9583982.pdf - Hindawi.com

10
Research Article A Study on Effectiveness Evaluation for the Physical Protection System of a High Security Prison Based on the Cloud Model Ke Yin Public Security Department, Nanjing Forest Police College, Nanjing 210023, China Correspondence should be addressed to Ke Yin; [email protected] Received 6 September 2018; Accepted 31 October 2018; Published 14 November 2018 Academic Editor: Clemente Galdi Copyright © 2018 Ke Yin. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. In order to improve the effectiveness and accuracy of effectiveness evaluation for the physical protection system of a high security prison, this paper analyzed factors affecting the evaluation of such a system and, on this basis, applied the cloud theory and constructed a cloud model for evaluating the effectiveness of such a system. A case study was used to discuss the risk controllability of such a system with the evaluation method based on the cloud model. e research results show that the cloud model that we constructed for effectiveness evaluation can greatly reduce the influence of subjective factors in the risk evaluation for the physical protection system of a high security prison through the setting, calculation, and analysis of relevant parameters and we found that it is more accurate and practically useful especially when it is used in the evaluation together with the fuzziness and randomness of qualitative linguistic concepts. 1. Introduction With the rapid development of information technology, the information technology of high security prisons has also been constantly strengthened and advocated. e integrated phys- ical protection system is the foundation and core of building a more intelligent high security prison with more advanced information technology and which is oſten called a system that requires long-term construction and constant improve- ment. Since the comprehensive physical protection system is the center of daily operation support and management of the prison, its stability is essential to the security of the entire management system. As Fennelly, Lawrence [1] pointed out that no physical protection system is 100% defeat-proof, and if it is expected and designed to eliminate most threats, it always has its weak links. Physical barriers, alarm systems, security forces, and all the other components of a security system cannot achieve maximum security individually. erefore, it is necessary to establish an effectiveness evaluation system for the physical protection system of a high security prison. According to the existing literature, the researches on effectiveness evaluation for the physical protection system of a high security prison can be divided into three categories: e first category mainly puts emphasis on the intelligent analysis technology in the physical protection system, such as the research of Jie Xu [2] which analyzes how the physical protection system is constructed and applied based on the construction of the high security prison in Foshan, and further discusses the security needs and development orientation of high security prisons, especially the demand for and application of intelligent analysis technology. e second category focuses on the application of big data in physical protection, such as the Research of YunguoZuo [3] which analyzes the combined application of new technologies such as network and intelligence technologies of the physical protection system and the big data analysis technology in high security prisons and the research of Xu Xiaogang [4] which, based on the specific case in a high security prison, discusses the path and method of improving and creating innovative physical protection models in response to the change of situation in a high security prison; the third category involves the basically comprehensive researches, such as the research of WANG Hai-wei [5] which proposes a scheme to build an integrated physical protection system in response to the current situation and problems of the construction of the physical protection system. e scheme has built the dispersed physical protection subsystems into an integrated physical protection system of mutual interaction Hindawi Security and Communication Networks Volume 2018, Article ID 9583982, 9 pages https://doi.org/10.1155/2018/9583982

Transcript of 9583982.pdf - Hindawi.com

Research ArticleA Study on Effectiveness Evaluation for the Physical ProtectionSystem of a High Security Prison Based on the Cloud Model

Ke Yin

Public Security Department Nanjing Forest Police College Nanjing 210023 China

Correspondence should be addressed to Ke Yin yinkekesinacom

Received 6 September 2018 Accepted 31 October 2018 Published 14 November 2018

Academic Editor Clemente Galdi

Copyright copy 2018 KeYinThis is an open access article distributedunder theCreativeCommonsAttributionLicensewhichpermitsunrestricted use distribution and reproduction in any medium provided the original work is properly cited

In order to improve the effectiveness and accuracy of effectiveness evaluation for the physical protection system of a high securityprison this paper analyzed factors affecting the evaluation of such a system and on this basis applied the cloud theory andconstructed a cloudmodel for evaluating the effectiveness of such a system A case study was used to discuss the risk controllabilityof such a system with the evaluation method based on the cloud model The research results show that the cloud model that weconstructed for effectiveness evaluation can greatly reduce the influence of subjective factors in the risk evaluation for the physicalprotection system of a high security prison through the setting calculation and analysis of relevant parameters and we found thatit is more accurate and practically useful especially when it is used in the evaluation together with the fuzziness and randomnessof qualitative linguistic concepts

1 Introduction

With the rapid development of information technology theinformation technology of high security prisons has also beenconstantly strengthened and advocated The integrated phys-ical protection system is the foundation and core of buildinga more intelligent high security prison with more advancedinformation technology and which is often called a systemthat requires long-term construction and constant improve-ment Since the comprehensive physical protection system isthe center of daily operation support and management of theprison its stability is essential to the security of the entiremanagement system As Fennelly Lawrence [1] pointed outthat no physical protection system is 100defeat-proof and ifit is expected and designed to eliminatemost threats it alwayshas its weak links Physical barriers alarm systems securityforces and all the other components of a security systemcannot achieve maximum security individually Therefore itis necessary to establish an effectiveness evaluation system forthe physical protection system of a high security prison

According to the existing literature the researches oneffectiveness evaluation for the physical protection system ofa high security prison can be divided into three categoriesThe first category mainly puts emphasis on the intelligent

analysis technology in the physical protection system suchas the research of Jie Xu [2] which analyzes how thephysical protection system is constructed and applied basedon the construction of the high security prison in Foshanand further discusses the security needs and developmentorientation of high security prisons especially the demandfor and application of intelligent analysis technology Thesecond category focuses on the application of big data inphysical protection such as the Research of YunguoZuo [3]which analyzes the combined application of new technologiessuch as network and intelligence technologies of the physicalprotection system and the big data analysis technology inhigh security prisons and the research of Xu Xiaogang [4]which based on the specific case in a high security prisondiscusses the path and method of improving and creatinginnovative physical protection models in response to thechange of situation in a high security prison the thirdcategory involves the basically comprehensive researchessuch as the research of WANG Hai-wei [5] which proposesa scheme to build an integrated physical protection systemin response to the current situation and problems of theconstruction of the physical protection system The schemehas built the dispersed physical protection subsystems into anintegrated physical protection system of mutual interaction

HindawiSecurity and Communication NetworksVolume 2018 Article ID 9583982 9 pageshttpsdoiorg10115520189583982

2 Security and Communication Networks

and integration However most of these researchers empha-sized the construction of the physical protection systemfrom a qualitative and excessively subjective point of viewwithout making adequate quantitative analysis Therefore itis often difficult to promote and apply their research resultsin practice

How to strengthen physical protection and improve theeffectiveness of the physical protection system of a highsecurity prison has always been an important task in thepublic safety management In recent years scholars haveproposed some evaluation models to try to solve the problemof effectiveness For example Eric G Lambert et al [6] madea detailed analysis which revealed that the effects of thepersonal variables were conditional on staff position thatis irrespective of position two of seven work environmentvariables studied were closely related to greater perceivedrisk of harm from the job Jennifer Shea and Tory Taylor [7]posit that without explicitly incorporating the assessmentsat the foundation of the Evaluation-led Learning frameworkdeveloping mental evaluationrsquos ability to affect organizationallearning in productive ways will likely be haphazard andlimited Some others advocate that the Cloud Model theorycan be effectively applied into the assessment [8ndash15] Weknow that on the basis of traditional fuzzy mathematics andprobability statistics the cloud model organically combinesfuzziness and randomness to establish a quality and quantitydata conversion model which realizes the natural conversionbetween qualitative linguistic values and quantitative valuesand objectively reflects the characteristics of the evaluatedindices and makes the comprehensive evaluation of systemeffectiveness more objective Based on this assumption thispaper will according to the characteristics of the cloudtheory together with the individual needs of the physicalprotection system of a high security prison which is differentfrom ordinary physical protection systems establish relevantparameters and make use of certain arithmetic expressions ofthe weighted integrated cloud model to build an adjustableeffectiveness evaluation model for the physical protectionsystem from the perspective of qualitative and quantitativeconversion

2 Research Areas

Ahigh security prison is actually rather a complicated systemAlthough there are not many sites involved the configurationof its internal area is usually complicated eg a high securityprison always includes the security fence the duty room thesub-control center the command center the prison factorythe reception room the infrastructure site the ordinarycells the quarantine cells and the restaurant Its physicalprotection system should be based on the specialness ofits structure and the specificity of its needs Its securitylevel requires that its physical protection system must beable to ensure the security of its periphery the security ofguardsmen the security inside and outside a cell and thesecurity of inmates when they meet with their families Inaddition it is necessary to effectively manage the prisonersrsquopersonal data and sentencing information the prison officersrsquopersonal records and attendance records the entry and exit

records of various personnel and the reporting of events andissuance of decision-making results when emergency occurs

In recent years information technology and Internet ofThings technology have been widely used in various types ofwork in a high security prison At present in high securityprisons of China a three-dimensional warning system witha wall and an AB door as the main body has been developedand additionally supported by a power grid an access controland an alarm system and relatively built perfect systems ofdefense by personnel and by physical barriers In the systemof defense by technology various subsystems are establishedsuch as the video surveillance system the alarm systemthe periphery defense system the vehicle bottom detectionsystem the AB door management system the access controlsystem and the broadcast intercom system According to thedata the total number of video surveillance stations acrossthe country has reached 450000 There are 20 provinceswhich have basically built a two-level command systembetween bureau of prisons and prisons though it is obviouslyfar from meeting the needs

As the physical protection system is increasingly used inprisonmanagement its role in prison security is continuouslyplayed to extremes However according to the data of thepublic security system there are two big problems that needto be addressed and solved in the physical protection systemof a high security prison first how to test whether the to-be-designed or existing physical protection system can achievethe effects and goals required by the security design secondlyhow to strike a balance between demand and cost in thephysical protection system construction since if so it cannot only play its due role decently but also help avoid theuse of duplicate devices Due to the important role playedby the physical protection system in security managementof a high security prison a frequent and effective evaluationmechanism for such a system can improve its effectivenessand stability which will be discussed in detail as follows

3 An Effectiveness EvaluationModel for the Physical ProtectionSystem of a High Security PrisonBased on the Normal Cloud Model

31 An Introduction to the Normal Cloud Model The nor-mal cloud model is mainly expressed by expectations (Ex)entropy (En) and super entropy (He)

The normal cloud model [16] used in this study is one ofcloud models Since the distribution curves of many thingsin social and natural sciences are approximately expressedin the normal or semi-normal distribution the normalcloud model can indicate more universality in applicationIt evolved and developed from the probability theory andfuzzy mathematics is a new model using linguistic valuesto represent uncertainty conversion between the qualitativeand the quantitative [17ndash19] The digital characteristics ofthe normal cloud model which is represented through thequantitative expressions of qualitative concepts are oftenexpressed by expectations (Ex) entropy (En) and superentropy (He)

Security and Communication Networks 3

Cloud generation algorithms include the forward cloudgeneration algorithm [20] and the reverse cloud generationalgorithm [21] The forward cloud generation algorithmconverts natural linguistic values to quantitative valuesconversely the reverse cloud generation algorithm convertsquantitative values to natural linguistic values So we saythat the cloud model is a new mathematical model thatis developed on the basis of normal distribution and thebell-shaped membership functions Since the model can beapplied widely [22 23] its computing concept can be dividedinto the following steps [24]

