期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Fuzzy Risk Assessment Method for Airborne Network Security Based on AHP-TOPSIS
1
作者 Kenian Wang YuanHong Chunxiao Li 《Computers, Materials & Continua》 SCIE EI 2024年第7期1123-1142,共20页
With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental ... With the exponential increase in information security risks,ensuring the safety of aircraft heavily relies on the accurate performance of risk assessment.However,experts possess a limited understanding of fundamental security elements,such as assets,threats,and vulnerabilities,due to the confidentiality of airborne networks,resulting in cognitive uncertainty.Therefore,the Pythagorean fuzzy Analytic Hierarchy Process(AHP)Technique for Order Preference by Similarity to an Ideal Solution(TOPSIS)is proposed to address the expert cognitive uncertainty during information security risk assessment for airborne networks.First,Pythagorean fuzzy AHP is employed to construct an index system and quantify the pairwise comparison matrix for determining the index weights,which is used to solve the expert cognitive uncertainty in the process of evaluating the index system weight of airborne networks.Second,Pythagorean fuzzy the TOPSIS to an Ideal Solution is utilized to assess the risk prioritization of airborne networks using the Pythagorean fuzzy weighted distance measure,which is used to address the cognitive uncertainty in the evaluation process of various indicators in airborne network threat scenarios.Finally,a comparative analysis was conducted.The proposed method demonstrated the highest Kendall coordination coefficient of 0.952.This finding indicates superior consistency and confirms the efficacy of the method in addressing expert cognition during information security risk assessment for airborne networks. 展开更多
关键词 Airborne networks information security risk assessment cognitive uncertainty Pythagorean fuzzy sets
下载PDF
Regional groundwater resources development suitability assessment model with geographic information system
2
《Global Geology》 1998年第1期80-80,共1页
关键词 Regional groundwater resources development suitability assessment model with geographic information system
下载PDF
Data processing of small samples based on grey distance information approach 被引量:14
3
作者 Ke Hongfa, Chen Yongguang & Liu Yi 1. Coll. of Electronic Science and Engineering, National Univ. of Defense Technology, Changsha 410073, P. R. China 2. Unit 63880, Luoyang 471003, P. R. China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第2期281-289,共9页
Data processing of small samples is an important and valuable research problem in the electronic equipment test. Because it is difficult and complex to determine the probability distribution of small samples, it is di... Data processing of small samples is an important and valuable research problem in the electronic equipment test. Because it is difficult and complex to determine the probability distribution of small samples, it is difficult to use the traditional probability theory to process the samples and assess the degree of uncertainty. Using the grey relational theory and the norm theory, the grey distance information approach, which is based on the grey distance information quantity of a sample and the average grey distance information quantity of the samples, is proposed in this article. The definitions of the grey distance information quantity of a sample and the average grey distance information quantity of the samples, with their characteristics and algorithms, are introduced. The correlative problems, including the algorithm of estimated value, the standard deviation, and the acceptance and rejection criteria of the samples and estimated results, are also proposed. Moreover, the information whitening ratio is introduced to select the weight algorithm and to compare the different samples. Several examples are given to demonstrate the application of the proposed approach. The examples show that the proposed approach, which has no demand for the probability distribution of small samples, is feasible and effective. 展开更多
关键词 Data processing Grey theory Norm theory Small samples Uncertainty assessments Grey distance measure information whitening ratio.
