Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information
|
|
- Darcy Rice
- 8 years ago
- Views:
Transcription
1 Journal of Computational Information Systems 9: Available at Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information Jiehui JU 1, Fuwei FAN 2,, Jiyi WU 3 1 Zhejiang University of Science & Technology, Hangzhou , China 2 Lishui Radio and Television University, Lishui , China 3 Key Lab of E-Business and Information Security, Hangzhou Normal University, Hangzhou , China Abstract In this paper, we investigate the multiple attribute decision making problems to evaluate the key technology for P2P network route security with 2-tuple linguistic information. We extended the TOPSIS model to solve the evaluation problems of key technology for P2P network route security with 2-tuple linguistic information. According to the traditional ideas of TOPSIS, the optimal alternatives is determined by calculating the shortest distance from the 2-tuple linguistic positive ideal solution TLPIS and on the other side the farthest distance of the 2-tuple linguistic negative ideal solution TLNIS. It is based on the concept that the optimal alternative should have the shortest distance from the positive ideal solution and on the other side the farthest distance of the negative ideal solution. The method has exact characteristic in linguistic information processing. It avoided information distortion and losing which occur formerly in the linguistic information processing. Finally, a numerical example with the key technology for P2P network route security evaluation is used to illustrate the applicability and effectiveness of the proposed model. Keywords: Multiple Attribute Decision Making; TOPSIS Model; 2-Tuple; P2P Network Route Security 1 Introduction As the process of human economy and social intellectualization speeding up, knowledge has become the most important resources in modern society [1-6]. Enterprises operation pattern has shifted from product-oriented to development of human capital and intellectual resources, how to effectively manage and apply the knowledge resources, integrate the existing knowledge and get access to new knowledge, has become the key point to gain the competitive advantage [7-10]. The evaluation of knowledge management is the beginning of effective knowledge management and throughout the process of knowledge management. Whether to evaluate the effective knowledge Corresponding author. addresses: @qq.com Jiehui JU, @qq.com Fuwei FAN / Copyright 2013 Binary Information Press DOI: /jcis6331 July 15, 2013
2 5530 J. Ju et al. /Journal of Computational Information Systems 9: management, continual feeding back and improve in the process of knowledge management based on the assessment result, immediately have an influence on efficiency and effect of enterprise knowledge management implementation [11-15]. The aim of this paper is to develop a TOPSIS model for key technology for P2P network route security evaluation with 2-tuple linguistic information. The remainder of this paper is set out as follows. In the next section, we introduce the basic concepts of traditional TOPSIS model. In Section 3 we utilize the TOPSIS model to solve the key technology for P2P network route security evaluation with 2-tuple linguistic information. In Section 4, we give an illustrative example to verify the developed approach and to demonstrate its feasibility and practicality. In Section 5 we conclude the paper and give some remarks. 2 Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information Let A = {A 1, A 2,, A m } be a discrete set of alternatives, and G = {G 1, G 2,, G n } be the set of attributes, w = w 1, w 2,, w n is the weighting vector of the attributes G j j = 1, 2,, n, where w j [0, 1], n j=1 w j = 1. Suppose that R = r ij m n is the decision matrix, where r ij S is a preference value, which takes the form of linguistic variables, for the alternative A i A with respect to the attribute G j G. In the following, we will extend the TOPSIS method [8, 9], to solve multiple attribute decision making problems to deal with evaluation model of key technology for P2P network route security evaluation with 2-tuple linguistic information. Step 1 Transforming linguistic decision matrix R = r ij m n matrix R = r ij, 0 m n. into 2-tuple linguistic decision Step 2 Defining the TLPIS and TLNIS as where r j, a j r, a = r 1, a 1, r 2, a 2,, r n, a n r, a = r1, a 1, r 2, a 2,, r n, a n = max {r ij, a ij }, j = 1, 2,, n. r j, a j = min {r ij, a ij }, j = 1, 2,, n. i i 1 2 Step 3 Calculating the distances of each alternative from TLPIS and TLNIS using the following equation, respectively: i, η i = n j=1 1 r ij, a ij 1 r j, a j wj 3 i, η i = n j=1 1 r ij, a ij 1 r j, a j wj 4