(1) Generate a normal random number

1198641198991015840119894 = 119873119874119877119872(1198641198991198671198902) (1)

In (1) 119864119899 and 1198671198902 represent expectation and variancerespectively

(2) Regenerate another normal random number

119909119894 = 119873119874119877119872(Ex 11986411989910158402119894 ) (2)

In (2) 119864119909 and 11986411989910158402119894 represent expectation and variancerespectively and NORM represents the normally distributedrandom function

(3) Calculation

120583119894 = expminus (119909119894 minus 119864119909)2

211986411989910158402119894 (3)

(4) (119909119894 120583119894) represents any cloud drop in the number field(5) Repeat Steps (1) to (4) until we obtain the required

number of cloud drops

32 The Effectiveness Evaluation Index System for the PhysicalProtection System of a High Security Prison For a highsecurity prison the effectiveness of its physical protectionsystem refers to the functions of its physical protectionsystem namely the extent to which its physical protectionsystem reaches or achieves the systemrsquos intended goals in itssafety management system Since it is a type of very compli-cated and exploratory research to determine the effectivenessevaluation indices for its physical protection system there isno clear unified standard for relevant researches at presentDue to the fact that the relationship is complex betweenany two evaluation factors in effectiveness evaluation for itsphysical protection system which not only involves videosurveillance periphery defense entrance and exit controlintercom broadcast emergency alert electronic patrol intel-ligent analysis and electronic maps among other physicalprotection functions but also has to interact with the policemanagement system the intelligence research and judgmentsystem dispatching and command system etc therefore theconstruction of an evaluation index system for its physicalprotection system should be based not only on the basicevaluation model for the physical protection system but alsoon the special needs of high security prisons which havespecial functions

Most prison security systems have similar requirementsand authorize their staff to collect and report intelligence rel-atively [25] escape planning organized gang-related activity

Table 1 Effectiveness evaluation index system for the physicalprotection system of a high security prison

First-Level Indices Second-Level Indices

InformationCollectionTransmission andControl

Means of Information CollectionQuality of Information CollectionSpeed of Information TransmissionSecurity of Information Transmission

Capability of Signal Shielding

Judgment andProcessing ofInformation

Analysis of Information ContentResearch on and Judgment of Information

ContentInformation Data Sorting and Mining

Information Interaction Ability

Detection andMonitoring

Detection RangeDetection SensitivityMonitoring Place

Covertness of Detection Equipment

Entrance and ExitControl

Access AuthorizationResponse Time

Emergent OpeningVehicle Detection Capability

Prison Officersrsquo PatrolManagement of Prison Patrollers

Patrol RouteEquipment of Prison Patrollers

Self-ProtectionCapability of theSystem

Anti-Destruction and Anti-InterferenceCapability

Level of Operating PersonnelBackupManagement Capability

False Positive Rate and False Negative Rate

drug trafficking planned assaults on staff or other prisonersillicit communications via mobile phone and Internet radi-calization and violent extremist activity bullying of vulnera-ble prisoners and risks to safety and security and order andcontrol of the prison

Based on the principles of clear hierarchy high scientificcontent completeness comparability and data availabilityand operability this paper will consider the status of thephysical protection system of a high security prison in Chinaand the availability of evaluation data and try to build aneffectiveness evaluation index system for the physical protec-tion system of a high security prison based on the authorrsquosprevious research [26 27] and othersrsquo relevant researchachievements [28 29] The specific contents are shown inTable 1

(1) Information collection focuses on the means of infor-mation acquisition as well as the quality and timeliness ofdata information information transmission examines thecommunication status and transmission efficiency of thephysical protection information system of a high securityprison and information control focuses on interfering andshielding information transmission through specific channelsor of specific frequencies within prison the information

4 Security and Communication Networks

technology level of the physical protection system of a highsecurity prison can be accurately evaluated by quantitativeindices such as stable running time failure rate and accu-racy and therefore this method has good measurability andoperability

(2) Judgment of information mainly examines the appli-cation of the physical protection system (of a high secu-rity prison) in assistance to analyze study and judge datainformation and the information processing focuses onthe evaluation of the ability to automatically sort identifyand integrate information so as to generate correspondingjudgment results The systemrsquos capability of processing inter-action is mainly reflected in the capability of interactionbetween subsystems the quick response to emergency andthe capability to work 24 hours such as the interactionbetween the video surveillance system and the intrusionalarm system the fire protection system the entrance andexit control system the intercom system and the emergencyalarm system whichwill help identify automatically and sendalarm signals

(3) Detection and monitoring cover not only externalinvasion from outside to inside in periphery protection butalso emergencies that break out from inside to outside Itfocuses on the coverage and sensitivity of various intrusiondetectors as well as the video surveillance index in theprison security system to assess the coverage of the video thecovertness of the front-end equipment such as the cameraand the resolution of the back-end video

(4) The access control index is divided into two partsthe control of personnelrsquos and vehiclesrsquo entrance and exit Itmainly examines the authority of the entrance and exit thetime duration of the entrance and exit the emergent openingand closing of the entrance and exit and the inspection ofsigns of life in and out of vehicles

(5) The evaluation index of personnel patrolling mainlyincludes the management of prison patrollers the designof patrol routes and the personnelrsquos equipment The man-agement of prison patrollers refers to the assignment ofpatrollersrsquo number and the arrangement of patrol time patrolroutes are designed on the basis of the patrollers and shouldcover key and vital areas completely Personnelrsquos equipmentincludes emergency equipment for a single officer in theenvironment of a high security prison

(6) On the one hand the self-protection capabilityrefers to the adaptability fault-tolerant repair capability andresilience of the system after being used Physical protectionequipment is the key part of the physical protection systemFailure of the physical protection equipment will result inthe failure of its protection capability which in turn willaffect the protection effectiveness of the physical protectionsystem On the other hand the systemrsquos self-protectioncapability index is more related to the system maintenanceby the users to adopt the integrated management systemfor physical protection of a high security prison includingequipment backup technical support and system failureconfirmation This capability improves the survivability ofthe system guarantees the benefits of the investment andhelps to play a better role in the systemrsquos advantage of physicalprotection

33 The Effectiveness Evaluation Model for the PhysicalProtection System of a High Security Prison

331 Determination of Comments Most of these commentsare described in ambiguous language The indices for eval-uating the physical protection system are mostly qualitativeindices which cannot be directly quantified and need to beindirectly converted into quantitative indices Therefore weshould represent comments by the one-dimensional cloudmodel and we can develop a set of standard cloud modelsfor evaluation of the index system The following formula isused to solve the digital characteristics of the cloud model

119864119909119894 =

119862119898119894119899119894 119894 = 1119862119898119894119899119894 + 1198621198981198861199091198942 1 lt 119894 lt 119899119862119898119886119909119894 119894 = 119899

(4)

119864119899119894 = 119862119898119886119909119894 minus 1198621198981198941198991198946 (5)

119867119890119894 = 119870 (6)

(Cmin Cmax) is the range of values for comments In theformula 119896 is a constant indicating the degree of ambiguityof certain comments which can be determined based onhistorical data or can be directly given by experts accordingto experience while the value of119867119890 cannot be too large so asto avoid the error of 119864119909 being too large and the result beinginaccurate Based on relevant literature on risk assessment bythe cloudmodel [20 21 28] and according to the effectivenessevaluation criteria for the physical protection system ofa high security prison this paper has set the ranks andcorresponding scores of the comments as follows low risk[0 4] relatively low risk [4 6] medium risk [6 8] relativelyhigh risk [8 9] and high risk [9 10] with the value of Hebeing 003 According to this definition this paper can obtaina table of digital characteristics for standard cloud models ofrisk (Table 2)

Obtain the standard cloud graph with Matlab accordingto data in Table 2

332 Determination of Each Indexrsquos Weight The evalua-tion index system clarifies the affiliation between indicesbut the importance of each index at the same level toits superior index still needs to be determined by usingscientific methods Concerning the hierarchical structure ofthe effectiveness evaluation index system for the physicalprotection system of a high security prison it is appropriateto use the analytic hierarchy process (AHP) to calculate theweight value of each index This paper uses the AHP to solvethe problem of index weight distribution Its main approachis as follows Use Saatyrsquos scaling method for priorities [30]to make a comparison between indices at the same leveland score each one of them in terms of importance andthen construct a corresponding judgment matrix for themaccording to the scores and then verify the consistency of thejudgment matrix If the matrix fails to meet the requirements

Security and Communication Networks 5

Table 2 A set of standard cloud models for evaluation

Comments Low Risk Relatively Low Risk Medium Risk Relatively High Risk High RiskStandard CloudModel (00667003) (50333003) (70333003) (8501667003) (1001667003)

of consistency it needs to be repeatedly reconstructed untilthe requirement of consistency is met Finally the weight ofeach index is obtained by hierarchical single ordering andhierarchical total ordering

333 Determination of the Cloud Model for Each IndexAccording to the risk value judged by the expert group foreach index the cloud model of each level is calculated bythe reverse cloud generator formula without the degree ofcertainty

Firstly the mean value of each set of data samples isobtained

119883 = 1119899119899sum119894=1

119909119894 (7)

The first absolute central moment for each set of data samples

1119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (8)

Variance

1198782 = 1119899 minus 1

119899sum119894=1

(119909119894 minus 119883)2 (9)

Expectation

119864119909 = 119883 (10)

At the same time the entropy can be obtained from the meanvalue

119864119899 = radic1205872 times 1

119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (11)

Based on variance and super entropy we can obtain

119867119890 = radic1198782 minus 1198641198992 (12)

334 Determining Evaluation Results with the Help of theCloud Model Graph Based on the cloud models of thesecond-level indices together with each indexrsquos weight wecan calculate the cloud models of the first-level indices Thecalculation formula is shown in (13)-(15) where Ex En andHe are the evaluation cloudmodels of the (n-1)th level indicesEx1Ex2 sdot sdot sdotExn is the expectation of the cloud model of eachindex at the nth level Ex1Ex2 sdot sdot sdotExn is the entropy of thecloud model of each index at the nth level 1198671198901 1198671198902 sdot sdot sdot 119867119890119899is the super entropy of the cloud model of each index atthe nth level 119894 is the number of indices at the nth level and1205971 1205972 sdot sdot sdot 120597n is the weight of each index at the nth level Wekeep calculating until the integrated cloudmodel of the targetlevel for evaluation is obtained

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 1 Standard cloud model graph for the evaluation model

Ex = 1198641199091 times 1198641198991 times 1205971 + 1198641199092 times 1198641198992 times 1205972 + sdot sdot sdot + 119864119909119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (13)

119864119899 = 1198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (14)

He

= 1198671198901 times 1198641198991 times 1205971 + 1198671198902 times 1198641198992 times 1205972 + sdot sdot sdot + 119867119890119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899(15)

The total model obtains the cloud graph by Matlab asshown in Figure 1 and verifies the evaluation levels of theentire system

