IJAISE6
IJAISE6
Dr. Priyanka R.1, Teena K. B.2, Rashmi T. V.3, Dr. Reshma J.4, Dr. Tejashwini Nagaraj5, Tejaswini N.6
Keywords: Wireless Sensor Network; Hybrid Cluster Intelligent IDS; Deep Belief Network; Deep Learning; In-Vehicle security;
Performance measures
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 226
Fig 2: Cluster Based WSN
WSN has become more and more important as an area of broadcast bus networks in the rail network. The packet is
study in recent years. Due to their various characteristics obtained by a receiver ECU, which recognizes the ID of
such as low power consumption, energy limitation, radio the sender [14]. The unique ID number of the sender
frequency usage, and so on, mobile sensor networks may ECU may be provided in the package. As a result, the
be subject to many security risks. In case of an attacker's CAN packet doesn’t exclude an explicit destination field.
presence in the network, encryption, which is generally The syntax of the CAN data packet can be found in
regarded as one of the primary security lines, shall no Figure 3. There is an arbitration field including 11 bits of
longer be effective [16]. The identification and identification, each with a distinct ECU. There are 2
suppression of both external and internal threats are features to the arbitration field: 1) allowing each ECU to
facilitated by IDS, sometimes referred to as the 2nd line filter out a strange message, and 2) ranking messages
of defense. Direct installation of IDSs that are built for according to their ID in descending order [15]. The area
ad hoc networks or wired in a WSN is not possible. This of data may contain as many as 8 bits of information that
necessitates the development of a special detection can be sent in the message. The angle of the on-and-off
system for cellular sensor networks, which takes account status and the steering wheel of the display panel
of their constraints [17]. elements are examples of this type of information. The
data field size is set in a control field. Any mistakes in
2. Related Works
the data packet are found using the Cyclic Redundancy
With a maximum communication speed of 1 Mbps, CAN Check (CRC) field. It is confirmed that valid CAN
is intended to be used for high-speed, half-duplex packets were received by the acknowledgment field [16].
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 227
profiling unit contains features that can be manually Monitoring unit of the latest type of attack, the profiling
trained from the Internet. In case of discovery by the unit may update its database for future packets [19].
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 228
bus, as shown in Figure 7. Our architecture consists of learning, meaning it's either an attack or a standard
two main stages: the detection and training stage, as packet. As a result, it is expected that the information on
shown in Figure 8, an existing IDS based on machine the label will be communicated using matching features.
learning. It is being carried out offline in this phase The adoption of a DNN framework for feature training
because of the long duration of training. There's a binary allows us to gain weight parameters at edges linking
label on every CAN training packet in supervised nodes. The detection phase is also depicted in Figure 8.
Fig 6: (a) Top-down with n hidden layers DBN; (b) Bottom-up with n hidden layers DNN with Pretrained layers
The learning structure would be created of supervised label information. The altered structure is presented in
learning, as the HCIIDS-DBN framework gives rise to an Figure 6 (b) a deep feed forward structure of the ANN.
unobserved learning mechanism in Figure 6 (a). For this The correction of parameters is performed with a
purpose, a discriminative deep learning structure is gradient descent approach within the deep feed forward
created by appending the last classification layer to the ANN structure as soon as they have been initialized for
top level of the HCIIDS-DBN framework and including weights.
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 229
Fig 7: Attack scenario in the connected car
A method to detect intrusions built into the CWSN is and an HCIIDS-DBN for the sink. For HCIIDS-DBN to
proposed in this study. In the case of sinks, CHs, and be trained in the new attacks that HCIIDS-DBN has
SNs, three separate IDS are established based on a identified and classified, a feedback system operates at
variety of capacities and attack probability. It is proposed each sink and on CH.
that an IDS be misused for SN, a HCIIDS-DBN for CH,
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 230
Fig 9: Proposed Architecture
3.3 Anomaly detection model anomaly detection module in CWSN to see if any
abnormal packets are present. As the misuse detection
The anomaly detection model operates the same way as a
module relies on many well-known attack behavior
filter. To be further detected, the misuse detection model
models, it is appropriate to design model foundations
will receive abnormal packets. If the present behavior
based on those behaviors. Since most intruder detection
deviates from the normal behavior model, the system
techniques guarantee performance based on training data,
will classify the packet as abnormal, since the anomaly
this study uses BPN with a supervised learning method.
