Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information



Similar documents
Cell Phone Evaluation Base on Entropy and TOPSIS

A Multi-granular Linguistic Model to Evaluate the Suitability of Installing an ERP System

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method

Credit Risk Comprehensive Evaluation Method for Online Trading

Performance Evaluation and Prediction of IT-Outsourcing Service Supply Chain based on Improved SCOR Model

Analysis of China Motor Vehicle Insurance Business Trends

Linguistic Preference Modeling: Foundation Models and New Trends. Extended Abstract

Research of The Requirement of Labor Market Management System of

The Application of ANP Models in the Web-Based Course Development Quality Evaluation of Landscape Design Course

Tasks Scheduling Game Algorithm Based on Cost Optimization in Cloud Computing

A Fuzzy AHP based Multi-criteria Decision-making Model to Select a Cloud Service

A New Method for Traffic Forecasting Based on the Data Mining Technology with Artificial Intelligent Algorithms

Optimization of Fuzzy Inventory Models under Fuzzy Demand and Fuzzy Lead Time

Research on Trust Management Strategies in Cloud Computing Environment

AN EVALUATION METHOD FOR ENTERPRISE RESOURCE PLANNING SYSTEMS

Natural Language Querying for Content Based Image Retrieval System

Performance Appraisal System using Multifactorial Evaluation Model

Application of the Multi Criteria Decision Making Methods for Project Selection

Alternative Selection for Green Supply Chain Management: A Fuzzy TOPSIS Approach

KNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE

An Improved Authentication Protocol for Session Initiation Protocol Using Smart Card and Elliptic Curve Cryptography

The Compound Operations of Uncertain Cloud Concepts

1604 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014

EFFICIENCY EVALUATION IN TIME MANAGEMENT FOR SCHOOL ADMINISTRATION WITH FUZZY DATA

Research Article A Hybrid Program Projects Selection Model for Nonprofit TV Stations

Capability Service Management System for Manufacturing Equipments in

A Health Degree Evaluation Algorithm for Equipment Based on Fuzzy Sets and the Improved SVM

A Network Simulation Experiment of WAN Based on OPNET

Demand Forecasting Optimization in Supply Chain

Analysis of Mobile Phone Reliability Based on Active Disassembly Using Smart Materials *

An Improved PROMETHEE Method Applied in Enterprise's Financial Performance Measurement

Security evaluation model for the enterprise cloud services based on grey fuzzy AHP

Optimization under fuzzy if-then rules

Factors to be Considered When to Design Software Development Plan Yu Gao 1, a, Xiangzhong Feng 2,b

Design of Fuzzy Drip Irrigation Control System Based on ZigBee Wireless Sensor Network

4. GPCRs PREDICTION USING GREY INCIDENCE DEGREE MEASURE AND PRINCIPAL COMPONENT ANALYIS

Multi-layer Structure of Data Center Based on Steiner Triple System

Soft Computing in Economics and Finance

en fi lm af Zhang Yang instruktøren bag den kinesiske fi lmperle Badeanstalten Premiere 31. oktober

Genetic Algorithm Based Interconnection Network Topology Optimization Analysis

A 360-Degree Performance Appraisal Model Dealing with Heterogeneous Information and Dependent Criteria

Technology, Douliu City, Yunlin 640, Taiwan

An Evaluation Model for Determining Insurance Policy Using AHP and Fuzzy Logic: Case Studies of Life and Annuity Insurances

Study of the Decision-Making Model of Outsourcing Service Provider Selection

Grey and Fuzzy Evaluation of Information System Disaster Recovery Capability

Some Research Problems in Uncertainty Theory

E-learning in China Qiyun Wang National Institute of Education, Nanyang Technological University, Singapore

Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks

IDENTIFYING THE FACTORS AFFECTING ENTERPRISE RESOURCE PLANNING (ERP) SUCCESS USING FUZZY TOPSIS TECHNIQUE

The Security Evaluation of ATM Information System Based on Bayesian Regularization

Comparison between Vertical Handoff Decision Algorithms for Heterogeneous Wireless Networks

