软件可信性评估方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着信息技术的推广和普及,计算机软件承载着拓展应用领域、解决复杂多变问题的重要作用,在现代信息社会中无处不在。然而,随着应用领域的广泛深入和应用环境的动态演化,规模日趋庞大的软件系统并不总是让人信任,常会发生各种故障或失效,软件可信性问题日益突出,已经成为影响信息社会国防建设和国民经济发展的普遍问题。为了消除或减轻软件失信对国民经济造成的威胁和困扰,“如何提高软件可信性”成为国内外不同学术组织和科研团体共同关注的研究热点。其中,作为提高和保障软件可信性的有力支撑,软件可信性评估成为学术界和实业界致力于解决的焦点问题。
     软件可信性内涵上是业务用户对期望的所有可信指标实现程度的一种个性化感受和评价。随着用户多元化需求和用户所处环境的演化,软件可信性的评估结果常会发生变化,使得软件可信性呈现出演化特性。软件可信性的这种特性导致传统软件评价理论与模型很难适应新形势下软件可信性的评价。此外,软件可信性评估工作是技术层面和管理层面相互渗透的一个重要体现。然而,由于传统软件工程领域侧重于技术层面,致使目前对于软件可信性评估的研究大多集中在可信软件构造和软件可信性测试等层面,缺乏对可信软件评估管理层面的研究。基于此,本文从管理科学的角度出发,结合软件可信性的特点,采用理论研究和实践研究相结合的方法,针对软件可信性评估这一科学问题展开研究。
     主要研究内容及创新成果如下:
     (1)探讨了软件可信性增长机理。基于软件演化观,分析并定义了软件可信性增长过程(STGP),建立了四阶段STGP周期模型,提炼出STGP不同阶段存在的影响软件可信性的四类因素。在此基础上,给出了软件可信性在狭义和广义上的定义以及可信软件的定义,并概括了软件可信性的典型特征。
     (2)研究了面向需求的软件关键可信指标获取规则。针对软件可信指标的约简需求,引入语言型多属性群决策方法设计可信指标获取规则,基于语言描述方法给出面向需求的语言型可信指标获取流程和方法。针对可信指标获取规则中决策专家权重的确定方法,扩展语言评价信息基本度量元,构建群体一致性最优模型和方案差异性最优模型,并设计了改进粒子群算法进行求解。
     (3)研究了需求稳定情形下的软件可信性评估方法。描述了需求稳定情形下软件可信性评估问题,并给出需求稳定情形下软件可信性评估流程,重点讨论了评估中可信指标权重的确定问题。针对组合赋权思想,提出一种新的组合权系数确定方法。该方法考虑不同赋权法所得权向量的随机性,建立基于最大熵原理的不确定性最优模型和基于相对熵原理的一致性最优模型,采用改进粒子群算法对加权和模型进行求解。提出了不同组合赋权方法的合理性评价方法,通过算例说明所提方法的合理性和有效性。最后,给出需求稳定情形下软件可信等级的确定方法。
     (4)研究了需求演化情形下的软件可信性评估方法。描述了需求演化情形下软件可信性评估问题,并给出了需求演化情形下软件可信性评估流程。针对需求演化情形下用户新增需求对软件可信指标权重的影响问题,提出了指标偏好演化的概念,给出了用户新增需求的获取方法、分类方法及重要度量化方法。通过构建用户新增需求和可信指标之间的质量屋给出可信指标偏好变元的计算方法,设计了偏好感应函数以确定需求演化后可信指标的动态权重。最后,给出了需求演化情形下软件可信等级的确定方法。
     (5)对产品生命周期管理(PLM)软件的可信性进行评估。分析了PLM软件的实施现状,针对PLM软件评估的实际需要,将本文所提方法应用于国内某大型汽车制造企业PLM软件的评估中。采用语言型可信指标获取规则获取PLM软件的评估指标,分别就需求稳定和需求演化两种情况对PLM软件进行评估,并给出了详细的评估过程。通过案例说明本文研究成果在实际中的应用和推广价值。
With the promotion and popularization of information technology, computer software is playingan important role in expanding application fields and solving complex problems. Software iseverywhere in modern information society. However, as the wide range of application field and thedynamic evolution of application environment, increasingly large-scale software system is notalways to be trustworthy, and often brings about a variety of malfunction or failure. Softwaretrustworthiness (ST) issues have become increasingly prominent, which has been the widespreadproblem of affecting the construction of national defense and the development of national economyin information society. In order to eliminate or mitigate the threat posed by the untrustworthysoftware to the national economy,“how to improve software trustworthiness” becomes the researchfocus of common concern in different academic organizations and research groups at home andabroad, among which, as a strong support to improve and guarantee ST, the software trustworthinessevaluation (STE) becomes the focus problem that the academia and the business communities arededicated to solve.