3 J. Ju et al. /Journal of Computational Information Systems 9: Step 4 Calculating the relative closeness degree of each alternative from TLPIS using the following equation 1 i i, η i =, η i 1 i, η i 1 i, η i, i = 1, 2,, m. 5 Step 5 According to the relative closeness degree i, η i, the ranking order of all alternatives can be determined. If any alternative has the highest i, η i value, then, it is the most desirable alternative. 3 Illustrative Example In the following, we present an illustrative example of the new approach in a decision making problem about key technology for P2P network route security evaluation. Suppose a company plans to evaluate the key technology for P2P network route security. There is a panel with five possible P2P network route systems A i i = 1, 2, 3, 4, 5 to select. The company selects four attribute to evaluate the five possible P2P network route systems: 1 G 1 is the tactics; 2 G 2 is the technology; 3 G 3 is the economy; 4 G 4 is the logistics and strategy. The five possible P2P network route systems A i i = 1, 2,, 5 are to be evaluated using the linguistic term set S = {s 0 = extremely poorep, s 1 = very poorv P, s 2 = poorp, s 3 = mediumm, s 4 = goodg, s 5 = very goodv G, s 6 = extremely goodeg} by the decision makers under the above four attributes, as listed in the following matrix: R = A 1 A 2 A 3 A 4 A 5 G 1 G 2 G 3 G 4 s 4 s 6 s 5 s 5 s 2 s 3 s 4 s 3 s 3 s 5 s 3 s 4 s 5 s 4 s 5 s 2 s 4 s 3 s 1 s 3 And W T = 0.2, 0.4, 0.1, 0.3 is the weighting vector of the attributes G j j = 1, 2, 3, 4. In the following, we shall utilize the proposed approach in this paper getting the most desirable P2P network route systems: Step 1 Transforming linguistic decision matrix R = r ij m n into 2-tuple linguistic decision
4 5532 J. Ju et al. /Journal of Computational Information Systems 9: matrix R = r ij, 0 m n. R = A 1 A 2 A 3 A 4 A 5 G 1 G 2 G 3 G 4 s 4, 0 s 6, 0 s 5, 0 s 5, 0 s 2, 0 s 3, 0 s 4, 0 s 3, 0 s 3, 0 s 5, 0 s 3, 0 s 4, 0 s 5, 0 s 4, 0 s 5, 0 s 2, 0 s 4, 0 s 3, 0 s 1, 0 s 3, 0 Step 2 Defining the TLPIS and TLNIS as r, a = s 5, 0, s 6, 0, s 5, 0, s 5, 0 T r, a = s 2, 0, s 3, 0, s 1, 0, s 2, 0 T Step 3 Calculating the distances of each P2P network route systems from TLPIS and TLNIS 1, η 1 = s2, 0.13, 2, η 2 = s1, , η 3 = s2, 0.26, 4, η 4 = s2, , η 5 = s2, 0.12, 1, η1 = s2, , η2 = s3, 0.43, 3, η3 = s2, , η4 = s2, 0.31, 5, η5 = s2, 0.37 Step 4 Calculating the relative closeness degree of each P2P network route systems from TLPIS 1, η 1 = s 0, 0.25, 2, η 2 = s 1, , η 3 = s 0, 0.46, 4, η 4 = s 1, , η 5 = s 1, 0.37 Step 5 Ranking all the P2P network route systems A i i = 1, 2,, 5 in accordance with the relative closeness degree i, η i : A 2 A 4 A 5 A 3 A 1, and thus the most desirable P2P network route systems is A 2. 4 Conclusions In this paper, we investigate the multiple attribute decision making problems to deal with evaluation model of key technology for P2P network route security evaluation with 2-tuple linguistic information. We extended the TOPSIS model to solve the evaluation problems of key technology for P2P network route security evaluation with 2-tuple linguistic information. According to the traditional ideas of TOPSIS, the optimal alternatives is determined by calculating the shortest distance from the 2-tuple linguistic positive ideal solution TLPIS and on the other side the farthest distance of the 2-tuple linguistic negative ideal solution TLNIS. It is based on the concept
5 J. Ju et al. /Journal of Computational Information Systems 9: that the optimal alternative should have the shortest distance from the positive ideal solution and on the other side the farthest distance of the negative ideal solution. The method has exact characteristic in linguistic information processing. It avoided information distortion and losing which occur formerly in the linguistic information processing. Finally, a numerical example with key technology for P2P network route security evaluation is used to illustrate the applicability and effectiveness of the proposed model. References [1] Xiaoyue Liu, Yanbing Ju, Aihua Wang, A Multiple Attribute Group Decision Making Method with its Application to Emergency Alternative Assessment, JCIT: Journal of Convergence Information Technology, Vol. 7, No. 2, pp , [2] Ming Li, Yanjing Zhang, The OWA-VIKOR method for multiple attributive group decision making in 2-tuple linguistic setting, JCIT: Journal of Convergence Information Technology, Vol. 7, No. 2, pp , [3] Rui Lin, Xiaofei Zhao, Hongjun Wang, Guiwu Wei, Model for Potential Evaluation of Emerging Technology Commercialization with Hesitant Fuzzy Information, IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 1, pp , [4] Xiaorong Wang, Zhanhong Gao, Xiaofei Zhao, Guiwu Wei, Model for Evaluating the Government Archives Website s Construction Based on the GHFHWD Measure with Hesitant Fuzzy Information, JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 