首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
归纳了软件开发项目的几大常见风险,在此基础上,通过集成层次分析法AHP和模糊综合评判法FUZZY的原理和模型,设计出软件开发项目风险评价的指标体系,并运用Delphi方法,让多名专家对各项指标赋权而得出每个指标的权重,之后通过风险因素U到模糊评判评语集V的模糊映射,得到模糊评估矩阵。最后根据FUZZY理论,运用模糊矩阵的合成运算,对软件开发项目风险进行两级评估,从而构建了集成方法下软件开发项目风险评价的过程和模型。结论对软件开发项目管理者具有实际参考价值。  相似文献   

2.
研究网络安全风险评估问题.信息资产价值、安全威胁和安全漏洞是风险评估时必须评估的三个指标.针对传统模糊综合评判法直接评估各指标的风险等级和权重,容易出现评估偏差,导致最终模糊综合评判结果不够客观、准确.为提高评估效率和准确性,提出改进的网络安全风险糊综合评判法,各指标的风险等级采取先由专家评估指标风险值,再通过列表法求得;各指标权重采取先由专家评估指标排队等级,再通过公式法求得.仿真结果表明,改进后的方法减少了主观因素的影响,提高了模糊综合评判的准确度.  相似文献   

3.
针对Web应用的安全风险,提出模糊综合评价与信息熵相结合的集成风险评估方法。对于Web应用的技术维度,采用层次分析法确定评估指标的权重;为更好地反映安全漏洞的潜在风险,在多级模糊评价的过程中引入峰值评判的准则。对于Web应用的管理维度,采用信息熵挖掘评估指标的权重和专家意见的权重,获取专家群体的一致性评判意见。通过应用实例证明了评估方法的可行性和有效性。该集成评估方法吸收了当前网络安全众测的理念,体现了网络安全等级保护和信息安全体系建设的要求,有利于组织快速评估Web应用安全风险并进行持续的改进。  相似文献   

4.
针对气象信息网络事故的随机性,复杂性和不确定的特点,以及在气象信息网络安全风险评估选取评估指标过程中存在的主观性,通过采用粗糙集改进的属性约简算法对用于评估的指标集进行约简,从而剔除其中的对最终结果不造成影响的指标,并且利用相对约简建立用于气象信息网络安全风险评估的层次指标体系,应用模糊层次分析法对选定的气象信息网络进行安全风险评估,比单纯的依靠专家打分法更具有科学依据和数据支持。  相似文献   

5.
针对风险评估过程中存在专家权重难以合理设置,评估结果受专家主观性影响大等问题,提出一种基于自适应专家权重的信息系统风险评估模型SAEW-ISRA,给出一种细粒度专家权重自适应调整方法。首先,在评估过程中引入三角模糊数对风险指标属性评分;其次,根据专家评分模糊度描述专家知识量,结合与专家群体评分的距离构建后验权重,可使专家权重自适应调整,同时使用模糊层次分析法构建风险指标权重;然后,提出信息系统风险指标危险度量化方法,可计算风险值;最后,通过某信息系统的风险评估实例验证所提方法能达到更高的评估准确性,同时在一定程度上解决了评估过程中权重不合理问题。  相似文献   

6.
为提高风险评估的可信度,针对传统的层次分析法在确定因素权重方面存在的问题,引入梯形模糊数来确定权重,提出了基于梯形模糊层次分析法的综合评价方法,解决了风险评估中定性指标定量评估的难题。通过实例分析,验证了该方法的合理性和可行性。  相似文献   

7.
为评估桥梁恐怖袭击风险,提出了一种基于网络分析法(ANP)的桥梁恐怖袭击风险评估仿真模型,通过构建桥梁恐怖袭击风险评估指标体系和ANP网络模型,采用delphi咨询法和Saaty标度法对部分定性评估指标进行了量化,利用Super Decision软件,分别使用ANP和AHP两种方法对某地区5座桥梁作为潜在恐袭目标进行了风险评估和对比分析。仿真结果表明,ANP方法能改进AHP风险评估模型的不足,评估结果可为相关部门反恐提供决策参考依据。  相似文献   

8.
沈利香  曹国 《计算机应用》2012,32(2):480-484
针对商业银行网络安全评估指标之间的相互依赖特性,提出一种基于网络层次分析法的多人风险评估模型。该模型首先利用网络层次分析法得出个体网络安全评估风险指数,并利用加权欧氏距离的双层多目标规划模型集结个体专家的决策结果。仿真实验通过对四家案例银行计算机网络安全风险进行评估,结果显示本模型的评估结果比个体评估更具有可信度。  相似文献   

9.
风险管理逐渐成为开发高质量软件过程中的重要的组成部分。风险评估作为风险管理的重要活动之一,是风险控制的前提。贝叶斯网络作为风险管理的有力工具之一,是处理不确定性的有效方法。结合贝叶斯网络与模糊理论,提出一种风险评估方法,首先使用贝叶斯网络对影响可信软件的风险因素进行风险概率评估,然后利用模糊综合评价法进行风险综合影响评估。该方法用于软件项目的风险评估,为开发高质量的可信软件提供新策略。  相似文献   

10.
基于TFN-FAHP的舰船作战仿真系统可信度评估   总被引:2,自引:1,他引:1  
为了对舰船作战仿真系统的可信度进行科学的评估,提出了基于TFN-FAHP的舰船作战仿真系统可信度评估的方法和具体步骤.首先分析影响舰船作战仿真系统可信度评估的具体指标因素,再将三角模糊数的概念与其基本运算应用在层次分析法之中,同时建立各个相关指标因素权重集,然后应用模糊综合评估法对对舰船作战仿真系统的可信度进行全面综合的评价,实验结果表明,该评估方法的应用解决了传统模糊层次分析法中人的主观判断模糊性的缺点,使评估结果更加趋于合理,是一个实用,有效的方法.  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

13.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

14.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

15.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

16.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

17.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

18.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

19.
20.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号