     Connotatively, ST is a kind of personalized feelings and evaluation of users on the realizationdegree of all expected trustworthy attributes (TAs). With the evolution of diversified needs of usersand users’ surroundings, the result of STE is usually changing, which makes ST present evolutioncharacteristic. This characteristic of ST makes the traditional software evaluation theory and modeldifficult to adapt to the STE in the new situation. In addition, STE is an important embodiment of themutual penetration of the technical level and management level. However, traditional softwareengineering field focuses on technical level, with the result that the present research of STE mainlyfocuses on the technical level including trustworthy software construction and ST testing, and lacksthe research on management level of STE. Therefore, the dissertation, from the perspective ofmanagement science, adopts research method of the integration of theory and practice to study theSTE method on the basis of the ST’s characteristics.
     The main research contents and innovations of the dissertation are summarized as follows:
     (1) The growth mechanism of ST is analyzed. Based on software evolution view, the softwaretrustworthiness growth process (STGP) is defined, four-stage STGP cycle model is constructed, andfour categories of factors impacting on the ST in different stage of STGP are refined. On this basis,the broad definition and narrow definition of ST and the definition of trustworthy software are givenrespectively, and the typical characteristics of ST are summarized.
     (2) The acquisition rule of key trustworthy attributes (KTAs) of software is studied. On the analysis of reduction requirement of software TAs, the acquisition rule of KTAs is put forward byintroducing linguistic multiple attribute group decision making (LMAGDM) method. Based onlinguistic description method, a requirement-oriented linguistic acquisition procedure of softwareTAs is developed. For the expert weights determining method in acquisition rule of software TAs,the basic metrics of linguistic assessment information are expanded, an optimization model of groupconsensus and an optimization model of alternative differences are constructed and an improvedPSO algorithm is designed for the solution.
     (3) The STE method under the circumstance of requirement stability (CRS) is studied. The STEproblem under the CRS is described and the STE procedure under the CRS is presented. Based onthe description, the weighting method of TAs is focused on. For the combination weighting approach,a new determining method of weight coefficients is given. The method constructs an uncertaintyoptimization model based on the principle of maximum entropy and a consistency optimizationmodel based on the principle of relative entropy. The improved PSO algorithm is used to solve themodel. An approach for evaluating reasonableness of different combination weighting method isproposed and a numerical example is conducted to show the reasonability and effectiveness of theproposed approach. Finally, the determining method of software trustworthiness level under the CRSis given.
     (4) The STE method under the circumstance of requirement evolution (CRE) is studied. TheSTE problem under the CRE is described and the STE procedure under the CRE is presented. Forthe impact of new customer requirement (NCR) to software TAs weights, the dissertation defines thepreference evolution of attribute, presents the acquisition method and classification method of NCRand its importance determining method. By building the house of quality between NCR and softwareTAs, a computation method for preference variable of TAs is presented. On this basis, a preferencesensing function is designed and the TAs weighting method under the CRE is proposed. Finally, thedetermining method of software trustworthiness level under the CRE is given.
     (5) The proposed methods are used to evaluate the trustworthiness of Product LifecycleManagement (PLM) software. The implementation situation of PLM software is analyzed. For theactual needs of evaluating PLM software, the methods proposed by this dissertation are applied tothe trustworthiness evaluation of PLM software for a large automobile manufacturing enterprise inChina. The acquisition rule of software TAs is used to obtain the TAs of PLM software, and for thetwo circumstances of the CRS and the CRE, the detailed evaluation process is given. This case studyproves that the research achievements of this dissertation have great value of application andpopularity.
引文
[1]刘克,单志广,王戟,等.“可信软件基础研究”重大研究计划综述[J].中国科学基金,2008,22(3):145–151.