5, No. 12, pp , [5] Xia Wang, Likun Peng, TOPSIS Method for Performance Appraisal in Liquor Industry Based on Economic Value Added, IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 2, pp , [6] Ying Wang, An Approach to Software Selection with Triangular Intuitionistic Fuzzy Information, IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 2, pp , [7] Hongxia Ruan, Xingrong Yan, Grey Relational Analysis Model for Evaluating the Enterprise s Financial Management, IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 2, pp , [8] F. Herrera and L. Nartinez, A 2-tuple fuzzy linguistic representation model for computing with words, IEEE Transactions on Fuzzy Systems, Vol.8, No.6, pp , [9] F. Herrera and L. Martinez, A model based on linguistic 2-tuples for dealing with multigranularity hierarchical linguistic contexts in multiexpert decision-making, IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics, Vol.31, No. 2, pp , [10] E. Herrera-Viedma, Modeling the retrieval process for an information retrieval system using an ordinal fuzzy linguistic approach, Journal of the American Society for Information Science and Technology, Vol. 52, No. 6, pp , [11] E. Herrera-Viedma, and A. G. Lopez-Herrera, A Review on Information Accessing Systems Based on Fuzzy Linguistic Modelling, International Journal of Computational Intelligence Systems, Vol. 3, No. 4, pp , [12] E. Herrera-Viedma, A. G. Lopez-Herrera, M. Luque et al., A fuzzy linguistic IRS model based on a 2-tuple fuzzy linguistic approach, International Journal of Uncertainty Fuzziness and Knowledge- Based Systems, Vol. 15, No. 2, pp , 2007.
6 5534 J. Ju et al. /Journal of Computational Information Systems 9: [13] Guiwu Wei, Some generalized aggregating operators with linguistic information and their application to multiple attribute group decision making, Computers & Industrial Engineering, Vol. 61, No. 1, pp , [14] Guiwu Wei, GRA method for multiple attribute decision making with incomplete weight information in intuitionistic fuzzy setting, Knowledge-Based Systems, Vol. 23, No. 3, pp , [15] Guiwu Wei, A method for multiple attribute group decision making based on the ET-WG and ET-OWG operators with 2-tuple linguistic information, Expert Systems with Applications, Vol. 37, No. 12, pp , 2010.
Cell Phone Evaluation Base on Entropy and TOPSIS
Cell Phone Evaluation Base on Entropy and TOPSIS Tetteh Akyene Glorious Sun School of Business and Management Donghua University, 1882 Yan an Road West, Shanghai 200051, P. R. China Email: 411015@mail.dhu.edu.cn
More informationA Multi-granular Linguistic Model to Evaluate the Suitability of Installing an ERP System
Mathware & Soft Computing 12 (2005) 217-233 A Multi-granular Linguistic Model to Evaluate the Suitability of Installing an ERP System P.J. Sánchez, L.G. Pérez, F. Mata and A.G. López-Herrera, Dept. of
More informationThe Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method
The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method School of Management Shanghai University, Shanghai Baoshan 200072 School of Foreign Yiwu Industrial & Commercial
More informationCredit Risk Comprehensive Evaluation Method for Online Trading
Credit Risk Comprehensive Evaluation Method for Online Trading Company 1 *1, Corresponding Author School of Economics and Management, Beijing Forestry University, fankun@bjfu.edu.cn Abstract A new comprehensive
More informationPerformance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model
Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model 1, 2 1 International School of Software, Wuhan University, Wuhan, China *2 School of Information
More informationAnalysis of China Motor Vehicle Insurance Business Trends
Analysis of China Motor Vehicle Insurance Business Trends 1 Xiaohui WU, 2 Zheng Zhang, 3 Lei Liu, 4 Lanlan Zhang 1, First Autho University of International Business and Economic, Beijing, wuxiaohui@iachina.cn
More informationLinguistic Preference Modeling: Foundation Models and New Trends. Extended Abstract
Linguistic Preference Modeling: Foundation Models and New Trends F. Herrera, E. Herrera-Viedma Dept. of Computer Science and Artificial Intelligence University of Granada, 18071 - Granada, Spain e-mail:
More informationResearch of The Requirement of Labor Market Management System of
Research of The Requirement of Labor Market Management System of Qinhuangdao 1 Xu Zhikun, 2 Gao Yabin, 3 Xiao Yan, 4 Bao YanYu 1, First and Corresponding Author College of Finance, Hebei Normal University
More informationThe Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course
, pp.291-298 http://dx.doi.org/10.14257/ijmue.2015.10.9.30 The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course Xiaoyu Chen 1 and Lifang Qiao
More informationTasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing
Journal of Computational Information Systems 11: 16 (2015) 6037 6045 Available at http://www.jofcis.com Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing Renfeng LIU 1, Lijun
More informationA Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service
Vol.8, No.3 (2014), pp.175-180 http://dx.doi.org/10.14257/ijsh.2014.8.3.16 A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service Hong-Kyu Kwon 1 and Kwang-Kyu Seo 2* 1 Department
More informationA New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms
Research Journal of Applied Sciences, Engineering and Technology 5(12): 3417-3422, 213 ISSN: 24-7459; e-issn: 24-7467 Maxwell Scientific Organization, 213 Submitted: October 17, 212 Accepted: November
More informationOptimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time
Tamsui Oxford Journal of Management Sciences, Vol. 0, No. (-6) Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time Chih-Hsun Hsieh (Received September 9, 00; Revised October,
More informationResearch on Trust Management Strategies in Cloud Computing Environment
Journal of Computational Information Systems 8: 4 (2012) 1757 1763 Available at http://www.jofcis.com Research on Trust Management Strategies in Cloud Computing Environment Wenjuan LI 1,2,, Lingdi PING
More informationAN EVALUATION METHOD FOR ENTERPRISE RESOURCE PLANNING SYSTEMS
Journal of the Operations Research Society of Japan 2008, Vol. 51, No. 4, 299-309 AN EVALUATION METHOD FOR ENTERPRISE RESOURCE PLANNING SYSTEMS Shin-Guang Chen Tungnan University Yi-Kuei Lin National Taiwan
More informationNatural Language Querying for Content Based Image Retrieval System
Natural Language Querying for Content Based Image Retrieval System Sreena P. H. 1, David Solomon George 2 M.Tech Student, Department of ECE, Rajiv Gandhi Institute of Technology, Kottayam, India 1, Asst.
More informationPerformance Appraisal System using Multifactorial Evaluation Model
Performance Appraisal System using Multifactorial Evaluation Model C. C. Yee, and Y.Y.Chen Abstract Performance appraisal of employee is important in managing the human resource of an organization. With
More informationApplication of the Multi Criteria Decision Making Methods for Project Selection
Universal Journal of Management 3(1): 15-20, 2015 DOI: 10.13189/ujm.2015.030103 http://www.hrpub.org Application of the Multi Criteria Decision Making Methods for Project Selection Prapawan Pangsri Faculty
More informationAlternative Selection for Green Supply Chain Management: A Fuzzy TOPSIS Approach
Alternative Selection for Green Supply Chain Management: A Fuzzy TOPSIS Approach Mohit Tyagi #, Pradeep Kumar, and Dinesh Kumar # mohitmied@gmail.com,kumarfme@iitr.ernet.in, dinesfme@iitr.ernet.in MIED,
More informationKNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 22/2013, ISSN 1642-6037 medical diagnosis, ontology, subjective intelligence, reasoning, fuzzy rules Hamido FUJITA 1 KNOWLEDGE-BASED IN MEDICAL DECISION
More informationAn Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
ROMANIAN JOURNAL OF INFORMATION SCIENCE AND TECHNOLOGY Volume 16, Number 4, 2013, 324 335 An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography
More informationThe Compound Operations of Uncertain Cloud Concepts
Journal of Computational Information Systems 11: 13 (2015) 4881 4888 Available at http://www.jofcis.com The Compound Operations of Uncertain Cloud Concepts Longjun YIN 1,, Junjie XU 1, Guansheng ZHANG
More information1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014
1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 Combining various trust factors for e-commerce platforms using Analytic Hierarchy Process Bo Li a, Yu Zhang b,, Haoxue Wang c, Haixia Xia d, Yanfei Liu
More informationEFFICIENCY EVALUATION IN TIME MANAGEMENT FOR SCHOOL ADMINISTRATION WITH FUZZY DATA
International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 8, August 2012 pp. 5787 5795 EFFICIENCY EVALUATION IN TIME MANAGEMENT FOR
More informationResearch Article A Hybrid Program Projects Selection Model for Nonprofit TV Stations
Mathematical Problems in Engineering Volume 2015, Article ID 368212, 10 pages http://dx.doi.org/10.1155/2015/368212 Research Article A Hybrid Program Projects Selection Model for Nonprofit TV Stations
More informationCapability Service Management System for Manufacturing Equipments in
Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan
More informationA Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM
Journal of Computational Information Systems 10: 17 (2014) 7629 7635 Available at http://www.jofcis.com A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM Tian
More informationA Network Simulation Experiment of WAN Based on OPNET
A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2
More informationDemand Forecasting Optimization in Supply Chain