detection is based on that model. Consequently, it is of
When BPN learns an appropriate relationship between
concern that anomaly detections may classify regular
input and output variables, its weight is increased
communications as abnormal and thereby lead to errors
accordingly. This can reduce the error of inferences to a
in classification. However, it rarely defines abnormal
great extent, to achieve an accurate level of precision.
communication as normal. Many packets on CWSN
Therefore, BPN can achieve perfect accuracy by
should be recognized, a majority of which are common.
HCIIDS-DBN based on extensive training. This study
The anomaly detection method will be used as the
uses three layers of HCIIDS-DBN which consist of an
starting filter and screening packet. In the event of an
input layer, the concealed layer, and the output layer.
abnormal packet being detected, a misuse detection
Figure 11 depicts the abuse detection model's structure.
module shall be used to detect additional suspicious
The input vector we use is an anomalous packet, which
packets. An anomaly detection module has detected an
has been identified by the anomaly detection module.
intrusion to compare the present behavior with the
The maximum number of processors in the input layer
expected behaviour as shown in Figure 10. If the existing
shall be defined by the characteristics selected for
behavior is contrary to normal behavior patterns, it
packets. Moreover, to get a hidden layer's number of
would not be appropriate for the system to be classified
processing units, input and output layer unit values shall
as an anomaly. To be able to monitor CWSN packet
be averaged. After examination, eight prevalent assaults
status, packets have to create a regular pattern of
were identified in the CWSN: Sinkhole, Select Forward,
behavior. In these cases, the necessary rules are defined
Hello Floods, Sybil Attack, Acknowledgment Spoofing,
by professionals and anomaly detection modules have
Denial of Service, and Spoofed/Altered/Replayed
been developed in this study with a Rule-Based Analysis
Routing Information.
method.
Consequently, there is no balance in the data on training.
The process of construction may be separated into the
On the other hand, HCIIDS-DBN will ignore anomalous
following three steps:
packets owing to their low occurrence rate. To prevent
Step 1: The packets delivered from CH's neighbor are the this, after training data have been processed in the
ones that go through the sink in CWSN. Therefore, the anomaly detection module, the abnormal packet that has
analysis of all prior packets that have communicated to been taken for training shall be segregated. To verify the
the tank will be carried out and each packet type shall be malicious behaviour of the target that has been detected
classified as either normal or irregular. using anomaly detection, a set of attacks characterized by
Step 2: Choose a feature. Search for the essential predefined rule signatures and anomalies based on SVM
characteristics assigned to a particular package so that it is used in this proposed approach. Cluster-based
can be differentiated into normal and irregular packages. architectures incorporate detection technology to prolong
a network's lifetime. This is accomplished by appointing
Step 3: The development of guidelines for the detection one recognized node as the CH, which transmits packets
of anomalies. Attributes chosen the specifications of a (aggregated data) from the nodes to the BS rather than
standard pack are used to develop these rules. the node's collected data being sent to the base station
Any packet that runs into the sink when all CHs that is located in a faraway place.
communicate with each other shall be filtered by an
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 231
Fig 10: HCIIDS-DBN System architecture
CHs are sensors for local base stations, and groups have select the CAN syntax's 64-bit locations (equivalent to 8
a specific probability of becoming CHs at any time. A bytes) in the DATA field, and we examine the bit-
single cluster is composed of all nodes in this symbol statistical distributions. A mathematical
architecture, which are geographically distributed representation of the data vector PO2 R64 is possible.
throughout the network. The CH is aimed at prolonging Any bit locations in the DATA field can be used to
the network's life and reducing its energy consumption. generate a characteristic. However, it is possible to
Consideration will be given to the circumstances of the reduce the dimension of certain semantic elements in a
bit symbol symbols in a data packet. Specifically, we related syntactic element.