    [2] NSF Program Announcement/Solicitation: Trusted computing (Dec,2001).www.nsf.gov/pubs/2001/nsf01160/nsf01160.html#TOC.
    [3] Department of Computer Science of the Technical University Darmstadt, TrustedSystems.www.dvsl.informatik.tudarmstadt.de/DVSI/research/index.html
    [4]梅宏,曹东刚.软件可信性:互联网带来的新挑战[J].中国计算机学会通讯,2010,6(2):20–27.
    [5] Center for National Software Studies (CNSS).2nd National Software Summit FinalReport[R].April,2005, http://www.cnsoftware.org/nss2report/
    [6] Trusted Computing Group, TCG Architecture Overview,28April2004.www.trustedcomputinggroup.org/specs/IWG/TCG_1_0_Architecture_Overview.pdf
    [7] A. Immonen, and M. Palviainen. Trustworthiness Evaluation and Testing of Open SourceComponents[J]. Seventh International Conference on Quality Software(QSIC2007).
    [8]王怀民,唐杨斌,尹刚,等.互联网软件的可信机理[J].中国科学(E辑)2006,36(10):1156–1169.
    [9]郑志明,马世龙,李未,等.软件可信性动力学特征及其演化复杂性[J].中国科学,2009,39(9):946–950.
    [10]田俊峰,李珍,刘玉玲.一种可信软件设计方法及可信性评价[J].计算机研究与发展,2011,48(8):1447–1454.
    [11]赵会群,孙晶.面向服务的可信体系结构代数模型[J].计算机学报,2010,33(5):890–899.
    [12] Hardin D, Hiratzka T D, Johnson D R, et al. Development of security software: A highassurance methodology [C]//Proc of the11th Int Conf on Formal Engineering Methods,Berlin: Spriner,2009:266–285.
    [13]李任杰,张瞩熹,江海燕,等.基于监控的可信软件构造模型研究与实现[J].计算机应用研究,2009,26(12):4586–4588.
    [14]王新志,孙乐昌,陆余良,等.一种面向软件行为可信性的入侵检测方法[J].中国科学技术大学学报,2011,41(7):626–635.
    [15]蒋凡,邢学智,章磊.基于反馈的可信网络软件验证与测试集成框架方法[J].中国科学技术大学学报,2010,40(2):198–202.
    [16] Shahriar H, Zulkernine M. Trustworthiness testing of phishing websites: A behaviormodel-based approach. Future Generation Computer Systems,2011, doi:10.1016/j.future.2011.02.001.
    [17] Hook D, Kelly D. Testing for trustworthiness in scientific software J]. Software Engineeringfor Computational Science and Engineering,2009. SECSE’09, ICSE Workshop on May2009,59–64.
    [18] Muherkjee A, Siewiorek D P. Measuring Software Dependability by RobustnessBenchmarking [J]. IEEE Transactions on Software Engineering,1997,23(6):366–378.
    [19]覃志东,雷航,桑楠,等.安全关键软件可靠性验证测试方法研究[J].航空学报,2005,26(3):334–339.
    [20] Delamaro M E, Maidonado J C, Mathru A P. Interface mutation: an approach for integrationtesting [J]. IEEE Trans on Software Engineering,2001,27(3):228–247.
    [21] McGraw G, Potter B. Software security testing[J]. IEEE Security&Privacy,2004,2(5):81–85.
    [22]项森,陈意云,林春晓,等.动态存储管理安全验证的CoQ实现[J].计算机研究与发展,2007,44(2):361–367.
    [23]陈锦富,卢炎生,谢晓东.软件错误注入测试技术研究[J].软件学报,2009,20(6):1425–1443.
    [24] Englan P, Lampson B, Manferdell I J, et al. A trusted open platform[J]. IEEE Computer,2003,36(7):55–62.
    [25] Reiner S, Zhang X L, Trent J, et al. Design and implementation of a TCG-based integritymeasurement architecture [C]//Proc of the13th USENIX Security Symposium. San Diego,CA:[s. n.],2004:223–238.
    [26] Mohammad N, Masoom A, Zhang X W, et al. Remote attestation of attribute updates andinformation flows in a UCON system [C]//Proc of the2nd International Conference onTrusted Computing. Berlin: Springer-Verlag,2009:63–80.
