Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ruimin Hu is active.

Publication


Featured researches published by Ruimin Hu.


international conference on computer sciences and applications | 2013

Risk Assessment of Security Systems Based on Entropy Theory and Neyman-Pearson Criterion

Haitao Lv; Ruimin Hu

For a security system, the risk assessment is an important metric to judge whether the protection effectiveness of a security system is good or not. In this paper, the security systems deployed in a guard field are regarded abstractly as a diagram of security network. Firstly a method about risk assessment based on entropy theory and Neyman-Pearson criterion is proposed. Secondly, the most vulnerable path formulation of a security network is described and a solution by utilizing the Dijkstras shortest path algorithm is provided. The protection probability on the most vulnerable path is considered as the risk measure of a security network. Furthermore, we study the effects of some parameters on the risk and the breach protection probability and present simulations. Ultimately, we can gain insight about the risk of a security network.


Entropy | 2013

Protection Intensity Evaluation for a Security System Based on Entropy Theory

Haitao Lv; Ruimin Hu; Jun Chen; Zheng He; Shihong Chen

The protection effectiveness is an important metric to judge whether a security system is good or not. In this paper, a security system deployed in a guard field is regarded abstractly as a security network. A quantitative protection effectiveness evaluation method based on entropy theory is introduced. We propose the protection intensity model, which can be used to calculate the protection intensity of a stationary or moving object provided by a security system or a security network. Using the protection intensity model, an algorithm, specifically for finding the minimal protection intensity paths of a field deployed multiple security system, is also put forward. The minimal protection intensity paths can be considered as the effectiveness measure of security networks. Finally, we present the simulation of the methods and models in this paper.


international conference on computer research and development | 2011

Investment decision model of crime prevention system based on expected monetary values of the economic loss caused by risks

Haitao Lv; Ruimin Hu; Bin Huang; Tao Lu; Jingjing Dai

In recent years more and more cities are planning to construct crime preventing systems in order to reduce the loss caused by risks. There are many kinds of crime preventing systems with different variety and price in the market so far. It is the problem that each decision-maker faces jointly that how to select a crime preventing system for a city which would be a perfect fit. From the stand point of decision-makers, this paper proposed an investment decision-making model for the construction of crime preventing systems. This model measures the quality of a crime prevention system through expected monetary values of the economic loss caused by risks. This article also introduced two decision-making methods, which were optimistic rule and pessimistic rule. Finally this paper proved the model reasonable through an actual application.


international conference on information engineering and computer science | 2009

The Architecture and Application of University Emergency Information System

Xi Guo; Ruimin Hu; Yongjun Peng; Haitao Lv; Hao Bu

Nowadays, with the rapid development of social economy, the environment has become more and more complex and various events sometimes take place around universities in China. So the emergency information system should be constructed to prevent the occurrence of events and reduce economic losses in universities. In this paper, firstly, the requirements of university emergency are proposed according to the traditional emergency management techniques. Secondly, the new service-oriented architecture of university emergency information system which based on the ideal of hierarchical design is discussed. Finally, an example for specific application of university emergency information system is presented to clarify three core processes of university emergency response. The example shows that all kinds of events that occurred in university are disposed quickly and efficiently by this emergency system. It has the reference significance to other countries in the construction of university emergency information system.


Archive | 2010

Multi-node protection efficiency evaluation system with multiple protection capabilities

Chen Jun; Jingjing Dai; Xi Guo; Ruimin Hu; Haitao Lu; Yimin Wang


Archive | 2010

Protection effectiveness evaluation system with single protection capacity

Chen Jun; Jingjing Dai; Xi Guo; Ruimin Hu; Haitao Lu; Yimin Wang


Archive | 2010

Method for optimizing protection capability in safety protection system

Chen Jun; Jingjing Dai; Xi Guo; Ruimin Hu; Haitao Lu; Yimin Wang


Archive | 2010

Protection efficiency evaluating system with multiple protection abilities

Chen Jun; Jingjing Dai; Xi Guo; Ruimin Hu; Haitao Lu; Yimin Wang


3rd International Conference in Mechanical, Information and Industrial Engineering | 2015

Vulnerability assessment of security systems based on risk entropy and Neyman-Pearson criterion

Haitao Lv; Ruimin Hu; Jun Chen


italian conference on theoretical computer science | 2014

Risk Evaluation for Security Network Based on Protection Model and Risk Entropy

Haitao Lv; Ruimin Hu

Collaboration


Dive into the Ruimin Hu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge