Research on Subject Trust Evaluation Based on Fuzzy Theory
نویسندگان
چکیده
منابع مشابه
Research on complex system evaluation based on fuzzy theory
Complex system evaluation lies in the core position of system engineering theory and methodology and is also a research hotspot and difficulty in system engineering theory and practice research. The paper, taking performance evaluation of integrates with agriculture base and supermarket for example, advances an evaluation indicator system and a fuzzy comprehensive evaluation algorithm. Firstly,...
متن کاملdesigning unmanned aerial vehicle based on neuro-fuzzy systems
در این پایان نامه، کنترل نرو-فازی در پرنده هدایت پذیر از دور (پهپاد) استفاده شده است ابتدا در روش پیشنهادی اول، کنترل کننده نرو-فازی توسط مجموعه اطلاعات یک کنترل کننده pid به صورت off-line آموزش دیده است و در روش دوم یک کنترل کننده نرو-فازی on-line مبتنی بر شناسایی سیستم توسط شبکه عصبی rbf پیشنهاد شده است. سپس کاربرد این کنترل کننده در پهپاد بررسی شده است و مقایسه ای ما بین کنترل کننده های معمو...
Trust Computation Based on Fuzzy Clustering Theory
Trust is part of our daily life and thus can be used as a mechanism for providing security in computer networks. In this paper, by considering the dynamic nature of trust, especially the temporal and spatial characteristics in security of society, we describe trust from four factors: access time, place, history behavior and risk control strategy and then apply fuzzy clustering method and inform...
متن کاملA research on classification performance of fuzzy classifiers based on fuzzy set theory
Due to the complexities of objects and the vagueness of the human mind, it has attracted considerable attention from researchers studying fuzzy classification algorithms. In this paper, we propose a concept of fuzzy relative entropy to measure the divergence between two fuzzy sets. Applying fuzzy relative entropy, we prove the conclusion that patterns with high fuzziness are close to the classi...
متن کاملTrust Model in Cloud Computing Environment Based on Fuzzy Theory
Recent years have witnessed the development of cloud computing. However, there also come some security concerns in cloud computing environment, such as emerging network attacks and intrusions, and instable cloud service provision due to flexible cloud infrastructure and resources. To this end, we research on the trusted computing in cloud computing environment. Specifically, in this paper, we p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Advanced Engineering Forum
سال: 2011
ISSN: 2234-991X
DOI: 10.4028/www.scientific.net/aef.1.52