期刊文献+

物联网环境下的终端控制智能响应方法 被引量:2

Response method for terminal control intelligent network environment
原文传递
导出
摘要 物联网环境下同一命题解决方案众多,如何从众多的方案中选择最佳方案变得非常困难。本文深入分析物联网环境下影响物联网环境下终端控制决策的特点,引入决策科学中的多属性决策,并根据物联网特点选用主客观组合赋值法确定物联网各属性的权值,选用几何加权平均算法对各种解决方案进行排序,即满足了不同用户的个性化需求,也不破坏物联网的整体属性,取得了良好的效果。 Under the environment of Internet of things, how to select the best solution from a host of solutions become very difficult.Thorough Intemet environment influence under the environment of Intemet of things terminal control decision-making, the characteristics of the introduction of decision science in the multiple attribute decision making, and according to the characteristics of the Internet of things combination of subjective and objective value assignment method of things the weight of each attribute, use geometrical weighted average algorithm to sort by a variety of solutions, which satisfy the personalized needs of different users, also don't destroy the overall properties of the Internet of things, and good results have been achieved.
出处 《网络安全技术与应用》 2014年第3期39-40,共2页 Network Security Technology & Application
关键词 物联网 多属性决策 组合赋值法 Internet of Things ( IOT ) multi-attribute decision-making ( MADM ) Portfolio assignment method ( PAM )
  • 相关文献

参考文献4

  • 1Green TJ, Tannen V.Models for incomplete and probabilistic information[J].IEEE Date Engineering Bulletin, 2006, 29 ( 1 ): 17-24.
  • 2Blumensath T, Davies ME.Iterative hard thresholding for compressed sensing[J] .Applied and Computational Harmonic Analysis, 2009, 27 (3): 265-274.
  • 3王永庆.人工智能原理与方法[M].西安:西安交通大学出版社,2006.
  • 4黄海生,王汝传.基于隶属云理论的主观信任评估模型研究[J].通信学报,2008,29(4):13-19. 被引量:80

二级参考文献11

  • 1李德毅,刘常昱.论正态云模型的普适性[J].中国工程科学,2004,6(8):28-34. 被引量:896
  • 2刘常昱,冯芒,戴晓军,李德毅.基于云X信息的逆向云新算法[J].系统仿真学报,2004,16(11):2417-2420. 被引量:188
  • 3唐文,胡建斌,陈钟.基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659. 被引量:84
  • 4BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[A]. Proceedings of the 17th Symposium on Security and Privacy[C]. Oakland CA, 1996.164-173.
  • 5BETH T, BORCHERDING M, KLEIN B. Valuation of trust in open networks[A]. Gollmann D, ed. Proceedings of the European Symposium on Research in Security (ESORICS)[C]. Brighton:Springer- Verlag, 1994.3-18.
  • 6JΦSANG A, KNAPSKOG S J. A metric for trusted systems[A]. Global IT Security. Wien: Austrian Computer Society[C]. 1998. 541-549.
  • 7JΦSANG A. Trust-Based decision making for electronic transactions[A]. Proceedings of the 4th Nordic Workshop on SecureComputer Systems (NORDSEC'99)[C]. 1999.
  • 8GERCK E. Toward real-world models of trust: Reliance on received information[EB/OL], http://www.mcg.org. br/trustdef.htm,1999.
  • 9LID Y, CHEUNG D W, Sill X M,et al. Uncertainty reasoning based on cloud models in controllers[J]. Computers and Mathematics with Applications, 1998, 35(3): 99-123.
  • 10LID Y, HAN J W, SHI X M, et al. Knowledge representation and discovery based on linguistic atoms[J]. Knowledge-based Systems, 1998, 10(7):431-440.

共引文献90

同被引文献17

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部