CN108446848A - Individual networks awareness of safety scalar quantization evaluation method - Google Patents

Individual networks awareness of safety scalar quantization evaluation method Download PDF

Info

Publication number
CN108446848A
CN108446848A CN201810233382.0A CN201810233382A CN108446848A CN 108446848 A CN108446848 A CN 108446848A CN 201810233382 A CN201810233382 A CN 201810233382A CN 108446848 A CN108446848 A CN 108446848A
Authority
CN
China
Prior art keywords
behavior
safety
awareness
assessment
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810233382.0A
Other languages
Chinese (zh)
Inventor
罗森林
郝靖伟
李蕊
尚海
潘丽敏
杨鹏
李燕伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN201810233382.0A priority Critical patent/CN108446848A/en
Publication of CN108446848A publication Critical patent/CN108446848A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Abstract

For the problem that current network security realizes ambiguity in definition, lack effective assessment system and methodology, the present invention proposes individual networks awareness of safety scalar quantization evaluation method.This method includes three parts, subjective consciousness assessment, the assessment of behavior ontology and evaluation decision.Subjective consciousness evaluation part obtains individual information by questionnaire survey, is recognized to each information security by analytic hierarchy process (AHP), 4 information law ethics, information security knowledge, information security ability dimensions are given a mark, score of the acquisition individual consumer in this 4 dimensions.Behavior ontology evaluation part scans computer and mobile phone user's behavior, calculating and the optimal direct distance of user behavior, passes through random forests algorithm and differentiate user behavior safe class.Subjective consciousness assessment and the assessment of behavior ontology are merged, individual networks space safety level of consciousness is assessed.The experimental results showed that this method can realize individual networks awareness of safety scalar quantization in conjunction with machine learning method, granularity to weak from being not less than 4 grades by force, and Grading accuracy rate is 95% or more.This method can be used for improving the comprehensive and universality of individual networks awareness of safety scalar quantization model, have certain practical value.