4 Results and Analysis

This paper made a case study of the physical protectionsystem of a high security prison which has just completedthe overall reconstruction of its physical protection systemand improved significantly from three aspects defense byprison personnel defense by physical barriers and defenseby technology The configuration of its physical protectionsystem is relatively representative According to the indexsystem the evaluation model and the calculation methodconstructed above the following analysis and calculationwere performed

According to the effectiveness evaluation index systemfor the physical protection system of a high security prisonconstructed in the previous section we organized an expertgroup to score each index item according to the scalingmethod of the AHP and establish a judgment matrix for eachlevel of evaluation indices where we have the following

First level index set

119860 = 1198601 1198602 sdot sdot sdot 119860 119894 (119894 = 1 2 119900) (16)

6 Security and Communication Networks

The weight set of the first level indices

120596 = 1198801 1198802 sdot sdot sdot 119880119894 (119894 = 1 2 119900) (17)

Second level index set

119860 119894 = 119860 1198941 119860 1198942 sdot sdot sdot 119860 119894119895 (119895 = 1 2 119901) (18)

The weight set of the second level indices

120596119894 = 1205961198941 1205961198942 sdot sdot sdot 120596119894119895 (119895 = 1 2 119901) (19)

T is the judgment matrix of A1 A2 and A3 (first levelindices) for evaluating the effectiveness of the physical pro-tection system T1 T2 T3 T6 are the judgment matrices ofA11 A12 A13 A66 (second level indices) for evaluating theeffectiveness of the physical protection systemThe judgmentmatrix of each levelrsquos indices is as follows

T =

[[[[[[[[[[[[[[[[[

1 13

13

15 1 1

33 1 1 1

3 3 13 1 1 1

3 3 15 3 3 1 5 31 1

313

15 1 1

33 1 1 1

3 3 1

]]]]]]]]]]]]]]]]]

T1 =[[[[[[[[[[[[

1 13

13

15

15

3 1 1 13

13

3 1 1 13

135 3 3 1 1

5 3 3 1 1

]]]]]]]]]]]]

T2 =[[[[[[[[[

1 13 1 1

23 1 3 61 1

3 1 12

2 16 2 1

]]]]]]]]]

T3 =[[[[[[[[[

1 12 3 1

32 1 5 1

213

15 1 1

73 2 7 1

]]]]]]]]]

Table 3 Weight vector and consistency judgment

Weight Vector CR ConsistencyJudgment

120596=(00597016060160603986005971606)T 00093 Satisfy1205961=(0055701298012980342403424)

T 00125 Satisfy1205962=(01325053810132501968)T 00938 Satisfy1205963=(01623028790060404894)

T 00071 Satisfy1205964=(080603250402801917)

T 00573 Satisfy1205965=(01638053902973)

T 00079 Satisfy1205966=(01376039350075403935)T 00015 Satisfy

T4 =[[[[[[[[[[

1 13

15

13

3 1 35 3

5 53 1 5

33 1

335 1

]]]]]]]]]]

T5 =[[[[[[

1 13

123 1 2

2 12 1

]]]]]]

T6 =[[[[[[[[

1 13 2 1

33 1 5 112

15 1 1

53 1 5 1

]]]]]]]]

(20)

The weight vector of each levelrsquos indices was calculatedand the consistency was verified as shown in Table 3

Table 3 is the result of the hierarchical single orderingHowever in order to obtain the importance of all the indicesat the same level with respect to the highest level thehierarchical total ordering must also be conducted on thebasis of the hierarchical single ordering The weight vector ofeach index relative to its target level is shown in Table 4

According to the risk criteria defined in Table 2 we askedexperts to score each index and then calculated the cloudmodel characteristics (Ex En and He) from the quantitativeto the qualitative using formula (7)-(12) of the reverse cloudmodel generation algorithm without the degree of certaintyThe result is shown in Table 5

According to the data in Table 5 the integrated cloudmodel for the physical protection system of this high securityprison was calculated by formula (13)-(15) (496486 0267204065) and the cloud graph Figure 2 was crafted

From Figure 2 it can be seen that the risk value ofthis prisonrsquos physical protection system is consistent withthe cloud graph of relatively low risk In other words inrelatively low risk this calculation result is consistent withthe assessment results of some experts and the results from

Security and Communication Networks 7

Table 4 Weight vector of each index relative to its target level

First LevelIndex

WeightVector

SecondLevelIndex

WeightVector

WeightVector inTotal

Ordering

A1 00597

A11 00557 00033A12 01298 00078A13 01298 00078A14 03424 00204A15 03424 00204

A2 01606

A21 01325 00213A22 05381 00865A23 01325 00213A24 01968 00316

A3 01606

A31 01623 0026A32 02879 00462A33 00604 00097A34 04894 00786

A4 03986

A41 00806 00321A42 0325 01295A43 04028 01606A44 01917 00764

A5 00597A51 01638 00098A52 0539 00322A53 02973 00178

A6 01606

A61 01376 00221A62 03935 00632A63 00754 00121A64 03935 00632

survey The entropy and super entropy of the integratedcloud model for evaluation are small which proves thatthe distribution of the cloud is relatively concentrated theopinions are more in unison and the evaluation results aremore reliable Compared with other methods such as pureanalytic hierarchy process this method can be adopted withmore accurate values and then convert these values throughthe cloud model into a graph which shows results moreclearly

5 Conclusion

In general the traditional methods for evaluating the risklevel of security systems focus on evaluation techniquesbut rarely consider the randomness and fuzziness the twoattributes of qualitative language This will cause defects inthese methods no matter how many efforts are made in thesubjective analysis and the reliability and authenticity of theevaluation results are always in question

In this paper the cloud theory was applied to evaluatethe effectiveness of the physical protection system of a highsecurity system and then a case study was adopted to discussthe controllability of risk of such a system with the evaluation

Table 5 Weight vector and cloudmodel of each second level index

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

Means ofInformationCollection

00033 (218180745800864) Low Risk

Quality ofInformationCollection

00078 (381821160101335) Low Risk

Speed ofInformationTransmission

00078 (409091152304516) RelativelyLow Risk

Security ofInformationTransmission

00204 (463641180802454) RelativelyLow Risk

Capabilityof SignalShielding

00204 (309091284402031) Low Risk

Analysis ofInformationContent

00213 (290910621503235) Low Risk

Research on andJudgment ofInformationContent

00865 (190910621503235) Low Risk

Information DataSorting andMining

00213 (254550870103402) Low Risk

InformationInteraction Ability 00316 (536361408702649) Relatively

Low Risk

Detection Range 0026 (618181160101335) MediumRisk

DetectionSensitivity 00462 (327271346504528) Low Risk

Monitoring Place 00097 (363641097902215) Low RiskCovertness ofDetectionEquipment

00786 (572731118704084) RelativelyLow Risk

AccessAuthorization 00321 (490910621503235) Relatively

Low Risk

Response Time 01295 (509091077203612) RelativelyLow Risk

Emergent Opening 01606 (481821429405661) RelativelyLow Risk

Vehicle DetectionCapability 00764 (672730890801571) Medium

RiskManagement ofPrison Patrollers 00098 (790910828600653) Medium

Risk

Patrol Route 00322 (418181015103650) RelativelyLow Risk

Equipment ofPrison Patrollers 00178 (481821160101335) Relatively

Low RiskAnti-DestructionandAnti-InterferenceCapability

00221 (509090849404117) RelativelyLow Risk

Level of OperatingPersonnel 00632 (600001367305750) Medium

Risk

8 Security and Communication Networks

Table 5 Continued

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

BackupManagementCapability

00121 (390911035801343) Low Risk

False Positive Rateand False NegativeRate

00632 (336360662901229) Low Risk

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 2 Cloud graph for evaluating the risk level of the physicalprotection system

method based on the cloud modelThe research results showthat the cloud model for effectiveness evaluation we con-structed can greatly reduce the influence of subjective factorsin the risk evaluation for the physical protection system ofa high security system through the setting calculation andanalysis of relevant parameters and it is very accurate andpractically useful especially when it is used in evaluationtogether with the fuzziness and randomness of qualitativelinguistic concepts To be sure due to the limitations of theconditions further discussion and research are needed in thecomparative study on different cloud models

Data Availability

The data used to support the findings of this study areincluded within the article

Conflicts of Interest

The author declares that they have no conflicts of interest

Acknowledgments

This work is funded by the project 2018SJA0576 of philoso-phy and social science research in colleges and universitiesin Jiangsu Province the pre-research project LGY201701

of Nanjing Forest Police College and the FundamentalResearch Funds for the Central Universities under grantof LGZD201602 Dr Ke Yin who graduated from NanjingUniversity of Technology and majored in safety engineeringand risk control is now a senior lecturer at Nanjing ForestPolice College

References

[1] F Lawrence ldquoEffective Physical Securityrdquo Elsevier Science ampTechnology p 67 2016

[2] X Jie ldquoApplication and demand of prison safety precautionsystem constructionrdquo Industry Applications vol 02 pp 32ndash352015

[3] Y Zuo ldquoApplication analysis of prison security mode based onbig datardquo Industry Applications vol 2 pp 44ndash48 2015

[4] X Xiaogang ldquoOn constructing prevention mode of securityfrom the trend of the prison situation perspectiverdquo Journal ofAnhui Vocational College of Police Officers vol 11 pp 9ndash13 2012

[5] W Hai-wei ldquoDesign of Comprehensive Security System Basedon Prison Applicationrdquo Computer Knowledge and Technologyvol 11 pp 55ndash60 2015

[6] E G Lambert K I Minor J Gordon J B Wells and N LHogan ldquoExploring the Correlates of Perceived Job Dangerous-ness Among Correctional Staff at a Maximum Security PrisonrdquoCriminal Justice Policy Review vol 29 no 3 pp 215ndash239 2018

[7] J Shea and T Taylor ldquoUsing developmental evaluation asa system of organizational learning An example from SanFranciscordquo Evaluation and Program Planning vol 65 pp 84ndash93 2017

[8] W Tian W Yun and X Zhong ldquoResearch on EffectivenessEvaluation of Peoplersquos Air Defense Material Reserves SystemBased on Cloud Modelrdquo Computer Simulation vol 31 pp 15ndash19 2014

[9] X Cong and L Ma ldquoPerformance Evaluation of Public-Private Partnership Projects from the Perspective of EfficiencyEconomic Effectiveness and Equity A Study of ResidentialRenovation Projects in Chinardquo Sustainability vol 10 no 6 p1951 2018

[10] Y T Liu L Li and M Zhang ldquoEffectiveness evaluation ofinformation management system based on modified normalcloudmodelrdquoAppliedMechanics andMaterials vol 411-414 pp231ndash235 2013

[11] W Zhang and Y Chen ldquoStudy on evaluation of skills trainingeffectiveness in electric power corporationrdquo Applied Mechanicsand Materials vol 263-266 no 1 pp 3400ndash3404 2013

[12] H Liu Z LiW Song andQ Su ldquoFailureMode andEffect Anal-ysis Using Cloud Model Theory and PROMETHEE MethodrdquoIEEE Transactions on Reliability vol 66 no 4 pp 1058ndash10722017