    [27] Bertoa M F, Troya J M, Vallecillo A. Measuring the usability of software components [J].Journal of Systems and Software,2006,79(3):427–439.
    [28] González M P, Lorés J, Granollers A. Enhancing usability testing through dataminingtechniques: A novel approach to detecting usability problem patterns for a context of use [J].Information and Software Technology,2008,50(6):547–568.
    [29] Propp S, Buchholz G, Forbrig P. Integration of usability evaluation and model-based softwaredevelopment [J]. Advances in Engineering Software,2009,40(12):1223–1230.
    [30] McCass J A, Richards P K and Walters G F. Factors in software quality. Rome AirDevelopment Centre, Vols I-III,1977, Italy.
    [31] McCall J. The Automated Measurement of Software Quality [C]. In Proc. Of InternationalComputer Software and Applications Conference,1981.
    [32] Boehm B W. Characteristics of Software Quality [M]. Am sterdam: NorthHolland,1978.
    [33] Khosravi K and Guéhéneuc Y G. A Quality Model for design Patterns. German Industry,www.etud.iro.umontreal.ca,2004.
    [34] Maryoly Ortega, María A. Perez, and Teresita Rojas. A Systemic Quality Model forEvaluating Software Products. Laboratorio de Investigacin en Sistemas de Information,2002.http://www.lisi.usb.ve/publicaciones.
    [35] ISO/IEC9126-1Software Engineering-Software Product Quality (Part1): Quality Model.
    [36] ISO/IEC14598-5Information Technology-Software Product Evaluation (Part-5): Process forEvaluation.
    [37] Dromey R G. A model for software product quality [J]. IEEE Transactions on SoftwareEngineering, Feb1995,21(2nd):146–162.
    [38]叶言苓,朱三元.软件质量评价体系及其实现[J].计算机应用及软件,18(1):26–33.
    [39] Nagib C and Belkis C. Designing with a Systemic Total Quality. Educational Technology,1994,34(1):29–36.
    [40] Voas J. Certification: Reducing the hidden costs of poor quality [J]. Reliable SoftwareTechnologies, IEEE Software,1999,16(4):22–25.
    [41] Ronan Fitzpatrick. Software quality definitions and strategic issues. Staffordshire University,1996. http://www.dit.ie/rfitzpatrick.
    [42] Martin Neil and Norman Fenton. Predicting software quality using Bayesian belief networks.NASA/Goddard Space Flight Centre, December1996.http://sel.gsfc.nasa.gov/website/sew/1996/topics/neil_p.pdf.
    [43] Gates B. E-mail to Microsoft Employees on Trustworthy Computing. January17,2002,Available at http://www.microsoft.com/mscorp/execmail/2002/01-17twc.asp.
    [44] Mundie C et al. Trustworthy Computing. Microsoft White Paper. October2002, Available athttp://www.microsoft.com/mscorp/twc/default.mspx.
    [45] Safonov V O. Using Aspect-Oriented Programming for Trustworthy Software Development[J]. New Jersey: Wiley&Sons,2008.
    [46] Schmidt H. Trustworthy Components—Compositionality and Prediction [J]. The Journal ofSystems and Software,2003,65:215–225.
    [47]蔡斯博,邹艳珍,邵凌霜,等.一种支持软件资源可信评估的框架[J].软件学报,2010,21(2):359–372.
    [48] Wang H M, Tang Y B, Yin G, et al. Trustworthiness of Internet-based software[J]. Science inChina: Series F Information Science,2006,49(6):759–773.
    [49] Yang Y, Wang Q, Li M S. Process trustworthiness as a capability indicator for measuring andimproving software trustworthiness[C]//Lecture Notes in Computer Science5533:Proceedings of the International Conference on Software Process: Trustworthy SoftwareDevelopment Process (ICSP’09). Berlin, Heidelberg: Springer-Verlag,2009:389–401.
    [50] Lenzini G, Tokmakoff A. Managing trustworthiness in component-based embedded systems[J].Electronic Notes in Theoretical Computer Science,2007,179(6):143–155.
    [51] Immonen A, Palviainen M. Trustworthiness evaluation and testing of open source components
    [C].//Proceeding of the7th International Conference on Quality Software(QSIC’07),2007:316–321.
    [52]郎波,刘旭东,王怀民,等.一种软件可信分级模型[J].计算机科学与探索,2010,4(3):231–239.
