2023
DOI: 10.1016/j.comcom.2023.02.019
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection for fault detection in wireless community networks using machine learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 35 publications
0
6
0
Order By: Relevance
“…Assuming that the WOA population is N and the GA population is G, the new population is a combined (N + G) population, leading to a population boom after some iterations. To avoid a population explosion, which leads to high computational costs, a conditional choice strategy, inspired by the Altruism strategy [44], is proposed to sacrifice individuals in the new population with the number of sacrificed whales equal to G. Therefore, the similarity index (SI), which is described in Equation (15), is used to calculate the similarity score of each whale with their counterparts in the population.…”
Section: Proposed Genetic Sacrificial Whale Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Assuming that the WOA population is N and the GA population is G, the new population is a combined (N + G) population, leading to a population boom after some iterations. To avoid a population explosion, which leads to high computational costs, a conditional choice strategy, inspired by the Altruism strategy [44], is proposed to sacrifice individuals in the new population with the number of sacrificed whales equal to G. Therefore, the similarity index (SI), which is described in Equation (15), is used to calculate the similarity score of each whale with their counterparts in the population.…”
Section: Proposed Genetic Sacrificial Whale Optimizationmentioning
confidence: 99%
“…Figure 6 illustrates that the second feature subset, which has the lowest fitness value, is chosen as the output of GSWO for FS. In summary, the most useful feature subset, represented by the second whale, consists of features of order [0, 5,6,8,9,13,14,15,17].…”
Section: Applying Gswo For Feature Selectionmentioning
confidence: 99%
“…Indeed, a research of the performance of 4 unsupervised ML approaches based on different principles using this dataset has been carried out in Cerdà-Alabern et al. [3] . In addition, the dataset presented in this paper extends the dataset used in Cerdà-Alabern et al.…”
Section: Objectivementioning
confidence: 99%
“…In addition, the dataset presented in this paper extends the dataset used in Cerdà-Alabern et al. [3] by adding network topology information, including routing protocol metrics, routing tables and adjacency matrices. We believe that this data can be useful to study a wider set of ML methods, e.g.…”
Section: Objectivementioning
confidence: 99%
“…− Anomaly detection. These methods use unsupervised learning techniques to detect outliers or anomalies in the sensor data that indicate faults [61].…”
Section: Paper Year Main Idea Conclusionmentioning
confidence: 99%