Algorithm 1 Proposed FS For IoT security. |
-
1:
Input: total number of generations (T), and number of agents (N).
-
2:
Use Equation (14) to normalize the collected IoT data.
-
3:
Using proposed CNN technique to extract the features (as in Section 4.2).
-
4:
After extracting the features, divide the data into training and testing sets.
-
5:
Use Equation (19) to generate population X.
-
6:
Put .
-
7:
while do
-
8:
Apply Equation (20) to generate the Binary version of .
-
9:
Use Equation (21) to calculate the fitness value for .
-
10:
Find the best agent .
-
11:
Enhance as in Equations (2)–(9)
-
12:
.
-
13:
end while
-
14:
Remove irrelevant features from testing set that corresponding to zeros in .
-
15:
Output: Consider as output and the evaluate the performance.
|