scholarly journals The current situation and reform ideas of computer network security education in higher vocational computers

Author(s):  
Chenghai Cao
2013 ◽  
Vol 373-375 ◽  
pp. 1815-1820
Author(s):  
Hui Liang ◽  
Min Yong Shi

Internet attack is increasing and causing enormous economic loss in recent years. The network security literacy learning for educating students to defense Internet attack becomes more important. With the rapid development of computer and the mobile communication technology, the concept of entertainment is not new in todays Mobile Learning life and its purpose is to make the learning process more enjoyable when making people gain learning environment and resources anytime and anywhere. This paper integrates a funny computer network security education game into an iOS-based M-Learning platform which makes the learning process more fun and effective for its student end-users.


2000 ◽  
Author(s):  
James D. Johannes ◽  
Andrew Fanning ◽  
Kyle Hoover ◽  
Tim Lewis ◽  
Marsha Robinson

2020 ◽  
Vol 39 (3) ◽  
pp. 4427-4441
Author(s):  
Bin Xu

The concept of fuzzy number intuitionistic fuzzy sets (FNIFSs) is designed to effectively depict uncertain information in decision making problems which fundamental characteristic of the FNIFS is that the values of its membership function and non-membership function are depicted with triangular fuzzy numbers (TFNs). The dual Hamy mean (DHM) operator gets good performance in the process of information aggregation due to its ability to capturing the interrelationships among aggregated values. In this paper, we used the dual Hamy mean (DHM) operator and dual weighted Hamy mean (WDHM) operator with fuzzy number intuitionistic fuzzy numbers (FNIFNs) to propose the fuzzy number intuitionistic fuzzy dual Hamy mean (FNIFDHM) operator and fuzzy number intuitionistic fuzzy weighted dual Hamy mean (FNIFWDHM) operator. Then the MADM methods are proposed along with these operators. In the end, we utilize an applicable example for computer network security evaluation to prove the proposed methods.


Sign in / Sign up

Export Citation Format

Share Document