A Novel User-Preference-Driven Service Selection Strategy in Cloud

Maintainability Estimation of Component Based Software Development Using Fuzzy AHP

Improved PSO-based Task Scheduling Algorithm in Cloud Computing

Design and Implementation of the Self-Management Travel System

How To Calculate Tunnel Longitudinal Structure

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

Reverse Logistics Network in Uncertain Environment

A Novel Feature Selection Method Based on an Integrated Data Envelopment Analysis and Entropy Mode

Comparative Analysis of FAHP and FTOPSIS Method for Evaluation of Different Domains

Research on the Comprehensive Evaluation of Business Intelligence System Based on BP Neural Network

Discrete Hidden Markov Model Training Based on Variable Length Particle Swarm Optimization Algorithm

Evaluating Service Quality of Online Auction by Fuzzy MCDM

Fuzzy Comprehensive Evaluation Enterprise Performance Management

Quality of Service Routing Network and Performance Evaluation*

Study on Redundant Strategies in Peer to Peer Cloud Storage Systems

A comprehensive framework for selecting an ERP system

Combating Anti-forensics of Jpeg Compression

A Service Revenue-oriented Task Scheduling Model of Cloud Computing

SELECTION OF THE BEST SCHOOL FOR THE CHILDREN- A DECISION MAKING MODEL USING EXTENT ANALYSIS METHOD ON FUZZY ANALYTIC HIERARCHY PROCESS

Construction of Marketing Informatization Platform Based on System

AN APPLICATION OF INTERVAL-VALUED INTUITIONISTIC FUZZY SETS FOR MEDICAL DIAGNOSIS OF HEADACHE. Received January 2010; revised May 2010

SU Qiang Professor

Wireless Sensor Networks Coverage Optimization based on Improved AFSA Algorithm

Modeling of Knowledge Transfer in logistics Supply Chain Based on System Dynamics

Supply Chain Quality Management Based on Information Asymmetry

Binary Ant Colony Evolutionary Algorithm

Aircraft Selection Using Analytic Network Process: A Case for Turkish Airlines

Optimal PID Controller Design for AVR System

Knowledge Acquisition Approach Based on Rough Set in Online Aided Decision System for Food Processing Quality and Safety

A fuzzy linguistic approach for human resource evaluation and selection in software projects

DCT-JPEG Image Coding Based on GPU

Computing with Words for Direct Marketing Support System

A Solution for Data Inconsistency in Data Integration *

Multi-Expert Multi-Criteria Decision Support Model for Traffic Control

An Optimization Model of Load Balancing in P2P SIP Architecture

WestminsterResearch

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, HIKARI Ltd,

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

An Efficient Load Balancing Technology in CDN

DING Zhao FEBRUARY 2014 VOL 5, NO 10. Master degree candidate, College of Economic & Management, Sichuan Agricultural University.

An Imbalanced Spam Mail Filtering Method

Vertical Handover decision schemes using SAW and WPM for Network selection in Heterogeneous Wireless Networks

Optional Insurance Compensation Rate Selection and Evaluation in Financial Institutions

Approaches to Qualitative Evaluation of the Software Quality Attributes: Overview

Research of pest diagnosis system development tools based on binary tree

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform

Classified Comparison of Operational Efficiency to Internet Company in China Based on DEA Model

Development of Internet of Vehicle's Information System based on Cloud

Available online at Available online at Advanced in Control Engineering and Information Science

Transcription:

