Research Article
A Novel Method for Network Intrusion Detection
Algorithm 2
Algorithm of constructing the fuzzy attribute triadic concept vector model.
| | Input: fuzzy triadic background (FTBac) | | | Output: fuzzy attribute triadic concept vector (FCTA) | | (1) | Define and initialize | | (2) | for each j ∈ {C} do | | (3) | binDS ⟵ relationship between object and attribute | | (4) | for i = 1 to k do | | (5) | | | (6) | TConSe ⟵ {triCon, triCon∩TConSe} | | (7) | end for | | (8) | } | | (9) | end for | | (10) | for i = 1 to TConSe.size() do | | (11) | for j = 1 to m do | | (12) | | | (13) | end for | | (14) | end for | | (15) | for i = 1 to TConSe.size() do | | (16) | FCTA ⟵ unitize TConSe | | (17) | end for | | (18) | return FCTA |
|