首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
The COVID-19 pandemic has triggered a global humanitarian disaster that has never been seen before. Medical experts, on the other hand, are undecided on the most valuable treatments of therapy because people ill with this infection exhibit a wide range of illness indications at different phases of infection. Further, this project aims to undertake an experimental investigation to determine which treatments for COVID-19 disease is the most effective and preferable. The research analysis is based on vast data gathered from professionals and research journals, making this study a comprehensive reference. To solve this challenging task, the researchers used the HF AHP-TOPSIS Methodology, which is a well-known and highly effective Multi-Criteria Decision Making (MCDM) technique. The technique assesses the many treatment options identified through various research papers and guidelines proposed by various countries, based on the recommendations of medical practitioners and professionals. The review process begins with a ranking of different treatments based on their effectiveness using the HF-AHP approach and then evaluates the results in five different hospitals chosen by the authors as alternatives. We also perform robustness analysis to validate the conclusions of our analysis. As a result, we obtained highly corroborative results that can be used as a reference. The results suggest that convalescent plasma has the greatest rank and priority in terms of effectiveness and demand, implying that convalescent plasma is the most effective treatment for SARS-CoV-2 in our opinion. Peepli also has the lowest priority in the estimation.  相似文献   

2.
Usability and security are often considered contradictory in nature. One has a negative impact on the other. In order to satisfy the needs of users with the security perspective, the relationship and trade-offs among security and usability must be distinguished. Security practitioners are working on developing new approaches that would help to secure healthcare web applications as well increase usability of the web applications. In the same league, the present research endeavour is premised on the usable-security of healthcare web applications. For a compatible blend of usability and security that would fulfill the users’ requirments, this research proposes an integration of the Fuzzy AHP-TOPSIS method for assessing usable-security of healthcare web applications. Since the estimation of security-usability accrately is also a decision making problem, the study employs Multiple Criteria Decision Analysis (MCDA) for selecting the most decisive attributes of usability as well as security. Furthermore, this study also pinpoints the highest priority attributes that can strengthen the usable-security of the healthcare web applications. The effectiveness of the suggested method has been tested on the healthcare web applications of local hospitals in Mecca, Saudi Arabia. The results corroborate that Fuzzy AHP-TOPSIS is indeed a reliable technique that will help the developers to design a healthcare web applications that delivers optimum usable-security.  相似文献   

3.
Multiple customer data management has become a focus of attention in big organizations. Although much information is available, it does not translate into significant profitable value-added services. We present a design of a commercial web application based on business intelligence that generates information on social and financial behavior of clients in an organization; with the purpose of obtain additional information that allows to get more profits. This app will provide a broader perspective for making strategic decisions to increase profits and reduce internal investment costs. A case in point is the financial sector, a group of financial entities were used to make measurements and test them. A design to build a web application aimed at achieving a large and ambitious goal by means of defined tools reflecting clients’ business needs is proposed. In this research, different techniques and technologies are explored, such as diagrams, frameworks, design, architecture, model entity-relationship, tables, equations, mental maps and development tools. Through the Personal Software Process methodology and with the help of information extraction, consolidation, and visualization, the implementation can be carried out. This article provides the importance of implementing business intelligence in an organization and expands on the steps needed for the implementation of this valuable technology.  相似文献   

4.
In the recent years, the booming web-based applications have attracted the hackers’ community. The security risk of the web-based hospital management system (WBHMS) has been increasing rapidly. In the given context, the main goal of all security professionals and website developers is to maintain security divisions and improve on the user’s confidence and satisfaction. At this point, the different WBHMS tackle different types of security risks. In WBHMS, the security of the patients’ medical information is of utmost importance. All in all, there is an inherent security risk of data and assets in the field of the medical industry as a whole. The objective of this study is to estimate the security risk assessment of WBHMS. The risks assessment pertains to securing the integrity of the information in alignment with the Health Insurance Portability and Accountability Act. This includes protecting the relevant financial records, as well as the identification, evaluation, and prevention of a data breach. In the past few years, according to the US-based cyber-security firm Fire-eye, 6.8 million data thefts have been recorded in the healthcare sector in India. The breach barometer report mentions that in the year 2019, the data breaches found were up to 48.6% as compared to the year 2018. Therefore, it is very important to assess the security risk in WBHMS. In this research, we have followed the hybrid technique fuzzy analytic hierarchy process-technique for order of preference by similarity to ideal solution (F-AHPTOPSIS) approach to assess the security risk in WBHMS. The place of this empirical database is at the local hospital of Varanasi, U.P., India. Given the affectability of WBHMS for its board framework, this work has used diverse types of web applications. The outcomes obtained and the procedure used in this assessment would support future researchers and specialists in organizing web applications through advanced support of safety and security.  相似文献   

