The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A number of security risks are associated with the selection of wireless networks. We examined wireless network choices in a study involving 104 undergraduate social science students. One research goal was to examine the extent to which features (such as padlocks) and colours could be used to 'nudge' individuals towards more secure network and away from open (unsecured) network options. Another goal...
Along with the rapid development of Web services, user always want to make select decision according to their special preference demands of security attributes. This paper address the problem of service selection based on the Web services security assessment. First we use questionnaire to obtain the semantic and fuzzy information of user security attributes preferences. And then language fuzzy scale...
As a novel computing model, network computing the computing resources distributed on the internet, and providing required service through the unified interface, which bring great convenience to people's daily life. However, the existence of security related threats in internet hinder the further application of network computing. Regarding this problem, this paper propose a security enhancing technology...
Knowledge-based systems (KBS) can potentially enhance individual decision making. Yet, recommendations from these systems continue to be met with resistance. This is particularly troubling in professions associated with deception detection (e.g., border control), where humans are accurate only about half the time. In this research-in-progress, we examine how the fit between KBS explanations and users'...
Cyberspace situation awareness (CSA) is the base of cyberspace operations (CO). A right decision of CO is based on the correct awareness of the cyberspace situation. The paper analyzes two classical models, and then takes account of the characteristics of cyberspace operations, finally proposes a hierarchical, multi-perspectives model. The model employs three perspectives and four layers. The model...
The ubiquitous computing network support frame, the basic components and the fundamental security requirements were indicated. Some research cut-in points such as identification authentication, trust, decision-making, attention catch and emotion computing were listed to show how to begin the trusted ubiquitous computing researches. At last, the related researches and a simple example were mentioned...
Family business succession planning plays a critical and effective role on the longevity development of Chinese family business. The Chinese family business is currently in the phase of intergenerational transmission, most of which were established at the beginning of reform and opening up. They are facing the problem of abdication and succession options, how to achieve the successful family business...
Recently, the traditional flea markets for college students have a lot of flaws and defects. The existing C2C E-Commerce Web sites have not provided a stage for college students, who are in the ranks of the special groups. This paper devotes to create an on-line flea market which is faced with the Higher Education District focusing on college students. Firstly, it investigates the satisfaction of...
In the competitive electronic commerce market, how to evaluate and improve the qualify of its service has become a focus problem. The quality evaluation model of electronic commerce service based on the AHP-FUZZY combines both qualitative analysis and quantitative analysis, forms the overall evaluation framework through the use of evaluation indexes, which draws the comparable and analyzable indexes...
In this paper, university network security evaluation system based on fuzzy AHP evaluation model, with examples given using the evaluation model for network security assessment procedures and methods. Evaluation results show that the proposed approach is feasible and guidance.
It is an urgent task for securities investment managers to enhance their securities investment decision-making by taking advantage of artificial intelligence. This paper aims to build an intelligent securities investment decision-making support system, and uses data-driven decision-making support methodology to conduct an in-depth analysis of the prominent issues in knowledge-based securities investment...
Over the past few years, there has been increasing attention on how Information Technology (IT) supports good governance in Higher Education Institutions (HEI). It's obvious that communications and information technology provide ever-growing opportunities to improve institutional effectiveness and efficiency. The use of technology is driving significant changes in the way educational institutions...
With the development of society, more and more emphasis put on community safety, Community Safety Manager plays an important positive role in maintaining social safety and stability and the promotion of social harmony. Therefore, How to implement the innovative model of community management system, strengthening grass-roots development and democratic self-government building and improve the city economic,...
In this paper we have completed the analysis of intelligence mining system architecture framework and workflow, and showed the design frame of the web intelligence mining service system (IMSS). We have constructed and integrated intelligence experts brainpower supplemented by data mining technology, through the study on working mechanism of collection, analysis, services, counter-intelligence of the...
The prioritization of projects in higher education institutions is a complex decision-making problem. In this paper we deal with a problem of making a decision on whether to start a new project application, and if so, which project to choose in a situation where project teams have several project ideas and limited resources. The purpose of the paper is to show how to use the Analytic Hierarchy Process...
The purpose of this study is to increase the knowledge of responsibility and decision making transfer in public safety and security emergencies. The vast amount of literature dealing with emergencies includes surprisingly little empirically grounded knowledge of responsibility and decision making transfer in emergency management. The article is based on the case study method in the context of school...
AHP is an important method of evaluation; it has been widely used in the decision-making. Contraposing it has the ignorance about Security in some decision-making field, this paper mixes the AHP and fuzzy synthetically evaluation,then designs a new evaluation method of the candidates' comprehensive quality. It offers a scientific and reasonable method of the evaluating college graduatespsila comprehensive...
In this article, we propose a general-purpose disaster support system based on generalized (multiplicatively-weighted order-k Minkowski-metric) Voronoi diagrams. The proposed system is capable of handling disasters (or emergency units) having different weights in the complete order from 1 to k in the three popular Minkowski metrics (Euclidean, Manhattan and Maximum distance space). The proposed model...
In this paper, a new speech enhancement algorithm based on the wavelet packet transform is proposed to suppress the noise. Before decomposing the noisy speech into componets by the wavelet space, we select and construct a new window function, which is smoother than the Hamming window in frequency domain to process the frame's partition, in order to improve the wavelet thresholding performance in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.