The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyberspace is a complicated system of computer, network and other information environments. To evaluate its security defence ability, the offensive and defensive features in cyberspace were discussed in this paper, firstly. Then index system and evaluation model were proposed. Based on analytic hierarchy process method, cyberspace security defence system was decomposed from its ability aspect. Fuzzy...
Online Social Networks (OSNs) provide users with an easy way to share content, communicate, and update others about their activities. They also play an increasingly fundamental role in coordinating and amplifying grassroots movements, as demonstrated by recent uprisings in, e.g., Egypt, Tunisia, and Turkey. At the same time, OSNs have become primary targets of tracking, profiling, as well as censorship...
In order to prevent urban rail transit accidents and improve the urban rail transit safety, the improved entropy method and analytic hierarchy process is applied to evaluate the security situation of urban rail transit station. Firstly, safety evaluation index system of station is established according to its factors. Secondly, the weights of evaluation index are obtained based on the results of improved...
Weight reflects the essentiality of an index in index volume. Presented a method of determine index weight in security risk evaluation (SRE) based on information entropy. It is a kind of structure analysis method, which constituted entropy model for security risk evaluation of information system and defined subjection function in the first instance, shaped subjection degree matrix of experts' ideas...
In this study we analyze behavior of two types of coefficients for determining the suitable number of clusters obtained when fuzzy cluster analysis is applied. First one is Dunn's coefficient which contains membership degrees in its computational formula; second one is the average silhouette width, used primarily for evaluating hard clustering. There have already been attempts to compare different...
the risk of virtual enterprise problem is one of the hot issues, risk the indices system was established. At the same time, multi-level fuzzy synthetic evaluation model of virtual enterprise based on entropy-weighted was established. Not only take full of the amount of information. But also avoided subjective sense of weight-coefficient, and it mends the shortage of traditional synthetic evaluation...
Competitiveness of China Development Bank is evaluated from the perspective of commercial banks in this paper. By establishing competitiveness evaluation index system, China Development Bank is compared with nine commercial banks. Analytic Hierarchy Process is combined with Entropy Method, and the result of comprehensive evaluation shows the two methods are complementary to each other. The empirical...
Deterministic encryption for low entropy personally identifiable information(PII) is vulnerable to dictionary attack. It is particularly so because of an expedient method to enumerate possible PII'splain text instead of all possible keys. Deterministic encryption, however, is indispensable in the generation of hash or index of PII. This paper presents a novel mechanism to frustrate dictionary attacks...
The land is foundation of human survival and development, land sustainable use is related to human survival and development. Taking Daqing City as an example, the paper constructs evaluating indicator system basing on the characteristics of Daqing's land. Combining the entropy theory and the matter-element to construct the evaluate model, the paper evaluates the land sustainable use degree with macroscopic...
The indices system of risk review and a multi-level fuzzy synthetic evaluation model of virtual enterprise based on entropy-weighted were established. Not only make full use of the indices information. But also avoided subjective sense of weight-coefficient,and it mends the shortage of traditional synthetic evaluation methods. The practicality and reliability of the method is demonstrated in a example.
A new index system of commercial bank liquidity stress testing is set up after cluster analysis of R type. And then the index weight is determined by entropy method. Commercial bank liquidity risk is rated. Taking 14 listed banks for example, rating liquidity risk. The innovative feature of this paper: Firstly, observable indices replace unobservable ones, it is feasible for banks to ensure liquidity...
Water resources carrying capacity (WRCC) is an index, which reflects the supporting ability of the water resources system for sustainable society development. And it is the foundational measurement of water resources security, also it is a complex system which involves social-economic system, water resources system and ecological environment system. Pointing to the problems on vague concept about...
To be able to perform an analytical and more exact description of security, quantitative security measures are desirable. In this paper, we continue our investigation of the quantitative security measure guesswork, which gives the average number of guesses in an optimal brute force attack. The definition of guesswork is extended to joint and conditional guesswork. We show that joint guesswork is always...
With the security industry developing rapidly and the number of security systems increasing continuously in recent years, security systems provide a positive effect on society security in China, but many of them became vulnerable or even useless because of the problem of irrational allocation of resources. In order to evaluate security system efficiency to avoid these problems, the hierarchy structure...
Problems of land ecological security caused by the unreasonable utilization of land resource have influenced the sustainable development of society and economy. This paper selected areas along the Changjiang River in Anhui Province as study area. It constructed an evaluation index system of land ecological security based on Pressure-State-Response model. Considering the illegibility and uncertainty...
During recent years, urban ecological deterioration and environmental pollution are getting worse. Assessment of urban ecological security has become an important area in geoscience, resource and environmental science, ecology and ecological economics. This paper constructed an assessment index system of urban ecological security. The index system was composed of ecosystem pressure, ecosystem state...
Index partitioning techniques-where indexes are broken into multiple distinct sub-indexes-are a proven way to improve metadata search speeds and scalability for large file systems, permitting early triage of the file system. A partitioned metadata index can rule out irrelevant files and quickly focus on files that are more likely to match the search criteria. Also, in a large file system that contains...
In recent years, coal mine safety is an urgent problem needs to be solved in China. The article takes into account the impact of the safety evaluation factors of traditional coal mines (taking the Bofang mine as an example), using information entropy to determine the index weight, and then applies unascertained measurement model evaluation to assess its security level. By Bofang mine empirical investigation...
In the reference of ISO/IEC 9126 software quality model, this article establishes a comprehensive evaluation system of the software dependability. At the same time, it uses the concept of entropy to combine subjective weights and the entropy of objective weights to determine the weight values of measurements in the evaluation system. On this basis, take advantage of the trapezoidal-semi-trapezoidal...
The core of fuzzy evaluation on campus network security is membership degree transformation. But the existing transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.