    [53]赵会群,孙晶.一种SOA软件系统可信性评价方法研究[J].计算机学报,2010,33(11):2202–2210.
    [54] Weldemariam K, Alagar V. A formal approach for the specification and verification oftrustworthy component-based systems[J]. The Journal of Systems and Software,2011,84:77–104.
    [55] Betous C A, Kanoun K. Construction and stepwise refinement of dependability models[J].Performance Evaluation,2004,56:277–312.
    [56] Xie F, Yang G W, Song X Y. Component-based hardware/software co-verification for buildingtrustworthy embedded systems [J]. The Journal of Systems and Software,2007,80(5):643–654.
    [57] Lehman M M, Ramil J F. Software evolution and software evolution processes. Annals ofSoftware Engineering,2002,14(1-4):275–309.
    [58] Li Tong.软件演化过程建模=An Approach to Modelling Software Evolution Processes[M].北京:清华大学出版社,2008.
    [59] Evelyn J, Barry, and Chris F K. How software process automation affects software evolution:a longitudinal empirical analysis, Journal of Software Maintenance and Evolution: Researchand Practice,2007,19:1–31.
    [60] Belady L, Lehman M M. A model of large program development, IBM System Journal,1976,15(3):225–252.
    [61] Lehman M M. Laws of software evolution revisited. In: Lecture notes in computer science1149, Berlin: Springer, pp108–124,1997.
    [62]刘晓阳,赵建平,王玮,等.基于SOA的软件过程管理系统[J].兵工自动化,2011,30(1):91–94.
    [63]岳超源.决策理论与方法[M].北京:科学出版社,2003.
    [64]王国华,梁樑.决策理论与方法[M].合肥:中国科学技术大学出版社,2006.
    [65] Hwang C L, Lin M J. Group Decision Making under Multiple Criteria: Mthods andApplications [M]. Berlin: Springer,1987.
    [66] Satty T L. The Analytic hierarchy process [M]. New York: McGraw Hill,1980.
    [67]王宗军.集成式多目标权系数赋值方法[J].系统工程理论与实践,1996,16(8):12–19.
    [68] Herrera F, Herrera-Viedma E, Chiclana F. Multiperson decision-making based onmultiplicative preference relations [J]. European Journal of Operational Research,2001,129(2):372–385.
    [69] Maulik. Genetic Algorithm-Based Clustering Technique [J]. Patt.Recog,2000,33:1455–1465.
    [70]王应明.离差平方和的多指标决策方法及其应用[J].中国软科学,2000,(3):110–113.
    [71] Hwang C L, Yoon K. Multiple Attribute Decision Making: Methods and Applications [M].Berlin: Springer-Verlag,1981.
    [72]王应明,张军奎.基于标准差和平均差的群系数确定方法及其应用[J].数理统计与管理,2003,22(5):22–26.
    [73]王应明,傅国伟.主成分分析法在有限方案多目标决策中的应用[J].系统工程理论与应用,1993,2(2):43–48.
    [74]宋光兴,杨德礼.基于决策者偏好及赋权法一致性的组合赋权法[J].系统工程与电子技术,2004,26(9):1226–1230.
    [75]陶菊春,吴建明.综合加权评分法的综合权值确定新探[J].系统工程理论与实践,2001,21(8):43–48.
    [76]徐泽水,达庆利.多属性决策的组合赋权方法研究[J].中国管理科学,2002,10(2):84–87.
    [77]王中兴,牟琼,李桥兴.多属性决策的组合赋权法[J].应用数学与计算数学学报,2003,17(2):55–62.
    [78] Roy B. The problems and methods with multiple objective functions [J]. MathematicalProgramming,1971,1:239–247.
    [79] Mietinen K, Salminien P. Decision-aid for discrete multiple criteria decision maing problemswith imprecise [J]. European Journal of Operational Research,1999,119:50–60.
    [80] Satty T L. The Analytic hierarchy process [M]. New York: McGraw Hill,1980.
    [81] Srinivasan V, Shocher A D. Linear programming techniques for multidimensional analysis ofpreference [J]. Psychometrica,1973,38:337–346.
    [82] Brans J P, Mareschal B and Vincke Ph. Promethee: A new family of outranking methods inmulticriteria analysis [J]. In Brans J P ed. Operational Research’84, North-Holland: ElsevierScience Publishers,1984,408–421.