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 232
𝑁𝑜.𝑜𝑓 𝑑𝑒𝑡𝑒𝑐𝑡𝑒𝑑 𝑎𝑡𝑡𝑎𝑐𝑘𝑠
4 Results and Discussions 𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = × 100% (1)
.𝑜𝑓 𝑎𝑡𝑡𝑎𝑐𝑘𝑠
4.1 Performance measures 𝑁𝑜.𝑜𝑓 𝑚𝑖𝑠𝑐𝑙𝑎𝑠𝑠𝑖𝑓𝑖𝑒𝑑 𝑐𝑜𝑛𝑛𝑒𝑐𝑡𝑖𝑜𝑛𝑠
𝐹𝑎𝑙𝑠𝑒 𝑃𝑜𝑠𝑖𝑡𝑖𝑣𝑒 𝑅𝑎𝑡𝑒 = ×
𝑁𝑜. 𝑜𝑓 𝑛𝑜𝑟𝑚𝑎𝑙 𝑐𝑜𝑛𝑛𝑒𝑐𝑡𝑖𝑜𝑛𝑠
The computer used in this study is an AMD AthlonTM
100% (2)
64 X2 Dual Core Processor 5000+ 2.59GHz and has
2048MB of RAM running Windows XP Professional. 𝑁𝑜.𝑜𝑓 𝑐𝑜𝑟𝑟𝑒𝑐𝑡 𝑐𝑙𝑎𝑠𝑠𝑖𝑓𝑖𝑒𝑑 𝑐𝑜𝑛𝑛𝑒𝑐𝑡𝑖𝑜𝑛𝑠
𝐷𝑒𝑡𝑒𝑐𝑡𝑖𝑜𝑛 𝑅𝑎𝑡𝑒 = ×
𝑁𝑜.𝑜𝑓 𝑐𝑜𝑛𝑛𝑒𝑐𝑡𝑖𝑜𝑛𝑠
The NN tool, which is part of MATLAB 7.1, allows the
100% (3)
BPN method to be trained. The experiment's
effectiveness is assessed using the following Equations:
(1)–(3), which determine the accuracy and False Positive
Rate (FPR), and Detection Rate (DR).
Table 1: Categorization detail
Attacks Category No. of the amount of sample/ DR (%)
correct detection
Normal 2511/2573 98.95
Probe 1672/2155 77.42
DoS 9742/9896 98.54
U2R 5/27 15.78
R2L 56/569 9.92
The results of the test show that the accuracy is 91.26%, addition, if BPN were incapable of identifying several
the FP is 2.06%, and the DR is 90.96%, as shown in new attacks that are present in these classes it would
Table 1. Examining each assault class displayed in Table have misclassified those attacks. This means that our
2 and each efficiency, it is evident that Probe, U2R, and models need to be continually updated during learning to
R2L have poor DR figures—even 9.77% R2L's and maintain a large data rate for Integrated Data Streams
15.38% U2R's. It is due to the lack of training data for shown in Table 3.
R2L or U2R, which makes it difficult to detect them. In
Table 3: Simulation packets of CAN
ID Data Field ECU Target
10F 02 𝛼0 𝛽0 𝐴0 𝐵2 𝛼1 𝛽1 𝛼2 𝛽2 𝛼3 𝛽3 𝛼4 𝛽4 Engine
24F 33 𝛼0 𝛽0 𝐵1 𝐴3 𝛼1 𝛽1 𝛼2 𝛽2 𝛼3 𝛽3 𝛼4 𝛽4 Body Control
400 00 𝛼0 𝛽0 𝐸𝐹 10 𝛼1 𝛽1 𝛼2 𝛽2 𝛼3 𝛽3 𝛼4 𝛽4 Display Panel
As seen in Figure 12, the value data indicates the value the mode data denotes the command state of an ECU,
of the mode, such as the speed or the wheel angle, and such as controlling wheels. While noise may distort the
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 233
values information, for a brief period mode data remain detection stage, the use of mode data shall be
unchanged. The value data is only utilized as part of the demonstrated.
training phase for the proposed method. During the
Fig 12: The instances of the bit-symbol "1" at time t in the 8-byte Data field, which contains both value and mode data
1 𝜆 𝑚 𝑚 2 algorithm returns a logistic value of 0 or 1 so that it can
𝐶(𝑊𝑖) = ∑𝑘 𝐶(𝑊𝑖; 𝑢𝑘 , 𝑗𝑘 ) + ∑𝑁 𝑙
𝑛 ∑𝑥 ∑𝑦
𝑙+1 𝑥𝑡
(𝑊𝑖𝑦𝑥 )
𝐾 2
determine whether the sample is an attack packet or not.
