SlideShare a Scribd company logo
1 of 11
Download to read offline
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 5, October 2020, pp. 2401~2411
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i5.14859  2401
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Secure and reliable wireless advertising system using
intellectual characteristic selection algorithm for smart cities
Yousra Abdul Alsahib S. Aldeen, Haider Mohammed Abdulhadi
College of Science for Women, Department of Computer Science, University of Baghdad, Iraq
Article Info ABSTRACT
Article history:
Received Dec 6, 2019
Revised Mar 25, 2020
Accepted Apr 11, 2020
Smart cities wireless advertising (smart mobile-AD) filed is one of
the well-known area of research where smart devices using mobile ad hoc
networks (MANET) platform for advertisement and marketing purposes.
Wireless advertising through multiple fusion internet of things (IoT) sensors
is one of the important field where the sensors combines multiple sensors
information and accomplish the control of self-governing intelligent machines
for smart cities advertising framework. With many advantages, this field has
suffered with data security. In order to tackle security threats, intrusion
detection system (IDS) is adopted. However, the existing IDS system are not
able to fulfill the security requirements. This paper proposes an intellectual
characteristic selection algorithm (ICSA) integrated with normalized
intelligent genetic algorithm-based min-max feature selection (NIGA-MFS).
The proposed solution designs for wireless advertising system for
business/advertising data security and other transactions using independent
reconfigurable architecture. This approach supports the wireless advertising
portals to manage the data delivery by using 4G standard. The proposed
reconfigurable architecture is validated by using applications specific to
microcontrollers with multiple fusion IoT sensors.
Keywords:
Internet of things
Intrusion detection system
Mobile ad-hoc networks
Multiple fusion sensors
Wireless advertising
This is an open access article under the CC BY-SA license.
Corresponding Author:
Yousra Abdul Alsahib S. Aldeen,
College of Science for Women,
Department of Computer Science,
University of Baghdad, Iraq.
Email: yousraalkaalesi@gmail.com
1. INTRODUCTION
Intrusion detection system (IDS) is playing a significant role for data security of wireless advertising
data in mobile ad-hoc networks (MANET) platform. IDS systems are used to detect the known and unknown
attacks [1-3]. The attacks detection on wireless advertising in mobile ad hoc networks is a difficult task than
fixed wired networks, because of the nodes mobility and dynamic topologies [4, 5]. In these networks,
the networks are more complex where maintenance and other complexities exist [6, 7]. Moreover, few more
additional challenges are also present in the detection of attacks including lack of monitoring facilities for
the mobile nodes in the network. Therefore, there is need to design more suitable approach to handle these
networks characteristics and need to analyze the security attacks datasets to develop an efficient IDS. Recently,
the attacks detection of intruders effectively on wireless advertising in MANET is processed using featuring
approaches [8]. Classification methods are used to categorized the nodes into normal and abnormal which are
based on certain conditions. Many soft computing techniques are introduced in the past with effective
datasets [9]. Additionally, the existing classification techniques are not able to classify the datasets successfully
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411
2402
to detect the intruders with all kinds of attacks. In [10], a feature selection technique is introduced for improving
the classification accuracy [11].
In this context, this paper proposes a trust based routing protocol for find the suitable and secure routes
in the network. Specifically, an Intellectual characteristic selection algorithm (ICSA) integrated with
normalized intelligent genetic algorithm based min-max feature selection (NIGA-MFS) designs for effective
pre-processing of intrusion detection dataset in wireless advertising frame work of smart cities.
The rest of the paper is organized as follows: section 2 presents the related work in the domain. Section 3
illustrates the proposed approach, its process, design and algorithm. Section 4 discusses the simulation results
and discussion. Paper concludes in last section with future direction.
2. RELATED WORK
This section discusses the existing approaches to deal the security attacks in wireless
advertising MANET.
2.1. Feature selection techniques
Feature selection techniques are introduced by many researchers who are working in the areas of
medical data mining, image processing and intrusion detection. In all these applications, feature selection is
used to select the optimal number of features from the datasets consisting of more number of features.
In the past, several research works have accomplished by various researchers. Among them, in [12] authors
proposed the first incremental based algorithm for feature selection which is used to find the relevant features
which are suitable to solve the problem with optimal number of features. In their work, the number of features
and patterns are huge in their dataset.
Therefore, the proposed and effective method for feature selection can help in dimensionality
reduction. They also designed an incremental probabilistic algorithm as an alternative approach to
the exhaustive and heuristic methods. In [13], authors proposed an incremental feature selection algorithm
(IFSA) which is dynamic in nature for taking decisions over the different functionalities. This algorithm is
capable to avoid the re-computation process instead of retraining the subset from scratch. In [14], authors
developed a new evolutionary-incremental framework for feature selection. This framework is applied on an
ordinary evolutionary algorithm called genetic algorithm. This framework introduced some generic
modifications on ordinary evaluation algorithms which are compatible with the variable length of solutions.
Moreover, this framework is deployed for performing classification operation with two new operators
namely addition and deletion operators which change the length of solutions randomly.
In [15], authors proposed a new unsupervised feature selection method for effective decision making
over the dataset. In [16], authors proposed a new model for feature selection based on combination of
incremental mixed variable ant colony optimization (IACOMV) and support vector machine (SVM) for solving
the model selection problems effectively. In [17], authors proposed a machine learning algorithm version of
the binary bat algorithm (BBA) for performing effective classification. However, all discussed approaches are
not suitable for feature selection in intrusion detection applications [18]. Moreover, the existing feature
selection algorithms are more complex and hence they consume lot of time for convergence. Therefore, a new
feature selection algorithms needed to address the existing approaches limitations and best solution for
selecting optimal number of features.
3. INTELLECTUAL CHARACTERISTIC SELECTION ALGORITHM (ICSA)
Due to random deployment of static sensor nodes and environmental factors, existence of many issues
and loop holes in wireless sensor networks (WSN) is inevitable in smart cities. These limitations result in
reducing the data transmission performance in terms of data reliability, data transfer in wireless advertising
and in energy consumption in wireless advertising frameworks. Consequently, the fulfill the all network
requirements is an important factor for prolonging the network lifetime on wireless advertising in MANET
platform. The proposed framework shows in Figure 1.
The network lifetime of the internet of things (IoT) sensor nodes can be improved by deploying
the additional mobile sensors and static sensor deployment. Finding the number of additional IoT sensors in
the networks leads to optimization problem. Intellectual characteristic selection algorithm (ICSA) presents to
obtain the best/optimal coverage with high reliability of data transfer of network area by IoT sensor nodes.
The required numbers of static sensors are deployed randomly in the monitoring area. After deployment
of the sink nodes, nodes send a hello message to all other sensor nodes in the network, as a reply the nodes
send their location and node_id to sink node. By using these information, sink nodes apply the binary detection
model to detect the holes in the coverage of monitoring region during information transmission on wireless
TELKOMNIKA Telecommun Comput El Control 
Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen)
2403
advertising platform. After obtaining the coverage map, the sink calculates the optimal number of additional
sensor required and deploys those mobile sensors randomly. Each mobile sensor is modeled as a charged
particle in electromagnetism algorithm and the ICSA algorithm calculates the total force applied on the mobile
sensor by neighbor’s IoT sensors and fitness (Ai) values.
𝐴𝑖 = [𝑊1 ∗ 𝐼𝑛𝑓𝑜 𝐺𝑎𝑖𝑛 𝑟𝑎𝑡𝑖𝑜 (𝐼𝐺𝑅) (𝐴𝑖) + 𝑊2 ∗ 𝐼𝐺𝑅 (𝑀𝑢𝑡𝑎𝑡𝑖𝑜𝑛 (𝐴𝑖))
+ 𝑊3 ∗ 𝐼𝐺𝑅 (𝐶𝑟𝑜𝑠𝑠𝑜𝑣𝑒𝑟 (𝐴𝑖, 𝐴𝑗) ]/[𝑊1 + 𝑊2 + 𝑊3]; (1)
𝐴𝑖 >= 𝑇ℎ 𝐴𝑁𝐷 𝐴𝑗 >= 𝑇ℎ (2)
𝑆𝑆 = 𝑆𝑆 𝑈 (𝐴𝑖) 𝑈 (𝐴𝑗); (3)
𝐴𝑖 >= 𝑇ℎ 𝐴𝑁𝐷 𝐴𝑗 < 𝑇ℎ (4)
𝑆𝑆 = 𝑆𝑆 𝑈 (𝐴𝑖); (5)
𝐴𝑖 < 𝑇ℎ 𝐴𝑁𝐷 𝐴𝑗 >= 𝑇ℎ (6)
𝑆𝑆 = 𝑆𝑆 𝑈 (𝐴𝑗); (7)
From the (1-4) denote the fitness function to check the Info gain ratio (IGR) and features are selected
(SS) based on the threshold (Th) AND fitness (Aj) function as presents in the Algorithm 1. The total force
determines the direction of the mobile node; move the mobile node accordingly; if the mobile node is not in
optimum position, then apply genetic operators on the location of the sensor and apply AVFA algorithm.
This will continue till all the mobile sensors are moved to optimal location.
Figure 1. Overall operation of the proposed framework for wireless advertising
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411
2404
In this work, ICSA is proposed with the combination of GA and IAASA. Here, IAASA selects
the initial subsets and then applies the crossover fitness selection (CFS) formulation for finalizing the exact
features which are useful for identifying the four types of attacks. Finally, the hidden semi-Markov model
(HSMM) [19] and SVM [20] are used for classification for selected features. These classification tasks are
carried out using the existing classifier to test the performance of the proposed feature selection algorithms.
The IAASA uses the IGR which is computed using the (8-10).
𝐼𝑛𝑓𝑜(𝐷) = − ∑ [
𝑓𝑟𝑒𝑞(𝐶𝑗, 𝐷)
|𝐷|
]
𝑚
𝑗=1
𝑙𝑜𝑔2 [
𝑓𝑟𝑒𝑞(𝐶𝑗, 𝐷)
|𝐷|
] (8)
𝐼𝑛𝑓𝑜 (𝐹) = − ∑ [
|𝐹𝑖|
|𝐹|
]
𝑛
𝑖=1
× 𝑖𝑛𝑓𝑜 (𝐹𝑖) (9)
𝐼𝐺𝑅(𝐴𝑖) = [
𝐼𝑛𝑓𝑜(𝐷) − 𝐼𝑛𝑓𝑜(𝐹)
𝐼𝑛𝑓𝑜(𝐷) + 𝐼𝑛𝑓𝑜(𝐹)
] × 𝐼𝑛𝑓𝑜(𝐹𝑖) (10)
Here, D is the dataset, Ci is the fragments made from the dataset, F is the feature set with Fi as the feature
and IGR indicates the information gain ratio (IGR). The word info indicates the information gain values. Now,
the steps of the proposed Algorithm 1 are as follows:
Intelligent agent based incremental feature selection algorithm
Step 1: The intelligent agents divide the dataset D into n subsets of equal size and
named as C1, C2,…Cn.
Step 2: Agent computes the IGR value for every attribute (Ai) of the dataset using (4)
to obtain the value of IGR(Ai) and is expressed as:
𝐼𝐺𝑅(𝐴𝑖) = [
𝐼𝑛𝑓𝑜(𝐷) − 𝐼𝑛𝑓𝑜(𝐹)
𝐼𝑛𝑓𝑜(𝐷) + 𝐼𝑛𝑓𝑜(𝐹)
] × 𝐼𝑛𝑓𝑜(𝐹𝑖)
Step 3: The agent selects a feature from dataset which has maximum IGR.
Step 4: Now the agent divides the sub datasets Ci into two subsets based on their
distance between the neighbour nodes.
Step 5: Make the first part of each subset as parents in the genetic algorithm.
Step 6: Compute the fitness values using the formula
Fitness (Ai) = [ W1 * IGR (Ai) + W2 * IGR (Mutation (Ai) ) + W3 * IGR (Crossover
(Ai, Aj) ] / [W1+W2+W3];
Fitness (Aj) = [W1 * IGR (Aj) + W2 * IGR (Mutation (Aj)) + W3 * IGR (Crossover
(Ai, Aj)] / [W1+W2+W3];
Step 7: If Fitness (Ai) >= Threshold AND Fitness (Aj) >= Threshold then
Selected feature set SS = SS U (Ai) U (Aj);
Step 8: If Fitness (Ai) >= Threshold AND Fitness (Aj) < Threshold then
Selected feature set SS = SS U (Ai);
Step 9: If Fitness (Ai) < Threshold AND Fitness (Aj) >= Threshold then
Selected feature set SS = SS U (Aj);
Step 10: If Ai is included in SS then select the next attribute from the first subset
and call it as Ai
Step 11: If Aj is included in SS then select the next attribute from the second subset
and call it as Aj
Step 12: Repeat this process until all attributes are tested with the rules used in this
procedure.
Step 13: Return SS
Step 14: If No attributes are selected then change the Threshold with Threshold =
Threshold * 0.9 and go to step 6.
Further in order to improve the reliability and classification accuracy NIGA-MFS algorithm is used
for wireless advertising in smart cities. In this work, all the dataset is converted into a standard format which
uses the numerical values between 0 and 1 so that it is easy to compare during the classification process.
For this purpose, the minimum and maximum values are considered as the boundaries for each attribute
and the attribute length is computed using the difference between the maximum and the minimum values.
The normalized value is computed using the formula given in (11).
𝑁𝑜𝑟𝑚𝑎𝑙𝑖𝑧𝑒𝑑 𝑉𝑎𝑙𝑢𝑒 (𝐼) =
𝐺𝑖𝑣𝑒𝑛 𝑉𝑎𝑙𝑢𝑒 (𝐼)
(𝑀𝑎𝑥 𝑉𝑎𝑙𝑢𝑒 – 𝑀𝑖𝑛 𝑉𝑎𝑙𝑢𝑒)
(11)
TELKOMNIKA Telecommun Comput El Control 
Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen)
2405
where, I indicate the Ith data record, given value is the present value, normalized value is the computed value
which lies between 0 and 1, max value is the maximum value of the values for the particular attribute and Min
value is the Minimum value of the values for the particular attribute. The input data are normalized on each
record by dividing the max-min value by the maximum value and hence all the data are converted into uniform
format with a range of values from 0 to 1. This pre-processing helps the decision making process to carry out
easier comparisons. For this purpose, a new feature selection algorithm called GA based Min-Max feature
selection algorithm is proposed. The steps of the NIGA-MFS Algorithm 2 are as follows:
Normalized intelligent GA based min-max feature selection (NIGA-MFS) algorithm
Input: All features (Fi, i=1 to n), Number of generations K, Population size PS,
Crossover probability (CPi), Mutation probability (MPi).
Output: Set of selected features SFi, i = 1 to m.
NIGA-MFS ( )
Begin
Step 1: Initialize the population from the dataset as Fi, i=1 to n; n =41, Maximum
number of generations = 1000;
Step 2: Convert the features into feature numbers n binary form to represent them using
1s and 0s.
Step 3: Form two parents by selecting two attributes at random
Step 4: Remove them from Fi and name them PA1 and PA2.
Step 5: Initialize SFi = { } and Generation count = 1;
Step 6: Initialize the weights with W1=0.6, W2=0.4, CPi =0.5 and MPi=0.5.
Step 7: For each chromosome Fi present in the selected attributes population
{
i. Apply uniform crossover with a probability CPi and mutation operation with
probability MPi.
ii. Find the normalized Min-Max value using the formula
Min-Max Value (I) = Given Value (I) / (Max Value – Min Value)
iii. Evaluate Fitness (i)= [ W1 * RoundOf (Min-Max Value(i)) +
W2 * TruncateOf (Min-Max Value(i)+0.5)] / (W1 + W2)
iv. If fitness value of Fi > Threshold Then
FSi = FSi U Fi
Else
Read next attribute
Step 8: If Generation_Count < 1000 Then
Go to Step 7
Step 9: Return FSi.
The results of the feature selection algorithm and the classification algorithms with full features and
selected features are selected using the proposed feature selection algorithm for reliable data transfer which is
discussed in the results and discussion section.
4. RESULTS AND DISCUSSION
The efficiency of the ICSA is integrated with NIGA-MFS for optimal feature selection for reliable
data transfer in wireless advertising for smart cities in MANET platform with IoT sensors is analyzed in this
section. The proposed method successfully detects the sensible region which examines the optimized cluster
centers for reliable data transmission and members that leads to create the effective transmission path from
source to destination in smart city environment. Then the performance of the proposed system is analyzing by
using the following metrics.
a) Coverage fraction
Coverage fraction is metric to analyze, how the neighbor nodes are successfully examining while analyzing
the sensible nodes in wireless sensor networks of smart cities.
b) Energy consumption
Energy consumption is one the important metric that is used to measure how much power is consumed
while transmitting the information from source to destination without making any information loss.
c) Accuracy
The last metrics is accuracy in which the cluster formation efficiency is examined. Accuracy is analyzed
in terms of using number of nodes along with number of clusters.
By using the above efficiency metrics, excellence of the system is evaluated with the help of simulation setup,
which is discussed as follows.
The excellence of proposed technique performance is analyzed using simulation setup that is
compared with traditional methods. During the implementation process, the proposed system uses
the following simulation parameter that is listed in the Table 1.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411
2406
Table 1. Simulation parameter
Simulation Parameter Parameter Value
Simulator NS2 (v.2.29)
Transmission Range 500*500 square meters
Bandwidth 4 Mbps
Interface Queue Length 45
Packet size 512 bytes
Traffic type CBR
Packet rate 20 packets/sec
Topology size 700 * 700m2
Number of nodes 20,30,…50
Number of trials 30
Simulation Time 800 sec
Maximum Speed 40 m/s
Counter Threshold ( C ) 6
RAD Tmax 0.02 seconds
After simulation network simulator (NS2) setup, the next step is implementation of ICSA- NIGA-MFS and
the graphical representations are created for examining the system efficiency. Along with the simulation setup,
the efficiency of the system is analyzed in terms of different performance metrics such as coverage fraction, accuracy
of cluster and energy consumption metrics. Depending on the various discussions cluster head and centroid node is
selected using the ICSA integrated NIGA-MFS with effective manner. Then the efficiency of cluster is examined in
terms of precision, recall and accuracy metrics, which is explained as follows.
a) Recall
Recall is also called as the true positive rate which helps to determine how exact the cluster head is
chosen from the collection of nodes. The recall value is calculated as follows,
Recall =
True positive
True positive + False Negative
(12)
In (12), recall value is estimated, if the system ensures high true positive rate then the method successfully
selects the exact cluster with effective manner.
b) False negative rate (FNR)
False negative rate is also called as miss rate that measures how much fraction of the elements
classified as negative is false. The FNR value is estimated as follows:
False Negative Rate =
False Negative
True Positive + False Negative
(13)
In (13), false negative rate is estimated, if the system ensures low negative rate then the method successfully
selects the exact cluster with effective manner.
c) Precision
Precision is also called as Positive Prediction Value (PPV), it shows how much fraction of
the elements truly positive is classified as positive. Higher PPV means better classification. The Precision value
is estimated as follows,
Precision =
True Positive
True Postive + False Positive
(14)
Based on the (14) precision, recall values, accuracy is estimated as follows.
d) Accuracy (ACC)
Accuracy shows how much fraction of the total elements classified correctly. Higher ACC means
better classification. It is calculated as follows in (15).
Accuracy =
True Positive + True Negative
(True positive + True negative + False positive + False Negative)
(15)
Based on the above accuracy metric, the obtained clustering accuracy value is shown in Table 2.
TELKOMNIKA Telecommun Comput El Control 
Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen)
2407
Table 2. Performance analysis of clustering accuracy
IACOMV SVM BBA ICSA-NIGA-MFS
Accuracy 0.75 0.84 0.83 0.97
precision 0.74 0.85 0.76 0.98
Recall 0.83 0.54 0.66 0.89
False Negative Rate 0.91 0.6 0.71 0.55
Based on Table 2, ICSA-NIGA-MFS (accuracy-0.97%, precision-0.98% and recall-0.55%) is more
reliable in data transfer when compared to other methods such as IACOMV (accuracy-0.75%, precision-0.74%
and recall-0.83%) SVM (accuracy-0.84%, precision-0.85% and recall-0.54%), BBA (accuracy-0.83%,
precision-0.76% and recall-0.66%) and ICSA-NIGA-MFS (accuracy-0.97%, precision-0.98% and recall-0.55%).
Based on Table 2, it is clearly showing that the ICSA integrated NIGA-MFS ensures the high accuracy while
detecting exact cluster head, and eliminating the false nodes while transferring data in wireless advertising for
smart cities when compared to the other methods. Even though introduce method effectively form the region and
clusters with high accuracy, the network must consume minimum energy that leads to improve overall network
lifetime while transmitting data from source to destination in wireless advertising for smart cities. The low
utilization of energy leads to improve the overall transmission rate which also eliminates several difficulties.
So, ICSA integrated NIGA-MFS algorithm in cluster head to collect the data from base station from the member
nodes by multi-hop manner, which saves the energy consumption of cluster head and participants in WSN of
smart cities. In IACOMV and EMHR protocols, energy burden is due to the long-haul communication links