2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V52.12 Demand Forecasting Optimization
More informationAnalysis of Mobile Phone Reliability Based on Active Disassembly Using Smart Materials *
Journal of Surface Engineered Materials and Advanced Technology, 2011, 1, 80-87 doi:10.4236/jsemat.2011.12012 Published Online July 2011 (http://www.scirp.org/journal/jsemat) Analysis of Mobile Phone Reliability
More informationAn Improved PROMETHEE Method Applied in Enterprise's Financial Performance Measurement
An Improved PROMETHEE Method Applied in Enterprise's Financial Performance Measurement ZHANG Wei, Zhou Xia School of Business Administration, South China University of Technology, P.R.China, 510640 Abstract:
More informationSecurity evaluation model for the enterprise cloud services based on grey fuzzy AHP
OMPUTER MODELLING & NEW TEHNOLOGIES 2014 18(10) 239-244 Yu Bengong Wang Liu Guo Fengyi Abstract evaluation model for the enterprise cloud services based on grey fuzzy AHP Yu Bengong 1 2 Wang Liu 1* Guo
More informationOptimization under fuzzy if-then rules
Optimization under fuzzy if-then rules Christer Carlsson christer.carlsson@abo.fi Robert Fullér rfuller@abo.fi Abstract The aim of this paper is to introduce a novel statement of fuzzy mathematical programming
More informationFactors to be Considered When to Design Software Development Plan Yu Gao 1, a, Xiangzhong Feng 2,b
Advanced Engineering Forum Vols. 6-7 (2012) pp 3-8 Online: 2012-09-26 (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/aef.6-7.3 Factors to be Considered When to Design Software
More informationDesign of Fuzzy Drip Irrigation Control System Based on ZigBee Wireless Sensor Network
Design of Fuzzy Drip Irrigation Control System Based on ZigBee Wireless Sensor Network Xinjian Xiang College of Automation & Electrical Engineering, Zhejiang University of Science and Technology, Zhejiang,
More information4. GPCRs PREDICTION USING GREY INCIDENCE DEGREE MEASURE AND PRINCIPAL COMPONENT ANALYIS
4. GPCRs PREDICTION USING GREY INCIDENCE DEGREE MEASURE AND PRINCIPAL COMPONENT ANALYIS The GPCRs sequences are made up of amino acid polypeptide chains. We can also call them sub units. The number and
More informationMulti-layer Structure of Data Center Based on Steiner Triple System
Journal of Computational Information Systems 9: 11 (2013) 4371 4378 Available at http://www.jofcis.com Multi-layer Structure of Data Center Based on Steiner Triple System Jianfei ZHANG 1, Zhiyi FANG 1,
More informationSoft Computing in Economics and Finance
Ludmila Dymowa Soft Computing in Economics and Finance 4y Springer 1 Introduction 1 References 5 i 2 Applications of Modern Mathematics in Economics and Finance 7 2.1 Fuzzy'Set Theory and Applied Interval
More informationen fi lm af Zhang Yang instruktøren bag den kinesiske fi lmperle Badeanstalten Premiere 31. oktober
produced by Harvey Wong, Liu Qiang producer Stanley Tong co-producer Michael J. Werner, Wouter Barendrecht producer Er Yong, Zhang Yang screenplay by Zhang Yang, Wang Yao director Zhang Yang Line producer
More informationGenetic Algorithm Based Interconnection Network Topology Optimization Analysis
Genetic Algorithm Based Interconnection Network Topology Optimization Analysis 1 WANG Peng, 2 Wang XueFei, 3 Wu YaMing 1,3 College of Information Engineering, Suihua University, Suihua Heilongjiang, 152061
More informationA 360-Degree Performance Appraisal Model Dealing with Heterogeneous Information and Dependent Criteria
A 360-Degree Performance Appraisal Model Dealing with Heterogeneous Information and Dependent Criteria M. Espinilla, R. de Andrés, F.J. Martínez, and L. Martínez Department of Computer Sciences, University
More informationTechnology, Douliu City, Yunlin 640, Taiwan
Applied Mechanics and Materials Vol. 311 (2013) pp 398-403 Online available since 2013/Feb/27 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amm.311.398
More informationAn Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances
Proceedings of the 8th WSEAS International Conference on Fuzzy Systems, Vancouver, British Columbia, Canada, June 19-21, 2007 126 An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy
More informationStudy of the Decision-Making Model of Outsourcing Service Provider Selection
Study of the Decision-Making Model of Outsourcing Service Provider Selection En-lin Li Post-doctoral Research Working Station of North-east Asia Outsourcing Research Center, Harbin University of Commerce,
More informationGrey and Fuzzy Evaluation of Information System Disaster Recovery Capability
2nd International Conference on Advances in Computer Science and Engineering (CSE 2013) Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability Yuan Chunyang National Computer network
More informationSome Research Problems in Uncertainty Theory
