The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Li Ning applies information technology into all aspects of its corporate governance, combing with its actual situation continuously in the process of information development, which greatly improves its corporate governance ability. Enhancement of such ability lays a foundation for the development of information in the company and forms the mutual promotion of the two. In such an era of changing information,...
In many surveillance systems, an operator will have to make a decision on whether a target is present based on one or more sensor readings. For the latter, when an operator has at his disposal two or more sensor outputs his decision on a whether a target is present or not is likely to be influenced by those sensor readings. For instance, when both sensors report, the operator is more likely than not...
In this paper, we propose a new multi-expert decision-making method based on induced OWA operators for coal mine safety evaluation. Aggregation operators are crucial to decision-makers when they make decisions. The Ordered Weighted Aggregation (OWA) is the most common operator to aggregate the arguments that are the exact numerical values. However, the decision-makers may have vague knowledge about...
Today, the Internet technology development and their applications have become increasingly popular. Hence, the WWW technology brings the rising of Enterprise Information Portal (EIP). However, providing a secure Enterprise Information Portal is one of essential quality of services (QoS) in Internet applications. Focusing on the security of EIP, the purposes of this paper are to find out various risk...
Ecological Security Assessment is a new field in Sustainable Development study. In order to curb the deterioration of the ecological environment, we should conduct timely researches on the comprehensive evaluation of ecological security, which is recognized as the most powerful method to protect the regional economy effectively. Based on the sequence data of 1987, 2000 and 2005, the study takes Hebei...
Sensors are being deployed to improve border security generating enormous collections of data and databases. Unfortunately these sensors can respond to a variety of stimuli, sometimes reacting to meaningful events and sometimes triggered by random events which are considered false alarms. The intent of this project is to supplement human intelligence in a sensor network framework that can assist in...
The author worked past year as Professor & Head of School of Computing, Information and Mathematical Sciences and Director of Japan Pacific ICT Centre at the University of South Pacific. The South Pacific Region has many problems related to environmental and economic issues. The University of the South Pacific (USP) is an ideal platform for provision of development of Human Resources and enhancement...
This paper proposes a trust model to achieve consensus in a Group Decision Making (GDM). The setting of GDM here comprises of decision maker varied from expert to novice with no former knowledge to decide on certain alternatives. The model does not use a set of winning coalition nor a voting rule. Instead, the model employs trust model to facilitate judgment and decision process. The participants...
IBM defines autonomic computing as"an approach to build computing systems that are self-managed and operate with a minimum of human interference." This paper imports the idea of autonomic computing to design Intelligent security defensive software (ISDS), which can adapt to environment by changing policy automatically. The ISDS's framework and self-management working flow are designed according...
Human performance and human decision making is counted upon as a crucial aspect of overall system resilience. Advanced control systems have the potential to provide operators and asset owners a wide range of data, deployed at different levels that can be used to support operator situation awareness. However, the sheer amount of data available can make it challenging for operators to assimilate information...
This paper will provide an analysis of a survey on picture attributes based on userpsilas affinity of choice. There are four picture attributes evaluated, which are picture size, picture presentation, picture colour and picture category. The objective of this survey is to collect and analyze the affinity of choice as selected by the users. There are 63 respondents involved in this survey. The respondents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.