[1]
Nikzad Manteghi, Mohmmad Jafar Haddadpoor Jahromi. Propose a model to choose best project by AHP in distributed generation[C]. //Proceedings of World Congress on Innovation and Computer Sciences, 2012(1):481-484.
DOI: 10.1016/j.protcy.2012.02.105
Google Scholar
[2]
Fu Yu, Wu Xiaoping, Ye Qing, et al. An approach for information systems security risk assessment on fuzzy set and entropy-weight[J]. Acta electronica sinica, 2010, 38(7):1489-1494. (In Chinese).
Google Scholar
[3]
Shao Fei, Jiang Kebin, Liu Xiaobin, et al. Fuzzy evaluation on support ability of special refitting for ocean trawler based on grey relational analysis[J]. Journal of PLA University of Science and Technology(Natural Science Edition),2011,12(3):284-288.(In Chinese).
Google Scholar
[4]
Yu Suli, Qi Xiaohong.The project evaluation of Private Equity on the basis of BP neural network[J]. J Tsinghua Univ(Sci&Tech),2011,51(12):1917-1920. (In Chinese).
Google Scholar
[5]
Vapnik V. Statistical learning theory [M]. New York: Springer Verlag, 1998.
Google Scholar
[6]
National Information Center. Information security evaluation index system [R].2005:1-20. (In Chinese).
Google Scholar
[7]
Du Yong, Du Jun, Chen Jianying. System of measuring and appraising the quality of practitioners of information security in e-commerce[J]. Systems Engineering-Theory & Practice, 2010, 30(10):1870-1876. (In Chinese).
Google Scholar
[8]
Ghoggali, N. A multiobjective genetic SVM approach for classification problems with limited training samples[J]. Geoscience and Remote Sensing, 2009, 47(6):1707-1718.
DOI: 10.1109/tgrs.2008.2007128
Google Scholar
[9]
Xing Tao, Liao Ran. Multi-category support vector machine algorithm for quality analysis of student enrollment of universities[J]. Journal of Harbin Institute of Technology, 2010, 42(11):1828-1832. (In Chinese).
Google Scholar