Network Security Evaluation Mould based on Multifactor Fuzzy

Size: px
Start display at page:

Download "Network Security Evaluation Mould based on Multifactor Fuzzy"

Transcription

1 Network Security Evaluation Mould based on Multifactor Fuzzy Evaluation 1 Tao Wu, 2 Jun Ma, 3 Hang Zhang 1, Network Information Center, Hebei United University, Tangshan, China, happynat@163.com 2, Network Information Center, Hebei United University, Tangshan, China, mj@heuu.edu.cn 3, Network Information Center, Hebei United University, Tangshan, China, zhanghang@heuu.edu.cn Abstract The rapid development of information technology makes the quantitative assessment of network security is increasingly important. In this paper, we combine the network security objects and their attributes, and use the hierarchical analysis method to establish a network security risk assessment index system. It is to quantify the indictors by using the experts on the assessment of the impact factors, combination of qualitative analysis and fuzzy evaluation based on many factors. This paper proposes a network security risk assessment model and gave a quantitative assessment of the methods and steps. Network security risk assessment model helps to find the various factors of threat to network security. Keywords: Multi-Factor Fuzzy Evaluation, Network Security Mould, Risk Evaluation, Hierarchical Analysis Methods 1. Introduction The security risk evaluation is an important part in the network security system [1, 2, 3], as well as a systematic project. The evaluation system will be affected by a variety of factors which is subjective or objective, certain or uncertain, internal or external, etc, especially when network contains customer s most important information assets [4, 5, 6]. These security risks will have a great potential safety hazard to our nation, society, enterprises and individuals [7]. Thus, this essay aims to study the assessment methods on network security risk, provides basis for mastering the risk level of network security and avoiding this risk accurately, timely and quantitatively [8, 9, 10]. The evaluation index system of network security risk is an important part of network security risk evaluation system [11]. It is a guide mark for reflecting the security attribute of the evaluation target. This index system is constructed by the request of evaluation target and content. It is groups of related index which reflect the level of the network respond to risk [12, 13, 14]. It reflects the basic features, quality and level of evaluation target according to the selected evaluation target and some related information material [15, 16]. Theoretical standards of network security risk assessment which is popular in the world are ISO/IEC13335 IT Security Administration Guide, the BS based information security management system based on risk management, AS/NZS4360 risk management standards, etc. [1, 17] According to the above standards and characteristics of network security risk assessment indicators, assessment indicators can be divided into qualitative indicators and quantitative indicators. The network security risk index system consists of three parts which are the network layer index system, risk index system of the transmission network and physical security risk index system [2]. Meanwhile, each index system contains three elements of the assets. In this paper, we combine the network security objects and their attributes, and use the hierarchical analysis method to establish a network security risk assessment index system. It is to quantify the indictors by using the experts on the assessment of the impact factors, combination of qualitative analysis and fuzzy evaluation based on many factors. This paper proposes a network security risk assessment model and gave a quantitative assessment of the methods and steps. Network security risk assessment model helps to find the various factors of threat to network security. 2. Proposed scheme International Journal of Advancements in Computing Technology(IJACT) Volume5, Number5,March 2013 doi: /ijact.vol5.issue

2 2.1. Classification of assets and their level There are a variety of electronic media data, including a variety of data, system documentation, and operation and management procedures; Asset assignment is the valuation of the security value of assets, not only to consider the cost of the asset price, the more important is to consider the safety of the importance of assets for the organization's business [3]. In order to ensure consistency and accuracy of asset valuation, the agencies should establish a balance measure of value (asset evaluation criteria) in order to identify how to give value for assets assignment [4]. The level the assets are shown in Table 1. Table 1. Classification of assets and their level Rating labeling The definition of assets value 4 high The high degree of importance of the assets, after the destruction of its security attributes may cause the system to be more serious impact 3 medium The high degree of importance of the assets, after the destruction of its security attributes may cause the system to be moderate impact 2 low Assets less, after the destruction of its security attributes may cause the system to be a lower level of impact 1 very low The assets are very low, after the destruction of its security attributes may cause the system to be very low extent, and even negligible The security threat is the possibility of factors or events which have potential destruction to institutions and their assets. No matter how secure information systems are, security threats is an objective existence of things, it is one of the important factors of risk assessment. In the process of threat assessment, the first thing is to identify threaten in each key asset of every organization in need of protection. In the threat identification process, it should be determined based on environmental conditions and assets of the assets which previously threatened damage. An asset may be faced with multiple threats, and also a threat may cause different effects on different assets. The threat level is divided into four levels, from 1-4, representing the five levels of threat probability. The greater the rating value is, the greater the likelihood of threats is. The definition of specific possibility of the threat is shown in Table 2. Table 2. Threat level and assignment Rating labeling Definition of possible threat 4 High Threat to the likelihood is higher, in most cases likely to occur or can confirm that it occurred. 3 medium The medium of the possibility of threats, in certain circumstances may occur but has not been proven to occur. 2 low Threat to the likelihood is smaller, generally less likely to happen, it has not been shown to occur. 1 Very low Threat is almost impossible to occur except in very rare and exceptional circumstances Vulnerability identification Vulnerability assessment is also known as vulnerability assessment, an important content in security risk assessment. There is the weakness of the asset itself; it can be threatened to use, causing damage of the assets or business goals. The weaknesses include the vulnerability of the physical environment, organization, process, personnel, management, configuration, hardware, software and information, etc. Vulnerability assessment will aim at information assets which needed to protect, to identify every threat can take advantage of the vulnerability and the severity of the vulnerability assessment, to assess the possibility of vulnerability threats to use finally assign it the value of the relative grade. Level of vulnerability is divided into four levels, which representing the five levels of vulnerability of certain assets from 1-4. The greater the level is, the higher the degree of vulnerability. Specific for each level of vulnerability of vulnerability defined in Table