Journal of Uncertain Systems Vol.3, No.1, pp.3-10, 2009 Online at: www.jus.org.uk Some Research Problems in Uncertainty Theory aoding Liu Uncertainty Theory Laboratory, Department of Mathematical Sciences
More informationE-learning in China Qiyun Wang National Institute of Education, Nanyang Technological University, Singapore
The current issue and full text archive of this journal is available at www.emeraldinsight.com/1065-0741.htm GUEST EDITORIAL Qiyun Wang National Institute of Education, Nanyang Technological University,
More informationNetwork Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks
www.ijcsi.org 400 Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks K.Savitha 1, DR.C.Chandrasekar 2 1 Research Scholar, Periyar University Salem,
More informationIDENTIFYING THE FACTORS AFFECTING ENTERPRISE RESOURCE PLANNING (ERP) SUCCESS USING FUZZY TOPSIS TECHNIQUE
IDENTIFYING THE FACTORS AFFECTING ENTERPRISE RESOURCE PLANNING (ERP) SUCCESS USING FUZZY TOPSIS TECHNIQUE Gh. Enayati R., *Pourabbas Khadar S. and Ahoei A.R. Department of Management Science, Islamic Azad
More informationThe Security Evaluation of ATM Information System Based on Bayesian Regularization
JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 1587 The Security Evaluation of ATM Information System Based on Bayesian Regularization Lan Ma School of Air Traffic Management, Civil Aviation University
More informationComparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks
Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks Enrique Stevens-Navarro and Vincent W.S. Wong Department of Electrical and Computer Engineering The University
More informationA Novel User-Preference-Driven Service Selection Strategy in Cloud
A Novel User-Preference-Driven Service Selection Strategy in Cloud Computing *1 Yanbing Liu, 2 Mengyuan Li, 3 Qiong Wang *1,Corresponding Author,2 College of Computer Science and Technology, Chongqing
More informationMaintainability Estimation of Component Based Software Development Using Fuzzy AHP
International journal of Emerging Trends in Science and Technology Maintainability Estimation of Component Based Software Development Using Fuzzy AHP Author Sengar Dipti School of Computing Science, Galgotias
More informationImproved PSO-based Task Scheduling Algorithm in Cloud Computing
Journal of Information & Computational Science 9: 13 (2012) 3821 3829 Available at http://www.joics.com Improved PSO-based Tas Scheduling Algorithm in Cloud Computing Shaobin Zhan, Hongying Huo Shenzhen
More informationDesign and Implementation of the Self-Management Travel System
Design and Implementation of the Self-Management Travel System Dongbei University of Finance and Economics School of Tourism and Hotel Management,Dalian, China 116025 Abstract Through skeleton system,
More informationHow To Calculate Tunnel Longitudinal Structure
Calculation and Analysis of Tunnel Longitudinal Structure under Effect of Uneven Settlement of Weak Layer 1,2 Li Zhong, 2Chen Si-yang, 3Yan Pei-wu, 1Zhu Yan-peng School of Civil Engineering, Lanzhou University
More informationFUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
More informationReverse Logistics Network in Uncertain Environment
NFORMATON Volume 15, Number 12, pp.380-385 SSN 1343-4500 c 2012 nternational nformation nstitute Reverse Logistics Network in Uncertain Environment ianjun Liu, Yufu Ning, Xuedou Yu Department of Computer
More informationA Novel Feature Selection Method Based on an Integrated Data Envelopment Analysis and Entropy Mode
A Novel Feature Selection Method Based on an Integrated Data Envelopment Analysis and Entropy Mode Seyed Mojtaba Hosseini Bamakan, Peyman Gholami RESEARCH CENTRE OF FICTITIOUS ECONOMY & DATA SCIENCE UNIVERSITY
More informationComparative Analysis of FAHP and FTOPSIS Method for Evaluation of Different Domains
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) August 2015, PP 58-62 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Comparative Analysis of
More informationResearch on the Comprehensive Evaluation of Business Intelligence System Based on BP Neural Network
Available online at www.sciencedirect.com Systems Engineering Procedia 00 (2011) 000 000 Systems Engineering Procedia 4 (2012) 275 281 Systems Engineering Procedia www.elsevier.com/locate/procedia 2 nd
More informationDiscrete Hidden Markov Model Training Based on Variable Length Particle Swarm Optimization Algorithm
Discrete Hidden Markov Model Training Based on Variable Length Discrete Hidden Markov Model Training Based on Variable Length 12 Xiaobin Li, 1Jiansheng Qian, 1Zhikai Zhao School of Computer Science and
More informationEvaluating Service Quality of Online Auction by Fuzzy MCDM
Evaluating Service Quality of Online Auction by Fuzzy MCDM Wei-Hsuan Lee, Chien-Hua Wang, and Chin-Tzong Pang Abstract This paper applies fuzzy set theory to evaluate the service quality of online auction.