    [83] Yager R R. On ordered weighted averaging aggregation operators in multi-criteria decisionmaking [J]. IEEE Transactions on Systems, Man and Cybernetics,1988,18:183–190.
    [84]丁勇.语言型多属性群决策方法及其应用研究[D],合肥工业大学博士学位论文,2011.
    [85] Bordogna G, Fedrizzi M, Passi G. A linguistic modeling of consensus in group decisionmaking based on OWA operator [J]. IEEE Transactions on Systems, Man, and Cybernetics,1997,27:126–132.
    [86] Herrera F, Herrera-Viedma E. Linguistic decision analysis: steps for solving decisionproblems under linguistic information [J]. Fuzzy Sets and Systems2000,115:67–82.
    [87] Herrera F, Martinez L. A2-tuple fuzzy linguistic representation model for computing withwords [J]. IEEE Transactions on Fuzzy Systems,2000,8(6):746–752.
    [88]王欣荣,樊治平.基于二元语义信息处理的一种语言群决策方法[J].管理科学学报,2003,6(5):1–5.
    [89]徐泽水.不确定性多属性决策方法及应用[M].北京:清华大学出版社,2004.
    [90]徐泽水.基于语言信息的决策理论与方法[M].北京:科学出版社,2008.
    [91]樊治平,肖四汉.基于自然语言符号表示的比较矩阵的一致性及排序方法[J].系统工程理论与实践,2002,22(5):87–91.
    [92]陈岩,樊治平.语言判断矩阵的一致性及相关问题研究[J].系统工程理论与实践,2004,24(4):136–141.
    [93] Xu Z S. Incomplete linguistic preference relations and their fusion[J]. Information Fusion,2006,7(3):331–337.
    [94] Alonso S, Cabrerizo F J, Chiclana F, et al. Group Decision-Making with Incomplete FuzzyLinguistic Preference Relations[J]. International Journal of Intelligent Systems,2009,24(2):201–222.
    [95] Herrera-Viedma E, Herrera F, Chiclana F. A Consensus Model for Multiperson DecisionMaking with Different Preference Structures[J]. IEEE Transactions on Systems, Man, andCybernetics Part A: Systems and Humans,2002,32(3):394–402.
    [96]刘如钢,张恒喜,汪诚等.基于语言量化的多标准模糊群体决策算法研究[J].计算机工程与应用,2004,40(34):227–229.
    [97]陈侠,樊治平,陈岩.基于语言判断矩阵的专家群体判断一致性分析[J].控制与决策,2006,21(8):879–884.
    [98] Alonso S, Herrera-Viedma E, Cabrerizo F J, et al. Visualizing consensus in group decisionmaking situations[C]. IEEE International Conference on Fuzzy Systems,2007,1–6.
    [99]姜艳萍,梁海明.不同粒度语言信息的群体一致性判别和改进方法[J].东北大学学报(自然科学版),2010,31(11):1652–1656.
    [100] Xu Z S. Linguistic aggregation operators: an overview. In: Fuzzy Sets and Their Extensions:Representation, Aggregation and Models. Editors: Bustince H, Herrera F, Montero J. Berlin:Springer–Verlag,2007,163–181.
    [101] Yager R R. Quantifier guided aggregation using OWA operators[J]. International Journal ofIntelligent Systems,1996,11:49–73.
    [102] Yager R R, Rybalov A. Understanding the median as a fusion operator[J]. International Journalof General Systems,1997,26:239–263.
    [103] Yager R R. Fusion of ordinal information using weighted median aggregation[J]. InternationalJournal of Approximate Reasoning,1998,18:35–52.
    [104] Herrera F, Herrera-Viedma E. Aggregation operators for linguistic weighted information [J].IEEE Transactions on Systems, Man, and Cybernetics-Part A,1997,27:646–656.
    [105] Yager R R. Applications and extensions of OWA aggregations [J]. International Journal ofMan-Machine Studied,1992,37:103–132.
    [106] Herrera F, Herrera-Viedma E, Verdegay J L. A Sequential Selection Process in Group DecisionMaking with a Linguistic Assessment Approach [J]. Information Sciences,1995,85:223–229.
    [107] Delgado M, Verdegay J L, Vila M A. On aggregation operators of linguistic labels [J].International Journal of Intelligent Systems,1993,8:351–336.