[13] L Linlin and L Yunfei ldquoEffectiveness evaluation of commandand control system based on cloud modelrdquo System Engineeringand Electronics vol 40 no 04 pp 815ndash822 2018

[14] W Debin ldquoEffectiveness Evaluation of Military Communica-tions SystemBased on ANP and Cloud Modelrdquo Fire Control ampCommand Control vol 41 no 08 pp 118ndash124 2016

[15] G Jiao L Tianwei and Z Yun-hai ldquoComprehensive effective-ness evaluation of shipborne navigation equipmentbased onADC and MCGCrdquo Modern Electronics Technique vol 38 no08 pp 58ndash61 2015

Security and Communication Networks 9

[16] D Li andY DuArtificial Intelligence with Uncertainty NationalDefence Industry Press Beijing 2007

[17] W Xinzhou Fuzzy Spatial Information Processing WuhanUniversity Press Wuhan 2003

[18] S Hu D Li Y Liu and D Li ldquoMining weights of land eval-uation factors based on cloud model and correlation analysisrdquoGeomatics and Information Science of Wuhan University vol 31no 5 pp 423ndash427 2006

[19] Li Deyi ldquoLiu Changyu Study on the universality of thenormalCloudmodelrdquoEngineering Science vol 6 no 8 pp 28ndash34 2004

[20] D Li K Di D Li and X Shi ldquoMining association ruleswith linguistic cloud modelsrdquo in Research and Development inKnowledgeDiscovery andDataMining vol 1394ofLectureNotesin Computer Science pp 392-393 Springer Berlin HeidelbergBerlin Heidelberg 1998

[21] W Yingchao and J Hongwen ldquoA normal cloud model-basedstudy of grading prediction of rockburst intensityin deepunderground engineeringrdquoRock and Soil Mechanics vol 36 no4 pp 1189ndash1194 2015

[22] L Changyi L Deyi D Yi et al ldquoSome statistical analysisof thenormal cloud modelrdquo Information and Control vol 34 no 2pp 236ndash239 2005

[23] H Shiyuan L Deren L Yaolin et al ldquoDeterminationandintegration of subjective weights and objectiveweights of landgrading factorsrdquo Geomatics andInformation Science of WuhanUniversity vol 31 no 8 pp 695ndash699 2006

[24] Y Zhang J Yan P Jiang and N Yang ldquoNormal cloud modelbased evaluation of land resources ecological security in Hubeiprovincerdquo Nongye Gongcheng Xuebao vol 29 no 22 pp 252ndash258 2013

[25] Handbook onDynamic Security andPrison Intelligence UnitedNations New York USA 2013

[26] K Yin ldquoResearch on the Effectiveness Evaluation Model ofthe Prison Physical Protection System Based on Grey AnalyticHierarchy Processrdquo Security and Communication Networks vol2017 2017

[27] K Yin ldquoEffectiveness evaluation model research of the prisonphysical protection system in terms of grey analytic hierarchyprocessrdquo in Proceedings of the 2017 IEEE 17th InternationalConference on Communication Technology (ICCT) pp 1873ndash1879 Chengdu October 2017

[28] L Guizhi ldquoAnalysis of effectiveness evaluation index systemfor prison safety management systemrdquo Intelligent Processing andApplication vol 12 pp 42ndash47 2016

[29] S Xunfeng andW Fengwu ldquoPrison informatization and its rolein prison safety managementrdquo Communication amp InformationTechnology vol 7 pp 94ndash97 2014

[30] T L Saaty ldquoThere is no mathematical validity for using fuzzynumber crunching in the analytic hierarchy processrdquo Journal ofSystems Science and Systems Engineering no 4 2006

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom

2 Security and Communication Networks

and integration However most of these researchers empha-sized the construction of the physical protection systemfrom a qualitative and excessively subjective point of viewwithout making adequate quantitative analysis Therefore itis often difficult to promote and apply their research resultsin practice

How to strengthen physical protection and improve theeffectiveness of the physical protection system of a highsecurity prison has always been an important task in thepublic safety management In recent years scholars haveproposed some evaluation models to try to solve the problemof effectiveness For example Eric G Lambert et al [6] madea detailed analysis which revealed that the effects of thepersonal variables were conditional on staff position thatis irrespective of position two of seven work environmentvariables studied were closely related to greater perceivedrisk of harm from the job Jennifer Shea and Tory Taylor [7]posit that without explicitly incorporating the assessmentsat the foundation of the Evaluation-led Learning frameworkdeveloping mental evaluationrsquos ability to affect organizationallearning in productive ways will likely be haphazard andlimited Some others advocate that the Cloud Model theorycan be effectively applied into the assessment [8ndash15] Weknow that on the basis of traditional fuzzy mathematics andprobability statistics the cloud model organically combinesfuzziness and randomness to establish a quality and quantitydata conversion model which realizes the natural conversionbetween qualitative linguistic values and quantitative valuesand objectively reflects the characteristics of the evaluatedindices and makes the comprehensive evaluation of systemeffectiveness more objective Based on this assumption thispaper will according to the characteristics of the cloudtheory together with the individual needs of the physicalprotection system of a high security prison which is differentfrom ordinary physical protection systems establish relevantparameters and make use of certain arithmetic expressions ofthe weighted integrated cloud model to build an adjustableeffectiveness evaluation model for the physical protectionsystem from the perspective of qualitative and quantitativeconversion

2 Research Areas

Ahigh security prison is actually rather a complicated systemAlthough there are not many sites involved the configurationof its internal area is usually complicated eg a high securityprison always includes the security fence the duty room thesub-control center the command center the prison factorythe reception room the infrastructure site the ordinarycells the quarantine cells and the restaurant Its physicalprotection system should be based on the specialness ofits structure and the specificity of its needs Its securitylevel requires that its physical protection system must beable to ensure the security of its periphery the security ofguardsmen the security inside and outside a cell and thesecurity of inmates when they meet with their families Inaddition it is necessary to effectively manage the prisonersrsquopersonal data and sentencing information the prison officersrsquopersonal records and attendance records the entry and exit

records of various personnel and the reporting of events andissuance of decision-making results when emergency occurs

In recent years information technology and Internet ofThings technology have been widely used in various types ofwork in a high security prison At present in high securityprisons of China a three-dimensional warning system witha wall and an AB door as the main body has been developedand additionally supported by a power grid an access controland an alarm system and relatively built perfect systems ofdefense by personnel and by physical barriers In the systemof defense by technology various subsystems are establishedsuch as the video surveillance system the alarm systemthe periphery defense system the vehicle bottom detectionsystem the AB door management system the access controlsystem and the broadcast intercom system According to thedata the total number of video surveillance stations acrossthe country has reached 450000 There are 20 provinceswhich have basically built a two-level command systembetween bureau of prisons and prisons though it is obviouslyfar from meeting the needs

As the physical protection system is increasingly used inprisonmanagement its role in prison security is continuouslyplayed to extremes However according to the data of thepublic security system there are two big problems that needto be addressed and solved in the physical protection systemof a high security prison first how to test whether the to-be-designed or existing physical protection system can achievethe effects and goals required by the security design secondlyhow to strike a balance between demand and cost in thephysical protection system construction since if so it cannot only play its due role decently but also help avoid theuse of duplicate devices Due to the important role playedby the physical protection system in security managementof a high security prison a frequent and effective evaluationmechanism for such a system can improve its effectivenessand stability which will be discussed in detail as follows

3 An Effectiveness EvaluationModel for the Physical ProtectionSystem of a High Security PrisonBased on the Normal Cloud Model

31 An Introduction to the Normal Cloud Model The nor-mal cloud model is mainly expressed by expectations (Ex)entropy (En) and super entropy (He)

The normal cloud model [16] used in this study is one ofcloud models Since the distribution curves of many thingsin social and natural sciences are approximately expressedin the normal or semi-normal distribution the normalcloud model can indicate more universality in applicationIt evolved and developed from the probability theory andfuzzy mathematics is a new model using linguistic valuesto represent uncertainty conversion between the qualitativeand the quantitative [17ndash19] The digital characteristics ofthe normal cloud model which is represented through thequantitative expressions of qualitative concepts are oftenexpressed by expectations (Ex) entropy (En) and superentropy (He)

Security and Communication Networks 3

Cloud generation algorithms include the forward cloudgeneration algorithm [20] and the reverse cloud generationalgorithm [21] The forward cloud generation algorithmconverts natural linguistic values to quantitative valuesconversely the reverse cloud generation algorithm convertsquantitative values to natural linguistic values So we saythat the cloud model is a new mathematical model thatis developed on the basis of normal distribution and thebell-shaped membership functions Since the model can beapplied widely [22 23] its computing concept can be dividedinto the following steps [24]

(1) Generate a normal random number

1198641198991015840119894 = 119873119874119877119872(1198641198991198671198902) (1)

In (1) 119864119899 and 1198671198902 represent expectation and variancerespectively

(2) Regenerate another normal random number

119909119894 = 119873119874119877119872(Ex 11986411989910158402119894 ) (2)

In (2) 119864119909 and 11986411989910158402119894 represent expectation and variancerespectively and NORM represents the normally distributedrandom function

(3) Calculation

120583119894 = expminus (119909119894 minus 119864119909)2

211986411989910158402119894 (3)

(4) (119909119894 120583119894) represents any cloud drop in the number field(5) Repeat Steps (1) to (4) until we obtain the required

number of cloud drops

32 The Effectiveness Evaluation Index System for the PhysicalProtection System of a High Security Prison For a highsecurity prison the effectiveness of its physical protectionsystem refers to the functions of its physical protectionsystem namely the extent to which its physical protectionsystem reaches or achieves the systemrsquos intended goals in itssafety management system Since it is a type of very compli-cated and exploratory research to determine the effectivenessevaluation indices for its physical protection system there isno clear unified standard for relevant researches at presentDue to the fact that the relationship is complex betweenany two evaluation factors in effectiveness evaluation for itsphysical protection system which not only involves videosurveillance periphery defense entrance and exit controlintercom broadcast emergency alert electronic patrol intel-ligent analysis and electronic maps among other physicalprotection functions but also has to interact with the policemanagement system the intelligence research and judgmentsystem dispatching and command system etc therefore theconstruction of an evaluation index system for its physicalprotection system should be based not only on the basicevaluation model for the physical protection system but alsoon the special needs of high security prisons which havespecial functions

Most prison security systems have similar requirementsand authorize their staff to collect and report intelligence rel-atively [25] escape planning organized gang-related activity

Table 1 Effectiveness evaluation index system for the physicalprotection system of a high security prison

First-Level Indices Second-Level Indices

InformationCollectionTransmission andControl

Means of Information CollectionQuality of Information CollectionSpeed of Information TransmissionSecurity of Information Transmission

Capability of Signal Shielding

Judgment andProcessing ofInformation

Analysis of Information ContentResearch on and Judgment of Information

ContentInformation Data Sorting and Mining

Information Interaction Ability

Detection andMonitoring

Detection RangeDetection SensitivityMonitoring Place

Covertness of Detection Equipment

Entrance and ExitControl

Access AuthorizationResponse Time

Emergent OpeningVehicle Detection Capability

Prison Officersrsquo PatrolManagement of Prison Patrollers

Patrol RouteEquipment of Prison Patrollers

Self-ProtectionCapability of theSystem

Anti-Destruction and Anti-InterferenceCapability

Level of Operating PersonnelBackupManagement Capability

False Positive Rate and False Negative Rate

drug trafficking planned assaults on staff or other prisonersillicit communications via mobile phone and Internet radi-calization and violent extremist activity bullying of vulnera-ble prisoners and risks to safety and security and order andcontrol of the prison

