Research Article
A Novel, Efficient, and Secure Anomaly Detection Technique Using DWU-ODBN for IoT-Enabled Multimedia Communication Systems
Algorithm 1
Pseudocode of the RCI-ChOA method
| Input: Extracted features | | Output: Selected features | | Begin | | Initialize population , coefficient vectors , maximum number of iteration | | | | Calculate fitness for each chimps | | Set | | While | | Update | | Update position using , , , | | Evaluate fitness of the position of chimps | | If { | | Update position of the chimps using | | Else | | { | | Update position of the chimps using | | } End if | | Update | | Calculate fitness of the current position of the chimp | | Set | | End while | | Return selected features | | End |
|