INFORMATION TECHNOLOGY SECURITY AIRCRAFT FLIGHT IN DIFFICULT CONDITIONS BASED MULTIFACTORIAL FUZZY MODELS
نویسندگان
چکیده
منابع مشابه
Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملExamination of excessive fuel consumption for transport jet aircraft based on fuzzy-logic models of flight data
Because the amount of fuel usage is huge, and exhaust emissions of commercial transports is regulated under the Kyoto Protocol, how to reduce fuel consumption is an urgent problem for all airlines. The airlines urgently need a practical method to reduce fuel consumptions within constraints to accomplish the mission. The objective for the present paper is to use a model-based method and flight d...
متن کاملMathematical Models for Human Pilot Maneuvers in Aircraft Flight Simulation
Mathematical models are presented in this paper to describe human maneuvers for aircraft flight simulation. Input parameters for the human pilot model (HPM), such as the course deviation indicator (CDI) and the heading change, are defined for the model, and are related mathematically to those in the proportional-integral-derivative (PID) controller for automatic control. Similarities are discus...
متن کاملFuzzy Economic Decision-models for Information Security Investment
Present paper derives fuzzy economic models to evaluate the economic feasibility of information security investment. The Net Present Value (NPV), and discounted Return on Investment (dRoI) models are proposed for the execution of costbenefit analysis. Since fuzzy results are in the form of a complex nonlinear representation, and do not always provide a totally ordered set in the same way that c...
متن کاملInformation Technology and Security
This paper examines key trends and developments in information technology, and the implications of those developments on stability and security. Focus is on cyber threats to computer networks, including information theft and sabotage, and acts that disrupt or deny services. Seven trend areas are examined: ubiquity, mobility, hacking tools, performance, vulnerabilities, groundedness, and informa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of National Aviation University
سال: 2013
ISSN: 2306-1472,1813-1166
DOI: 10.18372/2306-1472.57.5533