Journal of Computational Information Systems 9: 14 2013 5529 5534 Available at http://www.jofcis.com Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information Jiehui JU 1, Fuwei FAN 2,, Jiyi WU 3 1 Zhejiang University of Science & Technology, Hangzhou 310023, China 2 Lishui Radio and Television University, Lishui 323000, China 3 Key Lab of E-Business and Information Security, Hangzhou Normal University, Hangzhou 310023, China Abstract In this paper, we investigate the multiple attribute decision making problems to evaluate the key technology for P2P network route security with 2-tuple linguistic information. We extended the TOPSIS model to solve the evaluation problems of key technology for P2P network route security with 2-tuple linguistic information. According to the traditional ideas of TOPSIS, the optimal alternatives is determined by calculating the shortest distance from the 2-tuple linguistic positive ideal solution TLPIS and on the other side the farthest distance of the 2-tuple linguistic negative ideal solution TLNIS. It is based on the concept that the optimal alternative should have the shortest distance from the positive ideal solution and on the other side the farthest distance of the negative ideal solution. The method has exact characteristic in linguistic information processing. It avoided information distortion and losing which occur formerly in the linguistic information processing. Finally, a numerical example with the key technology for P2P network route security evaluation is used to illustrate the applicability and effectiveness of the proposed model. Keywords: Multiple Attribute Decision Making; TOPSIS Model; 2-Tuple; P2P Network Route Security 1 Introduction As the process of human economy and social intellectualization speeding up, knowledge has become the most important resources in modern society [1-6]. Enterprises operation pattern has shifted from product-oriented to development of human capital and intellectual resources, how to effectively manage and apply the knowledge resources, integrate the existing knowledge and get access to new knowledge, has become the key point to gain the competitive advantage [7-10]. The evaluation of knowledge management is the beginning of effective knowledge management and throughout the process of knowledge management. Whether to evaluate the effective knowledge Corresponding author. Email addresses: 199576936@qq.com Jiehui JU, 807433645@qq.com Fuwei FAN. 1553 9105 / Copyright 2013 Binary Information Press DOI: 10.12733/jcis6331 July 15, 2013

5530 J. Ju et al. /Journal of Computational Information Systems 9: 14 2013 5529 5534 management, continual feeding back and improve in the process of knowledge management based on the assessment result, immediately have an influence on efficiency and effect of enterprise knowledge management implementation [11-15]. The aim of this paper is to develop a TOPSIS model for key technology for P2P network route security evaluation with 2-tuple linguistic information. The remainder of this paper is set out as follows. In the next section, we introduce the basic concepts of traditional TOPSIS model. In Section 3 we utilize the TOPSIS model to solve the key technology for P2P network route security evaluation with 2-tuple linguistic information. In Section 4, we give an illustrative example to verify the developed approach and to demonstrate its feasibility and practicality. In Section 5 we conclude the paper and give some remarks. 2 Analysis of Model and Key Technology for P2P Network Route Security Evaluation with 2-tuple Linguistic Information Let A = {A 1, A 2,, A m } be a discrete set of alternatives, and G = {G 1, G 2,, G n } be the set of attributes, w = w 1, w 2,, w n is the weighting vector of the attributes G j j = 1, 2,, n, where w j [0, 1], n j=1 w j = 1. Suppose that R = r ij m n is the decision matrix, where r ij S is a preference value, which takes the form of linguistic variables, for the alternative A i A with respect to the attribute G j G. In the following, we will extend the TOPSIS method [8, 9], to solve multiple attribute decision making problems to deal with evaluation model of key technology for P2P network route security evaluation with 2-tuple linguistic information. Step 1 Transforming linguistic decision matrix R = r ij m n matrix R = r ij, 0 m n. into 2-tuple linguistic decision Step 2 Defining the TLPIS and TLNIS as where r j, a j r, a = r 1, a 1, r 2, a 2,, r n, a n r, a = r1, a 1, r 2, a 2,, r n, a n = max {r ij, a ij }, j = 1, 2,, n. r j, a j = min {r ij, a ij }, j = 1, 2,, n. i i 1 2 Step 3 Calculating the distances of each alternative from TLPIS and TLNIS using the following equation, respectively: i, η i = n j=1 1 r ij, a ij 1 r j, a j wj 3 i, η i = n j=1 1 r ij, a ij 1 r j, a j wj 4