下载PDF
Information Security Evaluation of Industrial Control Systems Using Probabilistic Linguistic MCDM Method
4
作者 Wenshu Xu Mingwei Lin 《Computers, Materials & Continua》 SCIE EI 2023年第10期199-222,共24页
Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation inform... Industrial control systems(ICSs)are widely used in various fields,and the information security problems of ICSs are increasingly serious.The existing evaluation methods fail to describe the uncertain evaluation information and group evaluation information of experts.Thus,this paper introduces the probabilistic linguistic term sets(PLTSs)to model the evaluation information of experts.Meanwhile,we propose a probabilistic linguistic multi-criteria decision-making(PL-MCDM)method to solve the information security assessment problem of ICSs.Firstly,we propose a novel subscript equivalence distance measure of PLTSs to improve the existing methods.Secondly,we use the Best Worst Method(BWM)method and Criteria Importance Through Inter-criteria Correlation(CRITIC)method to obtain the subjective weights and objective weights,which are used to derive the combined weights.Thirdly,we use the subscript equivalence distance measure method and the combined weight method to improve the probabilistic linguistic Visekriterijumska Optimizacija I Kompromisno Resenje(PL-VIKOR)method.Finally,we apply the proposed method to solve the information security assessment problem of ICSs.When comparing with the existing methods such as the probabilistic linguistic Tomada deDecisão Iterativa Multicritério(PL-TODIM)method and probabilistic linguistic Technique for Order Preference by Similarity to Ideal Solution(PL-TOPSIS)method,the case example shows that the proposed method can provide more reasonable ranking results.By evaluating and ranking the information security level of different ICSs,managers can identify problems in time and guide their work better. 展开更多
关键词 Multi-criteria decision-making distance measure probabilistic linguistic term sets industrial control system information security assessment
下载PDF
Best-effort service QoE assessment using visual information based Weber-Fechner law
5
作者 Guan Wanqing Wang Luhan +2 位作者 Lu Zhaoming Wen Xiangming Chen Xin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第2期38-45,共8页
Quality of experience(QoE) has been one of the most important factors for service providers and operators to develop and deploy services. Previous works have shown that Weber-Fechner law(WFL) can be used to promot... Quality of experience(QoE) has been one of the most important factors for service providers and operators to develop and deploy services. Previous works have shown that Weber-Fechner law(WFL) can be used to promote the accuracy of best-effort(BE) services' QoE assessment. In this paper, based on WFL, we take a deep insight into the visual information of BE services and its role in WFL, especially in web browsing services, and propose an enhanced QoE assessment model for BE services by taking the visual information into account. Both images and texts visual information are extracted and combined to get the visual information for web pages. Finally, a subjective experiment is performed to validate performance of proposed QoE assessment model, which shows that it performs better than traditional WFL based model. 展开更多
关键词 QoE assessment Weber-Fechner law best-effort service visual information
原文传递
Areas vulnerable to natural disasters and damage estimation of infrastructure in Busan, Korea
6
作者 JEON Sang-Soo 《Journal of Central South University》 SCIE EI CAS 2014年第4期1499-1507,共9页
Since the damages caused by disasters associated with climate anomalies and the diversification of the social structure increase every year, an efficient management system associated with a damage assessment of the ar... Since the damages caused by disasters associated with climate anomalies and the diversification of the social structure increase every year, an efficient management system associated with a damage assessment of the areas vulnerable to disasters is demanded to prevent or mitigate the damages to infrastructure. The areas vulnerable to disasters in Busan, located at southeastern part of Korea, were estimated based on historical records of damages and a risk assessment of the infrastructure was performed to provide fundamental information prior to the establishment of the real-time monitoring system for infrastructure and establish disaster management system. The results are illustrated by using geographical information system(GIS) and provide the importance of the roadmap for comprehensive and specific strategy to manage natural disasters. 展开更多
关键词 natural disaster damages risk assessment infrastructure disaster management system geographical information system
下载PDF
Negative exponential behavior of image mutual information for pseudo-thermal light ghost imaging: observation, modeling, and verification 被引量:3
7
作者 Junhui Li Bin Luo +3 位作者 Dongyue Yang Longfei Yin Guohua Wu Hong Guo 《Science Bulletin》 SCIE EI CAS CSCD 2017年第10期717-723,共7页
When using the image mutual information to assess the quality of reconstructed image in pseudothermal light ghost imaging, a negative exponential behavior with respect to the measurement number is observed. Based on i... When using the image mutual information to assess the quality of reconstructed image in pseudothermal light ghost imaging, a negative exponential behavior with respect to the measurement number is observed. Based on information theory and a few simple and verifiable assumptions, semi-quantitative model of image mutual information under varying measurement numbers is established. It is the Gaussian characteristics of the bucket detector output probability distribution that leads to this negative exponential behavior. Designed experiments verify the model. 展开更多
关键词 Ghost imaging Image mutual information information theory Image quality assessment
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部