期刊文献+

一种模糊评判的实现方法 被引量:1

A Realization of Fuzzy Integrated Estimation
下载PDF
导出
摘要 总结了模糊评判模型的特点,提出了一种基于"层次分析法"和"加权平均模型"的三级综合评判的实现方法,并通过实例系统的开发验证了系统的可行,对模糊评判的实现及推广具有积极的意义。 This paper concludes the characteristics about Fuzzy-based Estimation, proposes a method about the realization of three-layer integrated estimation based on the AHP and weighted-even model, and validates the system by developing it. This system is positive for realizing and popularizing the Fuzzy-based Estimation.
作者 陈磊 陈盈
出处 《台州学院学报》 2009年第6期6-11,共6页 Journal of Taizhou University
基金 安徽省高校省级自然科学研究项目(KJ2009B146z)
关键词 模糊评判 层次分析法 加权平均模型 和法 fuzzy integrated estimation analytical hierarchy process weighted-even model method of summation
  • 相关文献

参考文献7

二级参考文献29

  • 1[1]Rommelfanger HJ.Multicriteria Decision Making Using Fuzzy Logic [C].In:Proceedings of the Conference on the North American Fuzzy Information Processing Society, 1998: 360~364 被引量:1
  • 2[2]Hanseong S,Poonghyun S.A Software Safety Evaluation Method Based on Fuzzy Colored Petri Nets[C].In:Proceedings of International Conference on Fuzzy Systems, 1999; (2): 830~834 被引量:1
  • 3[3]Antonakopoulos T, Agavanakis K.CASE Tools Evaluation: An Automatic Process Based on Fuzzy Sets Theory[C].In:Proceedings of Sixth IEEE International Workshop on Rapid System Prototyping, 1995:140~146 被引量:1
  • 4[4]Cannavacciuolo A,Capaldo G.A Fuzzy Model of the Evaluation Process[C].In:Proceedings of the Fifth IEEE International Conference on Fuzzy Systems, 1996; (2) :828~834 被引量:1
  • 5[5]Copigneaux F,Martin S.Software Security Evaluation Based on a Topdown McCall-like Approach[C].In:Proceedings of the Fourth Conference on Aerospace Computer Security Applications, 1988:414~418 被引量:1
  • 6[6]Garrabrants WM,Ellis AW.CERTS :A Comparative Evaluation Methodfor Risk Management Methodologies and Tools[C].In:Proceedings of the Sixth Annual Computer Security Applications Conference,1990:251~257 被引量:1
  • 7[2]Zhang Xiaoguang,Cao Jian,Zhang Shensheng.Fuzzy Synthesis Evaluation Improved Task Distribution in WfMS.CIT Lab,Department Of Computer Science &Technology,Shanghai Jiaotong University,Shanghai,Lecture Notes in Computer Science,2004,3033:927-934 被引量:1
  • 8James P Anderson.Computer security technology planning study[Z].Volume II.ESD-TR-73-51,Electronic Systems Division,Air Force Systems Command,Hanscom. 被引量:1
  • 9Bell D E,Lapadula L J.Secure computer systems:unified exposition and multics interpretation[Z].MITRE Corp,1976,MTR-2997-3130. 被引量:1
  • 10US DoD 5200.28-STD,Trusted computer systems evaluation criteria[S].1985. 被引量:1

共引文献54

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部