Fuzzy evaluation on network security based on the new algorithm of membership degree transformation-M(1, 2, 3)

作者:
H JiangJ Ruan

关键词:
network security membership degree transformation fuzzy evaluation M(1 3) model

摘要:
Network security has close relationships with the physical environment of information carriers, information transmission, information storage, information management and so on, and these relations have much ambiguity. Therefore, it is reasonable and scientific to apply fuzzy comprehensive evaluation method for network security fuzzy evaluation. The core of network security fuzzy evaluation is membership degree transformation calculation. But the transformation methods should be discussed, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information about object classification hidden in every index, affirm the relationship of object classification and index membership, eliminate the redundant data in index membership for object classification by defining distinguishable weight and extract valid values to compute object membership. The new algorithm of membership degree transformation includes three calculation steps which can be summarized as 鈥渆ffective, comparison and composition鈥, which i

在线下载

相关文章:
在线客服:
对外合作:
联系方式:400-6379-560
投诉建议:feedback@hanspub.org
客服号

人工客服,优惠资讯,稿件咨询
公众号

科技前沿与学术知识分享