[Retracted] Network Traffic Forecasting in Network Cybersecurity: Granular Computing Model
Algorithm 1
Algorithm steps.
Let, be the sample of the network traffic on day.
is the number of clusterings in the FCM and RKM methods.
is the centroid of clustering with the FCM and RKM approaches.
is enhanced prediction.
(1) Use soft computing with RKM and FCM.
(2) Obtain the prediction values from the LSTM model .
(3) Determine the cluster membership of the sample ; let be the member of clusters j ( ∈ ). For the FCM and RKM granules, membership was determined appropriately.
(4) Modify Pi using , which is the centroid of the jth cluster = f(,).