The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an approach to construct effectiveness evaluation model semi-automatically based on system architecture such as Department of Defense Architecture Framework (DoDAF). The effectiveness evaluation index system is firstly generated based on architecture models including Capability Dependencies (CV-4), Capability to Operational Activities Mapping (CV-6), Operational Activity to Systems...
This article presents an approach to examining the similarity of the sentences. In our approach, Euler algorithm was used to generate a series of words based on tree and S⊘rensen-Dice coefficient was applied to determine the similarity between compared trees. The emphasis is on defining the similarity between the correct and incorrect answers from the Yahoo Question and Answer of the Non-Factual Data...
Cloud computing is a platform serving millions of users simultaneously. This platform employs various task scheduling algorithms that play a significant role in determining the cloud computing performance (waiting time, response time, execution time, and total finish time for all tasks). Tasks are usually different in their nature, importance, length, and requirements. Therefore, we will be using...
This paper puts forward a way to design and realize a teaching quality evaluation system for part-time teachers. Through the evaluation of part-time teachers in the teaching process, the quantitative evaluation results of the teaching quality of the course can be gained on the basis of analytic hierarchy process to carry on the distribution of evaluation index weights, fuzzy comprehensive evaluation...
Identity management (IDM) refers to a security discipline that employs technologies to manage information about the identity of users and control their access to organization resources. Various IDM products are in the market to offer corporate customers productivity and security while lowering costs of identity management. System integrators who implement the IDM solutions for their corporate customers...
The word Cloud has been a buzzword since last few years but there has been lot of confusion happening in the cloud market with respect to selection of best cloud provider at the cheapest prize and achieving the highest resource efficiency for the cloud providers. As now the entire world is moving to achieve goal of becoming SMART PLANET, the technologies like IoT -Internet of Things getting popular...
This article researches on node importance ranking of multiplex network. Existing node importance ranking methods are amost monoplex network using only single relationship. However, in real life a person often has various relationships, so how to rank nodes of multiplex network is more realistic and meaningful. In this article, we propose a multiplex network node ranking method based on weighted aggregation...
This paper focuses on the problem of college physical teaching quality evaluation, which is of great importance in modern education. Firstly, we propose an index system for evaluating the quality of college physical teaching, and it can cover many influencing factors of college physical teaching quality estimating. Secondly, we propose a fuzzy AHP based college physical teaching quality evaluation...
The use of information technology becomes important tool to achieve business goals of an organization. One of the technologies that can be used for that purpose is cloud computing, which enable some cloud service could be comfortably accessed anywhere. Additional benefit offered by cloud technology is by providing an access to the shared network in some computing resource that has been configured...
Cloud computing is a remarkable improvement in the digital landscape that has changed the way of Information Technology solutions are delivered and how end-users put them to use. The cloud computing environment is growing with numbers of cloud service providers and cloud customers. In this scenario, the main confront for cloud customer is to choose ideal service provider among similar services offered...
The research of trustworthiness measurement of user behavior is the hotpot in the network security. According to the existing problems of the user behavior trust evaluation method in the subjective weight and dynamic adaptability, in this paper, the calculation method of indirect credibility has been improved, and combined with the previously proposed user behavior evaluation method based on Analytic...
People are highly efficient in recognizing faces. However, it is almost impossible for them to cope with huge datasets of facial images without any computational support. On the other hand, the way people describe the facial features using quite commonly encountered descriptors such as “long nose”, “small eyes” and also allude to their feelings according to a specific person like “seems to be nice”,...
This paper presents research extending the feature selective validation (FSV) method to quantitatively compare multiple datasets. The analytic hierarchy process is introduced to weight different FSV results when comparison is conducted by comparing multiple numerical results with their referencing counterparts. Only pairwise comparisons are required which simplify the process of comprehensive validation...
In Cloud Computing Environment, nodes possess the property to transfer the application from one node to another. Due to transfer property some nodes may get overloaded and other may get underloaded and the overall performance of the cloud will degrade. To maintain the performance a load balancing strategy is required. In this paper we are considering multi-parameters for load balancing. Analytical...
The paper analyses the efficiency of the Information Technology (IT) for Domain-Specific Mathematical Modelling (DSMM). IT DSMM was developed to meet the shortcomings of the IT for Domain-Specific Modelling (DSM). IT DSMM allows us to develop metamodels in the different mathematical semantics and thus to increase the level of adequateness of models to the modelled domains. It also reduces an amount...
Selecting the desired ontology from a collection of available ones is essential for ontology reuse. We address the problem of evaluating, ranking and selecting ontologies according to user preferences. We exploit the Analytic Hierarchy Process (AHP) to solve the multiple-criteria decision problem and to model the preferences of the users. We use AHP to analyze the available ontologies from different...
The purpose of this article is to compare AHP and fuzzy AHP methods for human resources in science technology (HRST) performance index selection. Both the AHP and Fuzzy AHP are extremely useful when a decision-making process is complex, as they can prioritize multiple-choice criteria into a hierarchy by assessing the relative importance of criteria, and generate an overall rank of alternatives.
Recently, the employment demand has been paid a lot of attention to so that the research with respect to the forecasting methods such as linear regression, artificial intelligence and the grey prediction method have been comprehensively investigated. Since the predictive focus and the characteristics of the methods are different, the outcomes of predictions cannot achieve the accuracy by simply hybridizing...
Analytic Hierarchy Process (AHP), which was originally introduced by Professor T. L. Satty, is an effective method to make a quantitative analysis for the non-quantitative analytical case. In recent years, two evaluation models based on AHP have been proposed for indoor air quality (IAQ) by the environmental experts from home and abroad. One is Indoor Assessment by the Analytical Hierarchy (IAAH),...
In this work, we present a analytical hierarchy process (AHP) for computing trust in the vehicular ad hoc networks (VANETs). AHP based trust management provides a lightweight security alternative to existing security techniques. Trust Management in VANETs is required to broadcast of selfish or malicious messages and also enable other vehicles to filter out such messages. A trust management system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.