3 Table 3. Vulnerability level and assignment Rating labeling Definition of the severity of the vulnerability 4 high There is one or more fragile or loopholes in management, the threat of use of the likelihood of success is higher. 3 medium There are one or more fragile medium technology or regulatory loopholes, and threatened the use of the likelihood of success 2 low Lower the possibility of existence of one or more technical or regulatory loopholes, the lower the degree of vulnerability was threatened use of successful. 1 very low The possibility of the existence of one or more low vulnerability degree of technical or regulatory loopholes, was threatened use of success is very low, almost impossible to be successful Layered index assessment process The process of risk assessment includes four stages which are risk assessment preparation, the identification of risk factors, the degree of risk analysis and risk rating assessment [5]. The value of the overall risk assessment is gained by hierarchs using quantitative method. Different values correspond to different levels, and comprehensive analysis is conducted. The risk calculation models and algorithms are as follows: 1) To identify the information assets and give the value to the information assets; 2) To identify the threat and give the value to the threat of the frequency assignment; 3) To identify the vulnerability of information assets, and give value to the severity of the vulnerability of the assignment; 4) To work out the possibility of security incidents based on the identification results of threats and vulnerabilities; 5) To calculate the value of each risk in the index system according to the likelihood of security incidents and the effects of security incidents. 6) To analyze comprehensively and get the value of the overall risk assessment using the methods of quantitative and qualitative according to the risk value of each indicators in the index system. The risk is calculated as follows: R f A,V,T f Ia,L Va,T, (1) where R stands risks; A indicates assets; V represents vulnerability; T represents the threat; Ia refers to impact of organizational business caused by the assets of security (also known as the importance of the assets); Va refers to the vulnerability of an asset,l stands for the threat of use of assets caused by the vulnerability of the likelihood of security incidents. The risk calculation model shown in Figure 1: Figure 1. Risk Calculation Model 2.4. Multiple factors comprehensive evaluation algorithm Fuzzy comprehensive evaluation method is a comprehensive evaluation method based on fuzzy mathematics. The comprehensive evaluation method based on fuzzy mathematics membership theory qualitative evaluation into quantitative evaluation using fuzzy math to make an overall evaluation of things or objects restricted by many factors. It can resolve clear, systematic and strong features, and the problem which is fuzzy, difficult to quantify can be solved; it is suitable for a variety of nondeterministic problems. 258

4 In order to facilitate description, according to the basic concepts of fuzzy math, fuzzy comprehensive evaluation method and related terms are defined as follows : Evaluate the factors (X): treatment of the specific factors set of evaluation questions (such as a variety of indicators, parameters, specifications, performance, condition, etc.). In order to facilitate weight distribution and comment, the properties of the evaluation factors, evaluation factors into certain categories (for example, the network layer, transport layer, physical layer), and each category as a single evaluation factors, called the first an evaluation of factors (X1). The first level of evaluation factors can be set under the second level of evaluation factors (for example, the first level of evaluation factors network layer may have under the second stage of evaluation factors: the topological situation in routing and Qos). The second level of evaluation factors can also set up under the third level of evaluation factors, and so forth. Evaluate the factor value (x): it refers to the specific value of the evaluation factors. Evaluation of the value (Y): it refers to the level of the pros and cons of the evaluation factors. Evaluation factors for the evaluation of the optimal value 1 (percentile of 100 points) ; less optimal evaluation factors, according to the extent due to the excellent, the evaluation value is greater than or equal to zero and less than or equal to 1 (percentile of 100 points,), which is 0 Y 1 (using the percentage system, 0 Y 100). The average assessment value (Yp): it refers to the average of the evaluation of certain evaluation factors through qualitative analysis or quantitative analysis. Average rating value (Yp) = number of evaluation value/evaluation source. Weight (W): it is the status and importance to the evaluation factors. The total weight of the first level of evaluation factors is 1; the total of an evaluation of the weight of the factors in each evaluation factors is a. Weighted average value (Ypw): it refers to the weighted average evaluation value. Weighted average evaluation value (Ypw) = average evaluation value (Yp) the weight (W). The comprehensive evaluation value (Ez): it refers to the evaluation factors with a weighted average value (Epw). Comprehensive evaluation value corresponds to an evaluation of the value of the factors. Algorithm is as follows: 1) Determine the evaluation factors set: the risk of network layer X 1, Transport Layer risk X 2, physical risks X 3, set for the evaluation of network security level of risk factors. X ( X1, X 2, X 3) (2) Determination of the set of sub-factors in the factors sets. Based on a realistic assessment of the needs, you can customize the different number of sub-factors set, the sub-factors set in factor sets of are as follows: X1 ( X11, X12,..., X 1m) (3) X 2 ( X 21, X 22,..., X 2n) (4) X 3 ( X 31, X 32,..., X 3 p) (5) Such as: where, X 11 topological robustness indicators, the X 12 data confidentiality indicators, X 13 for business failure frequency, and so on. 2) Determine the judge set Y. OK Y = {lowest-risk (y 1 ), low risk (y 2 ), moderate risk (y 3 ), high-risk (y 4 )} judged set. 3) Comprehensive evaluation to the factors set. By experienced technical and managerial personnel to form a judgment group, individual evaluation of each evaluation sub-factors, respectively, and combined with quantitative evaluation to calculate the individual level of risk, based on a percentage of the degree of risk identification, evaluation matrix. Assessed in terms of a network layer index X 1i, identified as lowest risk and low risk, medium risk and high risk of the judges of the respective percentages of P i1, P i2, P i3, P i4, then this the evaluation of the index matrix: R1i ( Pi1, Pi2, Pi3, Pi4) (6) And the like, the network layer evaluation matrix as: 259