More informationFuzzy Comprehensive Evaluation Enterprise Performance Management
Fuzzy Comprehensive Enterprise Performance Management Model Based on AHP Hunan Vocational College of Railway echnology,yuanjie2013@yeah.net, Zhuzhou, Hunan province, China Abstract Performance management
More informationQuality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
More informationStudy on Redundant Strategies in Peer to Peer Cloud Storage Systems
Applied Mathematics & Information Sciences An International Journal 2011 NSP 5 (2) (2011), 235S-242S Study on Redundant Strategies in Peer to Peer Cloud Storage Systems Wu Ji-yi 1, Zhang Jian-lin 1, Wang
More informationA comprehensive framework for selecting an ERP system
International Journal of Project Management 22 (2004) 161 169 www.elsevier.com/locate/ijproman A comprehensive framework for selecting an ERP system Chun-Chin Wei, Mao-Jiun J. Wang* Department of Industrial
More informationCombating Anti-forensics of Jpeg Compression
IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng
More informationA Service Revenue-oriented Task Scheduling Model of Cloud Computing
Journal of Information & Computational Science 10:10 (2013) 3153 3161 July 1, 2013 Available at http://www.joics.com A Service Revenue-oriented Task Scheduling Model of Cloud Computing Jianguang Deng a,b,,
More informationSELECTION OF THE BEST SCHOOL FOR THE CHILDREN- A DECISION MAKING MODEL USING EXTENT ANALYSIS METHOD ON FUZZY ANALYTIC HIERARCHY PROCESS
SELECTION OF THE BEST SCHOOL FOR THE CHILDREN- A DECISION MAKING MODEL USING EXTENT ANALYSIS METHOD ON FUZZY ANALYTIC HIERARCHY PROCESS Reshma Radhakrishnan 1, A. Kalaichelvi 2 Research Scholar, Department
More informationConstruction of Marketing Informatization Platform Based on System
Construction of Marketing Informatization Platform Based on System Integration 1 Jian-sen Liu, 2 Kun Zhai, 3 Bin Liu 1, Xuzhou Construction Machinery Group (XCMG Co.), *2, Xuzhou Construction Machinery
More informationAN APPLICATION OF INTERVAL-VALUED INTUITIONISTIC FUZZY SETS FOR MEDICAL DIAGNOSIS OF HEADACHE. Received January 2010; revised May 2010
International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 5(B), May 2011 pp. 2755 2762 AN APPLICATION OF INTERVAL-VALUED INTUITIONISTIC
More informationSU Qiang Professor ---------------------------------------------------------------------------------------------------------------------------------
SU Qiang Professor PhD Advisor Department: Department of Management Science and Engineering Email: suq@tongji.edu.cn Office Phone: +86-21-65981443 ---------------------------------------------------------------------------------------------------------------------------------
More informationWireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm
, pp. 99-108 http://dx.doi.org/10.1457/ijfgcn.015.8.1.11 Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm Wang DaWei and Wang Changliang Zhejiang Industry Polytechnic College
More informationModeling of Knowledge Transfer in logistics Supply Chain Based on System Dynamics
, pp.377-388 http://dx.doi.org/10.14257/ijunesst.2015.8.12.38 Modeling of Knowledge Transfer in logistics Supply Chain Based on System Dynamics Yang Bo School of Information Management Jiangxi University
More informationSupply Chain Quality Management Based on Information Asymmetry
Supply Chain Quality Management Based on Information Asymmetry Jianhua Zhao 1, Yue Hu 2, Yi Wang 3 College of Economic and Management, China Three Gorges University, Yichang Hubei Province, China 443002
More informationBinary Ant Colony Evolutionary Algorithm
Weiqing Xiong Liuyi Wang Chenyang Yan School of Information Science and Engineering Ningbo University, Ningbo 35 China Weiqing,xwqdds@tom.com, Liuyi,jameswang@hotmail.com School Information and Electrical
More informationAircraft Selection Using Analytic Network Process: A Case for Turkish Airlines
Proceedings of the World Congress on Engineering 211 Vol II WCE 211, July 6-8, 211, London, U.K. Aircraft Selection Using Analytic Network Process: A Case for Turkish Airlines Yavuz Ozdemir, Huseyin Basligil,
More informationOptimal PID Controller Design for AVR System
Tamkang Journal of Science and Engineering, Vol. 2, No. 3, pp. 259 270 (2009) 259 Optimal PID Controller Design for AVR System Ching-Chang Wong*, Shih-An Li and Hou-Yi Wang Department of Electrical Engineering,
More informationKnowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety
, pp. 381-388 http://dx.doi.org/10.14257/ijunesst.2014.7.6.33 Knowledge Acquisition Approach Based on Rough Set in Online Aided ecision System for Food Processing Quality and Safety Liu Peng, Liu Wen,
More informationA fuzzy linguistic approach for human resource evaluation and selection in software projects
