Research Article
A Novel Method for Network Intrusion Detection
Algorithm 2
Algorithm of constructing the fuzzy attribute triadic concept vector model.
| Input: fuzzy triadic background (FTBac) | | Output: fuzzy attribute triadic concept vector (FCTA) | (1) | Define and initialize | (2) | for each j ∈ {C} do | (3) | binDS ⟵ relationship between object and attribute | (4) | for i = 1 to k do | (5) | | (6) | TConSe ⟵ {triCon, triCon∩TConSe} | (7) | end for | (8) | } | (9) | end for | (10) | for i = 1 to TConSe.size() do | (11) | for j = 1 to m do | (12) | | (13) | end for | (14) | end for | (15) | for i = 1 to TConSe.size() do | (16) | FCTA ⟵ unitize TConSe | (17) | end for | (18) | return FCTA |
|