5 P11 P12 P13 P14 P21 P22 P23 P 24 R Pm 1 Pm2 Pm3 Pm4 where m is the number of the sub-factors in the network layer s factor set; For qualitative analysis, experts on the evaluation factors established the evaluation matrix. In topological robustness indicators as an example, if 20% of the evaluation staff that" the lowest risk", 40% of the staff that" low risk", 30% of the staff that" moderate risk", 10% of the staff that" high risk", then: R (8) Similarly to obtain R2 (evaluation matrix of the transport layer) and R3 (evaluation matrix of the physical Layer), we have: R2 (0.4, 0.3, 0.2, 0.1) (9) R3 (0.3,0.3,0.3,0.1) (10) 4) To determine the X i of each sub-factor weights (a i ), a = {a 1, a 2, a 3 } of the factors X i an evaluation. Held ai the right to re-evaluation of X i, that is, fuzzy transformation from X i to Y: bi ai Ri (11) According to above analysis, to identify the factors weight: a 1 = (0.5), a 2 = (0.3), a 3 = (0.2); b1a11 R1(0.5, 0.5) (0.3, 0.5, 0.3, 0.1) (12) 5) Second stage comprehensive evaluation. Each X as an element to do it using bi-factor evaluation matrix: R { rij},0 rij 1 (13) For example: R (14) Total evaluation matrix. Y X R { y1, y2,..., ym} (15) Where the components: m Yi ( xk rkj),(m 4,k 1,2,3,4) (16) k 1 6) normalized processing: m In order to ensure treatment yi 1, need to be normalized, the normalization method to: 1 yi Y ' i,(i 1,2,3,4) n yi 1 After normalization processing results: Y ' 0.25,0.42,0.25,0.08 (18) According to the principle of maximum membership, may ultimately determine the degree of risk of network security. In general, linguistic variable fuzzy subsets can take corresponding membership function resolution changes, in the actual application, the measured data often contain noise, so membership function selection should also consider the effects of noise, which generally can be used the probability density function of the noise to give qualitative description. If the membership function is improper, the membership of people who lose weight may ultimately decide mainly by the noise, of course, this is not allowed. It is discovered through Experience that to (7) (17) 260

6 fully reduce the noise effect on degree of membership, membership function selection should also meet the following inequality: f 5 n (19) Type of f membership degree is equal to 0.5 width of membership function; n is for the probability density function of the variance. When membership function is to quantify the level of form, quantization level for general is Fuzzy analysis method to error and change the input control changes in the output of the fuzzy rules can generally be used directly in Mamdani rule table, but this is not necessarily the best, and often need to be adjusted according to different characteristics of the object of the accused control rules. 3. Experimental results 3.1. Unit risk assessment Individual risk assessment and multi-factor fuzzy evaluation method is as a network security risk evaluation method. When the occurrence of a risk involving index system, the individual risk assessment methods; when a number of risks occur simultaneously, the first individual risk assessment, and risk assessed in accordance with the assessment standards, determine the level of risk then evaluate use the methods of the multi-factor assessment. Figure 2. Various threats brought risk sum Analyze the risk value for each indicator calculation model through the following quantitative and qualitative: The risks posed by the threat of i is equals to asset class factor multiply the damage to the coefficient multiply risk probability caused by threat i; among them, the damage coefficient is the percentage for the corresponding damage. A single index value at risk Rj = the threaten of Σ caused by i the Wi. Wi refers to the weights of the threat = threat level. Various threats brought risk sum is shown in Figure 2. The weight vector can be calculated, by using analytic hierarchy process in quantitative analysis. First, to calculate the initial factors weights, then to calculate each layer the asset, threat, vulnerability factors such as weight, analytic hierarchy process calculation which can be used as follows: 1) Tectonic factor judgment matrix B = {bj}; 2) B is for the largest eigenvalue and the corresponding characteristic; 3) Consistency inspection, if successful, then the feature vector is the weight vector, or the need to modify the matrix B; Determine the weight vector of the calculation process by using the analytic hierarchy process, which can be illustrated in tables 4 to

7 Table 4. The first layer of factor weights table Type X1 X2 X3 Weight X1 1 1/5 1/ X X The largest eigenvalue=3.039, CI=0.019, RI=0.580; CR=0.033<0.1, Consistency test successful It is assumed that the network layer has 10 sub factors, then the network layer subsystem factors weights table as shown in table 5. Integrated network layer, transport layer and physical layer and each layer of each sub factor weight calculation, see table 6. Table 5. Network layer subsystem factors calculated weight table Type x1 x2 x3 x4 x5 x6 x7 x8 x9 x10 Weight x1 1 1/3 1/3 1/2 1/2 1/5 1/5 1/5 1/3 1/ x /2 2 1/3 1/5 1/4 1/3 1/ x /3 1/2 1/4 1/3 1/ x /3 1/3 1/4 1/3 1/ x5 1 1/3 1/7 1/3 1/5 1/ x6 1 1/4 1/3 1/2 1/ x / x / x9 1 1/ x The largest eigenvalue=11.129, CI=0.125, RI=1.490; CR=0.084<0.1, Consistency test successful Table 6. Each layer of factors weight table Network Layer A1 A2 A3 A4 A5 A6 A7 A8 A9 A10 Weight of network Transport Layer B1 B2 B3 B4 B5 B6 B7 B8 B9 B10 Weight of Transport Physical Layer C1 C2 C3 C4 C5 C6 C7 C8 C9 C10 Weight of physical Conclusion Network security risk assessment is a complex system; the degree of risk is affected by many factors, so it s very complex to evaluate the network security level of risk. This paper established evaluation index system and evaluation method according to the network security risks involving several key aspects to determine the qualitative analysis includes the influence of human factors. Therefore, the index system and evaluation method in this study has some limitations on the extent of the network security risks. In addition, the risk evaluation of the different types of network and aspects are different. A risk assessment for different types of networks, in-depth analysis of the risk of the network reasons, establishes the evaluation index system according to the sources of risk. Fuzzy comprehensive evaluation method is suitable for multi-factor fuzzy relations to a comprehensive evaluation of the scientific method; it is also suitable for the evaluation of network security level of risk. In this study, network security risk assessment is only a preliminary study, and many aspects need to be further study. 5. References [1] Cui Xining, Cheng Yameng, "A Security Evaluation Method for MILS System Within The CC Framework", IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 11, pp. 54 ~ 65,

