Font Size: a A A

The Application Investigation Of Security Management System In University Based On Aided Decision Technology

Posted on:2008-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:X C ZhangFull Text:PDF
GTID:2178360212978514Subject:Systems Engineering
Abstract/Summary:PDF Full Text Request
The security management system theory and application in university is directly related to the security of the scientific research projects. Therefore, some problems come out under this condition, including whether the safety of these items can be achieved and how the achievement is. These are the problems that the security supervision and management departments must confront. These years, the number of the classified projects in university is steeply increasing. They involve more and more the staff, equipment, and information on the related. Accordingly, it is necessary to establish and consummate a security management system to effectively manage the classified information.Based on the intelligent decision, data mining, and data warehouse technology, an intelligent decision management systems that university security management system was designed according to system project and management thought. The main contents in the thesis are as follows :1. In order to meet the needs of confidentiality, the logic structure and functional structure of the security management system was designed on the basis of Intelligent decisions.2. Considering the security reality in the university, the data model of data warehouse decision support system was given in order to build a security decision environment, which includes decision concept model of support data warehouse, logical model, and physical model. When the Data Warehouse was established, the secure data was further analyzed using data mining method and data warehouse.3. The investigation and establishment of a confidential evaluation system were performed. Based on the fuzzy comprehensive evaluation, fuzzy comprehensive evaluation of a kind of integrated method was designed. The method was applied in the establishment process of security degree evaluation system. This method solve the problems with many factors and factors scale which is hard to distribute.
Keywords/Search Tags:security management system, fuzzy comprehensive evaluation, aided decision technology, Data Mining
PDF Full Text Request
Related items