Study on fuzzy safety risk evaluation method of airport industry with influence factor analysis

Author(s):  
Xian-Feng Lu ◽  
Sheng-Guo Huang
2013 ◽  
Vol 774-776 ◽  
pp. 1940-1944
Author(s):  
Jin Yu Wang ◽  
Xiao Huan Yu

By using resampling methods this article processed the data of the four existing airlines safety Circumstances into 20 airlines, which are generated randomly and analog ground by using the Matlab software. Based on the data safety evaluation on the safety risk of the real existence four airlines of A, B, C and D are analyzed by using the method of factor analysis from the 20 airlines, and made and evaluated the airline security indicators. It can give the probable cause about airlines to determine their own unsafe facts through the evaluation results, and to find ways to improve.


2012 ◽  
Vol 209-211 ◽  
pp. 1402-1405
Author(s):  
Cheng Tie Tang ◽  
Zhen Hao Zhang ◽  
Zhi Gang He

The risk of bridge and tunnel engineering in construction stage is a main subject which must be faced by bridge and tunnel engineer. Risk evaluation can analyze the happening possibility of construction safety accident and the consequence and loss caused by the accident. The research summary of risk evaluation method of bridge and tunnel construction safety is generalized in this paper. The main methods of risk evaluation at present are extrapolated, and the quality of each method is analyzed. The word of this paper will provide favorable reference for further research on risk evaluation of construction safety of bridge and tunnel engineering.


Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Sign in / Sign up

Export Citation Format

Share Document