8 [2] Chao Yang, Yiwen Liang, Lin Lu,,Hongbin Dong,,Daihua Yang, "Research of Danger Theory Based on Balancing Mechanism", IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 2, pp. 1 ~ 6, 2012 [3] Yavatkar R, D. Pendarakis, R. Guerin, A Framework for Policy-based Admission Control, RFC 2753, [4] Qiang Zhao, Research of university network security, Science & Technology Information Shandong Economics Collage, vol. 3, pp , [5] J. Lee, D. Kim, S. Lee, J. Park, DDoS attacks detection using GA based optimized traffic matrix, in Innovative Mobile and Internet Services in Ubiquitous Computing, the 5th Int. Conf, pp , [6] Ming Yu, "A Nonparametric Adaptive Cusum Method And Its Application In Network Anomaly Detection", IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 1, pp. 280 ~ 288, 2012 [7] Dong Yan, Deng Guping, Value the network security of small and medium-sized enterprise, in Digital Communication World, vol. 3, [8] National computer network emergency response technical team/coordination center of china, 2009 Internet Security Survey Report in china. http: // March [9] G. Joya, Francisco Garcı a Lagos, Sandoval, Contingency evaluation and miniaturization using artificial neural network, Neural Comput Appl, vol.19 pp , [10] I. Genc, R. Diao, V. Vittal, S. Mandal, Decision tree-based preventive and corrective control applications for dynamic security enhancement in power systems, IEEE Trans. Power Syst., vol. 25 (3), pp , 2010 [11] Arunraj J. Maiti, Risk-based maintenance policy selection using AHP and goal programming, in Safety Science, vol. 48, pp , [12] A. A. Abou El Ela, M.A. Abido, S. R. Speaa, Differential evolution algorithm for emission constrained economic power dispatch problem Electr, Power Syst. Res, vol. 80, no. 10, pp , [13] J. Casasnovas, J.V. Riera, Extension of discrete t-norms and t-conorms to discrete fuzzy numbers, Fuzzy Sets Syst, vol. 167, no. 1, pp , [14] G. Feng, A survey on analysis and design of model-based fuzzy control systems, IEEE Transactions on Fuzzy Systems, vol. 14, no. 5, pp , 2006 [15] F. Lin, H. Ying, State-feedback control of fuzzy discrete-event systems, IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics, vol. 40, pp , [16] T. Allahviranloo, N. A. Kiani, N. Motamedi, Solving fuzzy differential equations by differential transformation method, Information Science, vol.179, pp , [17] J. Xu, Z. Liao, J.J.Nieto, A class of linear differential dynamical systems with fuzzy matrices, J Math Anal Appl, vol. 36, no. 8, pp ,

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain

A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain International Journal of Security and Its Applications, pp.81-88 http://dx.doi.org/10.1257/ijsia.201.8.6.08 A Hierarchical Information System Risk Evaluation Method Based on Asset Dependence Chain Xin

More information

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability 2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability Yuan Chunyang National Computer network

More information

Monitoring and Warning System for Information Technology (IT) Outsource Risk in Commercial Banks Based on Nested Theory of Excel Logical Function

Monitoring and Warning System for Information Technology (IT) Outsource Risk in Commercial Banks Based on Nested Theory of Excel Logical Function Advance Journal of Food Science and Technology 9(4): 302-307, 2015 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2015 Submitted: March 3, 2015 Accepted: March 14, 2015 Published:

More information

Research on supply chain risk evaluation based on the core enterprise-take the pharmaceutical industry for example

Research on supply chain risk evaluation based on the core enterprise-take the pharmaceutical industry for example Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):593-598 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on supply chain risk evaluation based on

More information

Study of Lightning Damage Risk Assessment Method for Power Grid

Study of Lightning Damage Risk Assessment Method for Power Grid Energy and Power Engineering, 2013, 5, 1478-1483 doi:10.4236/epe.2013.54b280 Published Online July 2013 (http://www.scirp.org/journal/epe) Study of Lightning Damage Risk Assessment Method for Power Grid

More information

Credit Risk Comprehensive Evaluation Method for Online Trading

Credit Risk Comprehensive Evaluation Method for Online Trading Credit Risk Comprehensive Evaluation Method for Online Trading Company 1 *1, Corresponding Author School of Economics and Management, Beijing Forestry University, fankun@bjfu.edu.cn Abstract A new comprehensive

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39. Research Article. Analysis of results of CET 4 & CET 6 Based on AHP Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):34-39 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Analysis of results of CET 4 & CET 6 Based on AHP

More information

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances Proceedings of the 8th WSEAS International Conference on Fuzzy Systems, Vancouver, British Columbia, Canada, June 19-21, 2007 126 An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November

More information

Design call center management system of e-commerce based on BP neural network and multifractal

Design call center management system of e-commerce based on BP neural network and multifractal Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(6):951-956 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Design call center management system of e-commerce

More information

Security evaluation model for the enterprise cloud services based on grey fuzzy AHP

Security evaluation model for the enterprise cloud services based on grey fuzzy AHP OMPUTER MODELLING & NEW TEHNOLOGIES 2014 18(10) 239-244 Yu Bengong Wang Liu Guo Fengyi Abstract evaluation model for the enterprise cloud services based on grey fuzzy AHP Yu Bengong 1 2 Wang Liu 1* Guo

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

Performance Appraisal System using Multifactorial Evaluation Model

Performance Appraisal System using Multifactorial Evaluation Model Performance Appraisal System using Multifactorial Evaluation Model C. C. Yee, and Y.Y.Chen Abstract Performance appraisal of employee is important in managing the human resource of an organization. With