between header and the cluster members. However, the energy dissipation is directly relative to the exponent of
data transmission distance. The energy consumption of the ICSA integrated NIGA-MFS algorithm is less than
that of IACOMV, SVM and BBA [21]. Less energy consumption means longer lifetime of network and then
the graphical representation of residual energy is shown in Figure 2. Table 2 shows the energy consumption where
energy measurement is based on joules.
Figure 2. Performance analysis based on energy
As shows in Figure 2 is the proposed ICSA integrated NIGA-MFS obtained a high energy saving
which leads to improve overall network [22] lifetime. Depending on the above simulation result, the ICSA
integrated NIGA-MFS algorithm transmits the data from one node to another node by consumed minimum
power that used to maintain the network lifetime when compared to other methods for wireless advertising in
smart city environment. In addition to this, effective utilization of nodes, network routing [23] and power
reduces the other failures in network with effective manner.
The above Figure 3 shows that the comparison of coverage fraction for the various models are
recognized sensitive region from the defined coverage area with reasonable simulation runs in defined
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411
2408
area [24]. The obtained coverage fraction is better for ICSA integrated NIGA-MFS when compared to
the existing sensing IACOMV, SVM and BBA. This successful examination of sensing region helps to analyze
the number of nodes in region with effective manner that used to form the cluster with different number of
rounds and nodes in sensor network for smart city framework [25].
As shown Figure 4, depending on the number of cluster nodes efficiency, the successful formations
of cluster enhance the data transmission process by maximizing the network lifetime in wireless advertising
framework for smart city platform. The formed cluster leads to reduces the high-energy consumption while
transmitting the data from source to destination node in smart city platform which helps to improve
the efficiency of the network.
Figure 3. Performance analysis based on coverage fraction
Figure 4. Performance analysis based on efficiency
TELKOMNIKA Telecommun Comput El Control 
Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen)
2409
Figure 5 depicts the comparison of average time taken between ICSA integrated NIGA-MFS
compared to the existing sensing IACOMV, SVM and BBA models. It is visible that ICSA integrated
NIGA-MFS outperforms in comparison with the other three algorithms. ICSA integrated NIGA-MFS
ahead with minimum computational time and the minimum computational time is due to the membership
function evaluation.
As shown in the Figure 6, however, ICSA integrated NIGA-MFS has lesser time for data transmission
between the IoT sensor nodes in smart city platform, which grows exponentially as the size of the IoT nodes
and links increases in smart city platform. ICSA integrated NIGA-MFS achieves the optimal solution in
a maximized network lifetime for the node generation with less optimum time than IACOMV, SVM and BBA
models. Thus the proposed solution shows the optimal set of features which are selected by the proposed
intelligent incremental feature selection algorithm.
Figure 5. Average computational time analysis
Figure 6. Average computational time with optimum solution
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411
2410
5. CONCLUSION
In this paper, ICSA integrated NIGA-MFS algorithm is proposed for wireless advertising system.
The proposed feature selection algorithms along with classifiers is used and itis observed that both the feature
selection algorithms increased the classification accuracy. Moreover, ICSA integrated NIGA-MFS algorithm
provided better results than the feature selection using the ICSA due to the use of normalization with genetic
algorithms. Both the algorithms reduced the classification time in comparison with IACOMV, SVM and BBA
models. Hence, the ICSA-NIGA-MFS achieves better performance in terms of classification accuracy and
classification time by the use of the proposed pre-processing techniques which is most suitable for wireless
advertising in smart city environment for reliable data transmission. In future, the proposed algorithm will apply
on other domain like, smart grids, edge computing, industrial IoT and underwater sensor networks.
ACKNOWLEDGEMENTS
This work was supported by University of Baghdad.
REFERENCES
[1] A. Gupta, R. K. Jha, P. Gandotra, and S. Jain, "Bandwidth spoofing and intrusion detection system for multistage 5G
wireless communication network," IEEE Transactions on Vehicular Technology, vol. 67, no. 1, pp. 618-632, 2017.
[2] M. S. Aliero, I. Ghani, K. N. Qureshi, and M. F. A. Rohani, "An algorithm for detecting SQL injection vulnerability
using black-box testing," Journal of Ambient Intelligence Humanized Computing, vol. 11, no. 1,
pp. 249-266, 2020.
[3] K. N. Qureshi, F. Bashir, and A. H. Abdullah, "Provision of Security in Vehicular Ad hoc Networks through An
Intelligent Secure Routing Scheme," 2017 International Conference on Frontiers of Information Technology (FIT),
pp. 200-205, 2017.
[4] E. Benkhelifa, T. Welsh, and W. Hamouda, "A critical review of practices and challenges in intrusion detection
systems for IoT: Toward universal and resilient systems," IEEE Communications Surveys Tutorials, vol. 20, no. 4,
pp. 3496-3509, 2018.
[5] A. Sharif, J. P. Li, and M. A. Saleem, "Internet of things enabled vehicular and ad hoc networks for smart city traffic
monitoring and controlling: a review," International Journal of Advanced Networking Applications, vol. 10, no. 3,
pp. 3833-3842, 2018.
[6] A. Mehmood, A. Khanan, M. M. Umar, S. Abdullah, K. A. Z. Ariffin, and H. Song, "Secure knowledge
and cluster-based intrusion detection mechanism for smart wireless sensor networks," IEEE Access, vol. 6,
pp. 5688-5694, 2017.
[7] K. Qureshi, A. H. Abdullah, O. Kaiwartya, F. Ullah, and S. I. A. Altameem, "Weighted link quality and forward
progress coupled with modified RTS/CTS for beaconless packet forwarding protocol (B-PFP)," Telecommunication
Systems, 2016.
[8] K. N. Qureshi, M. M. Idrees, J. Lloret, and I. Bosch, "Self-Assessment Based Clustering Data Dissemination for
Sparse and Dense Traffic Conditions for Internet of Vehicles," IEEE Access, vol. 8, pp. 10363-10372, 2020.
[9] Q. Yaseen, F. Albalas, Y. Jararwah, and M. Al‐ Ayyoub, "Leveraging fog computing and software defined systems
for selective forwarding attacks detection in mobile wireless sensor networks," Transactions on Emerging
Telecommunications Technologies, vol. 29, no. 4, 2018.
[10] P. M. Shakeel, S. Baskar, V. S. Dhulipala, S. Mishra, and M. M. Jaber, "Maintaining security and privacy in health
care system using learning based deep-Q-networks," Journal of Medical Systems, vol. 42, no. 10, 2018.
[11] H. Alanazi, A. Abdullah, K. Qureshi, and A. Ismail, "Accurate and dynamic predictive model for better prediction in
medicine and healthcare," Irish Journal of Medical Science, vol. 187, no. 2, pp. 501-513, 2018.
[12] A. Brandão, H. São Mamede, and R. Gonçalves, "A smart city’s model secured by blockchain," International
Conference on Software Process Improvement, Springer, pp. 249-260, 2018.
[13] M. Dorigo and T. Stützle, "Ant colony optimization: overview and recent advances," Handbook of Metaheuristics:
Springer, pp. 311-351, 2019.
[14] V. O. Costa and C. R. Rodrigues, "Hierarchical ant colony for simultaneous classifier selection and hyperparameter
optimization," 2018 IEEE congress on evolutionary computation (CEC), pp. 1-8, 2018.
[15] M. M. Mafarja and S. Mirjalili, "Hybrid binary ant lion optimizer with rough set and approximate entropy reducts
for feature selection," Soft Computing, vol. 23, no. 15, pp. 6249-6265, 2019.
[16] T. M. Mohamed and H. M. Moftah, "Simultaneous ranking and selection of keystroke dynamics features through
a novel multi-objective binary bat algorithm," Future Computing Informatics Journal, vol. 3, no. 1, pp. 29-40, 2018.
[17] D. Guha, P. K. Roy, and S. Banerjee, "Binary Bat Algorithm Applied to Solve MISO-Type PID-SSSC-Based Load
Frequency Control Problem," Iranian Journal of Science Technology, Transactions of Electrical Engineering,
vol. 43, no. 2, pp. 323-342, 2019.
[18] A. Tharwat and A. E. Hassanien, "Optimizing Support Vector Machine Parameters Using Bat Optimization
Algorithm," Machine Learning Paradigms: Theory and Application: Springer, pp. 351-374, 2019.
TELKOMNIKA Telecommun Comput El Control 
Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen)
2411
[19] T. Islam, M. E. Islam, and M. R. Ruhin, "An analysis of foraging and echolocation behavior of swarm intelligence
algorithms in optimization: ACO, BCO and BA," International Journal of Intelligence Science, vol. 8, no. 01,
pp. 1-27, 2018.
[20] S. Mirjalili, "Evolutionary algorithms and neural networks," Studies in Computational Intelligence, 2019.
[21] R. Hamidouche, Z. Aliouat, and A. M. Gueroui, "Genetic algorithm for improving the lifetime and QoS of wireless
sensor networks," Wireless Personal Communications, vol. 101, no. 4, pp. 2313-2348, 2018.
[22] S. S. L. Preeth, R. Dhanalakshmi, R. Kumar, and P. M. Shakeel, "An adaptive fuzzy rule based energy efficient
clustering and immune-inspired routing protocol for WSN-assisted IoT system," Journal of Ambient Intelligence
Humanized Computing, pp. 1-13, 2018.
[23] T. Kaur and R. Kumar, "Mitigation of Blackhole Attacks and Wormhole Attacks in Wireless Sensor Networks
Using AODV Protocol," 2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE),
pp. 288-292, 2018.
[24] M. Banerjee, J. Lee, and K. K. R. Choo, "A blockchain future for internet of things security: a position paper,"
Digital Communications Networks, vol. 4, no. 3, pp. 149-160, 2018.
[25] M. Torres Ruiz, M. D. Lytras, and H. Mathkour, "Innovative services and applications of wireless sensor networks:
Research challenges and opportunities," SAGE Publications Sage UK: London, England, 2018.
BIOGRAPHIES OF AUTHORS
Dr. Yousra Abdul Alsahib S. Aldeen. Head of Assurance and Performance Assessment
Unit-College of Science for Women-University of Baghdad. Ph.D. in Computer Network. Research
Interests: Cloud Privacy, IOT, Computer Network, Smart City, Cloud of Things, etc. 1994 she has got
BSc in Computer Science (Al-Mustansiriyah University). 2006 She has got MSc in Computer
Network (Iraqi Commission for computers and informatics). 2017 PhD at Faculty of Computing,
University Technology Malaysia, UTM, 81310 UTM Skudai, Johor, Malaysia.
Haider Mohammed Abdulhadi. Head of Avi-cenna E-Learning Unit - College of Science for
Women-University of Baghdad. .1999 he has got B.Sc. in electrical engineering (Al Mustansiriyah
University). 2009 he has got M.Sc. in Electronic Systems (Kharkov Polytechnic Institute - Ukraine).