J. Ju et al. /Journal of Computational Information Systems 9: 14 2013 5529 5534 5531 Step 4 Calculating the relative closeness degree of each alternative from TLPIS using the following equation 1 i i, η i =, η i 1 i, η i 1 i, η i, i = 1, 2,, m. 5 Step 5 According to the relative closeness degree i, η i, the ranking order of all alternatives can be determined. If any alternative has the highest i, η i value, then, it is the most desirable alternative. 3 Illustrative Example In the following, we present an illustrative example of the new approach in a decision making problem about key technology for P2P network route security evaluation. Suppose a company plans to evaluate the key technology for P2P network route security. There is a panel with five possible P2P network route systems A i i = 1, 2, 3, 4, 5 to select. The company selects four attribute to evaluate the five possible P2P network route systems: 1 G 1 is the tactics; 2 G 2 is the technology; 3 G 3 is the economy; 4 G 4 is the logistics and strategy. The five possible P2P network route systems A i i = 1, 2,, 5 are to be evaluated using the linguistic term set S = {s 0 = extremely poorep, s 1 = very poorv P, s 2 = poorp, s 3 = mediumm, s 4 = goodg, s 5 = very goodv G, s 6 = extremely goodeg} by the decision makers under the above four attributes, as listed in the following matrix: R = A 1 A 2 A 3 A 4 A 5 G 1 G 2 G 3 G 4 s 4 s 6 s 5 s 5 s 2 s 3 s 4 s 3 s 3 s 5 s 3 s 4 s 5 s 4 s 5 s 2 s 4 s 3 s 1 s 3 And W T = 0.2, 0.4, 0.1, 0.3 is the weighting vector of the attributes G j j = 1, 2, 3, 4. In the following, we shall utilize the proposed approach in this paper getting the most desirable P2P network route systems: Step 1 Transforming linguistic decision matrix R = r ij m n into 2-tuple linguistic decision

5532 J. Ju et al. /Journal of Computational Information Systems 9: 14 2013 5529 5534 matrix R = r ij, 0 m n. R = A 1 A 2 A 3 A 4 A 5 G 1 G 2 G 3 G 4 s 4, 0 s 6, 0 s 5, 0 s 5, 0 s 2, 0 s 3, 0 s 4, 0 s 3, 0 s 3, 0 s 5, 0 s 3, 0 s 4, 0 s 5, 0 s 4, 0 s 5, 0 s 2, 0 s 4, 0 s 3, 0 s 1, 0 s 3, 0 Step 2 Defining the TLPIS and TLNIS as r, a = s 5, 0, s 6, 0, s 5, 0, s 5, 0 T r, a = s 2, 0, s 3, 0, s 1, 0, s 2, 0 T Step 3 Calculating the distances of each P2P network route systems from TLPIS and TLNIS 1, η 1 = s2, 0.13, 2, η 2 = s1, 0.32 3, η 3 = s2, 0.26, 4, η 4 = s2, 0.21 5, η 5 = s2, 0.12, 1, η1 = s2, 0.26 2, η2 = s3, 0.43, 3, η3 = s2, 0.15 4, η4 = s2, 0.31, 5, η5 = s2, 0.37 Step 4 Calculating the relative closeness degree of each P2P network route systems from TLPIS 1, η 1 = s 0, 0.25, 2, η 2 = s 1, 0.31 3, η 3 = s 0, 0.46, 4, η 4 = s 1, 0.34 5, η 5 = s 1, 0.37 Step 5 Ranking all the P2P network route systems A i i = 1, 2,, 5 in accordance with the relative closeness degree i, η i : A 2 A 4 A 5 A 3 A 1, and thus the most desirable P2P network route systems is A 2. 4 Conclusions In this paper, we investigate the multiple attribute decision making problems to deal with evaluation model of key technology for P2P network route security evaluation with 2-tuple linguistic information. We extended the TOPSIS model to solve the evaluation problems of key technology for P2P network route security evaluation with 2-tuple linguistic information. According to the traditional ideas of TOPSIS, the optimal alternatives is determined by calculating the shortest distance from the 2-tuple linguistic positive ideal solution TLPIS and on the other side the farthest distance of the 2-tuple linguistic negative ideal solution TLNIS. It is based on the concept