5.
Design architecture is the edifice that strengthens the functionalities as well as the security of web applications. In order to facilitate architectural security from the web application’s design phase itself, practitioners are now adopting the novel mechanism of security tactics. With the intent to conduct a research from the perspective of security tactics, the present study employs a hybrid multi-criteria decision-making approach named fuzzy analytic hierarchy process-technique for order preference by similarity ideal solution (AHP-TOPSIS) method for selecting and assessing multi-criteria decisions. The adopted methodology is a blend of fuzzy analytic hierarchy process (fuzzy AHP) and fuzzy technique for order preference by similarity ideal solution (fuzzy TOPSIS). To establish the efficacy of this methodology, the results are obtained after the evaluation have been tested on fifteen different web application projects (Online Quiz competition, Entrance Test, and others) of the Babasaheb Bhimrao Ambedkar University, Lucknow, India. The tabulated outcomes demonstrate that the methodology of the Multi-Level Fuzzy Hybrid system is highly effective in providing accurate estimation for strengthening the security of web applications. The proposed study will help experts and developers in developing and managing security from any web application design phase for better accuracy and higher security.  相似文献   

6.
When designing a product or process, a design engineer is often faced with a number of quality attributes and hence prioritizing the quality attributes is an inevitable task. Development of an adequate weight assessment system for multiple attributes in the early stage of design is crucial, since the choice of paths to quality enhancement depends heavily upon the type of weight assessment system used. Although several weight assessment methods are available in the literature, there is room for improvement. Most weight assessment methods reported in the research community have been developed from the perspective of either customers or a design engineer. This article proposes a hybrid weight assessment system by combining the perspectives of both parties, the customer and a design engineer, in such a way that uncertainty of human perceptions can be modeled using the concepts of fuzzy sets and Monte Carlo simulation. A model is presented and a numerical example is discussed.  相似文献   

7.
大宗散货包装——集装袋的安全性评估   总被引:2,自引:2,他引:0  
高翔 《包装工程》2011,32(21):123-125,132
研究了针对盛装大宗散货的集装袋包装运输的相关国际法规的要求,分析了集装袋在不同运输环境中的潜在危险性,提出了应通过对集装袋力学性能、防静电性能、防老化性能进行检验,以对其安全性进行综合评估。  相似文献   

8.
Security is an important component in the process of developing healthcare web applications. We need to ensure security maintenance; therefore the analysis of healthcare web application's security risk is of utmost importance. Properties must be considered to minimise the security risk. Additionally, security risk management activities are revised, prepared, implemented, tracked, and regularly set up efficiently to design the security of healthcare web applications. Managing the security risk of a healthcare web application must be considered as the key component. Security is, in specific, seen as an add-on during the development process of healthcare web applications, but not as the key problem. Researchers must ensure that security is taken into account right from the earlier developmental stages of the healthcare web application. In this row, the authors of this study have used the hesitant fuzzy-based AHP-TOPSIS technique to estimate the risks of various healthcare web applications for improving security-durability. This approach would help to design and incorporate security features in healthcare web applications that would be able to battle threats on their own, and not depend solely on the external security of healthcare web applications. Furthermore, in terms of healthcare web application's security-durability, the security risk variable is measured, and vice versa. Hence, the findings of our study will also be useful in improving the durability of several web applications in healthcare.  相似文献   

9.
To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project (OWASP) Top Ten project is required. The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and implementation of those tools has different effectiveness rates in terms of security performance. Given the significant cost of commercial tools, this paper studies the performance of seven static tools using a new methodology proposal and a new benchmark designed for vulnerability categories included in the known standard OWASP Top Ten project. Thus, the practitioners will have more precise information to select the best tool using a benchmark adapted to the last versions of OWASP Top Ten project. The results of this work have been obtaining using widely acceptable metrics to classify them according to three different degree of web application criticality.  相似文献   

10.
Quality function deployment (QFD) is a product planning management instrument which has been used in a broad range of industries. However, the traditional QFD method has been criticised much for its deficiencies in acquiring experts’ opinions, weighting customer requirements (CRs) and ranking engineering characteristics (ECs). To overcome the limitations, an integrated analytical model is presented in this study for obtaining the importance ratings of ECs in QFD by integrating decision-making trial and evaluation laboratory (DEMATEL) technique and Vlsekriterijumska Optimizacija I Kompromisno Resenje (VIKOR) method under hesitant fuzzy environment. In particular, the hesitant fuzzy DEMATEL is used to analyse the interrelationships among CRs and determine their weights, and the hesitant fuzzy VIKOR is utilised to prioritise ECs. Finally, the feasibility and practicality of the proposed method are verified by an example regarding the product development of electric vehicle.  相似文献   