Based on the principles of clear hierarchy high scientificcontent completeness comparability and data availabilityand operability this paper will consider the status of thephysical protection system of a high security prison in Chinaand the availability of evaluation data and try to build aneffectiveness evaluation index system for the physical protec-tion system of a high security prison based on the authorrsquosprevious research [26 27] and othersrsquo relevant researchachievements [28 29] The specific contents are shown inTable 1

(1) Information collection focuses on the means of infor-mation acquisition as well as the quality and timeliness ofdata information information transmission examines thecommunication status and transmission efficiency of thephysical protection information system of a high securityprison and information control focuses on interfering andshielding information transmission through specific channelsor of specific frequencies within prison the information

4 Security and Communication Networks

technology level of the physical protection system of a highsecurity prison can be accurately evaluated by quantitativeindices such as stable running time failure rate and accu-racy and therefore this method has good measurability andoperability

(2) Judgment of information mainly examines the appli-cation of the physical protection system (of a high secu-rity prison) in assistance to analyze study and judge datainformation and the information processing focuses onthe evaluation of the ability to automatically sort identifyand integrate information so as to generate correspondingjudgment results The systemrsquos capability of processing inter-action is mainly reflected in the capability of interactionbetween subsystems the quick response to emergency andthe capability to work 24 hours such as the interactionbetween the video surveillance system and the intrusionalarm system the fire protection system the entrance andexit control system the intercom system and the emergencyalarm system whichwill help identify automatically and sendalarm signals

(3) Detection and monitoring cover not only externalinvasion from outside to inside in periphery protection butalso emergencies that break out from inside to outside Itfocuses on the coverage and sensitivity of various intrusiondetectors as well as the video surveillance index in theprison security system to assess the coverage of the video thecovertness of the front-end equipment such as the cameraand the resolution of the back-end video

(4) The access control index is divided into two partsthe control of personnelrsquos and vehiclesrsquo entrance and exit Itmainly examines the authority of the entrance and exit thetime duration of the entrance and exit the emergent openingand closing of the entrance and exit and the inspection ofsigns of life in and out of vehicles

(5) The evaluation index of personnel patrolling mainlyincludes the management of prison patrollers the designof patrol routes and the personnelrsquos equipment The man-agement of prison patrollers refers to the assignment ofpatrollersrsquo number and the arrangement of patrol time patrolroutes are designed on the basis of the patrollers and shouldcover key and vital areas completely Personnelrsquos equipmentincludes emergency equipment for a single officer in theenvironment of a high security prison

(6) On the one hand the self-protection capabilityrefers to the adaptability fault-tolerant repair capability andresilience of the system after being used Physical protectionequipment is the key part of the physical protection systemFailure of the physical protection equipment will result inthe failure of its protection capability which in turn willaffect the protection effectiveness of the physical protectionsystem On the other hand the systemrsquos self-protectioncapability index is more related to the system maintenanceby the users to adopt the integrated management systemfor physical protection of a high security prison includingequipment backup technical support and system failureconfirmation This capability improves the survivability ofthe system guarantees the benefits of the investment andhelps to play a better role in the systemrsquos advantage of physicalprotection

33 The Effectiveness Evaluation Model for the PhysicalProtection System of a High Security Prison

331 Determination of Comments Most of these commentsare described in ambiguous language The indices for eval-uating the physical protection system are mostly qualitativeindices which cannot be directly quantified and need to beindirectly converted into quantitative indices Therefore weshould represent comments by the one-dimensional cloudmodel and we can develop a set of standard cloud modelsfor evaluation of the index system The following formula isused to solve the digital characteristics of the cloud model

119864119909119894 =

119862119898119894119899119894 119894 = 1119862119898119894119899119894 + 1198621198981198861199091198942 1 lt 119894 lt 119899119862119898119886119909119894 119894 = 119899

(4)

119864119899119894 = 119862119898119886119909119894 minus 1198621198981198941198991198946 (5)

119867119890119894 = 119870 (6)

(Cmin Cmax) is the range of values for comments In theformula 119896 is a constant indicating the degree of ambiguityof certain comments which can be determined based onhistorical data or can be directly given by experts accordingto experience while the value of119867119890 cannot be too large so asto avoid the error of 119864119909 being too large and the result beinginaccurate Based on relevant literature on risk assessment bythe cloudmodel [20 21 28] and according to the effectivenessevaluation criteria for the physical protection system ofa high security prison this paper has set the ranks andcorresponding scores of the comments as follows low risk[0 4] relatively low risk [4 6] medium risk [6 8] relativelyhigh risk [8 9] and high risk [9 10] with the value of Hebeing 003 According to this definition this paper can obtaina table of digital characteristics for standard cloud models ofrisk (Table 2)

Obtain the standard cloud graph with Matlab accordingto data in Table 2

332 Determination of Each Indexrsquos Weight The evalua-tion index system clarifies the affiliation between indicesbut the importance of each index at the same level toits superior index still needs to be determined by usingscientific methods Concerning the hierarchical structure ofthe effectiveness evaluation index system for the physicalprotection system of a high security prison it is appropriateto use the analytic hierarchy process (AHP) to calculate theweight value of each index This paper uses the AHP to solvethe problem of index weight distribution Its main approachis as follows Use Saatyrsquos scaling method for priorities [30]to make a comparison between indices at the same leveland score each one of them in terms of importance andthen construct a corresponding judgment matrix for themaccording to the scores and then verify the consistency of thejudgment matrix If the matrix fails to meet the requirements

Security and Communication Networks 5

Table 2 A set of standard cloud models for evaluation

Comments Low Risk Relatively Low Risk Medium Risk Relatively High Risk High RiskStandard CloudModel (00667003) (50333003) (70333003) (8501667003) (1001667003)

of consistency it needs to be repeatedly reconstructed untilthe requirement of consistency is met Finally the weight ofeach index is obtained by hierarchical single ordering andhierarchical total ordering

333 Determination of the Cloud Model for Each IndexAccording to the risk value judged by the expert group foreach index the cloud model of each level is calculated bythe reverse cloud generator formula without the degree ofcertainty

Firstly the mean value of each set of data samples isobtained

119883 = 1119899119899sum119894=1

119909119894 (7)

The first absolute central moment for each set of data samples

1119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (8)

Variance

1198782 = 1119899 minus 1

119899sum119894=1

(119909119894 minus 119883)2 (9)

Expectation

119864119909 = 119883 (10)

At the same time the entropy can be obtained from the meanvalue

119864119899 = radic1205872 times 1

119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (11)

Based on variance and super entropy we can obtain

119867119890 = radic1198782 minus 1198641198992 (12)

334 Determining Evaluation Results with the Help of theCloud Model Graph Based on the cloud models of thesecond-level indices together with each indexrsquos weight wecan calculate the cloud models of the first-level indices Thecalculation formula is shown in (13)-(15) where Ex En andHe are the evaluation cloudmodels of the (n-1)th level indicesEx1Ex2 sdot sdot sdotExn is the expectation of the cloud model of eachindex at the nth level Ex1Ex2 sdot sdot sdotExn is the entropy of thecloud model of each index at the nth level 1198671198901 1198671198902 sdot sdot sdot 119867119890119899is the super entropy of the cloud model of each index atthe nth level 119894 is the number of indices at the nth level and1205971 1205972 sdot sdot sdot 120597n is the weight of each index at the nth level Wekeep calculating until the integrated cloudmodel of the targetlevel for evaluation is obtained

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 1 Standard cloud model graph for the evaluation model

Ex = 1198641199091 times 1198641198991 times 1205971 + 1198641199092 times 1198641198992 times 1205972 + sdot sdot sdot + 119864119909119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (13)

119864119899 = 1198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (14)

He

= 1198671198901 times 1198641198991 times 1205971 + 1198671198902 times 1198641198992 times 1205972 + sdot sdot sdot + 119867119890119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899(15)

The total model obtains the cloud graph by Matlab asshown in Figure 1 and verifies the evaluation levels of theentire system

4 Results and Analysis

This paper made a case study of the physical protectionsystem of a high security prison which has just completedthe overall reconstruction of its physical protection systemand improved significantly from three aspects defense byprison personnel defense by physical barriers and defenseby technology The configuration of its physical protectionsystem is relatively representative According to the indexsystem the evaluation model and the calculation methodconstructed above the following analysis and calculationwere performed

According to the effectiveness evaluation index systemfor the physical protection system of a high security prisonconstructed in the previous section we organized an expertgroup to score each index item according to the scalingmethod of the AHP and establish a judgment matrix for eachlevel of evaluation indices where we have the following

First level index set

119860 = 1198601 1198602 sdot sdot sdot 119860 119894 (119894 = 1 2 119900) (16)

6 Security and Communication Networks

The weight set of the first level indices

120596 = 1198801 1198802 sdot sdot sdot 119880119894 (119894 = 1 2 119900) (17)

Second level index set

119860 119894 = 119860 1198941 119860 1198942 sdot sdot sdot 119860 119894119895 (119895 = 1 2 119901) (18)

The weight set of the second level indices

120596119894 = 1205961198941 1205961198942 sdot sdot sdot 120596119894119895 (119895 = 1 2 119901) (19)

T is the judgment matrix of A1 A2 and A3 (first levelindices) for evaluating the effectiveness of the physical pro-tection system T1 T2 T3 T6 are the judgment matrices ofA11 A12 A13 A66 (second level indices) for evaluating theeffectiveness of the physical protection systemThe judgmentmatrix of each levelrsquos indices is as follows

T =

[[[[[[[[[[[[[[[[[

1 13

13

15 1 1

33 1 1 1

3 3 13 1 1 1

3 3 15 3 3 1 5 31 1

313

15 1 1

33 1 1 1

3 3 1

]]]]]]]]]]]]]]]]]

T1 =[[[[[[[[[[[[

1 13

13

15

15

3 1 1 13

13

3 1 1 13

135 3 3 1 1

5 3 3 1 1

]]]]]]]]]]]]

T2 =[[[[[[[[[

1 13 1 1

23 1 3 61 1

3 1 12

2 16 2 1

]]]]]]]]]

T3 =[[[[[[[[[

1 12 3 1

32 1 5 1

213

15 1 1

73 2 7 1

]]]]]]]]]

Table 3 Weight vector and consistency judgment

Weight Vector CR ConsistencyJudgment

120596=(00597016060160603986005971606)T 00093 Satisfy1205961=(0055701298012980342403424)

T 00125 Satisfy1205962=(01325053810132501968)T 00938 Satisfy1205963=(01623028790060404894)

T 00071 Satisfy1205964=(080603250402801917)

T 00573 Satisfy1205965=(01638053902973)

T 00079 Satisfy1205966=(01376039350075403935)T 00015 Satisfy

T4 =[[[[[[[[[[

1 13

15

13

3 1 35 3

5 53 1 5

33 1

335 1

]]]]]]]]]]

