Evaluation of Rural Water Security in Shandong Province of China

2014 ◽  
Vol 641-642 ◽  
pp. 49-52
Author(s):  
Man Man Leng ◽  
Li Jin ◽  
Qing Guo Li

In order to investigate the water security situation in typical rural areas of Shandong province, the index system of water security assessment were estasblished based on full understanding of water security as well as combination between actual situation of Shandong province and the definition rural water security. With six county-level city of Shandong province as examples for water security evaluation, each index weigh was calculated by entropy method according to the fuzzy comprehensive evaluation method .It was showed that the water security rank from bad to good was shouguang city, ju county, qingyun county, wendeng city, feicheng city and linqu county. The evaluation results was in keeping with the actual condition of water resources, which shows that this system is applicable on rural water security evaluation.

2012 ◽  
Vol 178-181 ◽  
pp. 337-344 ◽  
Author(s):  
Lin Wang ◽  
Ya Song Pang

This paper introducts and compares the conceptof ecological security and other related concepts (including ecilogical risk, ecosystem health, ecosystem servers and ecofogical capacity), sums up the review to assess regional ecological security theory frames (including PSR, PSIR,DSR,DPSIR and DPSER) and evaluation methods (including entropy method, principal component analysis, analytic hierarchy process, grey correlation method, fuzzy comprehensive evaluation method, artificial neural networks, matter-element analysis, ecological footprint, landscape ecological security pattern method and digital ecological security model), compares the advantages and disadvantages of various methods, and discussed regional ecological security evaluation method development direction.


2014 ◽  
Vol 919-921 ◽  
pp. 1451-1456 ◽  
Author(s):  
Qi Sheng Xu ◽  
Jian Gang Shi ◽  
Yong Gang Zhang

Infrastructure construction plays an important role in socio-economic development and urbanization level promotion. For the development of suburban infrastructure in Shanghai, the paper establishes the system of evaluation index and introduces the fuzzy comprehensive evaluation method. To make up for the insufficient of identification ability for determining the index weight by the AHP, the article uses the entropy method to make the results objective, scientific and reasonable.


2012 ◽  
Vol 482-484 ◽  
pp. 2390-2395
Author(s):  
De Qiang Li

In the paper, we establish an evaluation system in the study of four aspects such as people, regulation, equipment and technology management, field management and engineering construction. We present an entropy weight multi-level fuzzy comprehensive evaluation model in power plant security on the basis of reliability identification. Firstly, it identifies the reliability of power plant security evaluation system. Secondly, it can meet the condition that the system is reliable. Then it obtains the indicator weight of all levels in the evaluation system by the entropy weight method. Finally, it carries out a comprehensive evaluation in power plant security by the multi-level fuzzy evaluation method.


2014 ◽  
Vol 587-589 ◽  
pp. 86-91
Author(s):  
Ri Jia Ding ◽  
Lu Yin

With respect to mining area, to establish an evaluation system that aims to reflecting its actual condition and assessing its sustainable development ability has been of importance. In this paper, we discussed the meaning of sustainable development and evaluation factors, and then built a fuzzy comprehensive evaluation model to evaluate the sustainable development condition of mining area.


2012 ◽  
Vol 66 (3) ◽  
pp. 487-493 ◽  
Author(s):  
Fengshun Yang ◽  
Dongguo Shao ◽  
Chun Xiao ◽  
Xuezhi Tan

In this study, a model for assessing urban water security is developed using an evaluation method of catastrophe theory. To overcome the defects of the traditional catastrophe evaluation method, two aspects of improvement are assessed. One is expanding the scope of application of the traditional catastrophe approach, i.e., new normalization formulae for five lower level indicators contained in the index at the higher level is proposed in theory. The other is solving the problem that the synthetic values are generally high and the differences are not obvious based on the theories of Cramer's Rule and Vander monde determinant. The assessment results in Wuhan city are in good agreement with the actual situation. The comparison between the results of the improved method and a fuzzy comprehensive evaluation method verifies the science and reliability of the developed method. Consequently, it is concluded that the improved method can be an effective tool for assessment of urban water security and provide a valuable reference for improving inadequacies in urban water security.


2014 ◽  
Vol 513-517 ◽  
pp. 369-372 ◽  
Author(s):  
Wen Long Zang

Information security risk assessment is an important component of information system security engineering. Adopting the combination of qualitative and quantitative to qualitative evaluation method, based on the theory of fuzzy membership, every assessment indicator can be quantized with the method of integration of the qualitative to the quantitative. And adopting the objective method of fuzzy transformation to try to eliminate the initiative judgments, thus to ensure that the information security assessment is truly reflected, and solving such problems as the data collection in the process of information security evaluation, the combination of qualitative and quantitative evaluation, which are both very difficult to deal with. Consequently, the evaluation method is more scientific, comprehensive and maneuverability.


Author(s):  
Ying Gao ◽  
Qin Su ◽  
Yue Fang ◽  
Pinyan Lai

The aim of this study is to investigate and discuss the potential security issues arising from the deployment of the Cloud Enterprise Resource Planning system, and to propose a perfect and standard set of security evaluation index system for Cloud ERP security issues. Considering the issues which may be inherent in the conventional Enterprise Resource Planning systems and new ones brought by Cloud Computing, Cloud Platform, Cloud ERP, we use text mining technology to mine the related standard files in this paper. Since the standard literature is based on the comprehensive results of technology, science and practice, its characteristics of standardization, objectivity and validity also ensure the effectiveness and applicability of indicators. By using NLP methods, we construct a Cloud ERP security evaluation index system consisting of five parts: evaluation method security, information access security, data security, management security and others. The entropy method is used to assign weights for the Cloud ERP security evaluation index system, which is more scientific and rational and the method moderates the lack of objectivity caused by traditional evaluation methods which over-relies on evaluators. By analyzing cases of Cloud ERP collected in various application reports and research papers, we improve our system and find that compared to other evaluation systems, our system can evaluate the security of Cloud ERP more comprehensively.


Sign in / Sign up

Export Citation Format

Share Document