11.
To address the problem of network security situation assessment in the Industrial Internet, this paper adopts the evidential reasoning (ER)algorithm and belief rule base (BRB) method to establish an assessment model. First, this paper analyzes the influencing factors of the Industrial Internet and selects evaluation indicators that contain not only quantitative data but also qualitative knowledge. Second, the evaluation indicators are fused with expert knowledge and the ER algorithm. According to the fusion results, a network security situation assessment model of the Industrial Internet based on the ER and BRB method is established, and the projection covariance matrix adaptive evolution strategy (P-CMA-ES) is used to optimize the model parameters. This method can not only utilize semiquantitative information effectively but also use more uncertain information and prevent the problem of combinatorial explosion. Moreover, it solves the problem of the uncertainty of expert knowledge and overcomes the problem of low modeling accuracy caused by insufficient data. Finally, a network security situation assessment case of the Industrial Internet is analyzed to verify the effectiveness and superiority of the method. The research results show that this method has strong applicability to the network security situation assessment of complex Industrial Internet systems. It can accurately reflect the actual network security situation of Industrial Internet systems and provide safe and reliable suggestions for network administrators to take timely countermeasures, thereby improving the risk monitoring and emergency response capabilities of the Industrial Internet.  相似文献   

12.
涂布干燥气悬浮烘箱腔体计算机模拟与仿真分析   总被引:1,自引:1,他引:0  
宋建辉  丁俊健  涂志刚 《包装工程》2019,40(19):223-229
目的 从5种不同的涂布气悬浮烘箱腔体中,选出性能最佳的腔体结构方案。方法 通过对5种气悬浮烘箱腔体三维建模,应用Ansys软件的Fluent模块,设定5种模型实际使用时的边界条件,模拟5种烘箱的工作情况。结果 借助设定的辅助平面、辅助线段,得到了5种烘箱工作时的腔体内部热风轨迹图、烘箱不同位置的风速等高线图。结论 通过比较模拟结果,确定了均风导流隔板型烘箱腔体的工作效果优于其他烘箱结构。  相似文献   

13.
针对船舶安全评估过程中的诸多不确定因素,提出了一种基于模糊证据理论的安全评估方法,将证据体空间中的事件视为模糊子集,并引入模糊概率,更好地描述了专家意见(或知识),给出了质量分配函数的表示.最后,结合某船舶系统,给出了其安全评估的具体实现过程.结果表明,该方法可靠、有效.  相似文献   

14.
针对在大规模企业分布式网络中快速实施安全评估这一分布式安全评估问题,提出一种面向任务、可重构的主控中心方案.实验验证了该方案在快速任务生成时是可行、有效的,具有以扫描策略为组件、面向任务、可重构特性.  相似文献   

15.
The environmental impact of maritime transport has now become a relevant issue in sustainable policy formulation and has attracted increasing interest from academia. For the sustainable development of maritime transport, International Maritime Organization stipulates that the sulfur content of ship emissions will reach 0.5 from 2020. With the approaching of the stipulated implementation date, shipowners need to adopt scientific methods to make decision on low sulfur fuel. In this study, we applied a prospect theory based hesitant fuzzy multi-criteria decision-making model to obtain the optimal decision of low Sulphur marine fuel. For this purpose, the hesitant fuzzy decision matrix is established to collect expert opinions, the maximizing deviation method is adopted to determine criteria weights. According to calculate the Euclidean distance from the reference points, we obtain the comprehensive prospect values of alternatives. Lastly, a case study is carried out to illustrate the significance and effectiveness of the proposed methodology. The innovation of this study is that it is the first-time adopting prospect theory and hesitate fuzzy sets to multi-criteria decision making for low Sulphur marine fuel, which provides an effective decision model for shipping companies under Low Sulphur regulations, and can also be extended to other industries.  相似文献   

16.
系统安全中存在含糊性和不可分辨性,Fuzzy综合评价只能从正面解决含糊性问题,而Vague集具有 对不确定数据更强、更灵活的直觉表达能力,由此提出把Vague集运用到综合评价当中,并使用改进层次分析法 确定各评价指标的权重,建立了基于Vague集的系统安全综合评价模型。通过对陕西某高层建筑火灾危险评价实 例证明,该模型能使系统安全评价结果更准确、合理。  相似文献   

17.
MIS系统安全登录中加密技术的应用研究   总被引:1,自引:0,他引:1  
针对当前MIS系统登录方式在安全方面的问题和不足,分析了加密技术在数据库中应用的特殊性及加密算法特别是DES算法的特点。根据《铁道货币资金结算和管理系统》(RFS MIS)的安全需求,利用数据库的安全机制,设计了在双层用户角色模式下,应用3DES算法加密用户登录信息的安全登录验证机制;并详细论述了其在RFS MIS系统中的具体实现过程。  相似文献   

18.
重大环境污染事故风险模糊排序方法研究   总被引:5,自引:0,他引:5  
据工厂重大环境污染事故风险评价呈多指标多层次结构, 且风险性排序具有相对性和模糊性的特点, 运用模糊集理论中的权距离和隶属度概念, 并将最小二乘法加以拓展, 提出能够有效解决此类多指标多层次排序或优选问题的模糊排序方法。用于对大连市4家重点工厂的事故风险性进行评价和排序, 评价结果合理、准确。  相似文献   

19.
1 IntroductionTheProductMulti LifecycleSystem(PMLS)isageneraltermreferringtotheengineeringtechniquesandrelatedtheoriescommonlyconcernedwiththeenvironmentinfluence,resourceusageandproductlifedur ingthetotalProductMulti Lifecycle (PML)whenaproductisdesigned…  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号