T5 =[[[[[[

1 13

123 1 2

2 12 1

]]]]]]

T6 =[[[[[[[[

1 13 2 1

33 1 5 112

15 1 1

53 1 5 1

]]]]]]]]

(20)

The weight vector of each levelrsquos indices was calculatedand the consistency was verified as shown in Table 3

Table 3 is the result of the hierarchical single orderingHowever in order to obtain the importance of all the indicesat the same level with respect to the highest level thehierarchical total ordering must also be conducted on thebasis of the hierarchical single ordering The weight vector ofeach index relative to its target level is shown in Table 4

According to the risk criteria defined in Table 2 we askedexperts to score each index and then calculated the cloudmodel characteristics (Ex En and He) from the quantitativeto the qualitative using formula (7)-(12) of the reverse cloudmodel generation algorithm without the degree of certaintyThe result is shown in Table 5

According to the data in Table 5 the integrated cloudmodel for the physical protection system of this high securityprison was calculated by formula (13)-(15) (496486 0267204065) and the cloud graph Figure 2 was crafted

From Figure 2 it can be seen that the risk value ofthis prisonrsquos physical protection system is consistent withthe cloud graph of relatively low risk In other words inrelatively low risk this calculation result is consistent withthe assessment results of some experts and the results from

Security and Communication Networks 7

Table 4 Weight vector of each index relative to its target level

First LevelIndex

WeightVector

SecondLevelIndex

WeightVector

WeightVector inTotal

Ordering

A1 00597

A11 00557 00033A12 01298 00078A13 01298 00078A14 03424 00204A15 03424 00204

A2 01606

A21 01325 00213A22 05381 00865A23 01325 00213A24 01968 00316

A3 01606

A31 01623 0026A32 02879 00462A33 00604 00097A34 04894 00786

A4 03986

A41 00806 00321A42 0325 01295A43 04028 01606A44 01917 00764

A5 00597A51 01638 00098A52 0539 00322A53 02973 00178

A6 01606

A61 01376 00221A62 03935 00632A63 00754 00121A64 03935 00632

survey The entropy and super entropy of the integratedcloud model for evaluation are small which proves thatthe distribution of the cloud is relatively concentrated theopinions are more in unison and the evaluation results aremore reliable Compared with other methods such as pureanalytic hierarchy process this method can be adopted withmore accurate values and then convert these values throughthe cloud model into a graph which shows results moreclearly

5 Conclusion

In general the traditional methods for evaluating the risklevel of security systems focus on evaluation techniquesbut rarely consider the randomness and fuzziness the twoattributes of qualitative language This will cause defects inthese methods no matter how many efforts are made in thesubjective analysis and the reliability and authenticity of theevaluation results are always in question

In this paper the cloud theory was applied to evaluatethe effectiveness of the physical protection system of a highsecurity system and then a case study was adopted to discussthe controllability of risk of such a system with the evaluation

Table 5 Weight vector and cloudmodel of each second level index

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

Means ofInformationCollection

00033 (218180745800864) Low Risk

Quality ofInformationCollection

00078 (381821160101335) Low Risk

Speed ofInformationTransmission

00078 (409091152304516) RelativelyLow Risk

Security ofInformationTransmission

00204 (463641180802454) RelativelyLow Risk

Capabilityof SignalShielding

00204 (309091284402031) Low Risk

Analysis ofInformationContent

00213 (290910621503235) Low Risk

Research on andJudgment ofInformationContent

00865 (190910621503235) Low Risk

Information DataSorting andMining

00213 (254550870103402) Low Risk

InformationInteraction Ability 00316 (536361408702649) Relatively

Low Risk

Detection Range 0026 (618181160101335) MediumRisk

DetectionSensitivity 00462 (327271346504528) Low Risk

Monitoring Place 00097 (363641097902215) Low RiskCovertness ofDetectionEquipment

00786 (572731118704084) RelativelyLow Risk

AccessAuthorization 00321 (490910621503235) Relatively

Low Risk

Response Time 01295 (509091077203612) RelativelyLow Risk

Emergent Opening 01606 (481821429405661) RelativelyLow Risk

Vehicle DetectionCapability 00764 (672730890801571) Medium

RiskManagement ofPrison Patrollers 00098 (790910828600653) Medium

Risk

Patrol Route 00322 (418181015103650) RelativelyLow Risk

Equipment ofPrison Patrollers 00178 (481821160101335) Relatively

Low RiskAnti-DestructionandAnti-InterferenceCapability

00221 (509090849404117) RelativelyLow Risk

Level of OperatingPersonnel 00632 (600001367305750) Medium

Risk

8 Security and Communication Networks

Table 5 Continued

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

BackupManagementCapability

00121 (390911035801343) Low Risk

False Positive Rateand False NegativeRate

00632 (336360662901229) Low Risk

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 2 Cloud graph for evaluating the risk level of the physicalprotection system

method based on the cloud modelThe research results showthat the cloud model for effectiveness evaluation we con-structed can greatly reduce the influence of subjective factorsin the risk evaluation for the physical protection system ofa high security system through the setting calculation andanalysis of relevant parameters and it is very accurate andpractically useful especially when it is used in evaluationtogether with the fuzziness and randomness of qualitativelinguistic concepts To be sure due to the limitations of theconditions further discussion and research are needed in thecomparative study on different cloud models

Data Availability

The data used to support the findings of this study areincluded within the article

Conflicts of Interest

The author declares that they have no conflicts of interest

Acknowledgments

This work is funded by the project 2018SJA0576 of philoso-phy and social science research in colleges and universitiesin Jiangsu Province the pre-research project LGY201701

of Nanjing Forest Police College and the FundamentalResearch Funds for the Central Universities under grantof LGZD201602 Dr Ke Yin who graduated from NanjingUniversity of Technology and majored in safety engineeringand risk control is now a senior lecturer at Nanjing ForestPolice College

References

[1] F Lawrence ldquoEffective Physical Securityrdquo Elsevier Science ampTechnology p 67 2016

[2] X Jie ldquoApplication and demand of prison safety precautionsystem constructionrdquo Industry Applications vol 02 pp 32ndash352015

[3] Y Zuo ldquoApplication analysis of prison security mode based onbig datardquo Industry Applications vol 2 pp 44ndash48 2015

[4] X Xiaogang ldquoOn constructing prevention mode of securityfrom the trend of the prison situation perspectiverdquo Journal ofAnhui Vocational College of Police Officers vol 11 pp 9ndash13 2012

[5] W Hai-wei ldquoDesign of Comprehensive Security System Basedon Prison Applicationrdquo Computer Knowledge and Technologyvol 11 pp 55ndash60 2015

[6] E G Lambert K I Minor J Gordon J B Wells and N LHogan ldquoExploring the Correlates of Perceived Job Dangerous-ness Among Correctional Staff at a Maximum Security PrisonrdquoCriminal Justice Policy Review vol 29 no 3 pp 215ndash239 2018

[7] J Shea and T Taylor ldquoUsing developmental evaluation asa system of organizational learning An example from SanFranciscordquo Evaluation and Program Planning vol 65 pp 84ndash93 2017

[8] W Tian W Yun and X Zhong ldquoResearch on EffectivenessEvaluation of Peoplersquos Air Defense Material Reserves SystemBased on Cloud Modelrdquo Computer Simulation vol 31 pp 15ndash19 2014

[9] X Cong and L Ma ldquoPerformance Evaluation of Public-Private Partnership Projects from the Perspective of EfficiencyEconomic Effectiveness and Equity A Study of ResidentialRenovation Projects in Chinardquo Sustainability vol 10 no 6 p1951 2018

[10] Y T Liu L Li and M Zhang ldquoEffectiveness evaluation ofinformation management system based on modified normalcloudmodelrdquoAppliedMechanics andMaterials vol 411-414 pp231ndash235 2013

[11] W Zhang and Y Chen ldquoStudy on evaluation of skills trainingeffectiveness in electric power corporationrdquo Applied Mechanicsand Materials vol 263-266 no 1 pp 3400ndash3404 2013

[12] H Liu Z LiW Song andQ Su ldquoFailureMode andEffect Anal-ysis Using Cloud Model Theory and PROMETHEE MethodrdquoIEEE Transactions on Reliability vol 66 no 4 pp 1058ndash10722017

[13] L Linlin and L Yunfei ldquoEffectiveness evaluation of commandand control system based on cloud modelrdquo System Engineeringand Electronics vol 40 no 04 pp 815ndash822 2018

[14] W Debin ldquoEffectiveness Evaluation of Military Communica-tions SystemBased on ANP and Cloud Modelrdquo Fire Control ampCommand Control vol 41 no 08 pp 118ndash124 2016

[15] G Jiao L Tianwei and Z Yun-hai ldquoComprehensive effective-ness evaluation of shipborne navigation equipmentbased onADC and MCGCrdquo Modern Electronics Technique vol 38 no08 pp 58ndash61 2015

Security and Communication Networks 9

[16] D Li andY DuArtificial Intelligence with Uncertainty NationalDefence Industry Press Beijing 2007

[17] W Xinzhou Fuzzy Spatial Information Processing WuhanUniversity Press Wuhan 2003

[18] S Hu D Li Y Liu and D Li ldquoMining weights of land eval-uation factors based on cloud model and correlation analysisrdquoGeomatics and Information Science of Wuhan University vol 31no 5 pp 423ndash427 2006

[19] Li Deyi ldquoLiu Changyu Study on the universality of thenormalCloudmodelrdquoEngineering Science vol 6 no 8 pp 28ndash34 2004

[20] D Li K Di D Li and X Shi ldquoMining association ruleswith linguistic cloud modelsrdquo in Research and Development inKnowledgeDiscovery andDataMining vol 1394ofLectureNotesin Computer Science pp 392-393 Springer Berlin HeidelbergBerlin Heidelberg 1998

[21] W Yingchao and J Hongwen ldquoA normal cloud model-basedstudy of grading prediction of rockburst intensityin deepunderground engineeringrdquoRock and Soil Mechanics vol 36 no4 pp 1189ndash1194 2015

[22] L Changyi L Deyi D Yi et al ldquoSome statistical analysisof thenormal cloud modelrdquo Information and Control vol 34 no 2pp 236ndash239 2005

[23] H Shiyuan L Deren L Yaolin et al ldquoDeterminationandintegration of subjective weights and objectiveweights of landgrading factorsrdquo Geomatics andInformation Science of WuhanUniversity vol 31 no 8 pp 695ndash699 2006

[24] Y Zhang J Yan P Jiang and N Yang ldquoNormal cloud modelbased evaluation of land resources ecological security in Hubeiprovincerdquo Nongye Gongcheng Xuebao vol 29 no 22 pp 252ndash258 2013

[25] Handbook onDynamic Security andPrison Intelligence UnitedNations New York USA 2013

[26] K Yin ldquoResearch on the Effectiveness Evaluation Model ofthe Prison Physical Protection System Based on Grey AnalyticHierarchy Processrdquo Security and Communication Networks vol2017 2017

[27] K Yin ldquoEffectiveness evaluation model research of the prisonphysical protection system in terms of grey analytic hierarchyprocessrdquo in Proceedings of the 2017 IEEE 17th InternationalConference on Communication Technology (ICCT) pp 1873ndash1879 Chengdu October 2017