More information

Fuzzy Comprehensive Evaluation Enterprise Performance Management

Fuzzy Comprehensive Evaluation Enterprise Performance Management Fuzzy Comprehensive Enterprise Performance Management Model Based on AHP Hunan Vocational College of Railway echnology,yuanjie2013@yeah.net, Zhuzhou, Hunan province, China Abstract Performance management

More information

Vendor Evaluation and Rating Using Analytical Hierarchy Process

Vendor Evaluation and Rating Using Analytical Hierarchy Process Vendor Evaluation and Rating Using Analytical Hierarchy Process Kurian John, Vinod Yeldho Baby, Georgekutty S.Mangalathu Abstract -Vendor evaluation is a system for recording and ranking the performance

More information

MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process

MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process MULTIPLE-OBJECTIVE DECISION MAKING TECHNIQUE Analytical Hierarchy Process Business Intelligence and Decision Making Professor Jason Chen The analytical hierarchy process (AHP) is a systematic procedure

More information

Fuzzy regression model with fuzzy input and output data for manpower forecasting

Fuzzy regression model with fuzzy input and output data for manpower forecasting Fuzzy Sets and Systems 9 (200) 205 23 www.elsevier.com/locate/fss Fuzzy regression model with fuzzy input and output data for manpower forecasting Hong Tau Lee, Sheu Hua Chen Department of Industrial Engineering

More information

Analysis of Appropriate Methods for Assessment of Safety in Aviation

Analysis of Appropriate Methods for Assessment of Safety in Aviation Analysis of Appropriate Methods for Assessment of Safety in Aviation Jakub Kraus ATM Systems Laboratory, Department of Air Transport, Faculty of Transportation Sciences, Czech Technical University Horská

More information

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional

More information

A Risk Management System Framework for New Product Development (NPD)

A Risk Management System Framework for New Product Development (NPD) 2011 International Conference on Economics and Finance Research IPEDR vol.4 (2011) (2011) IACSIT Press, Singapore A Risk Management System Framework for New Product Development (NPD) Seonmuk Park, Jongseong

More information

Towards applying Data Mining Techniques for Talent Mangement

Towards applying Data Mining Techniques for Talent Mangement 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Towards applying Data Mining Techniques for Talent Mangement Hamidah Jantan 1,

More information

Risk Assessment of Petroleum Pipelines using a combined Analytical Hierarchy Process - Fault Tree Analysis (AHP-FTA)

Risk Assessment of Petroleum Pipelines using a combined Analytical Hierarchy Process - Fault Tree Analysis (AHP-FTA) Risk Assessment of Petroleum Pipelines using a combined Analytical Hierarchy Process - Fault Tree Analysis (AHP-FTA) Alex. W. Dawotola, P.H.A.J.M van Gelder, J.K Vrijling Faculty of Civil Engineering and

More information

Using Analytic Hierarchy Process (AHP) Method to Prioritise Human Resources in Substitution Problem

Using Analytic Hierarchy Process (AHP) Method to Prioritise Human Resources in Substitution Problem Using Analytic Hierarchy Process (AHP) Method to Raymond Ho-Leung TSOI Software Quality Institute Griffith University *Email:hltsoi@hotmail.com Abstract In general, software project development is often

More information

Real-time Risk Assessment for Aids to Navigation Using Fuzzy-FSA on Three-Dimensional Simulation System

Real-time Risk Assessment for Aids to Navigation Using Fuzzy-FSA on Three-Dimensional Simulation System http://www.transnav.eu the International Journal on Marine Navigation and Safety of Sea Transportation Volume 8 Number 2 June 2014 DOI: 10.12716/1001.08.02.04 Real-time Risk Assessment for Aids to Navigation

More information

Study on Human Performance Reliability in Green Construction Engineering

Study on Human Performance Reliability in Green Construction Engineering Study on Human Performance Reliability in Green Construction Engineering Xiaoping Bai a, Cheng Qian b School of management, Xi an University of Architecture and Technology, Xi an 710055, China a xxpp8899@126.com,

More information

Price Prediction of Share Market using Artificial Neural Network (ANN)

Price Prediction of Share Market using Artificial Neural Network (ANN) Prediction of Share Market using Artificial Neural Network (ANN) Zabir Haider Khan Department of CSE, SUST, Sylhet, Bangladesh Tasnim Sharmin Alin Department of CSE, SUST, Sylhet, Bangladesh Md. Akter

More information

Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System

Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System Bandwidth based Distributed Denial of Service Attack Detection using Artificial Immune System 1 M.Yasodha, 2 S. Umarani 1 PG Scholar, Department of Information Technology, Maharaja Engineering College,

More information

Degree of Uncontrollable External Factors Impacting to NPD

Degree of Uncontrollable External Factors Impacting to NPD Degree of Uncontrollable External Factors Impacting to NPD Seonmuk Park, 1 Jongseong Kim, 1 Se Won Lee, 2 Hoo-Gon Choi 1, * 1 Department of Industrial Engineering Sungkyunkwan University, Suwon 440-746,

More information

Forecasting of Economic Quantities using Fuzzy Autoregressive Model and Fuzzy Neural Network

Forecasting of Economic Quantities using Fuzzy Autoregressive Model and Fuzzy Neural Network Forecasting of Economic Quantities using Fuzzy Autoregressive Model and Fuzzy Neural Network Dušan Marček 1 Abstract Most models for the time series of stock prices have centered on autoregressive (AR)

More information

Maintainability Estimation of Component Based Software Development Using Fuzzy AHP

Maintainability Estimation of Component Based Software Development Using Fuzzy AHP International journal of Emerging Trends in Science and Technology Maintainability Estimation of Component Based Software Development Using Fuzzy AHP Author Sengar Dipti School of Computing Science, Galgotias

More information

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course , pp.291-298 http://dx.doi.org/10.14257/ijmue.2015.10.9.30 The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course Xiaoyu Chen 1 and Lifang Qiao

