the roughness of the material. The threshold value, the positions of holes and the black pixel nembers in the positon are obtained under the illuminator, in accordance with the reference image, by applying binary conversion and hole segmentation algorithm, as they are suggested in this paper, The existence and shape of hole are recognized by calculating the distance and feature value in the test image, which is obtained from the parameters of reference image. It is programmed to apply to GUI(Graphic User the Interface) in windows. More than 98% of recognition rate is shown, as it is applied to three different sizes of the radiation fin.

  • PDF

Analysis of the artifact reduction rate for the types of medical metals in CT with MAR algorithm (CT의 MAR알고리즘 적용 시 의료용 금속 물질별 인공물 감소율 분석)

  • Kim, Hyeon-ju;Yoon, Joon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.655-662
    • /
    • 2016
  • We investigated on the usefulness of MAR algorithm by making a comparison of the CT value between before and after applying the MAR algorithm in dual energy CT, using the various kinds of medical metals, causing the artifact to lead to the low image quality. As a result, the artifact was reduced in most cases (P<0.05); in particular, the artifact was highly reduced (P<0.05) using high density material, like alloy-stainless (reduced by 78.1%) and platinum, for example GDC coil (reduced by 76.1%). The effect of decreasing the Black hole artifact was outstanding in both the alloy-stainless and alloy-titanium (P<0.05). However, in case of GDC coil-a type platinum, white streak artifact was reduced effectively (P<0.05). Therefore, in case of patients who have medical metals inserted, we think that high-quality image information can be provided by decreasing the artifact caused by high density material through MAR algorithm in dual energy CT.

Clinical Apply of Dual Energy CT (kVp switching) : A Novel Approach for MAR(Metal Artifact Reduction) Method (듀얼에너지 CT(kvp switching)의 임상 적용: MAR(Metal Artifact Reduction) 알고리즘의 적용)

  • Kim, Myeong-Seong;Jeong, Jong-Seong;Kim, Myeong-Goo
    • Journal of Radiation Protection and Research
    • /
    • v.36 no.2
    • /
    • pp.79-85
    • /
    • 2011
  • OThe purpose of this article was to measure and compare the value of the metal artifact reduction (MAR) algorithm by Dual energy(kVp switching) CT (Computed Tomography) for non using MAR and we introduced new variable Dual energy CT applications through a clinical scan. The used equipment was GE Discovery 750HD with Dual-Energy system(kVp switching). CT scan was performed on the neck and abdomen area subject for patients. Studies were from Dec 20 2010 to Feb 10 2011 and included 25 subject patients with prosthesis. We were measured the HU (Hounsfield Unit) and noise value at metal artifact appear(focal loss of signal and white streak artifact area) according to the using MAR algorithm. Statistical analyses were performed using the paired sample t-test. In patient subject case, the statistical difference of showing HU was p=0.01 and p=0.04 respectively. At maximum black hole artifact area and white streak artifact area according to the using MAR algorithm. However noise was p=0.05 and p=0.04 respectively; and not the affected black hole and white streak artifact area. Dual Energy CT with the MAR algorithm technique is useful reduce metal artifacts and could improve the diagnostic value in the diagnostic image evaluation of metallic implants area.

A Two level Detection of Routing layer attacks in Hierarchical Wireless Sensor Networks using learning based energy prediction

  • Katiravan, Jeevaa;N, Duraipandian;N, Dharini
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4644-4661
    • /
    • 2015
  • Wireless sensor networks are often organized in the form of clusters leading to the new framework of WSN called cluster or hierarchical WSN where each cluster head is responsible for its own cluster and its members. These hierarchical WSN are prone to various routing layer attacks such as Black hole, Gray hole, Sybil, Wormhole, Flooding etc. These routing layer attacks try to spoof, falsify or drop the packets during the packet routing process. They may even flood the network with unwanted data packets. If one cluster head is captured and made malicious, the entire cluster member nodes beneath the cluster get affected. On the other hand if the cluster member nodes are malicious, due to the broadcast wireless communication between all the source nodes it can disrupt the entire cluster functions. Thereby a scheme which can detect both the malicious cluster member and cluster head is the current need. Abnormal energy consumption of nodes is used to identify the malicious activity. To serve this purpose a learning based energy prediction algorithm is proposed. Thus a two level energy prediction based intrusion detection scheme to detect the malicious cluster head and cluster member is proposed and simulations were carried out using NS2-Mannasim framework. Simulation results achieved good detection ratio and less false positive.