[28] L Guizhi ldquoAnalysis of effectiveness evaluation index systemfor prison safety management systemrdquo Intelligent Processing andApplication vol 12 pp 42ndash47 2016

[29] S Xunfeng andW Fengwu ldquoPrison informatization and its rolein prison safety managementrdquo Communication amp InformationTechnology vol 7 pp 94ndash97 2014

[30] T L Saaty ldquoThere is no mathematical validity for using fuzzynumber crunching in the analytic hierarchy processrdquo Journal ofSystems Science and Systems Engineering no 4 2006

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom

Security and Communication Networks 3

Cloud generation algorithms include the forward cloudgeneration algorithm [20] and the reverse cloud generationalgorithm [21] The forward cloud generation algorithmconverts natural linguistic values to quantitative valuesconversely the reverse cloud generation algorithm convertsquantitative values to natural linguistic values So we saythat the cloud model is a new mathematical model thatis developed on the basis of normal distribution and thebell-shaped membership functions Since the model can beapplied widely [22 23] its computing concept can be dividedinto the following steps [24]

(1) Generate a normal random number

1198641198991015840119894 = 119873119874119877119872(1198641198991198671198902) (1)

In (1) 119864119899 and 1198671198902 represent expectation and variancerespectively

(2) Regenerate another normal random number

119909119894 = 119873119874119877119872(Ex 11986411989910158402119894 ) (2)

In (2) 119864119909 and 11986411989910158402119894 represent expectation and variancerespectively and NORM represents the normally distributedrandom function

(3) Calculation

120583119894 = expminus (119909119894 minus 119864119909)2

211986411989910158402119894 (3)

(4) (119909119894 120583119894) represents any cloud drop in the number field(5) Repeat Steps (1) to (4) until we obtain the required

number of cloud drops

32 The Effectiveness Evaluation Index System for the PhysicalProtection System of a High Security Prison For a highsecurity prison the effectiveness of its physical protectionsystem refers to the functions of its physical protectionsystem namely the extent to which its physical protectionsystem reaches or achieves the systemrsquos intended goals in itssafety management system Since it is a type of very compli-cated and exploratory research to determine the effectivenessevaluation indices for its physical protection system there isno clear unified standard for relevant researches at presentDue to the fact that the relationship is complex betweenany two evaluation factors in effectiveness evaluation for itsphysical protection system which not only involves videosurveillance periphery defense entrance and exit controlintercom broadcast emergency alert electronic patrol intel-ligent analysis and electronic maps among other physicalprotection functions but also has to interact with the policemanagement system the intelligence research and judgmentsystem dispatching and command system etc therefore theconstruction of an evaluation index system for its physicalprotection system should be based not only on the basicevaluation model for the physical protection system but alsoon the special needs of high security prisons which havespecial functions

Most prison security systems have similar requirementsand authorize their staff to collect and report intelligence rel-atively [25] escape planning organized gang-related activity

Table 1 Effectiveness evaluation index system for the physicalprotection system of a high security prison

First-Level Indices Second-Level Indices

InformationCollectionTransmission andControl

Means of Information CollectionQuality of Information CollectionSpeed of Information TransmissionSecurity of Information Transmission

Capability of Signal Shielding

Judgment andProcessing ofInformation

Analysis of Information ContentResearch on and Judgment of Information

ContentInformation Data Sorting and Mining

Information Interaction Ability

Detection andMonitoring

Detection RangeDetection SensitivityMonitoring Place

Covertness of Detection Equipment

Entrance and ExitControl

Access AuthorizationResponse Time

Emergent OpeningVehicle Detection Capability

Prison Officersrsquo PatrolManagement of Prison Patrollers

Patrol RouteEquipment of Prison Patrollers

Self-ProtectionCapability of theSystem

Anti-Destruction and Anti-InterferenceCapability

Level of Operating PersonnelBackupManagement Capability

False Positive Rate and False Negative Rate

drug trafficking planned assaults on staff or other prisonersillicit communications via mobile phone and Internet radi-calization and violent extremist activity bullying of vulnera-ble prisoners and risks to safety and security and order andcontrol of the prison

Based on the principles of clear hierarchy high scientificcontent completeness comparability and data availabilityand operability this paper will consider the status of thephysical protection system of a high security prison in Chinaand the availability of evaluation data and try to build aneffectiveness evaluation index system for the physical protec-tion system of a high security prison based on the authorrsquosprevious research [26 27] and othersrsquo relevant researchachievements [28 29] The specific contents are shown inTable 1

(1) Information collection focuses on the means of infor-mation acquisition as well as the quality and timeliness ofdata information information transmission examines thecommunication status and transmission efficiency of thephysical protection information system of a high securityprison and information control focuses on interfering andshielding information transmission through specific channelsor of specific frequencies within prison the information

4 Security and Communication Networks

technology level of the physical protection system of a highsecurity prison can be accurately evaluated by quantitativeindices such as stable running time failure rate and accu-racy and therefore this method has good measurability andoperability

(2) Judgment of information mainly examines the appli-cation of the physical protection system (of a high secu-rity prison) in assistance to analyze study and judge datainformation and the information processing focuses onthe evaluation of the ability to automatically sort identifyand integrate information so as to generate correspondingjudgment results The systemrsquos capability of processing inter-action is mainly reflected in the capability of interactionbetween subsystems the quick response to emergency andthe capability to work 24 hours such as the interactionbetween the video surveillance system and the intrusionalarm system the fire protection system the entrance andexit control system the intercom system and the emergencyalarm system whichwill help identify automatically and sendalarm signals

(3) Detection and monitoring cover not only externalinvasion from outside to inside in periphery protection butalso emergencies that break out from inside to outside Itfocuses on the coverage and sensitivity of various intrusiondetectors as well as the video surveillance index in theprison security system to assess the coverage of the video thecovertness of the front-end equipment such as the cameraand the resolution of the back-end video

(4) The access control index is divided into two partsthe control of personnelrsquos and vehiclesrsquo entrance and exit Itmainly examines the authority of the entrance and exit thetime duration of the entrance and exit the emergent openingand closing of the entrance and exit and the inspection ofsigns of life in and out of vehicles

(5) The evaluation index of personnel patrolling mainlyincludes the management of prison patrollers the designof patrol routes and the personnelrsquos equipment The man-agement of prison patrollers refers to the assignment ofpatrollersrsquo number and the arrangement of patrol time patrolroutes are designed on the basis of the patrollers and shouldcover key and vital areas completely Personnelrsquos equipmentincludes emergency equipment for a single officer in theenvironment of a high security prison

(6) On the one hand the self-protection capabilityrefers to the adaptability fault-tolerant repair capability andresilience of the system after being used Physical protectionequipment is the key part of the physical protection systemFailure of the physical protection equipment will result inthe failure of its protection capability which in turn willaffect the protection effectiveness of the physical protectionsystem On the other hand the systemrsquos self-protectioncapability index is more related to the system maintenanceby the users to adopt the integrated management systemfor physical protection of a high security prison includingequipment backup technical support and system failureconfirmation This capability improves the survivability ofthe system guarantees the benefits of the investment andhelps to play a better role in the systemrsquos advantage of physicalprotection

33 The Effectiveness Evaluation Model for the PhysicalProtection System of a High Security Prison

331 Determination of Comments Most of these commentsare described in ambiguous language The indices for eval-uating the physical protection system are mostly qualitativeindices which cannot be directly quantified and need to beindirectly converted into quantitative indices Therefore weshould represent comments by the one-dimensional cloudmodel and we can develop a set of standard cloud modelsfor evaluation of the index system The following formula isused to solve the digital characteristics of the cloud model

119864119909119894 =

119862119898119894119899119894 119894 = 1119862119898119894119899119894 + 1198621198981198861199091198942 1 lt 119894 lt 119899119862119898119886119909119894 119894 = 119899

(4)

119864119899119894 = 119862119898119886119909119894 minus 1198621198981198941198991198946 (5)

119867119890119894 = 119870 (6)

(Cmin Cmax) is the range of values for comments In theformula 119896 is a constant indicating the degree of ambiguityof certain comments which can be determined based onhistorical data or can be directly given by experts accordingto experience while the value of119867119890 cannot be too large so asto avoid the error of 119864119909 being too large and the result beinginaccurate Based on relevant literature on risk assessment bythe cloudmodel [20 21 28] and according to the effectivenessevaluation criteria for the physical protection system ofa high security prison this paper has set the ranks andcorresponding scores of the comments as follows low risk[0 4] relatively low risk [4 6] medium risk [6 8] relativelyhigh risk [8 9] and high risk [9 10] with the value of Hebeing 003 According to this definition this paper can obtaina table of digital characteristics for standard cloud models ofrisk (Table 2)

Obtain the standard cloud graph with Matlab accordingto data in Table 2

332 Determination of Each Indexrsquos Weight The evalua-tion index system clarifies the affiliation between indicesbut the importance of each index at the same level toits superior index still needs to be determined by usingscientific methods Concerning the hierarchical structure ofthe effectiveness evaluation index system for the physicalprotection system of a high security prison it is appropriateto use the analytic hierarchy process (AHP) to calculate theweight value of each index This paper uses the AHP to solvethe problem of index weight distribution Its main approachis as follows Use Saatyrsquos scaling method for priorities [30]to make a comparison between indices at the same leveland score each one of them in terms of importance andthen construct a corresponding judgment matrix for themaccording to the scores and then verify the consistency of thejudgment matrix If the matrix fails to meet the requirements

Security and Communication Networks 5

Table 2 A set of standard cloud models for evaluation

Comments Low Risk Relatively Low Risk Medium Risk Relatively High Risk High RiskStandard CloudModel (00667003) (50333003) (70333003) (8501667003) (1001667003)

of consistency it needs to be repeatedly reconstructed untilthe requirement of consistency is met Finally the weight ofeach index is obtained by hierarchical single ordering andhierarchical total ordering

333 Determination of the Cloud Model for Each IndexAccording to the risk value judged by the expert group foreach index the cloud model of each level is calculated bythe reverse cloud generator formula without the degree ofcertainty

Firstly the mean value of each set of data samples isobtained

119883 = 1119899119899sum119894=1

119909119894 (7)

The first absolute central moment for each set of data samples

1119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (8)

Variance

1198782 = 1119899 minus 1

119899sum119894=1

(119909119894 minus 119883)2 (9)

Expectation

119864119909 = 119883 (10)

At the same time the entropy can be obtained from the meanvalue

119864119899 = radic1205872 times 1

119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (11)

Based on variance and super entropy we can obtain

119867119890 = radic1198782 minus 1198641198992 (12)

334 Determining Evaluation Results with the Help of theCloud Model Graph Based on the cloud models of thesecond-level indices together with each indexrsquos weight wecan calculate the cloud models of the first-level indices Thecalculation formula is shown in (13)-(15) where Ex En andHe are the evaluation cloudmodels of the (n-1)th level indicesEx1Ex2 sdot sdot sdotExn is the expectation of the cloud model of eachindex at the nth level Ex1Ex2 sdot sdot sdotExn is the entropy of thecloud model of each index at the nth level 1198671198901 1198671198902 sdot sdot sdot 119867119890119899is the super entropy of the cloud model of each index atthe nth level 119894 is the number of indices at the nth level and1205971 1205972 sdot sdot sdot 120597n is the weight of each index at the nth level Wekeep calculating until the integrated cloudmodel of the targetlevel for evaluation is obtained

