首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
归纳了软件开发项目的几大常见风险,在此基础上,通过集成层次分析法AHP和模糊综合评判法FUZZY的原理和模型,设计出软件开发项目风险评价的指标体系,并运用Delphi方法,让多名专家对各项指标赋权而得出每个指标的权重,之后通过风险因素U到模糊评判评语集V的模糊映射,得到模糊评估矩阵。最后根据FUZZY理论,运用模糊矩阵的合成运算,对软件开发项目风险进行两级评估,从而构建了集成方法下软件开发项目风险评价的过程和模型。结论对软件开发项目管理者具有实际参考价值。  相似文献   

2.
研究网络安全风险评估问题.信息资产价值、安全威胁和安全漏洞是风险评估时必须评估的三个指标.针对传统模糊综合评判法直接评估各指标的风险等级和权重,容易出现评估偏差,导致最终模糊综合评判结果不够客观、准确.为提高评估效率和准确性,提出改进的网络安全风险糊综合评判法,各指标的风险等级采取先由专家评估指标风险值,再通过列表法求得;各指标权重采取先由专家评估指标排队等级,再通过公式法求得.仿真结果表明,改进后的方法减少了主观因素的影响,提高了模糊综合评判的准确度.  相似文献   

3.
针对Web应用的安全风险,提出模糊综合评价与信息熵相结合的集成风险评估方法。对于Web应用的技术维度,采用层次分析法确定评估指标的权重;为更好地反映安全漏洞的潜在风险,在多级模糊评价的过程中引入峰值评判的准则。对于Web应用的管理维度,采用信息熵挖掘评估指标的权重和专家意见的权重,获取专家群体的一致性评判意见。通过应用实例证明了评估方法的可行性和有效性。该集成评估方法吸收了当前网络安全众测的理念,体现了网络安全等级保护和信息安全体系建设的要求,有利于组织快速评估Web应用安全风险并进行持续的改进。  相似文献   

4.
针对气象信息网络事故的随机性,复杂性和不确定的特点,以及在气象信息网络安全风险评估选取评估指标过程中存在的主观性,通过采用粗糙集改进的属性约简算法对用于评估的指标集进行约简,从而剔除其中的对最终结果不造成影响的指标,并且利用相对约简建立用于气象信息网络安全风险评估的层次指标体系,应用模糊层次分析法对选定的气象信息网络进行安全风险评估,比单纯的依靠专家打分法更具有科学依据和数据支持。  相似文献   

5.
针对风险评估过程中存在专家权重难以合理设置,评估结果受专家主观性影响大等问题,提出一种基于自适应专家权重的信息系统风险评估模型SAEW-ISRA,给出一种细粒度专家权重自适应调整方法。首先,在评估过程中引入三角模糊数对风险指标属性评分;其次,根据专家评分模糊度描述专家知识量,结合与专家群体评分的距离构建后验权重,可使专家权重自适应调整,同时使用模糊层次分析法构建风险指标权重;然后,提出信息系统风险指标危险度量化方法,可计算风险值;最后,通过某信息系统的风险评估实例验证所提方法能达到更高的评估准确性,同时在一定程度上解决了评估过程中权重不合理问题。  相似文献   

6.
为评估桥梁恐怖袭击风险,提出了一种基于网络分析法(ANP)的桥梁恐怖袭击风险评估仿真模型,通过构建桥梁恐怖袭击风险评估指标体系和ANP网络模型,采用delphi咨询法和Saaty标度法对部分定性评估指标进行了量化,利用Super Decision软件,分别使用ANP和AHP两种方法对某地区5座桥梁作为潜在恐袭目标进行了风险评估和对比分析。仿真结果表明,ANP方法能改进AHP风险评估模型的不足,评估结果可为相关部门反恐提供决策参考依据。  相似文献   

7.
研究网络安全准确评估问题,由于非法入侵使网络存在安全隐患,为最大限度降低网络安全带来的损失,在分析网络安全态势影响因素的基础上,提出一种模糊层次分析的网络安全态势评估模型.先构建构建网络安全指标体系,采用层次分析法计算各评估指标权重,并采用模糊方法建立网络安全态势一致性判断矩,从而实现对网络安全态势进行综合评估.仿真结果表明,模糊层次分析法提高了网络安全态势评估的准确率,评估结果更加客观,是一种有效的网络安全态势评估方法.  相似文献   

8.
针对“人在回路”和“硬件在回路”仿真系统规模大,实体多的特点,提出一种基于二级模糊综合评价法的仿真系统可信度评估方法;运用层次分析法对飞机虚拟维修训练系统不同层级的仿真模型的可信度进行分析,从而建立一种基于二级层次模型的复杂仿真训练系统的可信度指标体系;运用模糊综合评价方法与专家评价法相结合的可信度评估量化方法,实现了对虚拟仿真训练系统的量化计算;在此基础上,利用典型实例对该方法进行了实验验证,证明该方法对可重用复杂仿真系统实现精确地量化评估;并根据实验结果分析了仿真系统的改进方向,对其提高仿真效果和实训能力具有重要的指导作用。  相似文献   

9.
王冠 《软件工程师》2014,(12):42-45
本文通过风险识别,风险评估和风险应对这三种方法,对网络招投标中可能存在的风险进行了分析。针对网络招投标双方,分别建立适用于它们自身的风险评估指标体系。利用模糊层次分析法,对网络招投标双方的风险评估模型进行构建,结合德尔菲法,通过Yaahp软件,确定各个指标的权重,进而找出对网络招投标双方产生较大影响的风险因素,最后利用风险应对的方法,提出了降低招投标双方风险的对策。  相似文献   

10.
为提高风险评估的可信度,针对传统的层次分析法在确定因素权重方面存在的问题,引入梯形模糊数来确定权重,提出了基于梯形模糊层次分析法的综合评价方法,解决了风险评估中定性指标定量评估的难题。通过实例分析,验证了该方法的合理性和可行性。  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

13.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

14.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

15.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

16.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

17.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

18.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

19.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号