The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the electric car battery safety early warning ability and decrease the safe accident of electric vehicle charging, the electric vehicle charging safety factors are analyzed, the security early warning index selection ways and methods are studied, and a security early warning evaluation index system is set, the evaluation method of weight for safety index is discussed. Besides,...
Aiming at the problems that the scale of distribution network investment is gradually increasing and the investment effectiveness still needs to be improved, the paper propose a comprehensive assessment system of input-output benefit for distribution network construction project. Firstly, select input-output benefit indexes basing on key factors. Secondly, propose index evaluation criterion determining...
In this work, we focus on the problem of city security based on the massive amount of crime statistics data. Combined with city crime statistics data, fuzzy comprehensive evaluation method is used to judge the safety grade of the city, and the weight of the evaluation set is calculated based on the analytic hierarchy process. The experiment results show that fuzzy comprehensive evaluation method is...
Evaluating security threat status is very important in network security management and analysis. Aquantitative hierarchical threat evaluation model is developed in this paper to evaluate security threat status of a computer network system and the computational method is developed based on the structure of the network and the importance of services and hosts. The evaluation policy from bottom to top...
Critical infrastructures like smart grid and smart transportations are large-scale distributed CPSs and cyber-physical security is pivotal to their safety and security. Efficient security assessment can help administrators to protect CINs effectively and we propose a universal quantitative cyber-physical security assessment methodology which is based on cyber-physical dependence analyses. For given...
This paper establishes the index system of the safety evaluation of navigation environment from perspective of which affects the navigation safety. After that, Bayesian network security evaluation method is introduced and the fuzzy set theory is combined to construct a safety state evaluation model. Then the safety condition of the navigation environment is expressed in the form of safety probability.
Beichen district of Tianjin, located in the important node of Beijing-Tianjin golden corridor and high-tech industry area of Jingjintang region, has strong industrial foundations, while it is still faced with the problems that traditional industries account for high proportion of the industrial structure, inefficient use of industrial land, lack of enterprise innovation ability and shortage of resources,...
This research identifies a number of key factors related to online consumer trust and establishes a model based on the System Dynamic method to find out the relationships between these factors and trust. This paper provides several contributions. Firstly it reviews the previous works of online trust and identifies the major online trust building factors which mainly consists of business factors, consumer...
Since China adopted the policy of fully opening retail market at the end of 2004, the entrance of multinational retail enterprises brought the reality and potential impact on the domestic retail such as structure, controlling power and competitiveness. From the perspective of industrial safety concept, combined with the mature DEA model, this paper focus on analyzing the security of the four kinds...
To vary and improve risk assessment method of port facility security, a new risk assessment approach based on a comprehensive model (DHGF model) is developed, which integrates the Delphi method, the analytic hierarchy process (AHP), grey theory and fuzzy evaluation method. A comprehensive evaluation to the target port facility on security is obtained from qualitative analysis to quantitative analysis...
O2O E-commerce is booming. The consumer trust is important to the development of O2O, so this paper studies the related factors of consumer trust degree of O2O in four dimensions, including customer factor, vendor factor, website platform factor and transaction environment factor. We set up a comprehensive evaluation method based on Analytical Hierarchy Process and the fuzzy analysis. Empirical analysis...
In order to prevent urban rail transit accidents and improve the urban rail transit safety, the improved entropy method and analytic hierarchy process is applied to evaluate the security situation of urban rail transit station. Firstly, safety evaluation index system of station is established according to its factors. Secondly, the weights of evaluation index are obtained based on the results of improved...
In recent years the view of Jinggangshan is enchanting by its unique mountainous landscape and revolutionary cradle, which offers many attractions for tourists at home and abroad. Develop continuously along with the tourism industry, the blind development of land resources in the drive for economic interests has been leading to serious degradation of its land ecosystem mountainous and causing serious...
Concentration plant site selection is an complex system engineering. The traditional site selection schemes were too simple, only comparing on the technical and economic indicators of the schemes, but cross combinations between the various economic indicators were ignored. Through a comparative analysis of existing site selection method we explore the shortcomings of them, and then made extended time...
the safety assessment index system is established on the elements of mobile payment system and hierarchical structure of software risk assessment. In order to make up for the deficiencies of traditional risk methods and adapt to fuzzy description in mobile payment system, the hierarchical safety assessment model is developed with the extension theory as the core. The extension method converts the...
In the field-work, the study on safety assessment of oil & gas drilling troop management is limited. Aiming at the characteristics of oil & gas drilling troop management, this paper uses the Fuzzy-AHP and Fuzzy comprehensive judgment method to set up the safety management assessment model of oil & gas drilling troop. Select a drilling troop of Changqing petroleum bureau, the...
The most fundamental means of maintaining mechanical safety is to systematically carry out safety design and analysis in the mechanical design process. The fuzzy comprehensive evaluation method is to take the advantages of the level analytic hierarchy process and fuzzy comprehensive evaluation method. Firstly, the evaluation index system is divided into ladder level structure, calculated the index...
In order to more effectively assess the safety risk of a wind farm project, the evaluation indicators in the life cycle of a project can be divided into quality index, cost index, time index, security index, and sustainable development index. By combining the qualitative with quantitative, the model of principal component analysis (PCA) of the life cycle indicators was established, which can reflect...
The specification of security requirements is an important step when specifying new systems and systems of systems or analyzing existing systems with regard to security issues. A common way to formally specify security requirements is by means of safety and liveness properties. The systems in the focus of this paper are uniformly parameterised co operations. Such systems are characterised by the composition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.