Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 520-523.doi: 10.11896/jsjkx.200200062
• Big Data & Data Science • Previous Articles Next Articles
YUE Wen-jiao1,2, LI Peng1, WEN Jun-hao2, XING Bin1,3
CLC Number:
[1] MENG X F,CI X.Big data management:concepts,technologies and challenges[J].Computer Research and Development,2013,50(1):146-169. [2] SCALA N M,RAJGOPAL J,VARGAS L G,et al.Group Decision Making with Dispersion in the Analytic Hierarchy Process [J].Group Decision and Negotiation,2016,25(2):355-372. [3] EDM Council.DCAM:the data management capability assess-ment model[EB/OL].[2019-09-25].https://edmcouncil.org/page/aboutdcamreview. [4] CMMI Institute.Data Management Maturity (DMM)[EB/OL].https://www.cmmiinstitute.com/data-manage-ment-maturity. [5] China national engineering laboratory of industrial big data application technology,Global Association for Research Methods and Data Science[M]//Enterprise Data Application Influence White Paper.Guizhou,China,California,USA,2019. [6] YANG Y,WANG H T,JANG Y,et al.Research on software quality evaluation model based on fuzzy analytic hierarchy process[J].Computer and Digital Engineering,2017,45(4). [7] WANG J L,WU B,XU Y,et al.Study on optimizing water supply performance index weight by improving AHP method[J].Science and Technology Management Research,2019,39(9):49-55. [8] GAYTHER S.The Analytic Hierarchy process[M]//Encyclopedia of Biostatistics.John Wiley & Sons,2017:19-28. [9] QIN Z Y.Research on university library data governance andmaturity model under big data environment[J].New Century Library,2019(11):62-67. [10] XU L X,YUAN L.Research on maturity assessment of local government data opening portal[J].Library and Information Work,2019,63(12):52-58. [11] LI C,ZHOU C L,HUA B,et al.Information system application maturity evaluation model [J].East China Electric Power,2014,42(11):2428-2431. [12] FAN Y S.Strategic framework and maturity model of enterprise information management [J].Computer IntegratedManufactu-ring System,2008(7):1290-1296. |
[1] | WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42. |
[2] | LIU Zi-qi, GUO Bing-hui, CHENG Zhen, YANG Xiao-bo and YIN Zi-qiao. Science and Technology Strategy Evaluation Based on Entropy Fuzzy AHP [J]. Computer Science, 2020, 47(6A): 1-5. |
[3] | ZHENG Geng-feng. Emergency Plan Evaluation of Special Equipment Accident Based on Intuitionistic Fuzzy Analytic Hierarchy Process [J]. Computer Science, 2020, 47(6A): 616-621. |
[4] | FENG Shen-feng, GAO Jian-hua. Test Case Prioritization Method Based on AHP for Regression Testing [J]. Computer Science, 2019, 46(8): 233-238. |
[5] | ZHENG Zhi-yun, JIA Chun-yuan, WANG Zhen-fei and LI Dun. Computing Research of User Similarity Based on Micro-blog [J]. Computer Science, 2017, 44(2): 262-266. |
[6] | WAN Xue-lian and ZHANG Jing-he. Research on Comprehensive Assessment Method of Information System Security Based on System Attack and Defense [J]. Computer Science, 2016, 43(Z6): 322-327. |
[7] | SHAN Mei-jing. Analytic Hierarchy Process-based Assessment Method on Mobile Payment Security [J]. Computer Science, 2015, 42(Z11): 368-371. |
[8] | CHEN Xi-hong, JIN Yue-hui and YANG Tan. Study on Quality Assessment Model for Mobile Videos over 3G Network [J]. Computer Science, 2015, 42(9): 86-93. |
[9] | WANG Lei,YE Jun and ZHANG Hong-li. Rough Set and Analytic Hierarchy Process-based Approach on Supplier Selection [J]. Computer Science, 2014, 41(3): 80-84. |
[10] | JIANG Zheng-wei,ZHAO Wen-rui,LIU Yu and LIU Bao-xu. Model for Cloud Computing Security Assessment Based on Classified Protection [J]. Computer Science, 2013, 40(8): 151-156. |
[11] | . Analytic Hierarchy Process (AHP)-based Vulnerability Quantitative Assessment Method for Information Systems [J]. Computer Science, 2012, 39(7): 58-63. |
[12] | ZHANG Hai-tao,WANG Hui-qiang. Autonomic Dependability Evaluation of Autonomic System for Service-oriented [J]. Computer Science, 2011, 38(1): 158-161. |
[13] | LU Zhen-bang,ZHOU Bo. Network Security Situation Assessment Based on WOWA-FAHP [J]. Computer Science, 2009, 36(7): 63-67. |
[14] | . [J]. Computer Science, 2006, 33(9): 121-124. |
[15] | . [J]. Computer Science, 2006, 33(6): 73-75. |
|