More Related Content

What's hot

Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Conference Papers
 
Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...IJECEIAES
 
IRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET Journal
 
Hardware Design of a Smart Meter
Hardware Design of a Smart MeterHardware Design of a Smart Meter
Hardware Design of a Smart MeterIJERA Editor
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...ijngnjournal
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...Amir Shokri
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT IAEME Publication
 
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...IJECEIAES
 
Device to evaluate cleanliness of fiber optic connectors using image processi...
Device to evaluate cleanliness of fiber optic connectors using image processi...Device to evaluate cleanliness of fiber optic connectors using image processi...
Device to evaluate cleanliness of fiber optic connectors using image processi...IJECEIAES
 
International Journal of Engineering (IJE) Volume (2) Issue (1)
International Journal of Engineering (IJE) Volume (2)  Issue (1)International Journal of Engineering (IJE) Volume (2)  Issue (1)
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...IJERA Editor
 
2 pf implementation of wireless body area network ed iqbal qc
2 pf implementation of wireless body area network ed iqbal qc2 pf implementation of wireless body area network ed iqbal qc
2 pf implementation of wireless body area network ed iqbal qcIAESIJEECS
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
 
IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016 IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016 tsysglobalsolutions
 
IoT for wheel alignment monitoring system
IoT for wheel alignment monitoring systemIoT for wheel alignment monitoring system
IoT for wheel alignment monitoring systemIJECEIAES
 

What's hot (20)

Probabilistic Polling System Approach for IoT Secure Routing
Probabilistic Polling System Approach for IoT Secure RoutingProbabilistic Polling System Approach for IoT Secure Routing
Probabilistic Polling System Approach for IoT Secure Routing
 
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
Indoor tracking with bluetooth low energy devices using k nearest neighbour a...
 
Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...Design and implement WSN/IOT smart parking management system using microcontr...
Design and implement WSN/IOT smart parking management system using microcontr...
 
IRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water Conservation
 
Hardware Design of a Smart Meter
Hardware Design of a Smart MeterHardware Design of a Smart Meter
Hardware Design of a Smart Meter
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...hopfield neural network-based fault location in wireless and optical networks...
hopfield neural network-based fault location in wireless and optical networks...
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
 
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
Mobile based Automated Complete Blood Count (Auto-CBC) Analysis System from B...
 
Device to evaluate cleanliness of fiber optic connectors using image processi...
Device to evaluate cleanliness of fiber optic connectors using image processi...Device to evaluate cleanliness of fiber optic connectors using image processi...
Device to evaluate cleanliness of fiber optic connectors using image processi...
 
International Journal of Engineering (IJE) Volume (2) Issue (1)
International Journal of Engineering (IJE) Volume (2)  Issue (1)International Journal of Engineering (IJE) Volume (2)  Issue (1)
International Journal of Engineering (IJE) Volume (2) Issue (1)
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
Intrusion Detection and Countermeasure in Virtual Network Systems Using NICE ...
 