More information

A Study of Design Measure for Minimizing Security Vulnerability in Developing Virtualization Software

A Study of Design Measure for Minimizing Security Vulnerability in Developing Virtualization Software A Study of Design Measure for Minimizing Security Vulnerability in Developing Virtualization Software 1 Mi Young Park, *2 Yang Mi Lim 1, First Author Science and Technology Policy Institute,ollive@stepi.re.kr

More information

The Security Evaluation of ATM Information System Based on Bayesian Regularization

The Security Evaluation of ATM Information System Based on Bayesian Regularization JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 1587 The Security Evaluation of ATM Information System Based on Bayesian Regularization Lan Ma School of Air Traffic Management, Civil Aviation University

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

Research on Trust Management Strategies in Cloud Computing Environment

Research on Trust Management Strategies in Cloud Computing Environment Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING

More information

PROBIT-METHOD FOR INFORMATION SECURITY RISK ASSESSMENT

PROBIT-METHOD FOR INFORMATION SECURITY RISK ASSESSMENT UDC 004.056.53 Mokhor V.V., Tsurkan V.V. Анотація: PROBIT-METHOD FOR INFORMATION SECURITY RISK ASSESSMENT Приведено обґрунтування постановки задачі розвитку методології кількісної оцінки ризиків безпеки

More information

The ABC Wind Power Station Construction Project Management Performance Study. 15356-Project Performance Improvement

The ABC Wind Power Station Construction Project Management Performance Study. 15356-Project Performance Improvement The ABC Wind Power Station Construction Management Performance Study 15356- Performance Improvement Yi Gao 11672096 16-06-2014 Abstract At the present, there are too many academic researches concentrated

More information

AN APPLICATION OF INTERVAL-VALUED INTUITIONISTIC FUZZY SETS FOR MEDICAL DIAGNOSIS OF HEADACHE. Received January 2010; revised May 2010

AN APPLICATION OF INTERVAL-VALUED INTUITIONISTIC FUZZY SETS FOR MEDICAL DIAGNOSIS OF HEADACHE. Received January 2010; revised May 2010 International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 5(B), May 2011 pp. 2755 2762 AN APPLICATION OF INTERVAL-VALUED INTUITIONISTIC

More information

Copula model estimation and test of inventory portfolio pledge rate

Copula model estimation and test of inventory portfolio pledge rate International Journal of Business and Economics Research 2014; 3(4): 150-154 Published online August 10, 2014 (http://www.sciencepublishinggroup.com/j/ijber) doi: 10.11648/j.ijber.20140304.12 ISS: 2328-7543

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

Contemporary Logistics. Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory

Contemporary Logistics. Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory Contemporary Logistics 11 2013) 1838-739X Contents lists available at SEI Contemporary Logistics journal homepage: www.seiofbluemountain.com Logistics Outsourcing Risks Evaluation Based on Rough Sets Theory

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique

A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information

Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information Journal of Computational Information Systems 9: 14 2013 5529 5534 Available at http://www.jofcis.com Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic

More information

Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches

Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Chinese Business Review, ISSN 1537-1506 December 2011, Vol. 10, No. 12, 1106-1110 D DAVID PUBLISHING Advantages and Disadvantages of Quantitative and Qualitative Information Risk Approaches Stroie Elena

More information

Efficient Algorithm for Predicting QOS in Cloud Services Sangeeta R. Alagi, Srinu Dharavath

Efficient Algorithm for Predicting QOS in Cloud Services Sangeeta R. Alagi, Srinu Dharavath Efficient Algorithm for Predicting QOS in Cloud Services Sangeeta R. Alagi, Srinu Dharavath Abstract Now a days, Cloud computing is becoming more popular research topic. Building high-quality cloud applications

More information

Development of Virtual Lab System through Application of Fuzzy Analytic Hierarchy Process

Development of Virtual Lab System through Application of Fuzzy Analytic Hierarchy Process Development of Virtual Lab System through Application of Fuzzy Analytic Hierarchy Process Chun Yong Chong, Sai Peck Lee, Teck Chaw Ling Faculty of Computer Science and Information Technology, University

More information

Measurement Information Model

Measurement Information Model mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides

More information

Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process

Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process Decision Making on Project Selection in High Education Sector Using the Analytic Hierarchy Process Nina Begičević University of Zagreb, Faculty of Organization and Informatics, Pavlinska 2, Varaždin nina.begicevic@foi.hr

More information

Research on Evaluation Architecture of Marketing Performance for E-Commerce Websites

Research on Evaluation Architecture of Marketing Performance for E-Commerce Websites Research on Evaluation Architecture of Marketing Performance for E-Commerce Yan Yang 1, Guangtian Zhou 2,, Feng Yang 2 1 School of Information Management, Heilongjiang University, Harbin 150080, yangyan9070@163com

More information

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 Combining various trust factors for e-commerce platforms using Analytic Hierarchy Process Bo Li a, Yu Zhang b,, Haoxue Wang c, Haixia Xia d, Yanfei Liu

More information

Financial Trading System using Combination of Textual and Numerical Data

Financial Trading System using Combination of Textual and Numerical Data Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,

More information

Application of ARCGIS and Analytical Hierarchy Process in the Risk Assessment of Geological Disaster in Complex Mountains

Application of ARCGIS and Analytical Hierarchy Process in the Risk Assessment of Geological Disaster in Complex Mountains Application of ARCGIS and Analytical Hierarchy Process in the Risk Assessment of Geological Disaster in Complex Mountains Li Li Lecturer Key Laboratory of Water Environment Evolution and Pollution Control

