Loading...
  • Home
  • Search Results
527-528 of 4327 Papers

COMPARATIVE STUDY OF BIO-INSPIRED ALGORITHMS FOR UNCONSTRAINED OPTIMIZATION PROBLEMS

Published In: SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, ELECTRICAL AND COMPUTER ENGINEERING
Author(s): ADIL HASHMI , DIVYA GUPTA , NISHANT GOEL , SHRUTI GOEL

Abstract: Nature inspired meta-heuristic algorithms are iterative search processes which find near optimal solutions by efficiently performing exploration and exploitation of the solution space. Considering the solution space in a specified region, this work compares performances of Bat, Cuckoo search and Firefly algorithms for unconstrained optimization problems. Global optima are found using various test functions of different characteristics.

  • Publication Date: 13-Jun-2013
  • DOI: 10.15224/978-981-07-6935-2-28
  • Views: 0
  • Downloads: 0

DETECTION OF BLACK HOLE ATTACK IN MOBILE ADHOC NETWORKS

Published In: SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRONICS, ELECTRICAL AND COMPUTER ENGINEERING
Author(s): ADITYA KUMAR , KRISHAN KUMAR SALUJA , SHASHI GURUNG

Abstract: Mobile ad hoc networks (MANET) are widely used in that places where there is no available infrastructure. It is also called infrastructure less network. MANET is particularly vulnerable to various types of security attacks due to its fundamental characteristics, e.g. the lack of centralized monitoring, dynamic network topology, open medium, autonomous terminal and management. The black hole attack is one of such security issue in MANET. In this attack, a malicious node gives false information of having shortest route to the destination node so as to get all data packets and drops it. In this paper, we propose an algorithm to detect and prevent black hole attack in AODV routing. The proposed method uses conformation acknowledgment request to check whether the destination has received dummy packet or not.

  • Publication Date: 13-Jun-2013
  • DOI: 10.15224/978-981-07-6935-2-29
  • Views: 0
  • Downloads: 0