(4)
An ECU may be able to draw on many attack situations,
Where i- Neural Network depth, 𝑚𝑙 – nodes in ith layer, and its weight vectors can be adapted for each situation.
𝑥𝑡
and 𝑊𝑖𝑦𝑥 ∈ 𝑊𝑖 - weight edge between node y and node To determine the situation to enable an appropriate
x. Optimal parameter set represented as Wi* is shown in training set to be applied, mode information shall be
Equation (5). considered in the proposed strategy. To this end,
template matching shall be provided in the proposed
𝑊𝑖 ∗ = arg min 𝐶(𝑊𝑖) (5)
𝑊𝑖 method shown in Figure 13. A template containing
𝑥𝑡 𝑥𝑡−1 𝜕 information on the mode shall be drawn up by reference
𝑊𝑖𝑦𝑥 = 𝑊𝑖𝑦𝑥 +𝜉 𝑥𝑡−1 𝐶(𝑊𝑖) (6) to data and training samples applied for the specific
𝜕𝑊𝑖𝑦𝑥
situation. In Figure 14, find a template-matching
The class of the test CAN packet is expected to be
example that uses the YellowfinColor template. As
detected during the detection phase. To calculate an
demonstrated, if the template matches a CAN packet and
output, the set of features taken from the test CAN
training sample that must be assessed, the detector will
packet and a set of trained weighting variables are used,
use matched trained parameters derived from value data.
just as they were used for training. The classification
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 234
Fig 14: Determining the appropriate training parameters using the template matching method
According to its energy, CH will be chosen dynamically. network was first created, sensor nodes didn't even know
The CH election procedure is announced by the BS, and that a rogue node existed. After the WSNs have been
the CHs determine the residual energy using the formula deployed, their signature database will be built up. A CH
Vi(t) = [Initial – Re(t)] / s, in which Initial denotes the makes this item in a malicious node database and
initial energy, Re(t) is the residual energy, and s is the distributes it to all the nodes.
CH selection round number eight. The BS shall compute
Global agent: The global agent is monitoring the
the mean deviation and average, based on the values
communications between the neighboring nodes. Due to
obtained. The CH election process of nodes is announced
the broadcasting nature of wireless networks, it can
by CH. The message regarding the transfer of power will
receive all packets passing through the radio range of the
be sent by Old CH. Alert messages from a new CH are
node. It must know the details of its nearest nodes for a
received by sensor nodes. The BS oversees CH
global agent to monitor packets. We shall use the
authentication, whereas CH is in charge of the other
preconfigured rules and a Local Monitoring System to
cluster members' authentication. The individual agents
keep an eye on these packets. Each detector node shall
are operated only where necessary due to the limited
generate and communicate to the Community Health
resources and battery life.
Authorities every potential security breach detected at
Local agent: The monitoring of sensor data that is sent or one of its neighboring nodes. When the alert has been
received shall be performed by the local agent module. received, CHs use the X threshold to determine if a node
In its internal database, the node is keeping a close eye is suspicious.
on attacks of specific hostile network nodes. When the
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 235
Fig 15: Evaluation of the performance of intrusion detection with ROC curves
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 236
ratio exceeds 99%. To evaluate the performance of layers of the conventional feedforward artificial neural
quantitative detection, coherence matrices are shown in network and the intrusion detection efficiency. The
Figure 16. The proposed technique's performance offers recommended approach outperforms the feed-forward
a noticeably high detection rate. False positives make up (𝑅𝐴+𝑅𝑁)
ANN in terms of detection effectiveness of two
2
just 1.6 percent of errors, while 2.8% are false negatives.
