相似文献/References:
[1]黄松 夏洪亚 谈利群.基于模糊综合的信息安全风险评估[J].计算机技术与发展,2010,(01):185.
HUANG Song,XIA Hong-ya,TAN Li-qun.Fuzzy Comprehensive Evaluation for Information Security[J].,2010,(10):185.
[2]吉琨 王海艳 王汝传.一种基于灰色系统理论的主观信任评估方法[J].计算机技术与发展,2010,(04):109.
JI Kun,WANG Hai-yan,WANG Ru-chuan.A Novel Subjective Trust Evaluation Method Based on Grey System Theory[J].,2010,(10):109.
[3]李玲娟 孔凡龙.基于灰色理论的层次化网络安全态势评估方法[J].计算机技术与发展,2010,(08):163.
LI Ling-juan,KONG Fan-long.A Hierarchical Network Security Situation Evaluation Method Based on Grey Theory[J].,2010,(10):163.
[4]张琼 冯嘉礼.基于属性理论的教师教学质量动态评估[J].计算机技术与发展,2010,(12):12.
ZHANG Qiong,FENG Jia-li.Teaching Quality Dynamic Assessment in Attribute Theory[J].,2010,(10):12.
[5]于湛麟,朱萍,任永昌.电子商务企业声誉评估方法[J].计算机技术与发展,2013,(02):89.
YU Zhan-lin,ZHU Ping,REN Yong-chang.Corporate Reputation Evaluation Method on E-commerce[J].,2013,(10):89.
[6]邵 瑛,徐 斌.一种通用的文本日志类信息分析评估模型[J].计算机技术与发展,2021,31(增刊):73.[doi:10. 3969 / j. issn. 1673-629X. 2021. S. 014]
SHAO Ying,XU Bin.A Common Analysis and Evaluation Model of Text Log Information[J].,2021,31(10):73.[doi:10. 3969 / j. issn. 1673-629X. 2021. S. 014]
[7]唐传谦*,党虎飞.基于 VR 的金工仿真与实训评估研究[J].计算机技术与发展,2023,33(07):196.[doi:10. 3969 / j. issn. 1673-629X. 2023. 07. 029]
TANG Chuan-qian*,DANG Hu-fei.Research on Metalworking Simulation and Training Evaluation Based on VR[J].,2023,33(10):196.[doi:10. 3969 / j. issn. 1673-629X. 2023. 07. 029]