Description

Individual networks awareness of safety scalar quantization evaluation method
Technical field
The present invention relates to individual networks awareness of safety scalar quantization evaluation methods, belong to computer and information science technology neck Domain.
Background technology
Existing awareness of network security appraisal procedure depends on subjective judgement and statistical method mostly.Factor of evaluation is single, Lack objectivity;Simple statistics cannot portray structure feature complicated inside problem.For these problems, with information security Based on basic theory, information attacking and defending game theory, assessed in conjunction with the safe Attack Defence method of up-to-date information and awareness of network security Characteristic set builds the network security that a kind of assessment data dimension is wide, assessment content is comprehensive, assessment result has guiding value and anticipates Know assessment models, assessment result is divided by weak multiple ranks, proposing individual networks awareness of safety scalar quantization evaluation method by force, And crowd can be returned and carry out model verification.
Evaluation attribute (data type) involved by current network security consciousness assessment is not yet clear.Information security is one The extremely extensive topic of scope, and the various security knowledges, principle, method involved by awareness of network security are same complicated numerous It is trivial, it is therefore desirable to summarize extraction system, the major influence factors of comprehensive awareness of network security assessment, structure individual networks safety Realize scalar quantization appraisement system, these are required for abundant information security research and working experience and bulk information safety The excavation and analysis of data.The method mainly taken at present is divided into two kinds:Based on subjective intention analysis evaluation method and be based on The evaluation method of behavior ontological analysis.
1. the appraisal procedure based on the analysis of subjective intention
Appraisal procedure based on the analysis of subjective intention is the main method of current awareness of network security assessment.It is pass through to Measured sends questionnaire or the relevant information into test and appraisal acquisition user on line.Then to the information amount of progress of acquisition Change.Quantization to information is actually a kind of process of determining evaluation criterion weight.By to individual acquisition relevant information into Row weighted calculation is to obtain the evaluation result of comprehensive multidimensional.
Most common analysis method is analytic hierarchy process (AHP) in appraisal procedure based on the analysis of subjective intention.Such as 2013, Dong Lipeng is using the safe and secret attainment of information of trainee as destination layer, and index is proposed as quasi- stratification according to Satty three times for design 1~9 proportion quotiety build the relative importance judgment matrix of indices by the way of expert judging.To calculate The weight of each index.It scores each evaluating object, assessment awareness of network security is horizontal.Analytic hierarchy process (AHP) is to analysis personnel's It is required that it is relatively high, and generally require the long time.On the other hand, micro-judgment is largely dependent upon by result The conversed analysis of data obtains individual networks awareness of safety information.But human factor is subjective complicated, makes the cost of manual analysis It becomes very large, it is most important that structure feature complicated inside data cannot be portrayed.
Scaling method is another important method of subjective intention analysis.Such as 2014, Gao Donghuai et al. proposes to use scale To assess awareness of safety.Scale is worked out according to Likert scale, has " agreeing to very much " for each statement, " agreement ", " differ Calmly ", " disagreeing ", " very different meaning " five kinds of answers, are denoted as 5 points, 4 points, 3 points, 2 points, 1 point respectively.Each surveyee's Attitude total score is the summation of each problem score, and the attitude of the explainable surveyee of this total score is strong and weak or he is on this scale Different conditions.Scaling method of grading is also defective, and using this scale, examination person is easy to generate haloing error and the middle error that becomes. Everyone each project will be soon chosen as high score or average mark by excessively roomy or the golden mean of the Confucian school the examination person.Majority is commented Grade scale is suitable for all units of tissue not for a certain special post, because without specific aim.Grading table It is easy that the prejudice of examination person or halo effect is made to enter in evaluation.The structure of assessment models index system is asked dependent on investigation Volume, it is subjective, objective behavial factor feature is had ignored, the objectivity and accuracy of model are affected.
2. the appraisal procedure of Behavior-based control ontology