    [108] Herrera F, Verdegay J L. Linguistic assessments in group decision [J]. In: Proceedings of theFirst European Congress on Fuzzy and Intelligent Technologies, Aachen,1993,941–948.
    [109] Torra V. The weighted OWA operator [J]. International Journal of Intelligent Systems,1997,12:153–166.
    [110] Herrera F, Lbpez E, Rodrigue M. A linguistic decision model for promotion mix managementsolved with genetic algorithms[J]. Fuzzy Sets and Systems,2002,131(1):47–61.
    [111] Herrera F, Herrera-Viedma E, Martinez L. Representation models for aggregating linguisticinformation: Issues and analysis[A]. In: Mesiar R, Calvo T. Eds. Aggregation Operators: NewTrends and Applications [M]. Series Studies in Fuzziness and Soft Computing, Physica-Verlag,2001.
    [112]李红燕,樊治平.一种基于群体语言评价判断矩阵的群决策问题的二元语义解法[J].系统工程,2003,21(5):104–108.
    [113] Xu Z S. On generalized induced linguistic aggregation operators [J]. International Journal ofGeneral Systems,2006,35:17–28.
    [114] Xu Z S. A note on linguistic hybrid arithmetic averaging operator in group decision makingwith linguistic information[J]. Group Decision and Negotiation,2006,15:581–591.
    [115]陈俊良,刘新建,陈超.基于语言决策矩阵的专家客观权重确定方法[J].系统工程学报与电子技术,2011,33(6):1310–1316.
    [116] Xu Z S. Consisitency of interval fuzzy preference relations in group decision making[J].Applied Soft Computing,2011,11(5):3898–3909.
    [117]王洪利,冯玉强.基于云模型具有语言评价信息的多属性群决策研究[J].控制与决策,2005,20(6):679–682.
    [118]胡宝清.模糊集理论基础[M].武汉:武汉大学出版社,2010.
    [119] Laarhoven P J M, Pedrycz W. A fuzzy extension of Saaty’s priority theory. Fuzzy Sets Syst,1983,11(3):229–41.
    [120] Chen S J, Hwang C L. Fuzzy multiple attribute decision making,methods and applications. In:Lecture notes in economics an mathematical systems, vol.375. New York: Springer,1993。
    [121] Da deviren M, Yavuz S, and K l n N. Weapon selection using the AHP and TOPSIS methodsunder fuzzy environment [J]. Expert Systems with Applications,2009,36:8143–8151.
    [122]汪定伟,王俊伟.智能优化方法[M].北京:高等教育出版社,2007.
    [123] Kennedy J., Eberhart R. C. Particle swarm optimization[C]. In: Proceedings of IEEEInternational Conference on Neural Networks. Perth: IEEE Press,1995, vol.4,1942–1948.
    [124] Shi Y. Eberhart R. C. A modified particle swarm optimizer[C]. In: Proceedings of IEEEInternational Conference on Evolutionary Computation. Anchorage: IEEE Press,1998,66–73.
    [125]何克清等.网络是软件[M].北京:科学出版社,2008.
    [126] Xu Z S. Deviation Measures of Linguistic Preference Relations in Group Decision Making [J].Omega,2005,33:249–254.
    [127] Xu Z S. Group decision making based on multiple types of linguistic preference relations [J].Information Sciences,2008,178:452–467.
    [128] Xu Z S. Consistency of interval fuzzy preference relations in group making [J]. Applied SoftComputing,2011,11:3898–3909.
    [129]姜艳萍,梁海明.不同粒度语言信息的群体一致性判别和改进方法[J].东北大学学报(自然科学版),2010,31(11):1652–1656.
    [130]马永红,周荣喜,李振光.基于离差最大化的决策者权重的确定方法[J].北京化工大学学报(自然科学版),2007,34(2):178–180.
    [131] Hwang C L, Lin M J. Group decision making under multiple criteria[M]. Berlin:Springer-Verlag,1987.
    [132] Asanga Ratnaweera, Saman K. Halgamuge, Member, IEEE, and Harry C. Watson.Self-Organizing Hierarchical Particle Swarm Optimizer With Time-Varying AccelerationCoefficients. IEEE Trans. Evol. Comput.,2004,8(3):240–255.