40120130405021
4012013040502140120130405021
40120130405021
 
2 pf implementation of wireless body area network ed iqbal qc
2 pf implementation of wireless body area network ed iqbal qc2 pf implementation of wireless body area network ed iqbal qc
2 pf implementation of wireless body area network ed iqbal qc
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...
 
IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016 IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016
 
IoT for wheel alignment monitoring system
IoT for wheel alignment monitoring systemIoT for wheel alignment monitoring system
IoT for wheel alignment monitoring system
 

Similar to Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities

A feature selection method based on auto-encoder for internet of things intru...
A feature selection method based on auto-encoder for internet of things intru...A feature selection method based on auto-encoder for internet of things intru...
A feature selection method based on auto-encoder for internet of things intru...IJECEIAES
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for amiIJCI JOURNAL
 
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesSurvey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesIRJET Journal
 
Device identification using optimized digital footprints
Device identification using optimized digital footprintsDevice identification using optimized digital footprints
Device identification using optimized digital footprintsIAESIJAI
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
Intelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networksIntelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networksIJECEIAES
 
Embedded IEEE 2012 titles
Embedded IEEE 2012 titlesEmbedded IEEE 2012 titles
Embedded IEEE 2012 titlesVipin Jacob
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...CSITiaesprime
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningVenkat Projects
 
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...ijaia
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network IJECEIAES
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedAlison Reed
 

Similar to Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities (20)

A feature selection method based on auto-encoder for internet of things intru...
A feature selection method based on auto-encoder for internet of things intru...A feature selection method based on auto-encoder for internet of things intru...
A feature selection method based on auto-encoder for internet of things intru...
 
An intrusion detection algorithm for ami
An intrusion detection algorithm for amiAn intrusion detection algorithm for ami
An intrusion detection algorithm for ami
 
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning TechniquesSurvey on Optimization of IoT Routing Based On Machine Learning Techniques
Survey on Optimization of IoT Routing Based On Machine Learning Techniques
 
Device identification using optimized digital footprints
Device identification using optimized digital footprintsDevice identification using optimized digital footprints
Device identification using optimized digital footprints
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
Intelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networksIntelligent black hole detection in mobile AdHoc networks
Intelligent black hole detection in mobile AdHoc networks
 
Seminar PPT-4.pptx
Seminar PPT-4.pptxSeminar PPT-4.pptx
Seminar PPT-4.pptx
 
Embedded IEEE 2012 titles
Embedded IEEE 2012 titlesEmbedded IEEE 2012 titles
Embedded IEEE 2012 titles
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
AI & Connectivity - Challenges & Growth Strategies For The Future.pdf
AI & Connectivity - Challenges & Growth Strategies For The Future.pdfAI & Connectivity - Challenges & Growth Strategies For The Future.pdf
AI & Connectivity - Challenges & Growth Strategies For The Future.pdf
 
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
Wi-Fi fingerprinting-based floor detection using adaptive scaling and weighte...
 
L010527175
L010527175L010527175
L010527175
 
Intrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An OverviewIntrusion Detection System Using Machine Learning: An Overview
Intrusion Detection System Using Machine Learning: An Overview
 
An effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learningAn effecient spam detection technique for io t devices using machine learning
An effecient spam detection technique for io t devices using machine learning
 
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
ARTIFICIAL INTELLIGENCE TECHNIQUES FOR THE MODELING OF A 3G MOBILE PHONE BASE...
 
Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network Detecting network attacks model based on a convolutional neural network
Detecting network attacks model based on a convolutional neural network
 
Performance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax TestbedPerformance Evaluation Of A Wimax Testbed
Performance Evaluation Of A Wimax Testbed
 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
 
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...
 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 

Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 5, October 2020, pp. 2401~2411 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i5.14859  2401 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Secure and reliable wireless advertising system using intellectual characteristic selection algorithm for smart cities Yousra Abdul Alsahib S. Aldeen, Haider Mohammed Abdulhadi College of Science for Women, Department of Computer Science, University of Baghdad, Iraq Article Info ABSTRACT Article history: Received Dec 6, 2019 Revised Mar 25, 2020 Accepted Apr 11, 2020 Smart cities wireless advertising (smart mobile-AD) filed is one of the well-known area of research where smart devices using mobile ad hoc networks (MANET) platform for advertisement and marketing purposes. Wireless advertising through multiple fusion internet of things (IoT) sensors is one of the important field where the sensors combines multiple sensors information and accomplish the control of self-governing intelligent machines for smart cities advertising framework. With many advantages, this field has suffered with data security. In order to tackle security threats, intrusion detection system (IDS) is adopted. However, the existing IDS system are not able to fulfill the security requirements. This paper proposes an intellectual characteristic selection algorithm (ICSA) integrated with normalized intelligent genetic algorithm-based min-max feature selection (NIGA-MFS). The proposed solution designs for wireless advertising system for business/advertising data security and other transactions using independent reconfigurable architecture. This approach supports the wireless advertising portals to manage the data delivery by using 4G standard. The proposed reconfigurable architecture is validated by using applications specific to microcontrollers with multiple fusion IoT sensors. Keywords: Internet of things Intrusion detection system Mobile ad-hoc networks Multiple fusion sensors Wireless advertising This is an open access article under the CC BY-SA license. Corresponding Author: Yousra Abdul Alsahib S. Aldeen, College of Science for Women, Department of Computer Science, University of Baghdad, Iraq. Email: yousraalkaalesi@gmail.com 1. INTRODUCTION Intrusion detection system (IDS) is playing a significant role for data security of wireless advertising data in mobile ad-hoc networks (MANET) platform. IDS systems are used to detect the known and unknown attacks [1-3]. The attacks detection on wireless advertising in mobile ad hoc networks is a difficult task than fixed wired networks, because of the nodes mobility and dynamic topologies [4, 5]. In these networks, the networks are more complex where maintenance and other complexities exist [6, 7]. Moreover, few more additional challenges are also present in the detection of attacks including lack of monitoring facilities for the mobile nodes in the network. Therefore, there is need to design more suitable approach to handle these networks characteristics and need to analyze the security attacks datasets to develop an efficient IDS. Recently, the attacks detection of intruders effectively on wireless advertising in MANET is processed using featuring approaches [8]. Classification methods are used to categorized the nodes into normal and abnormal which are based on certain conditions. Many soft computing techniques are introduced in the past with effective datasets [9]. Additionally, the existing classification techniques are not able to classify the datasets successfully
  • 2.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411 2402 to detect the intruders with all kinds of attacks. In [10], a feature selection technique is introduced for improving the classification accuracy [11]. In this context, this paper proposes a trust based routing protocol for find the suitable and secure routes in the network. Specifically, an Intellectual characteristic selection algorithm (ICSA) integrated with normalized intelligent genetic algorithm based min-max feature selection (NIGA-MFS) designs for effective pre-processing of intrusion detection dataset in wireless advertising frame work of smart cities. The rest of the paper is organized as follows: section 2 presents the related work in the domain. Section 3 illustrates the proposed approach, its process, design and algorithm. Section 4 discusses the simulation results and discussion. Paper concludes in last section with future direction. 2. RELATED WORK This section discusses the existing approaches to deal the security attacks in wireless advertising MANET. 2.1. Feature selection techniques Feature selection techniques are introduced by many researchers who are working in the areas of medical data mining, image processing and intrusion detection. In all these applications, feature selection is used to select the optimal number of features from the datasets consisting of more number of features. In the past, several research works have accomplished by various researchers. Among them, in [12] authors proposed the first incremental based algorithm for feature selection which is used to find the relevant features which are suitable to solve the problem with optimal number of features. In their work, the number of features and patterns are huge in their dataset. Therefore, the proposed and effective method for feature selection can help in dimensionality reduction. They also designed an incremental probabilistic algorithm as an alternative approach to the exhaustive and heuristic methods. In [13], authors proposed an incremental feature selection algorithm (IFSA) which is dynamic in nature for taking decisions over the different functionalities. This algorithm is capable to avoid the re-computation process instead of retraining the subset from scratch. In [14], authors developed a new evolutionary-incremental framework for feature selection. This framework is applied on an ordinary evolutionary algorithm called genetic algorithm. This framework introduced some generic modifications on ordinary evaluation algorithms which are compatible with the variable length of solutions. Moreover, this framework is deployed for performing classification operation with two new operators namely addition and deletion operators which change the length of solutions randomly. In [15], authors proposed a new unsupervised feature selection method for effective decision making over the dataset. In [16], authors proposed a new model for feature selection based on combination of incremental mixed variable ant colony optimization (IACOMV) and support vector machine (SVM) for solving the model selection problems effectively. In [17], authors proposed a machine learning algorithm version of the binary bat algorithm (BBA) for performing effective classification. However, all discussed approaches are not suitable for feature selection in intrusion detection applications [18]. Moreover, the existing feature selection algorithms are more complex and hence they consume lot of time for convergence. Therefore, a new feature selection algorithms needed to address the existing approaches limitations and best solution for selecting optimal number of features. 3. INTELLECTUAL CHARACTERISTIC SELECTION ALGORITHM (ICSA) Due to random deployment of static sensor nodes and environmental factors, existence of many issues and loop holes in wireless sensor networks (WSN) is inevitable in smart cities. These limitations result in reducing the data transmission performance in terms of data reliability, data transfer in wireless advertising and in energy consumption in wireless advertising frameworks. Consequently, the fulfill the all network requirements is an important factor for prolonging the network lifetime on wireless advertising in MANET platform. The proposed framework shows in Figure 1. The network lifetime of the internet of things (IoT) sensor nodes can be improved by deploying the additional mobile sensors and static sensor deployment. Finding the number of additional IoT sensors in the networks leads to optimization problem. Intellectual characteristic selection algorithm (ICSA) presents to obtain the best/optimal coverage with high reliability of data transfer of network area by IoT sensor nodes. The required numbers of static sensors are deployed randomly in the monitoring area. After deployment of the sink nodes, nodes send a hello message to all other sensor nodes in the network, as a reply the nodes send their location and node_id to sink node. By using these information, sink nodes apply the binary detection model to detect the holes in the coverage of monitoring region during information transmission on wireless
  • 3. TELKOMNIKA Telecommun Comput El Control  Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen) 2403 advertising platform. After obtaining the coverage map, the sink calculates the optimal number of additional sensor required and deploys those mobile sensors randomly. Each mobile sensor is modeled as a charged particle in electromagnetism algorithm and the ICSA algorithm calculates the total force applied on the mobile sensor by neighbor’s IoT sensors and fitness (Ai) values. 𝐴𝑖 = [𝑊1 ∗ 𝐼𝑛𝑓𝑜 𝐺𝑎𝑖𝑛 𝑟𝑎𝑡𝑖𝑜 (𝐼𝐺𝑅) (𝐴𝑖) + 𝑊2 ∗ 𝐼𝐺𝑅 (𝑀𝑢𝑡𝑎𝑡𝑖𝑜𝑛 (𝐴𝑖)) + 𝑊3 ∗ 𝐼𝐺𝑅 (𝐶𝑟𝑜𝑠𝑠𝑜𝑣𝑒𝑟 (𝐴𝑖, 𝐴𝑗) ]/[𝑊1 + 𝑊2 + 𝑊3]; (1) 𝐴𝑖 >= 𝑇ℎ 𝐴𝑁𝐷 𝐴𝑗 >= 𝑇ℎ (2) 𝑆𝑆 = 𝑆𝑆 𝑈 (𝐴𝑖) 𝑈 (𝐴𝑗); (3) 𝐴𝑖 >= 𝑇ℎ 𝐴𝑁𝐷 𝐴𝑗 < 𝑇ℎ (4) 𝑆𝑆 = 𝑆𝑆 𝑈 (𝐴𝑖); (5) 𝐴𝑖 < 𝑇ℎ 𝐴𝑁𝐷 𝐴𝑗 >= 𝑇ℎ (6) 𝑆𝑆 = 𝑆𝑆 𝑈 (𝐴𝑗); (7) From the (1-4) denote the fitness function to check the Info gain ratio (IGR) and features are selected (SS) based on the threshold (Th) AND fitness (Aj) function as presents in the Algorithm 1. The total force determines the direction of the mobile node; move the mobile node accordingly; if the mobile node is not in optimum position, then apply genetic operators on the location of the sensor and apply AVFA algorithm. This will continue till all the mobile sensors are moved to optimal location. Figure 1. Overall operation of the proposed framework for wireless advertising