Traditional analytic hierarchy process (AHP) based on questionnaire survey has comparable limitation.On the one hand it is easy to be carried out by user Specific aim is coped with, it is difficult to reflect the true safety behavior of user.On the other hand acquisition information mode is single, it is difficult to which detection is different User copes with security threat ability complicated and changeable under scene.The appraisal procedure of Behavior-based control ontology, by the visitor for acquiring user Sight behavior, such as mobile phone uses, PC machine uses content of the act, objective evaluation awareness of safety is horizontal.
In conclusion existing assessment models also only consider the problems such as that there is only methods is single, assessment is comprehensive insufficient To individual subjective consciousness without the importance in view of prior objective behavior ontological analysis, the present invention proposes individual net Network awareness of safety scalar quantization evaluation method, by two aspect hierarchical layered amount of individual subjective consciousness and objective behavior ontology Change, more granularity fusions build individual networks awareness of safety scalar quantization model.
Invention content
Present invention aim to address current network securities to realize ambiguity in definition, lacks asking for effective assessment system and methodology Topic is unfolded to study to awareness of network security scalar quantization method, and in conjunction with various dimensions key factor, more granularity composite ratings calculate more Method is mutually authenticated, and more real data are mutually examined, and proposes individual networks awareness of safety scalar quantization evaluation method, will assess object Awareness of network security be divided into strong, stronger, general, weak four grades.
The design principle of the present invention includes three parts, subjective consciousness assessment, the assessment of behavior ontology and evaluation decision.It is subjective Consciousness assessment part obtains individual information by questionnaire survey, is recognized to each information security by analytic hierarchy process (AHP), information law Ethics, information security knowledge, the marking of information security ability four dimensions, score of the acquisition individual consumer in this four dimensions.Row For ontology evaluation part, computer and mobile phone user's behavior, calculating and the optimal direct distance of user behavior are scanned, by random Forest differentiates user behavior safe class.Finally fusion subjective consciousness assessment and the assessment of behavior ontology, assessment individual networks safety Level of consciousness.
The technical scheme is that be achieved by the steps of:
Step 1, subjective consciousness is assessed.
Step 1.1, questionnaire survey obtains data.
Step 1.2, questionnaire survey data are for statistical analysis.
Step 1.3, analytic hierarchy process (AHP) calculates absolute weight of each layer element to target.
Step 2, behavior ontology is assessed.
Step 2.1, it is scanned by personal computer behavior scanning and mobile terminal behavior, it is relevant to obtain personal security's consciousness Characteristic.
Step 2.2, the characteristic got is pre-processed, complies with the training sample requirement of random forest.
Step 2.3, using random forests algorithm to by pretreated personal computer and mobile terminal features sample It is for statistical analysis.
Step 3, subjective and objective assessment, the evaluation of comprehensive classification quantized result.According to Subjective questionnaire on negative impact data and objective row Decision model is established using tree for the attribute of ontology data, more algorithms are mutually authenticated, and more real data are mutually examined, and are obtained Go out the scalar quantization result of individual networks awareness of safety.
Advantageous effect
Compared to the appraisal procedure analyzed based on subjective intention, the present invention can effectively excavate implicit between each index system Related information also sufficiently lowers the influence of subjective factor, increases and is considered to objective behavial factor feature, greatly improves The objectivity and accuracy of model.
Compared to the appraisal procedure of Behavior-based control ontology, the present invention fully takes into account the comprehensive and pervasive of key factor Property, it takes the lead in combining machine learning algorithm, to evaluation result more multidimensional, the science of personal network's awareness of safety.
Description of the drawings
Fig. 1 is the schematic diagram of individual networks awareness of safety scalar quantization evaluation method of the present invention.
Fig. 2 is the awareness of network security evaluation index system to 1429 student's questionnaire surveys in specific implementation mode.
Specific implementation mode
In order to better illustrate objects and advantages of the present invention, the embodiment of the method for the present invention is done with reference to example It is further described.