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

Chapter 4 SUPPLY CHAIN PERFORMANCE MEASUREMENT USING ANALYTIC HIERARCHY PROCESS METHODOLOGY

Chapter 4 SUPPLY CHAIN PERFORMANCE MEASUREMENT USING ANALYTIC HIERARCHY PROCESS METHODOLOGY Chapter 4 SUPPLY CHAIN PERFORMANCE MEASUREMENT USING ANALYTIC HIERARCHY PROCESS METHODOLOGY This chapter highlights on supply chain performance measurement using one of the renowned modelling technique

More information

Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process

Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process Performance Management for Inter-organization Information Systems Performance: Using the Balanced Scorecard and the Fuzzy Analytic Hierarchy Process Y. H. Liang Department of Information Management, I-SHOU

More information

U.P.B. Sci. Bull., Series C, Vol. 77, Iss. 1, 2015 ISSN 2286 3540

U.P.B. Sci. Bull., Series C, Vol. 77, Iss. 1, 2015 ISSN 2286 3540 U.P.B. Sci. Bull., Series C, Vol. 77, Iss. 1, 2015 ISSN 2286 3540 ENTERPRISE FINANCIAL DISTRESS PREDICTION BASED ON BACKWARD PROPAGATION NEURAL NETWORK: AN EMPIRICAL STUDY ON THE CHINESE LISTED EQUIPMENT

More information

Using the Analytic Hierarchy Process in Engineering Education*

Using the Analytic Hierarchy Process in Engineering Education* Int. J. Engng Ed. Vol. 14, No. 3, p. 191±196, 1998 0949-149X/91 $3.00+0.00 Printed in Great Britain. # 1998 TEMPUS Publications. Using the Analytic Hierarchy Process in Engineering Education* P. R. DRAKE

More information

Prediction of Stock Performance Using Analytical Techniques

Prediction of Stock Performance Using Analytical Techniques 136 JOURNAL OF EMERGING TECHNOLOGIES IN WEB INTELLIGENCE, VOL. 5, NO. 2, MAY 2013 Prediction of Stock Performance Using Analytical Techniques Carol Hargreaves Institute of Systems Science National University

More information

A FUZZY LOGIC APPROACH FOR SALES FORECASTING

A FUZZY LOGIC APPROACH FOR SALES FORECASTING A FUZZY LOGIC APPROACH FOR SALES FORECASTING ABSTRACT Sales forecasting proved to be very important in marketing where managers need to learn from historical data. Many methods have become available for

More information

INFORMATION SECURITY RISK ASSESSMENT: BAYESIAN PRIORITIZATION FOR AHP GROUP DECISION MAKING. Zeynep Filiz Eren-Dogu and Can Cengiz Celikoglu

INFORMATION SECURITY RISK ASSESSMENT: BAYESIAN PRIORITIZATION FOR AHP GROUP DECISION MAKING. Zeynep Filiz Eren-Dogu and Can Cengiz Celikoglu International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 11, November 2012 pp. 8019 8032 INFORMATION SECURITY RISK ASSESSMENT: BAYESIAN

More information

Technology, Douliu City, Yunlin 640, Taiwan

Technology, Douliu City, Yunlin 640, Taiwan Applied Mechanics and Materials Vol. 311 (2013) pp 398-403 Online available since 2013/Feb/27 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amm.311.398

More information

Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain

Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge Service Network System in Agile Supply Chain Send Orders for Reprints to reprints@benthamscience.ae 384 The Open Cybernetics & Systemics Journal, 2015, 9, 384-389 Open Access Study on the Evaluation for the Knowledge Sharing Efficiency of the Knowledge

More information

ERP SYSTEM SELECTION BY AHP METHOD: CASE STUDY FROM TURKEY

ERP SYSTEM SELECTION BY AHP METHOD: CASE STUDY FROM TURKEY ERP SYSTEM SELECTION BY AHP METHOD: CASE STUDY FROM TURKEY Babak Daneshvar Rouyendegh (Babek Erdebilli) Atılım University Department of Industrial Engineering P.O.Box 06836, İncek, Ankara, Turkey E-mail:

More information

Knowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety

Knowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety , pp. 381-388 http://dx.doi.org/10.14257/ijunesst.2014.7.6.33 Knowledge Acquisition Approach Based on Rough Set in Online Aided ecision System for Food Processing Quality and Safety Liu Peng, Liu Wen,

More information

Health Policy and Administration PhD Track in Health Services and Policy Research

Health Policy and Administration PhD Track in Health Services and Policy Research Health Policy and Administration PhD Track in Health Services and Policy INTRODUCTION The Health Policy and Administration (HPA) Division of the UIC School of Public Health offers a PhD track in Health

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Effective Data Mining Using Neural Networks

Effective Data Mining Using Neural Networks IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 8, NO. 6, DECEMBER 1996 957 Effective Data Mining Using Neural Networks Hongjun Lu, Member, IEEE Computer Society, Rudy Setiono, and Huan Liu,

More information

Overseas Investment in Oil Industry and the Risk Management System

Overseas Investment in Oil Industry and the Risk Management System Overseas Investment in Oil Industry and the Risk Management System XI Weidong, JIN Qingfen Northeast Electric Power University, China, 132012 jelinc@163.com Abstract: Based on risk management content,

More information

Optimization of PID parameters with an improved simplex PSO

Optimization of PID parameters with an improved simplex PSO Li et al. Journal of Inequalities and Applications (2015) 2015:325 DOI 10.1186/s13660-015-0785-2 R E S E A R C H Open Access Optimization of PID parameters with an improved simplex PSO Ji-min Li 1, Yeong-Cheng

More information

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet

More information

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Journal of Computational Information Systems 10: 17 (2014) 7629 7635 Available at http://www.jofcis.com A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Tian

More information

Statistics Graduate Courses

Statistics Graduate Courses Statistics Graduate Courses STAT 7002--Topics in Statistics-Biological/Physical/Mathematics (cr.arr.).organized study of selected topics. Subjects and earnable credit may vary from semester to semester.

