期刊文献+

基于PCA-LINMAP-FCE的通信系统维修性评价方法

Method of maintainability evaluation based on PCA-LINMAP-FCE for communication systems
下载PDF
导出
摘要 为提高通信系统维修性评价的实用性和可操作性,提出了一种基于PCA-LINMAP-FCE的维修性评价方法.在构建简化的维修性评价指标体系的基础上,将PCA-LINMAP与模糊综合评判(FCE)方法相结合,从定量和定性的角度对维修性进行评价.实例仿真分析表明,该方法可操作性强,且有效地降低了评价的主观随意性,使维修设计和作业人员全面掌控通信系统装备维修性的影响因素,能够为科学制定设计方案和维修实施决策方案提供决策信息. In order to enhance the practical and operational performance, a method based on PCA-LINMAP-FCE for maintainability evaluation is proposed. Combining PCA-LINMAP with fuzzy comprehensive evaluation, the pro- vided approach evaluates the maintainability quantitatively and qualitatively on the basis of a simplified evaluation index system. Experimental results show that this high operational method reduces the arbitrary of subjective evalua- tion effectively. It is useful for maintenance personnel and designer to get acquainted with influencing factors of ma- intainability, and supply decision-making information for scientific design and implementation of maintaining scheme.
出处 《南京信息工程大学学报(自然科学版)》 CAS 2013年第4期358-363,共6页 Journal of Nanjing University of Information Science & Technology(Natural Science Edition)
关键词 维修性评价 主成分分析 多维偏好线性规划 模糊综合评判 maintainability evaluation principle component analysis linear programming technique for multidi-mensional analysis of preference fuzzy comprehensive evaluation
  • 相关文献

参考文献3

二级参考文献17

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2肖龙,戴宗坤.信息系统风险的多级模糊综合评判模型[J].四川大学学报(工程科学版),2004,36(5):98-102. 被引量:35
  • 3国家信息安全标准化技术委员会.GB/T20984-2007信息安全技术信息技术安全性评估规范[s].北京:中国标准出版社,2007.
  • 4全国信息安全标准化技术委员会信息安全管理工作组(WG7).IDTISO/IEC27001-2005信息安全管理体系要求[S].北京:中国标准出版社,2005.
  • 5SAHA I, MAULIK U, AO S I, et al. Fuzzy improved fuzzy clustering techniques for categorical data[J]. AIP Conference Proceedings, 2009, 1089: 82-93.
  • 6CAMPELLO R J G B, HRUSCHKS E R, ALVES V S. On the efficiency of evolutionary fuzzy clustering [ J ]. Journal of Heuristics, 2009, 15 ( 1 ) : 43-76.
  • 7HATHAWAY R J, BEZDEK J C, HU Y K. Generalized fuzzy clustering strategies using Lp norm distances[ J ]. IEEE Trans. on Fuzzy System, 2000, 8(5) : 576-582.
  • 8United States Department of Defense. DoD 5200. 28- STD Trusted computer system evaluation criteria [ S ]. Washington, DC: Department of Defense, 1985.
  • 9Offical Publications of the European Communities. ISBN 92-826-3004-8 Information technology security evaluation criteria [ S ]. Luxembourg: Office for Offieal Publications of the European Communities, 1991.
  • 10The National Security Agency and the National Institute of Standards and Technoogy. CCMB-2009-07-001 CC Information technology security evaluation common criteria[ S ]. Gaithersburg : [ s. n. ], 2009.

共引文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部