One is ground to 1429 student groups of Kenzo and doctor as experiment pair with Beijing Institute of Technology's information and electronics institute As the determinant attribute number obtained in terms of three will be scanned from questionnaire survey and personal computer behavior scanning, mobile phone behavior respectively According to as input, designing and dispose three tests:(1) 1429 are used by the determinant attribute data that Subjective questionnaire on negative impact obtains AHP statistical analyses determine percentage contribution of lower layer's index to upper layer index using the feature vector for calculating judgment matrix;(2) right Whether 2858 by comprising opening the PC end datas attribute of fire wall etc. and include the movement of application program danger permission quantity etc. End data attribute carries out the processing of machine learning method;(3) decision tree is generated using the training of subjective and objective data, obtains last point Grade quantized result, is divided into strong, stronger, general, weak four grades.
Detailed process is:
Step 1, questionnaire is carried out to Mailbox Of Technology University Of Beijing's breath and the student group of electronics institute Master degree candidate or more Investigation, questionnaire are designed according to first class index and two-level index, each two-level index corresponds to twice topic, are divided into single choice, more Four kinds of topic types are inscribed in the selected topic, True-False, analysis of cases, and table 1 shows 34 problem purpose particular contents.
1. questionnaire survey topic particular content of table
Step 2, analytic hierarchy process (AHP) weights, and each factor is resolved by different attribute at all levels, establishes hierarchical structure mould Type compares the relative importance of each factor of same level in pairs, is configured to judgment matrix, using judgment matrix, Relative weighting by comparison element to the last layer criterion is calculated using respective formula, and examines its consistency, if consistency Pass through, that is, determines that weight needs to readjust judgment matrix if not passing through;Calculate absolute weight of each layer element to target;It comments Estimate information security cognition, information knowledge, information security ethics, information security ability score.
Step 3, the personal computer of 1429 students is scanned, obtains more than 2000 computer safety informations.
Step 4, the individual mobile terminal information of 1429 students is scanned, obtains more than 1700 mobile terminal information securities Data.
Step 5, feature is ranked up using the Importance of Attributes of random forests algorithm measurement, then uses sequence backward Searching method removes the feature of one least important (importance score is minimum) from characteristic set, is gradually iterated every time, And classification accuracy rate is calculated, finally obtain that attribute number is minimum, the highest characteristic set of classification accuracy rate is as feature selecting knot Fruit finally extracts 9 dimension key influence factors of the ends PC personal security consciousness from 2,000 multidimensional information of acquisition, including whether Open whether never expired, dangerous network interface card quantity of fire wall, user password etc..
Step 6, using the machine learning method of step 5, mutually independent key influence factor, structure network peace are filtered out Full consciousness assessment characteristic set and quantitative expression method extract 6 dimension key influence factors of mobile terminal personal security consciousness, packet Whether the permission of danger containing application program quantity, mobile phone are by root etc..
Step 7, by 4 dimension attributes of questionnaire survey (information security cognition, understanding, Legal ethics, ability) and computer, shifting 2 dimension attributes (key influence factor at the ends PC and mobile terminal) of moved end pass through decision tree, judgement assessment object information consciousness safety The awareness of network security for assessing object is divided into strong, stronger, general, weak four grades by grade.
Test result:Experiment is based on individual networks awareness of safety scalar quantization model building method, by the letter of subjective questionnaire It ceases Safety Cognition, understanding, Legal ethics, ability scoring and personal computer behavior scanning, mobile phone behavior and scans 6 dimensions Consider, table 2 shows 9 key influence factors of Security of Personal Computer Net consciousness.
Table 3 shows 6 dimension key influence factors of individual mobile terminal awareness of network security.It is demonstrated experimentally that this is a kind of The individual networks awareness of safety scalar quantization evaluation method that can be actually used, granularity to weak from being divided into 4 grades by force, Grading accuracy rate 95% or more.The method of the present invention takes in minute grade, and the pass in input data is effectively positioned with lower resource consumption Key data and the influence that part extraneous data can be removed.
2. Security of Personal Computer Net of table realizes key influence factor table
3. individual mobile terminal awareness of network security key influence factor table of table
Above-described specific descriptions have carried out further specifically the purpose, technical solution and advantageous effect of invention It is bright, it should be understood that the above is only a specific embodiment of the present invention, the protection model being not intended to limit the present invention It encloses, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should be included in the present invention Protection domain within.