More information

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network , pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and

More information

A Novel User-Preference-Driven Service Selection Strategy in Cloud

A Novel User-Preference-Driven Service Selection Strategy in Cloud A Novel User-Preference-Driven Service Selection Strategy in Cloud Computing *1 Yanbing Liu, 2 Mengyuan Li, 3 Qiong Wang *1,Corresponding Author,2 College of Computer Science and Technology, Chongqing

More information

A Solution for Data Inconsistency in Data Integration *

A Solution for Data Inconsistency in Data Integration * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 681-695 (2011) A Solution for Data Inconsistency in Data Integration * Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai,

More information

A Multi-attribute Decision Making Approach for Resource Allocation in Software Projects

A Multi-attribute Decision Making Approach for Resource Allocation in Software Projects A Multi-attribute Decision Making Approach for Resource Allocation in Software Projects A. Ejnioui, C. E. Otero, and L. D. Otero 2 Information Technology, University of South Florida Lakeland, Lakeland,

More information

Research on Credibility Measurement Method of Data In Big Data

Research on Credibility Measurement Method of Data In Big Data Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 4, July 2016 Research on Credibility Measurement Method of Data In Big Data

More information

Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model

Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model 1, 2 1 International School of Software, Wuhan University, Wuhan, China *2 School of Information

More information

Security of Information in University Elearning Systems

Security of Information in University Elearning Systems JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 7-18 Security of Information in University Elearning Systems Rafał Grzybowski Technical University of Łódź Institute of Information Technology

More information

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Vol.8, No.3 (2014), pp.175-180 http://dx.doi.org/10.14257/ijsh.2014.8.3.16 A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Hong-Kyu Kwon 1 and Kwang-Kyu Seo 2* 1 Department

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net

International Journal of Software and Web Sciences (IJSWS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Evaluation of Universities Websites in Chennai city, India Using Analytical Hierarchy Process

Evaluation of Universities Websites in Chennai city, India Using Analytical Hierarchy Process International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) - 2016 Evaluation of Universities Websites in Chennai city, India Using Analytical Hierarchy Process Febronica

More information

Risk Management for IT Security: When Theory Meets Practice

Risk Management for IT Security: When Theory Meets Practice Risk Management for IT Security: When Theory Meets Practice Anil Kumar Chorppath Technical University of Munich Munich, Germany Email: anil.chorppath@tum.de Tansu Alpcan The University of Melbourne Melbourne,

More information

The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model

The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model Journal of Information & Computational Science 7: 12 (2010) 2403 2409 Available at http://www.joics.com The Planning Method for Disaster Recovery Program of Digital Business Based on HSM-III Model Shenghui

More information

Case Study on Improving Quality Management of W Company s New Product Development Project *

Case Study on Improving Quality Management of W Company s New Product Development Project * Technology and Investment, 2013, 4, 153-163 http://dx.doi.org/10.4236/ti.2013.43018 Published Online August 2013 (http://www.scirp.org/journal/ti) Case Study on Improving Quality Management of W Company

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

THE SELECTION OF RETURNS FOR AUDIT BY THE IRS. John P. Hiniker, Internal Revenue Service

THE SELECTION OF RETURNS FOR AUDIT BY THE IRS. John P. Hiniker, Internal Revenue Service THE SELECTION OF RETURNS FOR AUDIT BY THE IRS John P. Hiniker, Internal Revenue Service BACKGROUND The Internal Revenue Service, hereafter referred to as the IRS, is responsible for administering the Internal

More information

Applications of improved grey prediction model for power demand forecasting

Applications of improved grey prediction model for power demand forecasting Energy Conversion and Management 44 (2003) 2241 2249 www.elsevier.com/locate/enconman Applications of improved grey prediction model for power demand forecasting Che-Chiang Hsu a, *, Chia-Yon Chen b a

More information

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method School of Management Shanghai University, Shanghai Baoshan 200072 School of Foreign Yiwu Industrial & Commercial

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):616-621. Research Article. Study on audit of corporate financial risk based on FMEA method

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):616-621. Research Article. Study on audit of corporate financial risk based on FMEA method Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):616-621 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Study on audit of corporate financial risk based

More information

DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN. April 2009 SLAC I 050 07010 002

DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN. April 2009 SLAC I 050 07010 002 DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN April 2009 SLAC I 050 07010 002 Risk Management Plan Contents 1.0 INTRODUCTION... 1 1.1 Scope... 1 2.0 MANAGEMENT

More information

Analysis of Mobile Phone Reliability Based on Active Disassembly Using Smart Materials *

Analysis of Mobile Phone Reliability Based on Active Disassembly Using Smart Materials * Journal of Surface Engineered Materials and Advanced Technology, 2011, 1, 80-87 doi:10.4236/jsemat.2011.12012 Published Online July 2011 (http://www.scirp.org/journal/jsemat) Analysis of Mobile Phone Reliability

More information

Evaluating Insurers Enterprise Risk Management Practice

Evaluating Insurers Enterprise Risk Management Practice Evaluating Insurers Enterprise Risk Management Practice Li Cheng, CFA, FRM, FSA Director Financial Services Ratings October 3, 2013 Permission to reprint or distribute any content from this presentation

More information

4. GPCRs PREDICTION USING GREY INCIDENCE DEGREE MEASURE AND PRINCIPAL COMPONENT ANALYIS

4. GPCRs PREDICTION USING GREY INCIDENCE DEGREE MEASURE AND PRINCIPAL COMPONENT ANALYIS 4. GPCRs PREDICTION USING GREY INCIDENCE DEGREE MEASURE AND PRINCIPAL COMPONENT ANALYIS The GPCRs sequences are made up of amino acid polypeptide chains. We can also call them sub units. The number and

More information

How to do AHP analysis in Excel

How to do AHP analysis in Excel How to do AHP analysis in Excel Khwanruthai BUNRUAMKAEW (D) Division of Spatial Information Science Graduate School of Life and Environmental Sciences University of Tsukuba ( March 1 st, 01) The Analytical

More information

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information