  • 4.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411 2404 In this work, ICSA is proposed with the combination of GA and IAASA. Here, IAASA selects the initial subsets and then applies the crossover fitness selection (CFS) formulation for finalizing the exact features which are useful for identifying the four types of attacks. Finally, the hidden semi-Markov model (HSMM) [19] and SVM [20] are used for classification for selected features. These classification tasks are carried out using the existing classifier to test the performance of the proposed feature selection algorithms. The IAASA uses the IGR which is computed using the (8-10). 𝐼𝑛𝑓𝑜(𝐷) = − ∑ [ 𝑓𝑟𝑒𝑞(𝐶𝑗, 𝐷) |𝐷| ] 𝑚 𝑗=1 𝑙𝑜𝑔2 [ 𝑓𝑟𝑒𝑞(𝐶𝑗, 𝐷) |𝐷| ] (8) 𝐼𝑛𝑓𝑜 (𝐹) = − ∑ [ |𝐹𝑖| |𝐹| ] 𝑛 𝑖=1 × 𝑖𝑛𝑓𝑜 (𝐹𝑖) (9) 𝐼𝐺𝑅(𝐴𝑖) = [ 𝐼𝑛𝑓𝑜(𝐷) − 𝐼𝑛𝑓𝑜(𝐹) 𝐼𝑛𝑓𝑜(𝐷) + 𝐼𝑛𝑓𝑜(𝐹) ] × 𝐼𝑛𝑓𝑜(𝐹𝑖) (10) Here, D is the dataset, Ci is the fragments made from the dataset, F is the feature set with Fi as the feature and IGR indicates the information gain ratio (IGR). The word info indicates the information gain values. Now, the steps of the proposed Algorithm 1 are as follows: Intelligent agent based incremental feature selection algorithm Step 1: The intelligent agents divide the dataset D into n subsets of equal size and named as C1, C2,…Cn. Step 2: Agent computes the IGR value for every attribute (Ai) of the dataset using (4) to obtain the value of IGR(Ai) and is expressed as: 𝐼𝐺𝑅(𝐴𝑖) = [ 𝐼𝑛𝑓𝑜(𝐷) − 𝐼𝑛𝑓𝑜(𝐹) 𝐼𝑛𝑓𝑜(𝐷) + 𝐼𝑛𝑓𝑜(𝐹) ] × 𝐼𝑛𝑓𝑜(𝐹𝑖) Step 3: The agent selects a feature from dataset which has maximum IGR. Step 4: Now the agent divides the sub datasets Ci into two subsets based on their distance between the neighbour nodes. Step 5: Make the first part of each subset as parents in the genetic algorithm. Step 6: Compute the fitness values using the formula Fitness (Ai) = [ W1 * IGR (Ai) + W2 * IGR (Mutation (Ai) ) + W3 * IGR (Crossover (Ai, Aj) ] / [W1+W2+W3]; Fitness (Aj) = [W1 * IGR (Aj) + W2 * IGR (Mutation (Aj)) + W3 * IGR (Crossover (Ai, Aj)] / [W1+W2+W3]; Step 7: If Fitness (Ai) >= Threshold AND Fitness (Aj) >= Threshold then Selected feature set SS = SS U (Ai) U (Aj); Step 8: If Fitness (Ai) >= Threshold AND Fitness (Aj) < Threshold then Selected feature set SS = SS U (Ai); Step 9: If Fitness (Ai) < Threshold AND Fitness (Aj) >= Threshold then Selected feature set SS = SS U (Aj); Step 10: If Ai is included in SS then select the next attribute from the first subset and call it as Ai Step 11: If Aj is included in SS then select the next attribute from the second subset and call it as Aj Step 12: Repeat this process until all attributes are tested with the rules used in this procedure. Step 13: Return SS Step 14: If No attributes are selected then change the Threshold with Threshold = Threshold * 0.9 and go to step 6. Further in order to improve the reliability and classification accuracy NIGA-MFS algorithm is used for wireless advertising in smart cities. In this work, all the dataset is converted into a standard format which uses the numerical values between 0 and 1 so that it is easy to compare during the classification process. For this purpose, the minimum and maximum values are considered as the boundaries for each attribute and the attribute length is computed using the difference between the maximum and the minimum values. The normalized value is computed using the formula given in (11). 𝑁𝑜𝑟𝑚𝑎𝑙𝑖𝑧𝑒𝑑 𝑉𝑎𝑙𝑢𝑒 (𝐼) = 𝐺𝑖𝑣𝑒𝑛 𝑉𝑎𝑙𝑢𝑒 (𝐼) (𝑀𝑎𝑥 𝑉𝑎𝑙𝑢𝑒 – 𝑀𝑖𝑛 𝑉𝑎𝑙𝑢𝑒) (11)
  • 5. TELKOMNIKA Telecommun Comput El Control  Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen) 2405 where, I indicate the Ith data record, given value is the present value, normalized value is the computed value which lies between 0 and 1, max value is the maximum value of the values for the particular attribute and Min value is the Minimum value of the values for the particular attribute. The input data are normalized on each record by dividing the max-min value by the maximum value and hence all the data are converted into uniform format with a range of values from 0 to 1. This pre-processing helps the decision making process to carry out easier comparisons. For this purpose, a new feature selection algorithm called GA based Min-Max feature selection algorithm is proposed. The steps of the NIGA-MFS Algorithm 2 are as follows: Normalized intelligent GA based min-max feature selection (NIGA-MFS) algorithm Input: All features (Fi, i=1 to n), Number of generations K, Population size PS, Crossover probability (CPi), Mutation probability (MPi). Output: Set of selected features SFi, i = 1 to m. NIGA-MFS ( ) Begin Step 1: Initialize the population from the dataset as Fi, i=1 to n; n =41, Maximum number of generations = 1000; Step 2: Convert the features into feature numbers n binary form to represent them using 1s and 0s. Step 3: Form two parents by selecting two attributes at random Step 4: Remove them from Fi and name them PA1 and PA2. Step 5: Initialize SFi = { } and Generation count = 1; Step 6: Initialize the weights with W1=0.6, W2=0.4, CPi =0.5 and MPi=0.5. Step 7: For each chromosome Fi present in the selected attributes population { i. Apply uniform crossover with a probability CPi and mutation operation with probability MPi. ii. Find the normalized Min-Max value using the formula Min-Max Value (I) = Given Value (I) / (Max Value – Min Value) iii. Evaluate Fitness (i)= [ W1 * RoundOf (Min-Max Value(i)) + W2 * TruncateOf (Min-Max Value(i)+0.5)] / (W1 + W2) iv. If fitness value of Fi > Threshold Then FSi = FSi U Fi Else Read next attribute Step 8: If Generation_Count < 1000 Then Go to Step 7 Step 9: Return FSi. The results of the feature selection algorithm and the classification algorithms with full features and selected features are selected using the proposed feature selection algorithm for reliable data transfer which is discussed in the results and discussion section. 4. RESULTS AND DISCUSSION The efficiency of the ICSA is integrated with NIGA-MFS for optimal feature selection for reliable data transfer in wireless advertising for smart cities in MANET platform with IoT sensors is analyzed in this section. The proposed method successfully detects the sensible region which examines the optimized cluster centers for reliable data transmission and members that leads to create the effective transmission path from source to destination in smart city environment. Then the performance of the proposed system is analyzing by using the following metrics. a) Coverage fraction Coverage fraction is metric to analyze, how the neighbor nodes are successfully examining while analyzing the sensible nodes in wireless sensor networks of smart cities. b) Energy consumption Energy consumption is one the important metric that is used to measure how much power is consumed while transmitting the information from source to destination without making any information loss. c) Accuracy The last metrics is accuracy in which the cluster formation efficiency is examined. Accuracy is analyzed in terms of using number of nodes along with number of clusters. By using the above efficiency metrics, excellence of the system is evaluated with the help of simulation setup, which is discussed as follows. The excellence of proposed technique performance is analyzed using simulation setup that is compared with traditional methods. During the implementation process, the proposed system uses the following simulation parameter that is listed in the Table 1.
  • 6.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411 2406 Table 1. Simulation parameter Simulation Parameter Parameter Value Simulator NS2 (v.2.29) Transmission Range 500*500 square meters Bandwidth 4 Mbps Interface Queue Length 45 Packet size 512 bytes Traffic type CBR Packet rate 20 packets/sec Topology size 700 * 700m2 Number of nodes 20,30,…50 Number of trials 30 Simulation Time 800 sec Maximum Speed 40 m/s Counter Threshold ( C ) 6 RAD Tmax 0.02 seconds After simulation network simulator (NS2) setup, the next step is implementation of ICSA- NIGA-MFS and the graphical representations are created for examining the system efficiency. Along with the simulation setup, the efficiency of the system is analyzed in terms of different performance metrics such as coverage fraction, accuracy of cluster and energy consumption metrics. Depending on the various discussions cluster head and centroid node is selected using the ICSA integrated NIGA-MFS with effective manner. Then the efficiency of cluster is examined in terms of precision, recall and accuracy metrics, which is explained as follows. a) Recall Recall is also called as the true positive rate which helps to determine how exact the cluster head is chosen from the collection of nodes. The recall value is calculated as follows, Recall = True positive True positive + False Negative (12) In (12), recall value is estimated, if the system ensures high true positive rate then the method successfully selects the exact cluster with effective manner. b) False negative rate (FNR) False negative rate is also called as miss rate that measures how much fraction of the elements classified as negative is false. The FNR value is estimated as follows: False Negative Rate = False Negative True Positive + False Negative (13) In (13), false negative rate is estimated, if the system ensures low negative rate then the method successfully selects the exact cluster with effective manner. c) Precision Precision is also called as Positive Prediction Value (PPV), it shows how much fraction of the elements truly positive is classified as positive. Higher PPV means better classification. The Precision value is estimated as follows, Precision = True Positive True Postive + False Positive (14) Based on the (14) precision, recall values, accuracy is estimated as follows. d) Accuracy (ACC) Accuracy shows how much fraction of the total elements classified correctly. Higher ACC means better classification. It is calculated as follows in (15). Accuracy = True Positive + True Negative (True positive + True negative + False positive + False Negative) (15) Based on the above accuracy metric, the obtained clustering accuracy value is shown in Table 2.
  • 7. TELKOMNIKA Telecommun Comput El Control  Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen) 2407 Table 2. Performance analysis of clustering accuracy IACOMV SVM BBA ICSA-NIGA-MFS Accuracy 0.75 0.84 0.83 0.97 precision 0.74 0.85 0.76 0.98 Recall 0.83 0.54 0.66 0.89 False Negative Rate 0.91 0.6 0.71 0.55 Based on Table 2, ICSA-NIGA-MFS (accuracy-0.97%, precision-0.98% and recall-0.55%) is more reliable in data transfer when compared to other methods such as IACOMV (accuracy-0.75%, precision-0.74% and recall-0.83%) SVM (accuracy-0.84%, precision-0.85% and recall-0.54%), BBA (accuracy-0.83%, precision-0.76% and recall-0.66%) and ICSA-NIGA-MFS (accuracy-0.97%, precision-0.98% and recall-0.55%). Based on Table 2, it is clearly showing that the ICSA integrated NIGA-MFS ensures the high accuracy while detecting exact cluster head, and eliminating the false nodes while transferring data in wireless advertising for smart cities when compared to the other methods. Even though introduce method effectively form the region and clusters with high accuracy, the network must consume minimum energy that leads to improve overall network lifetime while transmitting data from source to destination in wireless advertising for smart cities. The low utilization of energy leads to improve the overall transmission rate which also eliminates several difficulties. So, ICSA integrated NIGA-MFS algorithm in cluster head to collect the data from base station from the member nodes by multi-hop manner, which saves the energy consumption of cluster head and participants in WSN of smart cities. In IACOMV and EMHR protocols, energy burden is due to the long-haul communication links between header and the cluster members. However, the energy dissipation is directly relative to the exponent of data transmission distance. The energy consumption of the ICSA integrated NIGA-MFS algorithm is less than that of IACOMV, SVM and BBA [21]. Less energy consumption means longer lifetime of network and then the graphical representation of residual energy is shown in Figure 2. Table 2 shows the energy consumption where energy measurement is based on joules. Figure 2. Performance analysis based on energy As shows in Figure 2 is the proposed ICSA integrated NIGA-MFS obtained a high energy saving which leads to improve overall network [22] lifetime. Depending on the above simulation result, the ICSA integrated NIGA-MFS algorithm transmits the data from one node to another node by consumed minimum power that used to maintain the network lifetime when compared to other methods for wireless advertising in smart city environment. In addition to this, effective utilization of nodes, network routing [23] and power reduces the other failures in network with effective manner. The above Figure 3 shows that the comparison of coverage fraction for the various models are recognized sensitive region from the defined coverage area with reasonable simulation runs in defined
