Application of Grey Relational Analysis in Computer Communication



Similar documents
Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Study on prediction of network security situation based on fuzzy neutral network

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

Green Master based on MapReduce Cluster

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

Software Reliability Index Reasonable Allocation Based on UML

A Parallel Transmission Remote Backup System

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Automated Event Registration System in Corporation

APPENDIX III THE ENVELOPE PROPERTY

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

Numerical Methods with MS Excel

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

6.7 Network analysis Introduction. References - Network analysis. Topological analysis

A particle swarm optimization to vehicle routing problem with fuzzy demands

Fault Tree Analysis of Software Reliability Allocation

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

How To Make A Supply Chain System Work

Expert Systems with Applications

Report 52 Fixed Maturity EUR Industrial Bond Funds

Optimal Packetization Interval for VoIP Applications Over IEEE Networks

Fuzzy Task Assignment Model of Web Services Supplier in Collaborative Development Environment

of the relationship between time and the value of money.

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

A MULTI-CRITERIA CALL CENTER SITE SELECTION BY HIERARCHY GREY RELATIONAL ANALYSIS

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

An Automated Selecting Subcontractor Model In E-Commerce by Pao-Hung Lin

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Optimization Model in Human Resource Management for Job Allocation in ICT Project

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

How To Balance Load On A Weght-Based Metadata Server Cluster

On Error Detection with Block Codes

Evaluating the Network and Information System Security Based on SVM Model

1. The Time Value of Money

The paper presents Constant Rebalanced Portfolio first introduced by Thomas

Fuzzy Multi-criteria Method for Revaluation of ERP System Choices Using Real Options

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

Fuzzy Risk Evaluation Method for Information Technology Service

AnySee: Peer-to-Peer Live Streaming

The Digital Signature Scheme MQQ-SIG

ERP System Flexibility Measurement Based on Fuzzy Analytic Network Process

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Chapter = 3000 ( ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

10.5 Future Value and Present Value of a General Annuity Due

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Performance Attribution. Methodology Overview

Integrating Production Scheduling and Maintenance: Practical Implications

Average Price Ratios

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

DYNAMIC FACTOR ANALYSIS OF FINANCIAL VIABILITY OF LATVIAN SERVICE SECTOR COMPANIES

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Software Aging Prediction based on Extreme Learning Machine

Banking (Early Repayment of Housing Loans) Order,

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data

Real-Time Scheduling Models: an Experimental Approach

Transcription:

Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author Iformato Egeerg Departmet, Luzhou Ralway Vocatoal Techcal College, LuZhou, 545007, Cha, E-mal:13977298896@139.com Abstract Wth the rapd developmet of computer ad commucato techology, the computer etwork throughout people whole lve, cocer govermet, factory, school, commucato, bak, mltary ad the other world, as the people daly lfe, as bg s as slghtly stable as the atoal securty. It ca t be avod problem how to desg a etwork topology structure of hgh capacty, low cost, easy expaso to every etwork maagers. The key of computer commucato etwork topology structure s the plag desg of back-boe etwork topology structure, durg the back-boe etwork desgg the key gudele s all-termal etwork relable capacty. It s the best techology gudele to embody back-boe etwork relable capacty. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer commucato etwork securty. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. Keywords: Multple Attrbute Decso Makg (MADM), Computer Commucato Network, Grey Relatoal Aalyss (GRA), Relatoal Degree 1. Itroducto So far, there was ot a ormal ad tegrated rsk assessmet system for computer etwork formato securty, ad also, the opo of sortg rsk assessmet dd t come to a agreemet. Sce absece of rsk assessmet stadard, dfferet rsk assessmet departmet got the dfferet result evaluatg the same system. At the same tme, wth speedg up orgazato formato process ad ehacg the foudato ad teger of etwork formato system, formato securty problem became more ad more mportat. Curret formato securty eeded to stregthe the rsk assessmet quckly. The exsted research areas cluded securty costructo ad developmet for computer etwork system, rule ad method of etwork formato securty rsk assessmet. Wth aalyzg the curret stuato of computer formato system, the key pots ad problems of rsk assessmet could be foud to provde the referece ad bass for etwork securty orgazato. Because may formato system securty rsk assessmet theores were hard to be operated, regularty uo rsk assessmet was desged ad mplemeted to mprove the maeuverablty, acheved qualtatve ad measurable rsk aalyss, at the same tme, aalyzed ad dscussed developmet aspect of etwork formato securty rsk assessmet. Wth the developmet of the Iformato Techology, computer etworks have bee wdely used may felds. But people are axous for the securty of the computer etworks more ad more. Recet years, more tha 60% user etworks have bee broke. The computer etworks have the great rsk. The desre of the etworks for dfferet type of users s dfferet. The etwork egeers usually costruct a computer etwork accordg to ther experece ad the requests of the user. Qualtatve aalyss of the securty for a etwork s ofte used. Wth the rapd developmet of formato techology, the teret has already become the vtal vehcle for formato dssemato globally. However, sce after the advet of the teret, resource sharg ad formato securty have tur to oe par of rrecoclable cotradctos. The more ad the wder teret formato s shared, the more ad the deeper Iteratoal Joural of Dgtal Cotet Techology ad ts Applcatos(JDCTA) Volume6,Number22,December 2012 do:10.4156/jdcta.vol6.ssue22.48 417

Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J formato securty problems are creasgly exposured. Therefore, tradtoal passve protecto s ot adaptable to the curret securty stuato, ad the theory of proactve etwork securty assessmet has bee created accordgly. The favorable etwork securty assessmet ca assst the maagemet staff to comprehesvely ad precsely cotrol the level of securty, ths makes a great mportace to safeguard the teret to ru smoothly[1-10]. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss are the multple attrbute decso makg (MADM) problems.the am of ths paper s to vestgate the MADM problems for evaluatg the computer commucato etwork securty based o grey relatoal aalyss. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. I order to do so, the rest of the paper s orgazed as follows: ext secto brefly troduce some basc cocepts related to the grey relatoal aalyss (GRA) model. I Secto 3, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. I Secto 4 we llustrate our proposed algorthmc method wth a example. The fal secto cocludes. 2. Grey relatoal aalyss Grey relatoal aalyss (GRA) method [11-12] was orgally developed by Deg ad has bee successfully appled solvg a varety of MADM problems [13-21]. The ma procedure of GRA s frstly traslatg the performace of all alteratves to a comparablty sequece. Ths step s called grey relatoal geeratg. Accordg to these sequeces, a deal target sequece s defed. The, the grey relatoal coeffcet betwee all comparablty sequeces ad deal target sequece s calculated. Fally, base o these grey relatoal coeffcets, the grey relatoal degree betwee deal target sequece ad every comparablty sequeces s calculated. If a comparablty sequece traslated from a alteratve has the hghest grey relatoal degree betwee the deal target sequece ad tself, that alteratve wll be the best choce. The procedures of grey relatoal aalyss are show Fg. 1 [11-12]. Fgure 1. Procedure of grey relatoal aalyss 418

Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J 3. Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Wth the cotuous developmet of computer techology ad the wde spread of etwork applcato, etwork securty s becomg a mportat ssue whch techcas face ad may studes relatg to the etwork securty techology are becomg mature. Network securty stuatoal awareess s a techology whch ca realze the etwork securty specto ad motorg. Besdes, t s a hot topc o the formato securty research. It s very sgfcat to carry out ths research, for t ca mprove the emergecy respose ablty of et system, mtgate the harm caused by cyber attacks, dscover the malcous vaso behavor ad mprove the system s couter-attack ablty. I ths secto, we cosder a multple attrbute decso makg problems to evaluate the computer commucato etwork securty based o grey relatoal aalyss. Let A A1, A2,, Am dscrete set of alteratves, ad G G G G be the set of attrbutes,,,, 1 2 s the weghtg vector of the attrbutesgj j1, 2,,, where j 0,1, j1 that A aj s the decso matrx, where j m be a 1, 2,, 1 j. Suppose a s a preferece value, gve by the decso maker for the alteratve A A wth respect to the attrbutegj G. I the followg, we wll exted the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Step 1. Calculate the ormalzed decso matrx. The ormalzed value b j s calculated as If attrbute G j s a beeft crtero: b j aj m aj max a m a j j, 1, 2,, m, j 1, 2,,. (1) If attrbute G j s a cost crtero: b j max aj aj max a m a j j, 1, 2,, m, j 1, 2,,. (2) Step 2. Determe the postve deal soluto ad egatve deal soluto,, 1 max b j B b b,, 1 m b j B b b (3) (4) Step 3. Calculate the grey relatoal coeffcet of each alteratve from PIS ad NIS usg the followg equato, respectvely: The grey relatoal coeffcet of each alteratve from PIS s gve as 419

Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J j m m b b max max b b b b max max b b 1 m 1j j j 1 m 1j j j j j 1 m 1j j j, 1, 2,, m, j1, 2,,. (5) Smlarly, the grey relatoal coeffcet of each alteratve from NIS s gve as m m b b max max b b j b b max max b b 1 m 1j j j 1 m 1j j j j j 1 m 1j j j, 1, 2,, m, j1, 2,,. (6) where the detfcato coeffcet 0.5. Step 4. Calculatg the degree of grey relatoal coeffcet of each alteratve from PIS ad NIS usg the followg equato, respectvely: jj j1 w, 1,2,, m. (7) jj j1 w, 1,2,, m. (8) The basc prcple of the GRA method s that the chose alteratve should have the largest degree of grey relato from the postve deal soluto ad the smallest degree of grey relato from the egatve deal soluto. Step 5. Calculatg the relatve relatoal degree of each alteratve from PIS usg the followg equato, Step 6. Rak all the alteratves A 1, 2,, m 1, 2,, m. If ay alteratve has the hghest alteratve. Step 7. Ed. 4. Numercal example, 1,2,, m. (9) ad select the best oe(s) accordace wth value, the, t s the most mportat The calculator techque develops quckly ad makes owadays the socal developmet have already caed ot got away from a formato etwork. Because the calculator etwork delvers of volve each realm of face, scece educato, ad mltary...etc. the formato, clude huge ecoomy or atoal terest amog them, so ecessary etwork from each sde of everyoe attack stoes, the etwork attack stoes of the mafestato s also vared, lke vrus fecto, steal the dstortg of data, formato delete to add a etc.. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths secto, we preset a emprcal case study of evaluatg the computer commucato etwork securty based o grey relatoal aalyss. The am s to evaluate the best eterprse from evaluatg the computer commucato etwork securty. The fve possble computer commucato etwork systems A 1, 2,3, 4,5 are evaluated. The expert groups must take a decso accordg to the followg sx attrbutes: G1 s the flmsess of the etwork; G2 s the 420

Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J etwork safety of etwork formato safety; G3 s the famlar etwork attack the method ad couter pla; G4 s the etwork safety costructo; G5 s the etwork safety techology; G6 s the etwork safety strategy. The fve possble computer commucato etwork systems A 1, 2,3, 4,5 are to be evaluated by the decso makers uder the above sx attrbutes (whose weghtg vector 0.12,0.20,0.15,0.18,0.21,0.14 T ) usg the 0-10 scale, ad costruct the A a j : decso matrx as follows 5 6 A1 7 5 7 8 7 5 A 2 4 3 9 6 8 4 A A 3 5 9 4 5 5 7 A4 9 6 5 4 6 6 A 5 7 8 8 9 8 3 To get the most desrable computer commucato etwork systems, the followg steps are volved: Step 1. Costructg the ormalzed decso matrx as B by usg formula (1) ad (2): Step 2. Determg the PIS ad the NIS G1 G2 G3 G4 G5 G6 A1 0.60 0.33 0.60 0.80 0.67 0.50 A2 0.00 0.00 1.00 0.40 1.00 0.25 A A 3 0.20 1.00 0.00 0.20 0.00 1.00 A4 1.00 0.50 0.20 0.00 0.33 0.75 A 5 0.60 0.83 0.80 1.00 1.00 0.00 B 1.00 1.00 1.00 1.00 1.00 1.00 B 0.00 0.00 0.00 0.00 0.00 0.00 Step 3. Calculatg the grey relatoal coeffcet of each computer commucato etwork system from PIS ad NIS 5 6 j 0.5556 0.4286 0.5556 0.7143 0.6000 0.5000 0.3333 0.3333 1.0000 0.4545 1.0000 0.4000 0.3846 1.0000 0.3333 0.3846 0.3333 1.0000 1.0000 0.5000 0.3846 0.3333 0.4286 0.6667 0.5556 0.7500 0.7143 1.0000 1.0000 0.3333 421

Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J 5 6 j 0.4545 0.6000 0.4545 0.3846 0.4286 0.5000 1.0000 1.0000 0.3333 0.5556 0.3333 0.6667 0.7143 0.3333 1.0000 0.7143 1.0000 0.3333 0.3333 0.5000 0.7143 1.0000 0.6000 0.4000 0.4545 0.3750 0.3846 0.3333 0.3333 1.0000 Step 4. Calculatg the degree of grey relatoal coeffcet of each computer commucato etwork system from PIS ad NIS 0.5603, 0.6045, 0.5754, 0.5210, 0.7605 1 2 3 4 5 0.4720, 0.6333, 0.6876, 0.60901, 0.4572 1 2 3 4 5 Step 5. Calculate the relatve relatoal degree of each computer commucato etwork system from PIS 0.5428, 0.4883, 0.4556, 0.4610, 0.6245 1 2 3 4 5 Step 6. Accordg to the relatve relatoal degree, the rakg order of the fve computer commucato etwork systems s: A5 A1 A2 A4 A3, ad thus the most desrable computer commucato etwork system s A 5. 5. Cocluso Computer techology s developg very rapdly, powerful computers ad Itraet/Iteret are becomg popular all over the world. Iformatolzato ad etworklzato become tedecy of today s ecoomc ad socety s developmet of the world. Iformato techology ad computer etwork have already appled wdely. Wth the rapd developmet of computer ad commucato techology, the computer etwork throughout people whole lve, cocer govermet, factory, school, commucato, bak, mltary ad the other world, as the people daly lfe, as bg s as slghtly stable as the atoal securty. It ca t be avod problem how to desg a etwork topology structure of hgh capacty, low cost, easy expaso to every etwork maagers. The key of computer commucato etwork topology structure s the plag desg of back-boe etwork topology structure, durg the back-boe etwork desgg the key gudele s all-termal etwork relable capacty. It s the best techology gudele to embody back-boe etwork relable capacty. The problem of evaluatg the computer commucato etwork securty based o grey relatoal aalyss s the multple attrbute decso makg (MADM) problems. I ths paper, we vestgate the multple attrbute decso makg (MADM) problems for evaluatg the computer commucato etwork securty. The, we exteded the grey relatoal aalyss (GRA) model to evaluate the computer commucato etwork securty. Accordg to the tradtoal deas of GRA, the optmal alteratve(s) s determed by calculatg the relatoal degree of every alteratve ad postve deal soluto (PIS) ad egatve deal soluto (NIS). It s based o the cocept that the optmal alteratve should have the largest relatoal degree from the postve deal soluto ad o the other sde the smallest relatoal degree from the egatve deal soluto. Fally, a llustratve example demostrates the practcalty ad effectveess of the proposed method. 6. Refereces [1] ZANG Wehua, GUO Ru, "The Applcato of Neural Network based o Evolutoary Strategy 422

Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Network Securty Quatfcato Aalyss", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 4, No. 2, pp. 151-159, 2012. [2] Je Zhag, Ju Tag, Fag Pe, "A method for etwork securty rsk assessmet ad decsomakg based o the cloud model", JCIT: Joural of Covergece Iformato Techology, Vol. 7, No. 6, pp. 146-153, 2012. [3] Ja Wu, "A Approach to Evaluatg the Computer Network Securty wth Ucerta Lgustc Iformato", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 5, pp. 174-180, 2012. [4] Lao Hu-fe, "The Research o Network Securty Detecto Based o Improved Geetc Neural Algorthm", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 4, No. 13, pp. 69-75, 2012. [5] ChuaA Wag, Yaju Wag, Hua Ge, "Itellgece Computg Strategy for Computer Network Securty Itruso Detecto", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 13, pp. 217-225, 2012. [6] Xuchag L, "Model for Evaluatg the Computer Network Securty Ucerta Lgustc Evromet", IJACT, Vol. 4, No. 4, pp. 93-99, 2012. [7] Yupg L, Jgyua Y, Guoqag Wu, "Model for Evaluatg the Computer Network Securty wth Iterval-Valued Itutostc Fuzzy Iformato", JDCTA: Joural of Dgtal Cotet Techology ad ts Applcatos, Vol. 6, No. 6, pp. 140-146, 2012. [8] Yupg L, Xja Sha, Guoqag Wu, "Comprehesve Evaluato Model for Computer Network Securty wth Lgustc Iformato", AISS: Advaces Iformato Sceces ad Servce Sceces, Vol. 3, No. 9, pp. 126-131, 2011. [9] Yua Jag, Dogmg Jag, "A Approach to Wreless Sesor Network Securty Assessmet wth Fuzzy Number Itutostc Fuzzy Iformato", AISS: Advaces Iformato Sceces ad Servce Sceces,Vol. 3, No. 9, pp. 140-146, 2011. [10] Xagya Tao, Chagyu Ja, Cheg Yag, "Securty Aalyss o Cha Campus Network ad Costructo o Network Securty System", JCIT: Joural of Covergece Iformato Techology, Vol. 6, No. 11, pp. 166-174, 2011. [11] Julog Deg, Itroducto to Grey System, The Joural of Grey System (UK), vol.1, o.1, pp.1-24, 1989. [12] Julog Deg, Grey System Theory, Wuha: press of Huazhog Uversty of Scece & Techology, Cha, 2002. [13] Desheg Wu, Suppler selecto a fuzzy group decso makg settg: A method usg grey related aalyss ad Dempster-Shafer theory, Expert Systems wth Applcatos, vol.36, o.2, pp. 8892-8899, 2009. [14] Guwu We, GRA method for multple attrbute decso makg wth complete weght formato tutostc fuzzy settg, Kowledge-Based Systems, Vol.23, No.3, pp.243-247, 2010. [15] Guwu We, Grey relatoal aalyss model for dyamc hybrd multple attrbute decso makg, Kowledge-based Systems, vol.24, o.5, pp. 672-679, 2011. [16] Guwu We, Grey relatoal aalyss method for 2-tuple lgustc multple attrbute group decso makg wth complete weght formato, Expert Systems wth Applcatos, vol.38. o.5, pp. 4824-4828, 2011. [17] Yaoguo Dag, Sfeg Lu, B Lu, Study o cdece decso makg model of mult-attrbute terval umber, Joural of Najg Uversty of aeroautcs & astroautcs, vol. 36, o.3, pp. 403-406, 2004. [18] Jju Zhag, Desheg Wu, D. L. Olso, The method of grey related aalyss to multple attrbute decso makg problems wth terval umbers, Mathematcal ad Computer Modellg, vol. 42, o.3, pp.991-998, 2005. [19] Pede Lu, A ovel method for hybrd multple attrbute decso makg, Kowledge-Based Systems, vol. 22, o.5, pp.388-391, 2009. [20] D. L. Olso, D. Wu, Smulato of fuzzy multattrbute models for grey relatoshps, Europea Joural of Operatoal Research, vol. 175, o.4, pp.111-120, 2006. [21] Y. Kuo, T. Yag, G.W. Huag, The use of grey relatoal aalyss solvg multple attrbute decso-makg problems, Computers & Idustral Egeerg, vol. 55, o.1, pp. 80-93, 2008. 423