scenarios, as illustrated in Figure 17. The vanishing
This is an overall accuracy of approximately 97.8%. Two
gradient issue with the ANN structure results in
differences in the recommended DL structure utilizing
inconsistent results as the number of layers increases.
the DNN framework are compared between several
Table 4: Time complexity
Layer’s Testing(s) Testing
Classification(ms) Feature extraction(µs)
5 5.11 3.06 9.5
7 7.28 3.28 9.6
9 9.85 4.18 9.8
11 10.98 4.77 9.8
Furthermore, Table 4 shows the complexity of feature that is capable of effectively serving as both
identification times which is different according to the training and testing equipment. They consist of
number of concealed layers. The measurement time information received from network packets on mode and
required to examine each, and every packet sent over a value. The findings showed that the proposed
network is reflected in the evaluation time and the methodology could react to an attack promptly and have
training time is reflected in the measurement time a significant reliable identification ratio of about 99.8%
required to train the structure of DNN during the training when computational complexity related to multiple
stage. It is best to conduct training in the offline layers is very low.
environment as it involves time complexity ranging from
References
4 to 11 seconds. Nevertheless, the testing time
complexity for packet inspection only takes 8–9 μs to [1] Bediya, A. K., & Kumar, R. (2023). A novel
process each packet's features and 2–5 ms to classify the intrusion detection system for internet of things
packets—a time complexity that can be used for real- network security. In Research Anthology on
time applications. Convergence of Blockchain, Internet of Things, and
Security (pp. 330-348). IGI Global.
5. Conclusion
[2] He, K., Kim, D. D., & Asghar, M. R. (2023).
The three distinct IDSs of the sink, SH, and CN are Adversarial machine learning for network intrusion
engineered based on the diverse threats and likelihoods detection systems: a comprehensive survey. IEEE
they face. An HCIIDS-DBN with learning capabilities is Communications Surveys & Tutorials.
proposed for the sink; when the sink is subjected to [3] Abdulganiyu, O. H., Ait Tchakoucht, T., & Saheed,
unknown attacks, it not only studies and improves new Y. K. (2023). A systematic literature review for
classes through learning mechanisms in actual time, but network intrusion detection system
also lowers the threat of assault in the system. It aims at (IDS). International Journal of Information
effective detection of attacks and the prevention of waste Security, 1-38.
of resources. By contrast, when HCIIDS-DBN is [4] Yi, L., Yin, M., & Darbandi, M. (2023). A deep and
updating its attack class, it will use a feedback systematic review of the intrusion detection systems
mechanism from the CH to the sink. In the case of SNs, in the fog environment. Transactions on Emerging
an IDS for misuse is proposed. A quick and easy way to Telecommunications Technologies, 34(1), e4632.
manage SN is being developed to save resources and [5] Sivanantham, S., Mohanraj, V., Suresh, Y., &
avoid overwork for security. For the protection of the in- Senthilkumar, J. (2023). Association Rule Mining
vehicle network, they proposed a powerful HCIIDS- Frequent-Pattern-Based Intrusion Detection in
DBN. DNN allows each class to distinguish between Network. Computer Systems Science &
legitimate and malicious packets so that a vehicle Engineering, 44(2).
security system will be able to detect an attack of some [6] Talukder, M. A., Hasan, K. F., Islam, M. M.,
kind. In addition, we have proposed a new vector graphic Uddin, M. A., Akhter, A., Yousuf, M. A., ... &
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 237
Moni, M. A. (2023). A dependable hybrid machine detection scheme with dimensionality reduction in
learning model for network intrusion next generation networks. IEEE Transactions on
detection. Journal of Information Security and Information Forensics and Security, 18, 965-979.
Applications, 72, 103405. [19] de Carvalho Bertoli, G., Junior, L. A. P., Saotome,
[7] Sharma, B., Sharma, L., Lal, C., & Roy, S. (2023). O., & dos Santos, A. L. (2023). Generalizing
Anomaly based network intrusion detection for IoT intrusion detection for heterogeneous networks: A
attacks using deep learning technique. Computers stacked-unsupervised federated learning
and Electrical Engineering, 107, 108626. approach. Computers & Security, 127, 103106.