J. Ju et al. /Journal of Computational Information Systems 9: 14 2013 5529 5534 5533 that the optimal alternative should have the shortest distance from the positive ideal solution and on the other side the farthest distance of the negative ideal solution. The method has exact characteristic in linguistic information processing. It avoided information distortion and losing which occur formerly in the linguistic information processing. Finally, a numerical example with key technology for P2P network route security evaluation is used to illustrate the applicability and effectiveness of the proposed model. References [1] Xiaoyue Liu, Yanbing Ju, Aihua Wang, A Multiple Attribute Group Decision Making Method with its Application to Emergency Alternative Assessment, JCIT: Journal of Convergence Information Technology, Vol. 7, No. 2, pp. 75-82, 2012. [2] Ming Li, Yanjing Zhang, The OWA-VIKOR method for multiple attributive group decision making in 2-tuple linguistic setting, JCIT: Journal of Convergence Information Technology, Vol. 7, No. 2, pp. 184-191, 2012. [3] Rui Lin, Xiaofei Zhao, Hongjun Wang, Guiwu Wei, Model for Potential Evaluation of Emerging Technology Commercialization with Hesitant Fuzzy Information, IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 1, pp. 304-311, 2012. [4] Xiaorong Wang, Zhanhong Gao, Xiaofei Zhao, Guiwu Wei, Model for Evaluating the Government Archives Website s Construction Based on the GHFHWD Measure with Hesitant Fuzzy Information, JDCTA: International Journal of Digital Content Technology and its Applications, Vol. 5, No. 12, pp. 418-425, 2011. [5] Xia Wang, Likun Peng, TOPSIS Method for Performance Appraisal in Liquor Industry Based on Economic Value Added, IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 2, pp. 169-175, 2012. [6] Ying Wang, An Approach to Software Selection with Triangular Intuitionistic Fuzzy Information, IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 2, pp. 284-290, 2012. [7] Hongxia Ruan, Xingrong Yan, Grey Relational Analysis Model for Evaluating the Enterprise s Financial Management, IJACT: International Journal of Advancements in Computing Technology, Vol. 4, No. 2, pp. 132-138, 2012. [8] F. Herrera and L. Nartinez, A 2-tuple fuzzy linguistic representation model for computing with words, IEEE Transactions on Fuzzy Systems, Vol.8, No.6, pp. 746-752, 2000. [9] F. Herrera and L. Martinez, A model based on linguistic 2-tuples for dealing with multigranularity hierarchical linguistic contexts in multiexpert decision-making, IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics, Vol.31, No. 2, pp. 227-234, 2001. [10] E. Herrera-Viedma, Modeling the retrieval process for an information retrieval system using an ordinal fuzzy linguistic approach, Journal of the American Society for Information Science and Technology, Vol. 52, No. 6, pp. 460-475, 2001. [11] E. Herrera-Viedma, and A. G. Lopez-Herrera, A Review on Information Accessing Systems Based on Fuzzy Linguistic Modelling, International Journal of Computational Intelligence Systems, Vol. 3, No. 4, pp. 420-437, 2010. [12] E. Herrera-Viedma, A. G. Lopez-Herrera, M. Luque et al., A fuzzy linguistic IRS model based on a 2-tuple fuzzy linguistic approach, International Journal of Uncertainty Fuzziness and Knowledge- Based Systems, Vol. 15, No. 2, pp. 225-250, 2007.

5534 J. Ju et al. /Journal of Computational Information Systems 9: 14 2013 5529 5534 [13] Guiwu Wei, Some generalized aggregating operators with linguistic information and their application to multiple attribute group decision making, Computers & Industrial Engineering, Vol. 61, No. 1, pp. 32-38, 2011. [14] Guiwu Wei, GRA method for multiple attribute decision making with incomplete weight information in intuitionistic fuzzy setting, Knowledge-Based Systems, Vol. 23, No. 3, pp. 243-247, 2010. [15] Guiwu Wei, A method for multiple attribute group decision making based on the ET-WG and ET-OWG operators with 2-tuple linguistic information, Expert Systems with Applications, Vol. 37, No. 12, pp. 7895-7900, 2010.