  • 8.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411 2408 area [24]. The obtained coverage fraction is better for ICSA integrated NIGA-MFS when compared to the existing sensing IACOMV, SVM and BBA. This successful examination of sensing region helps to analyze the number of nodes in region with effective manner that used to form the cluster with different number of rounds and nodes in sensor network for smart city framework [25]. As shown Figure 4, depending on the number of cluster nodes efficiency, the successful formations of cluster enhance the data transmission process by maximizing the network lifetime in wireless advertising framework for smart city platform. The formed cluster leads to reduces the high-energy consumption while transmitting the data from source to destination node in smart city platform which helps to improve the efficiency of the network. Figure 3. Performance analysis based on coverage fraction Figure 4. Performance analysis based on efficiency
  • 9. TELKOMNIKA Telecommun Comput El Control  Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen) 2409 Figure 5 depicts the comparison of average time taken between ICSA integrated NIGA-MFS compared to the existing sensing IACOMV, SVM and BBA models. It is visible that ICSA integrated NIGA-MFS outperforms in comparison with the other three algorithms. ICSA integrated NIGA-MFS ahead with minimum computational time and the minimum computational time is due to the membership function evaluation. As shown in the Figure 6, however, ICSA integrated NIGA-MFS has lesser time for data transmission between the IoT sensor nodes in smart city platform, which grows exponentially as the size of the IoT nodes and links increases in smart city platform. ICSA integrated NIGA-MFS achieves the optimal solution in a maximized network lifetime for the node generation with less optimum time than IACOMV, SVM and BBA models. Thus the proposed solution shows the optimal set of features which are selected by the proposed intelligent incremental feature selection algorithm. Figure 5. Average computational time analysis Figure 6. Average computational time with optimum solution
  • 10.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2401 - 2411 2410 5. CONCLUSION In this paper, ICSA integrated NIGA-MFS algorithm is proposed for wireless advertising system. The proposed feature selection algorithms along with classifiers is used and itis observed that both the feature selection algorithms increased the classification accuracy. Moreover, ICSA integrated NIGA-MFS algorithm provided better results than the feature selection using the ICSA due to the use of normalization with genetic algorithms. Both the algorithms reduced the classification time in comparison with IACOMV, SVM and BBA models. Hence, the ICSA-NIGA-MFS achieves better performance in terms of classification accuracy and classification time by the use of the proposed pre-processing techniques which is most suitable for wireless advertising in smart city environment for reliable data transmission. In future, the proposed algorithm will apply on other domain like, smart grids, edge computing, industrial IoT and underwater sensor networks. ACKNOWLEDGEMENTS This work was supported by University of Baghdad. REFERENCES [1] A. Gupta, R. K. Jha, P. Gandotra, and S. Jain, "Bandwidth spoofing and intrusion detection system for multistage 5G wireless communication network," IEEE Transactions on Vehicular Technology, vol. 67, no. 1, pp. 618-632, 2017. [2] M. S. Aliero, I. Ghani, K. N. Qureshi, and M. F. A. Rohani, "An algorithm for detecting SQL injection vulnerability using black-box testing," Journal of Ambient Intelligence Humanized Computing, vol. 11, no. 1, pp. 249-266, 2020. [3] K. N. Qureshi, F. Bashir, and A. H. Abdullah, "Provision of Security in Vehicular Ad hoc Networks through An Intelligent Secure Routing Scheme," 2017 International Conference on Frontiers of Information Technology (FIT), pp. 200-205, 2017. [4] E. Benkhelifa, T. Welsh, and W. Hamouda, "A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems," IEEE Communications Surveys Tutorials, vol. 20, no. 4, pp. 3496-3509, 2018. [5] A. Sharif, J. P. Li, and M. A. Saleem, "Internet of things enabled vehicular and ad hoc networks for smart city traffic monitoring and controlling: a review," International Journal of Advanced Networking Applications, vol. 10, no. 3, pp. 3833-3842, 2018. [6] A. Mehmood, A. Khanan, M. M. Umar, S. Abdullah, K. A. Z. Ariffin, and H. Song, "Secure knowledge and cluster-based intrusion detection mechanism for smart wireless sensor networks," IEEE Access, vol. 6, pp. 5688-5694, 2017. [7] K. Qureshi, A. H. Abdullah, O. Kaiwartya, F. Ullah, and S. I. A. Altameem, "Weighted link quality and forward progress coupled with modified RTS/CTS for beaconless packet forwarding protocol (B-PFP)," Telecommunication Systems, 2016. [8] K. N. Qureshi, M. M. Idrees, J. Lloret, and I. Bosch, "Self-Assessment Based Clustering Data Dissemination for Sparse and Dense Traffic Conditions for Internet of Vehicles," IEEE Access, vol. 8, pp. 10363-10372, 2020. [9] Q. Yaseen, F. Albalas, Y. Jararwah, and M. Al‐ Ayyoub, "Leveraging fog computing and software defined systems for selective forwarding attacks detection in mobile wireless sensor networks," Transactions on Emerging Telecommunications Technologies, vol. 29, no. 4, 2018. [10] P. M. Shakeel, S. Baskar, V. S. Dhulipala, S. Mishra, and M. M. Jaber, "Maintaining security and privacy in health care system using learning based deep-Q-networks," Journal of Medical Systems, vol. 42, no. 10, 2018. [11] H. Alanazi, A. Abdullah, K. Qureshi, and A. Ismail, "Accurate and dynamic predictive model for better prediction in medicine and healthcare," Irish Journal of Medical Science, vol. 187, no. 2, pp. 501-513, 2018. [12] A. Brandão, H. São Mamede, and R. Gonçalves, "A smart city’s model secured by blockchain," International Conference on Software Process Improvement, Springer, pp. 249-260, 2018. [13] M. Dorigo and T. Stützle, "Ant colony optimization: overview and recent advances," Handbook of Metaheuristics: Springer, pp. 311-351, 2019. [14] V. O. Costa and C. R. Rodrigues, "Hierarchical ant colony for simultaneous classifier selection and hyperparameter optimization," 2018 IEEE congress on evolutionary computation (CEC), pp. 1-8, 2018. [15] M. M. Mafarja and S. Mirjalili, "Hybrid binary ant lion optimizer with rough set and approximate entropy reducts for feature selection," Soft Computing, vol. 23, no. 15, pp. 6249-6265, 2019. [16] T. M. Mohamed and H. M. Moftah, "Simultaneous ranking and selection of keystroke dynamics features through a novel multi-objective binary bat algorithm," Future Computing Informatics Journal, vol. 3, no. 1, pp. 29-40, 2018. [17] D. Guha, P. K. Roy, and S. Banerjee, "Binary Bat Algorithm Applied to Solve MISO-Type PID-SSSC-Based Load Frequency Control Problem," Iranian Journal of Science Technology, Transactions of Electrical Engineering, vol. 43, no. 2, pp. 323-342, 2019. [18] A. Tharwat and A. E. Hassanien, "Optimizing Support Vector Machine Parameters Using Bat Optimization Algorithm," Machine Learning Paradigms: Theory and Application: Springer, pp. 351-374, 2019.
  • 11. TELKOMNIKA Telecommun Comput El Control  Secure and reliable wireless advertising system using… (Yousra Abdul Alsahib S. Aldeen) 2411 [19] T. Islam, M. E. Islam, and M. R. Ruhin, "An analysis of foraging and echolocation behavior of swarm intelligence algorithms in optimization: ACO, BCO and BA," International Journal of Intelligence Science, vol. 8, no. 01, pp. 1-27, 2018. [20] S. Mirjalili, "Evolutionary algorithms and neural networks," Studies in Computational Intelligence, 2019. [21] R. Hamidouche, Z. Aliouat, and A. M. Gueroui, "Genetic algorithm for improving the lifetime and QoS of wireless sensor networks," Wireless Personal Communications, vol. 101, no. 4, pp. 2313-2348, 2018. [22] S. S. L. Preeth, R. Dhanalakshmi, R. Kumar, and P. M. Shakeel, "An adaptive fuzzy rule based energy efficient clustering and immune-inspired routing protocol for WSN-assisted IoT system," Journal of Ambient Intelligence Humanized Computing, pp. 1-13, 2018. [23] T. Kaur and R. Kumar, "Mitigation of Blackhole Attacks and Wormhole Attacks in Wireless Sensor Networks Using AODV Protocol," 2018 IEEE International Conference on Smart Energy Grid Engineering (SEGE), pp. 288-292, 2018. [24] M. Banerjee, J. Lee, and K. K. R. Choo, "A blockchain future for internet of things security: a position paper," Digital Communications Networks, vol. 4, no. 3, pp. 149-160, 2018. [25] M. Torres Ruiz, M. D. Lytras, and H. Mathkour, "Innovative services and applications of wireless sensor networks: Research challenges and opportunities," SAGE Publications Sage UK: London, England, 2018. BIOGRAPHIES OF AUTHORS Dr. Yousra Abdul Alsahib S. Aldeen. Head of Assurance and Performance Assessment Unit-College of Science for Women-University of Baghdad. Ph.D. in Computer Network. Research Interests: Cloud Privacy, IOT, Computer Network, Smart City, Cloud of Things, etc. 1994 she has got BSc in Computer Science (Al-Mustansiriyah University). 2006 She has got MSc in Computer Network (Iraqi Commission for computers and informatics). 2017 PhD at Faculty of Computing, University Technology Malaysia, UTM, 81310 UTM Skudai, Johor, Malaysia. Haider Mohammed Abdulhadi. Head of Avi-cenna E-Learning Unit - College of Science for Women-University of Baghdad. .1999 he has got B.Sc. in electrical engineering (Al Mustansiriyah University). 2009 he has got M.Sc. in Electronic Systems (Kharkov Polytechnic Institute - Ukraine).