[8] Mohy-eddine, M., Guezzaz, A., Benkirane, S., & [20] Putri, A. A., Agustina, C., Fauzan, H., Saputra, M.
Azrour, M. (2023). An efficient network intrusion R. E., Erdiansyah, M., & Wardani, P. S. (2023).
detection model for IoT security using K-NN Network security implementation with snort-based
classifier and feature selection. Multimedia Tools intrusion detection system using windows
and Applications, 1-19. 10. JComce-Journal of Computer Science, 1(1).
[9] Hnamte, V., & Hussain, J. (2023). DCNNBiLSTM: [21] Logeswari, G., Bose, S., & Anitha, T. (2023). An
An efficient hybrid deep learning-based intrusion intrusion detection system for sdn using machine
detection system. Telematics and Informatics learning. Intelligent Automation & Soft
Reports, 10, 100053. Computing, 35(1), 867-880.
[10] Okey, O. D., Melgarejo, D. C., Saadi, M., Rosa, R. [22] Kadry, H., Farouk, A., Zanaty, E. A., & Reyad, O.
L., Kleinschmidt, J. H., & Rodríguez, D. Z. (2023). (2023). Intrusion detection model using optimized
Transfer learning approach to IDS on cloud IoT quantum neural network and elliptical curve
devices using optimized CNN. IEEE Access, 11, cryptography for data security. Alexandria
1023-1038. Engineering Journal, 71, 491-500.
[11] Ennaji, S., El Akkad, N., & Haddouch, K. (2023). i- [23] Ghanbarzadeh, R., Hosseinalipour, A., & Ghaffari,
2NIDS Novel Intelligent Intrusion Detection A. (2023). A novel network intrusion detection
Approach for a Strong Network method based on metaheuristic optimisation
Security. International Journal of Information algorithms. Journal of ambient intelligence and
Security and Privacy (IJISP), 17(1), 1-17. humanized computing, 14(6), 7575-7592.
[12] Lilhore, U. K., Manoharan, P., Simaiya, S., [24] Wang, R. X., Wang, Y., & Dai, L. (2023, March).
Alroobaea, R., Alsafyani, M., Baqasah, A. M., ... & Intrusion detection in network security. In Second
Raahemifar, K. (2023). HIDM: Hybrid Intrusion Guangdong-Hong Kong-Macao Greater Bay Area
Detection Model for Industry 4.0 Networks Using Artificial Intelligence and Big Data Forum (AIBDF
an Optimized CNN-LSTM with Transfer 2022) (Vol. 12593, pp. 366-371). SPIE.
Learning. Sensors, 23(18), 7856.
[13] Cui, J., Sun, H., Zhong, H., Zhang, J., Wei, L.,
Bolodurina, I., & He, D. (2023). Collaborative
Intrusion Detection System for SDVN: A Fairness
Federated Deep Learning Approach. IEEE
Transactions on Parallel and Distributed Systems.
[14] Du, J., Yang, K., Hu, Y., & Jiang, L. (2023). Nids-
cnnlstm: Network intrusion detection classification
model based on deep learning. IEEE Access, 11,
24808-24821.
[15] Shaorong, W., & Guiling, L. (2023). Research on
campus network security protection system
framework based on cloud data and intrusion
detection algorithm. Soft Computing, 1-10.
[16] Sousa, B., Magaia, N., & Silva, S. (2023). An
Intelligent Intrusion Detection System for 5G-
Enabled Internet of Vehicles. Electronics, 12(8),
1757.
[17] Huang, Y., & Ma, M. (2023). Ill-ids: An
incremental lifetime learning ids for
vanets. Computers & Security, 124, 102992.
[18] Sood, K., Nosouhi, M. R., Nguyen, D. D. N., Jiang,
F., Chowdhury, M., & Doss, R. (2023). Intrusion
International Journal of Intelligent Systems and Applications in Engineering IJISAE, 2024, 12(17s), 225–238 | 238