Security

Comparison Computing Based on Sub-optimum Analysis:A Guide System of Network Security

Free registration required

Executive Summary

Many optimal computing methods do not provide optimization capabilities, but instead rely on comparison evaluation as a means for developing solutions. A kind of theory surrounding with optimum information system, the systematical sub-optimum method, has been presented, and thereby the practice courses and results of mankind are classified by their natures into three categories: "Optimum", "Sub-optimum" and "Non-optimum", and also, the way of seeking out the optimum system have been found out. It is considered that the non-optimum system does not exclude the targets and the results of sub-optimization in practice.

  • Format: PDF
  • Size: 377.11 KB