    [133]王国华,梁樑.决策理论与方法[M].合肥:中国科学技术大学出版社,2006.
    [134]陶菊春,吴建明.综合加权评分法的综合权值确定新探[J].系统工程理论与实践,2001,21(8):43–48.
    [135]徐泽水,达庆利.多属性决策的组合赋权方法研究[J].中国管理科学,2002,10(2):84–87.
    [136]王中兴,牟琼,李桥兴.多属性决策的组合赋权法[J].应用数学与计算数学学报,2003,17(2):55–62.
    [137]樊治平,张全,马建.多属性决策中权重确定的一种集成方法[J].管理科学学报,1998,1(3):50–53.
    [138]宋光兴,杨德礼.基于决策者偏好及赋权法一致性的组合赋权法[J].系统工程与电子技术,2004,26(9):1226–1230.
    [139] Buckley J J. Fuzzy hierarchical analysis. Fuzzy Sets Syst,1985,17(1):233–47
    [140] Shannon C E, Weaver W. The mathematical theory of communication[M]. Urbana: TheUniversity of lllinois Press,1947.
    [141] Shi L., Yang S.L. The evaluation of software trustworthiness with FAHP and FTOPSISmethods, International Conference on Computational Intelligence and Software Engineering,2009.
    [142] Wang J J, Zhang C F, et al. Using the fuzzy multi-criteria model to select the optimal coolstorage system for air conditioning [J]. Energy and Buildings,2008,40:2059–2066.
    [143] Buckley J J. Fuzzy hierarchical analysis, Fuzzy Sets and System,1985,17:233–247.
    [144] Chen S H, Hsieh C H. Representation, ranking, distance, and similarity of L-R type fuzzynumber and application. Australian Journal of Intelligent Processing Systems,2000,6(4):217–229.
    [145] Fenton NE,Pfleeger SL.软件度量(原书第二版)[M].北京:机械工业出版社,2004.
    [146] Wang J J, Zhang C F, et al. Using the fuzzy multi-criteria model to select the optimal coolstorage system for air conditioning [J]. Energy and Buildings,2008,40:2059–2066.
    [147]邱菀华.管理决策熵学及其应用[M].北京:中国电力出版社,2010.
    [148] Cover T.M., Thomas J.A. Elements of Information Theory [M]. New York: John Wiley andSons,2006.
    [149]毛红保,张凤鸣,冯卉,等.一种基于区间估计的多属性决策组合赋权方法[J].系统工程理论与实践,2007,27(6):86–92.
    [150] E T Jaynes. Information Theory and Statistical Mechanics[J]. Physical Review,1957,106(4):620–630.
    [151] Cover T.M., Thomas J.A. Elements of Information Theory [M]. New York: John Wiley andSons,2006.
    [152]陈卫东,蔡萌林,于诗源.工程优化方法[M].哈尔滨:哈尔滨工业大学出版社,2006.
    [153]袁亚湘.非线性优化计算方法[M].北京:科学出版社,2008.
    [154]曾宪报.组合赋权法新探[J].预测,1997(5):69–72.
    [155]华小义,谭景信.基于“垂面”距离的TOPSIS法——正交投影法[J].系统工程理论与实践,2004,24(1):114–119.
    [156]熊伟.质量功能展开——从理论到实践[M].北京:科学出版社,2009.
    [157] Hauser J R, Clausing D. The house of quality [J]. Harvard Business Review,1988, May-Jun:63–73.
    [158] Lee Y C, Sheu L C&Tsou Y G. Quality function deployment implementation based on FuzzyKano model: An application in PLM system [J]. Computers&Industrial Engineering,2008,55:48–63.
    [159] Chen L H, Ko W C. A fuzzy nonlinear model for quality function deployment consideringKano’s concept[J]. Mathematical and Computer modeling,2008,48:581–593.
    [160] Lee Y C, Huang S Y. A new fuzzy concept approach for Kano’s model[J]. Expert Systems withApplications,2009,36:4479–4484.
    [161] Chen L H, Weng M C. An evaluation approach to engineering design in QFD process usingfuzzy goal programming models[J]. European Journal of Operational Research,2006,172:230–248.
    [162] González A. A study of the ranking function approach through mean values [J]. Fuzzy Sets andSystems,1990,35:29–41.
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.