Proceedings of the 2015 International Conference on Industrial Engineering and Operations Management Dubai, United Arab Emirates (UAE), March 3 5, 2015 A fuzzy linguistic approach for human resource evaluation
More informationDCT-JPEG Image Coding Based on GPU
, pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information
More informationComputing with Words for Direct Marketing Support System
Computing with Words for Direct Marketing Support System Pakizar Shamoi Atsushi Inoue Department of Computer Science, Kazakh-British Technical University pakita883@gmail.com Abstract This paper highlights
More informationA Solution for Data Inconsistency in Data Integration *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 27, 681-695 (2011) A Solution for Data Inconsistency in Data Integration * Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai,
More informationMulti-Expert Multi-Criteria Decision Support Model for Traffic Control
Multi-Expert Multi-Criteria Decision Support Model for Traffic Control Sergio Gramajo Artificial Intelligence Research Group. National Technological University, (3500) Resistencia Argentina, sergio@frre.utn.edu.ar
More informationAn Optimization Model of Load Balancing in P2P SIP Architecture
An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn
More informationWestminsterResearch http://www.westminster.ac.uk/research/westminsterresearch
WestminsterResearch http://www.westminster.ac.uk/research/westminsterresearch A web-based hybrid system for blended electronic, mobile and social media marketing planning Shuliang Li Jim Zheng Li School
More informationApplied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.
Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing
More informationThe Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b
More informationAn Efficient Load Balancing Technology in CDN
Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University
More informationDING Zhao FEBRUARY 2014 VOL 5, NO 10. Master degree candidate, College of Economic & Management, Sichuan Agricultural University.
Analysis of relationship between rural energy consumption of biomass resources and income alteration of farmers DING Zhao Master degree candidate, College of Economic & Management, Sichuan Agricultural
More informationAn Imbalanced Spam Mail Filtering Method
, pp. 119-126 http://dx.doi.org/10.14257/ijmue.2015.10.3.12 An Imbalanced Spam Mail Filtering Method Zhiqiang Ma, Rui Yan, Donghong Yuan and Limin Liu (College of Information Engineering, Inner Mongolia
More informationVertical Handover decision schemes using SAW and WPM for Network selection in Heterogeneous Wireless Networks
Global Journal of Computer Science and Technology Volume 11 Issue 9 Version 1.0 May 2011 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) ISSN: 0975-4172
More informationOptional Insurance Compensation Rate Selection and Evaluation in Financial Institutions
, pp.233-242 http://dx.doi.org/10.14257/ijunesst.2014.7.1.21 Optional Insurance Compensation Rate Selection and Evaluation in Financial Institutions Xu Zhikun 1, Wang Yanwen 2 and Liu Zhaohui 3 1, 2 College
More informationApproaches to Qualitative Evaluation of the Software Quality Attributes: Overview
4th International Conference on Software Methodologies, Tools and Techniques Approaches to Qualitative Evaluation of the Software Quality Attributes: Overview Presented by: Denis Kozlov Department of Computer
More informationResearch of pest diagnosis system development tools based on binary tree
Research of pest diagnosis system development tools based on binary tree Yun Qiu 1, Guomin Zhou 1 1 Agricultural Information Institute of CAAS, Beijing 100081 Qiuyun@mail.caas.net.cn Abstract. A visual
More informationOpen Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1463-1467 1463 Open Access Research on Database Massive Data Processing and Mining Method
More informationClassified Comparison of Operational Efficiency to Internet Company in China Based on DEA Model
, pp. 1-14 http://dx.doi.org/10.14257/ijhit.2014.7.6.01 Classified Comparison of Operational Efficiency to Internet Company in China Based on DEA Model Liu Jian 1 and Li Wei 1,2,* 1 School of Information
More informationDevelopment of Internet of Vehicle's Information System based on Cloud
1848 JOURNAL OF SOFTWARE, VOL. 9, NO. 7, JULY 2014 Development of Internet of Vehicle's Information System based on Cloud Hengliang Shi Information Engineering School of Henan University of Science & Technology,
More informationAvailable online at www.sciencedirect.com Available online at www.sciencedirect.com. Advanced in Control Engineering and Information Science
Available online at www.sciencedirect.com Available online at www.sciencedirect.com Procedia Procedia Engineering Engineering 00 (2011) 15 (2011) 000 000 1822 1826 Procedia Engineering www.elsevier.com/locate/procedia
More information