The method of cloud model with entropy weight was adopted for the prediction of rock burst classification. Some main factors of rock burst including the uniaxial compressive strength (σc), the tensile strength (σ...The method of cloud model with entropy weight was adopted for the prediction of rock burst classification. Some main factors of rock burst including the uniaxial compressive strength (σc), the tensile strength (σt), the tangential stress (σθ), the rock brittleness coefficient (σc/σt), the stress coefficient (σθ /σc) and the elastic energy index (Wet) are chosen to establish evaluation index system. The entropy?cloud model and criterion are obtained through 209 sets of rock burst samples from underground rock projects. The sensitivity of indicators is analyzed and 209 sets of rock burst samples are discriminated by this model. The discriminant results of the entropy-cloud model are compared with those of Bayes, KNN and RF methods. The results show that the sensitivity order of those factors from high to low is σ_θ /σ_c, σ_θ, W_(ct), σ_c/σ_t, σ_t, σ_c, and the entropy-cloud model has higher accuracy than Bayes, K-Nearest Neighbor algorithm (KNN) and Random Forest (RF) methods.展开更多
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put...To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.展开更多
基金Projects(51474252,51274253)supported by the National Natural Science Foundation of ChinaProject(2015CX005)supported by the Innovation Driven Plan of Central South University,ChinaProject(2016zzts095)supported by the Fundamental Research Funds for the Central Universities,China
文摘The method of cloud model with entropy weight was adopted for the prediction of rock burst classification. Some main factors of rock burst including the uniaxial compressive strength (σc), the tensile strength (σt), the tangential stress (σθ), the rock brittleness coefficient (σc/σt), the stress coefficient (σθ /σc) and the elastic energy index (Wet) are chosen to establish evaluation index system. The entropy?cloud model and criterion are obtained through 209 sets of rock burst samples from underground rock projects. The sensitivity of indicators is analyzed and 209 sets of rock burst samples are discriminated by this model. The discriminant results of the entropy-cloud model are compared with those of Bayes, KNN and RF methods. The results show that the sensitivity order of those factors from high to low is σ_θ /σ_c, σ_θ, W_(ct), σ_c/σ_t, σ_t, σ_c, and the entropy-cloud model has higher accuracy than Bayes, K-Nearest Neighbor algorithm (KNN) and Random Forest (RF) methods.
基金Supported by the National Natural Science Foundation of China(No.60872041,61072066)Fundamental Research Funds for the Central Universities(JYI0000903001,JYI0000901034)
文摘To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.