Claims (4)

1. individual networks awareness of safety scalar quantization evaluation method, it is characterised in that described method includes following steps:
Step 1, subjective consciousness is assessed, and obtains data by questionnaire survey, and questionnaire survey data are for statistical analysis, then make Absolute weight of each layer element to target is calculated with analytic hierarchy process (AHP);
Step 2, behavior ontology is assessed, by personal computer behavior scanning and mobile terminal behavior scanning, obtaining personal security Realize relevant characteristic;
Step 3, decision is established using tree according to the attribute of Subjective questionnaire on negative impact data and objective behavior ontology data Model, more algorithms are mutually authenticated, and more real data are mutually examined, and obtain the scalar quantization result of individual networks awareness of safety.
2. according to the method described in claim 1, it is characterized in that, calculating each layer element to the exhausted of target using analytic hierarchy process (AHP) To weight, specific steps include:
Step 1.1, questionnaire survey is carried out, questionnaire is designed according to first class index and two-level index, each two-level index corresponds to two Road topic is divided into single choice, multiple choice, True-False, analysis of cases four kinds of topic types of topic, amounts to 34;
Step 1.2, analytic hierarchy process (AHP) weights, and each factor is resolved by different attribute at all levels, establishes hierarchy Model, The relative importance of each factor of same level is compared in pairs, is configured to, to judgment matrix, using judgment matrix, use Respective formula calculates the relative weighting to the last layer criterion by comparison element, and examines its consistency, if consistency passes through, It determines that weight needs to readjust judgment matrix if not passing through, calculates absolute weight of each layer element to target, assessment letter Cease Safety Cognition, information knowledge, information security ethics, information security ability score.
3. according to the method described in claim 1, it is characterized in that, assessed by behavior ontology, personal computer behavior is swept It retouches and is scanned with mobile terminal behavior, obtain personal security and realize relevant characteristic, the characteristic got is located in advance Reason, and using the data result of random forests algorithm acquisition personal computer and mobile terminal, step includes:
Step 2.1, personal computer is scanned, and obtains more than 2000 computer safety informations;
Step 2.2, individual mobile terminal information is scanned, obtains more than 1700 mobile terminal information security data;
Step 2.3, feature is ranked up using the Importance of Attributes of random forests algorithm measurement, is then searched backward using sequence Suo Fangfa removes the feature of one least important (importance score is minimum) from characteristic set, is gradually iterated every time, and Calculate classification accuracy rate, finally obtain attribute number is minimum, the highest characteristic set of classification accuracy rate as feature selecting as a result, Extract the key influence factor of personal computer and mobile terminal.
4. according to the method described in claim 1, it is characterized in that, subjective and objective assessment comprehensive classification quantized result evaluate, according to The attribute of Subjective questionnaire on negative impact data and objective behavior ontology data establishes decision model using tree, obtains individual net The scalar quantization of network awareness of safety as a result, using questionnaire survey 4 dimension attributes (information security cognition, understanding, Legal ethics, energy Power) and computer, mobile terminal 2 dimension attributes (key influence factor at the ends PC and mobile terminal) build decision tree, judgement assessment pair Image information realizes safe class, and the awareness of network security for assessing object is divided into strong, stronger, general, weak 4 grades.
CN201810233382.0A 2018-03-21 2018-03-21 Individual networks awareness of safety scalar quantization evaluation method Pending CN108446848A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810233382.0A CN108446848A (en) 2018-03-21 2018-03-21 Individual networks awareness of safety scalar quantization evaluation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810233382.0A CN108446848A (en) 2018-03-21 2018-03-21 Individual networks awareness of safety scalar quantization evaluation method

Publications (1)

Publication Number Publication Date
CN108446848A true CN108446848A (en) 2018-08-24

Family

ID=63195925

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810233382.0A Pending CN108446848A (en) 2018-03-21 2018-03-21 Individual networks awareness of safety scalar quantization evaluation method

Country Status (1)

Country Link
CN (1) CN108446848A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109861977A (en) * 2018-12-28 2019-06-07 北京红山瑞达科技有限公司 A kind of method that promotion personnel awareness of network security is promoted
CN111125186A (en) * 2019-11-25 2020-05-08 中国科学院计算技术研究所 Data processing method and system based on questionnaire
CN111370061A (en) * 2019-06-20 2020-07-03 深圳思勤医疗科技有限公司 Cancer screening method based on protein marker and artificial intelligence
EP3779817A4 (en) * 2018-09-29 2021-04-21 Advanced New Technologies Co., Ltd. Method and apparatus for detecting security awareness of user
CN112766792A (en) * 2021-01-29 2021-05-07 北京译泰教育科技有限公司 Capacity tree creating method
CN113839939A (en) * 2021-09-17 2021-12-24 北京邮电大学 Individual cognitive safety consciousness assessment method based on questionnaire survey
CN116647416A (en) * 2023-07-27 2023-08-25 深圳大学 Network security index recommendation method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102122294A (en) * 2011-01-29 2011-07-13 安徽工业大学 Survey research platform and method for psychology of college student for course selection based on data mining
CN102436622A (en) * 2011-12-28 2012-05-02 浙江汇信科技有限公司 Method for evaluating network market operator credit status
CN104933286A (en) * 2015-03-13 2015-09-23 华南理工大学 City spatial quality evaluation method based on big data
CN105893748A (en) * 2016-03-29 2016-08-24 安徽大学 Happiness index evaluation method and system based on rough set theory

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102122294A (en) * 2011-01-29 2011-07-13 安徽工业大学 Survey research platform and method for psychology of college student for course selection based on data mining
CN102436622A (en) * 2011-12-28 2012-05-02 浙江汇信科技有限公司 Method for evaluating network market operator credit status
CN104933286A (en) * 2015-03-13 2015-09-23 华南理工大学 City spatial quality evaluation method based on big data
CN105893748A (en) * 2016-03-29 2016-08-24 安徽大学 Happiness index evaluation method and system based on rough set theory

