Comparison Computing Based on Sub-optimum Analysis:A Guide System of Network Security
|
Title | Comparison Computing Based on Sub-optimum Analysis:A Guide System of Network Security |
Authors | |
Abstract | Many optimal computing method do not provide optimization capabilities, but instead rely on comparison evaluation as a means for developing solutions. A kind of theory surrounding with optimum information system, the systematical sub-optimum method, has been presented, and thereby the practice courses and results of mankind are classified by their natures into three categories: “Optimum”, “sub-optimum” and “non-optimum”, and also, the way of seeking out the optimum system have been found out. It is considered that the non-optimum system does not exclude the targets and the results of sub-optimization in practice. The formation of non-optimum system serves as the basis for existence of optimum system. Besides, the various characteristics and functions of the optimum system can be measured from the sub-optimum system. By summing the practice, this paper has also come at sub-optimum principle of the system, established the conception of sub-optimum thresholds and put forward three theorems about suboptimum parameters. Through the concept of sub-optimum, it analyzes the actual significance of system optimum. Based on sub-optimum analysis, it puts out the academic idea of extension optimum. Meanwhile, it discusses about the general framework of sub-optimum. Finally, according to the previous practice of optimization, kind of method has been developed to approach the optimum from non-optimum. |
Publisher | ACADEMY PUBLISHER |
Date | 2009-10-01 |
Source | Journal of Networks Vol 4, No 8 (2009): Special Issue: Performance Evaluation of Communication Networks |
Rights | Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html. |