Comparison Computing Based on Sub-optimum Analysis: A Guide System of Network Security

Many optimal computing method do not provide optimization capabilities, but instead rely on comparison evaluation as a means for developing solutions. A kind of theory surrounding with optimum information system, the systematical sub-optimum method, has been presented, and thereby the practice courses and results of mankind are classified by their natures into three categories : “Optimum”, “sub-optimum” and “non-optimum”, and also, the way of seeking out the optimum system have been found out. It is considered that the non-optimum system does not exclude the targets and the results of sub-optimization in practice. The formation of non-optimum system serves as the basis for existence of optimum system. Besides, the various characteristics and functions of the optimum system can be measured from the sub-optimum system. By summing the practice, this paper has also come at sub-optimum principle of the system, established the conception of sub-optimum thresholds and put forward three theorems about suboptimum parameters. Through the concept of sub-optimum, it analyzes the actual significance of system optimum. Based on sub-optimum analysis, it puts out the academic idea of extension optimum. Meanwhile, it discusses about the general framework of sub-optimum. Finally, according to the previous practice of optimization, kind of method has been developed to approach the optimum from non-optimum.

[1]  Zengtang Qu,et al.  Method of Non-optimum Analysis on Risk Control System , 2009, J. Softw..

[2]  Ping He,et al.  Approach of Non-optimum Analysis on Information Systems Security , 2009, 2009 IITA International Conference on Control, Automation and Systems Engineering (case 2009).

[3]  He Ping On theory and practice of reliable innovation system , 2009 .

[4]  Zengtang Qu,et al.  Intelligence Analysis Based on Intervenient Optimum Learning Guide System , 2009, 2009 International Conference on Computational Intelligence and Natural Computing.

[5]  He Ping The method of attribute analysis in non-optimum to optimum , 2008 .