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韦鹏程等: "《大数据巨量分析与机器学习的整合与开发》", 31 May 2017 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3779817A4 (en) * 2018-09-29 2021-04-21 Advanced New Technologies Co., Ltd. Method and apparatus for detecting security awareness of user
CN109861977A (en) * 2018-12-28 2019-06-07 北京红山瑞达科技有限公司 A kind of method that promotion personnel awareness of network security is promoted
CN109861977B (en) * 2018-12-28 2021-04-30 北京红山瑞达科技有限公司 Method for promoting personnel network security awareness to be improved
CN111370061A (en) * 2019-06-20 2020-07-03 深圳思勤医疗科技有限公司 Cancer screening method based on protein marker and artificial intelligence
CN111125186A (en) * 2019-11-25 2020-05-08 中国科学院计算技术研究所 Data processing method and system based on questionnaire
CN111125186B (en) * 2019-11-25 2023-06-13 中国科学院计算技术研究所 Data processing method and system based on questionnaire
CN112766792A (en) * 2021-01-29 2021-05-07 北京译泰教育科技有限公司 Capacity tree creating method
CN113839939A (en) * 2021-09-17 2021-12-24 北京邮电大学 Individual cognitive safety consciousness assessment method based on questionnaire survey
CN116647416A (en) * 2023-07-27 2023-08-25 深圳大学 Network security index recommendation method, device, equipment and storage medium
CN116647416B (en) * 2023-07-27 2023-11-07 深圳大学 Network security index recommendation method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108446848A (en) Individual networks awareness of safety scalar quantization evaluation method
CN105760439A (en) Figure cooccurrence relation graph establishing method based on specific behavior cooccurrence network
CN108268624A (en) User data method for visualizing and system
KR101229860B1 (en) System and method to support e-learning
Chamba-Eras et al. Analysis of usability of universities Web portals using the Prometheus tool-SIRIUS
CN109710940A (en) A kind of analysis and essay grade method, apparatus of article conception
Pourahmad et al. Service quality assessment in the academic library: Use of hybrid fuzzy expert system
Jiang et al. Employment competitiveness of college students based on improved AHP
Wong et al. An analysis of cognitive learning context in MOOC forum messages
CN114971425B (en) Database information monitoring method, device, equipment and storage medium
CN106295957A (en) Occupation Competency Model system and the method for analysis
Martinez-Gil et al. A digital platform to facilitate the resilience of rural territories
CN107909092A (en) Being accused of based on body identity characteristic fears personnel cruelly and studies and judges recognition methods and system
CN109063485A (en) A kind of vulnerability classification statistical system and method based on loophole platform
Afrizal et al. Analysis of the readiness of e-Government implementation at the ministerial level of the Republic of Indonesia
CN109583500A (en) A kind of aesthetic images quality prediction system and method based on depth drift-diffusion method
Li et al. The Best Summer Job Selection Based on AHP
Yao Collaborative recommendation model of MOOC online learning resources based on scoring matrix
Liu et al. Research on evaluation algorithm of the higher education system based on neural network
Judijanto et al. Analysis of the Impact of Globalization, Digital Technology, and Socio-Cultural Change on Community Identity in the Modern Era in Jakarta
Huang et al. The method of determining the weight of the evaluation index of students’ comprehensive quality
Du Measurement of Student Physical Fitness Based on Association Rule Algorithm
KR100531432B1 (en) Method for identifying network structure of giftedness, anlayizing giftedness pattern, and generating giftedness quotients based on the INPUT capability of memorization and cognition and on the OUTPUT capability of logic and evaluation
Khalyasmaa et al. Problems of criteria analysis and interpretation in automated systems for assessing scientific and technical solutions
Feng An evaluation approach for higher education informatization based on Grey model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180824

RJ01 Rejection of invention patent application after publication