Research Article
A Novel, Efficient, and Secure Anomaly Detection Technique Using DWU-ODBN for IoT-Enabled Multimedia Communication Systems
Algorithm 1
Pseudocode of the RCI-ChOA method
Input: Extracted features | Output: Selected features | Begin | Initialize population , coefficient vectors , maximum number of iteration | | Calculate fitness for each chimps | Set | While | Update | Update position using , , , | Evaluate fitness of the position of chimps | If { | Update position of the chimps using | Else | { | Update position of the chimps using | } End if | Update | Calculate fitness of the current position of the chimp | Set | End while | Return selected features | End |
|