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 1 Standard cloud model graph for the evaluation model

Ex = 1198641199091 times 1198641198991 times 1205971 + 1198641199092 times 1198641198992 times 1205972 + sdot sdot sdot + 119864119909119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (13)

119864119899 = 1198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (14)

He

= 1198671198901 times 1198641198991 times 1205971 + 1198671198902 times 1198641198992 times 1205972 + sdot sdot sdot + 119867119890119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899(15)

The total model obtains the cloud graph by Matlab asshown in Figure 1 and verifies the evaluation levels of theentire system

4 Results and Analysis

This paper made a case study of the physical protectionsystem of a high security prison which has just completedthe overall reconstruction of its physical protection systemand improved significantly from three aspects defense byprison personnel defense by physical barriers and defenseby technology The configuration of its physical protectionsystem is relatively representative According to the indexsystem the evaluation model and the calculation methodconstructed above the following analysis and calculationwere performed

According to the effectiveness evaluation index systemfor the physical protection system of a high security prisonconstructed in the previous section we organized an expertgroup to score each index item according to the scalingmethod of the AHP and establish a judgment matrix for eachlevel of evaluation indices where we have the following

First level index set

119860 = 1198601 1198602 sdot sdot sdot 119860 119894 (119894 = 1 2 119900) (16)

6 Security and Communication Networks

The weight set of the first level indices

120596 = 1198801 1198802 sdot sdot sdot 119880119894 (119894 = 1 2 119900) (17)

Second level index set

119860 119894 = 119860 1198941 119860 1198942 sdot sdot sdot 119860 119894119895 (119895 = 1 2 119901) (18)

The weight set of the second level indices

120596119894 = 1205961198941 1205961198942 sdot sdot sdot 120596119894119895 (119895 = 1 2 119901) (19)

T is the judgment matrix of A1 A2 and A3 (first levelindices) for evaluating the effectiveness of the physical pro-tection system T1 T2 T3 T6 are the judgment matrices ofA11 A12 A13 A66 (second level indices) for evaluating theeffectiveness of the physical protection systemThe judgmentmatrix of each levelrsquos indices is as follows

T =

[[[[[[[[[[[[[[[[[

1 13

13

15 1 1

33 1 1 1

3 3 13 1 1 1

3 3 15 3 3 1 5 31 1

313

15 1 1

33 1 1 1

3 3 1

]]]]]]]]]]]]]]]]]

T1 =[[[[[[[[[[[[

1 13

13

15

15

3 1 1 13

13

3 1 1 13

135 3 3 1 1

5 3 3 1 1

]]]]]]]]]]]]

T2 =[[[[[[[[[

1 13 1 1

23 1 3 61 1

3 1 12

2 16 2 1

]]]]]]]]]

T3 =[[[[[[[[[

1 12 3 1

32 1 5 1

213

15 1 1

73 2 7 1

]]]]]]]]]

Table 3 Weight vector and consistency judgment

Weight Vector CR ConsistencyJudgment

120596=(00597016060160603986005971606)T 00093 Satisfy1205961=(0055701298012980342403424)

T 00125 Satisfy1205962=(01325053810132501968)T 00938 Satisfy1205963=(01623028790060404894)

T 00071 Satisfy1205964=(080603250402801917)

T 00573 Satisfy1205965=(01638053902973)

T 00079 Satisfy1205966=(01376039350075403935)T 00015 Satisfy

T4 =[[[[[[[[[[

1 13

15

13

3 1 35 3

5 53 1 5

33 1

335 1

]]]]]]]]]]

T5 =[[[[[[

1 13

123 1 2

2 12 1

]]]]]]

T6 =[[[[[[[[

1 13 2 1

33 1 5 112

15 1 1

53 1 5 1

]]]]]]]]

(20)

The weight vector of each levelrsquos indices was calculatedand the consistency was verified as shown in Table 3

Table 3 is the result of the hierarchical single orderingHowever in order to obtain the importance of all the indicesat the same level with respect to the highest level thehierarchical total ordering must also be conducted on thebasis of the hierarchical single ordering The weight vector ofeach index relative to its target level is shown in Table 4

According to the risk criteria defined in Table 2 we askedexperts to score each index and then calculated the cloudmodel characteristics (Ex En and He) from the quantitativeto the qualitative using formula (7)-(12) of the reverse cloudmodel generation algorithm without the degree of certaintyThe result is shown in Table 5

According to the data in Table 5 the integrated cloudmodel for the physical protection system of this high securityprison was calculated by formula (13)-(15) (496486 0267204065) and the cloud graph Figure 2 was crafted

From Figure 2 it can be seen that the risk value ofthis prisonrsquos physical protection system is consistent withthe cloud graph of relatively low risk In other words inrelatively low risk this calculation result is consistent withthe assessment results of some experts and the results from

Security and Communication Networks 7

Table 4 Weight vector of each index relative to its target level

First LevelIndex

WeightVector

SecondLevelIndex

WeightVector

WeightVector inTotal

Ordering

A1 00597

A11 00557 00033A12 01298 00078A13 01298 00078A14 03424 00204A15 03424 00204

A2 01606

A21 01325 00213A22 05381 00865A23 01325 00213A24 01968 00316

A3 01606

A31 01623 0026A32 02879 00462A33 00604 00097A34 04894 00786

A4 03986

A41 00806 00321A42 0325 01295A43 04028 01606A44 01917 00764

A5 00597A51 01638 00098A52 0539 00322A53 02973 00178

A6 01606

A61 01376 00221A62 03935 00632A63 00754 00121A64 03935 00632

survey The entropy and super entropy of the integratedcloud model for evaluation are small which proves thatthe distribution of the cloud is relatively concentrated theopinions are more in unison and the evaluation results aremore reliable Compared with other methods such as pureanalytic hierarchy process this method can be adopted withmore accurate values and then convert these values throughthe cloud model into a graph which shows results moreclearly

5 Conclusion

In general the traditional methods for evaluating the risklevel of security systems focus on evaluation techniquesbut rarely consider the randomness and fuzziness the twoattributes of qualitative language This will cause defects inthese methods no matter how many efforts are made in thesubjective analysis and the reliability and authenticity of theevaluation results are always in question

In this paper the cloud theory was applied to evaluatethe effectiveness of the physical protection system of a highsecurity system and then a case study was adopted to discussthe controllability of risk of such a system with the evaluation

Table 5 Weight vector and cloudmodel of each second level index

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

Means ofInformationCollection

00033 (218180745800864) Low Risk

Quality ofInformationCollection

00078 (381821160101335) Low Risk

Speed ofInformationTransmission

00078 (409091152304516) RelativelyLow Risk

Security ofInformationTransmission

00204 (463641180802454) RelativelyLow Risk

Capabilityof SignalShielding

00204 (309091284402031) Low Risk

Analysis ofInformationContent

00213 (290910621503235) Low Risk

Research on andJudgment ofInformationContent

00865 (190910621503235) Low Risk

Information DataSorting andMining

00213 (254550870103402) Low Risk

InformationInteraction Ability 00316 (536361408702649) Relatively

Low Risk

Detection Range 0026 (618181160101335) MediumRisk

DetectionSensitivity 00462 (327271346504528) Low Risk

Monitoring Place 00097 (363641097902215) Low RiskCovertness ofDetectionEquipment

00786 (572731118704084) RelativelyLow Risk

AccessAuthorization 00321 (490910621503235) Relatively

Low Risk

Response Time 01295 (509091077203612) RelativelyLow Risk

Emergent Opening 01606 (481821429405661) RelativelyLow Risk

Vehicle DetectionCapability 00764 (672730890801571) Medium

RiskManagement ofPrison Patrollers 00098 (790910828600653) Medium

Risk

Patrol Route 00322 (418181015103650) RelativelyLow Risk

Equipment ofPrison Patrollers 00178 (481821160101335) Relatively

Low RiskAnti-DestructionandAnti-InterferenceCapability

00221 (509090849404117) RelativelyLow Risk

Level of OperatingPersonnel 00632 (600001367305750) Medium

Risk

8 Security and Communication Networks

Table 5 Continued

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

BackupManagementCapability

00121 (390911035801343) Low Risk

False Positive Rateand False NegativeRate

00632 (336360662901229) Low Risk

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 2 Cloud graph for evaluating the risk level of the physicalprotection system

method based on the cloud modelThe research results showthat the cloud model for effectiveness evaluation we con-structed can greatly reduce the influence of subjective factorsin the risk evaluation for the physical protection system ofa high security system through the setting calculation andanalysis of relevant parameters and it is very accurate andpractically useful especially when it is used in evaluationtogether with the fuzziness and randomness of qualitativelinguistic concepts To be sure due to the limitations of theconditions further discussion and research are needed in thecomparative study on different cloud models

Data Availability

The data used to support the findings of this study areincluded within the article

Conflicts of Interest

The author declares that they have no conflicts of interest

Acknowledgments

This work is funded by the project 2018SJA0576 of philoso-phy and social science research in colleges and universitiesin Jiangsu Province the pre-research project LGY201701

of Nanjing Forest Police College and the FundamentalResearch Funds for the Central Universities under grantof LGZD201602 Dr Ke Yin who graduated from NanjingUniversity of Technology and majored in safety engineeringand risk control is now a senior lecturer at Nanjing ForestPolice College

References

[1] F Lawrence ldquoEffective Physical Securityrdquo Elsevier Science ampTechnology p 67 2016

[2] X Jie ldquoApplication and demand of prison safety precautionsystem constructionrdquo Industry Applications vol 02 pp 32ndash352015

[3] Y Zuo ldquoApplication analysis of prison security mode based onbig datardquo Industry Applications vol 2 pp 44ndash48 2015

[4] X Xiaogang ldquoOn constructing prevention mode of securityfrom the trend of the prison situation perspectiverdquo Journal ofAnhui Vocational College of Police Officers vol 11 pp 9ndash13 2012

[5] W Hai-wei ldquoDesign of Comprehensive Security System Basedon Prison Applicationrdquo Computer Knowledge and Technologyvol 11 pp 55ndash60 2015

[6] E G Lambert K I Minor J Gordon J B Wells and N LHogan ldquoExploring the Correlates of Perceived Job Dangerous-ness Among Correctional Staff at a Maximum Security PrisonrdquoCriminal Justice Policy Review vol 29 no 3 pp 215ndash239 2018

[7] J Shea and T Taylor ldquoUsing developmental evaluation asa system of organizational learning An example from SanFranciscordquo Evaluation and Program Planning vol 65 pp 84ndash93 2017

[8] W Tian W Yun and X Zhong ldquoResearch on EffectivenessEvaluation of Peoplersquos Air Defense Material Reserves SystemBased on Cloud Modelrdquo Computer Simulation vol 31 pp 15ndash19 2014

[9] X Cong and L Ma ldquoPerformance Evaluation of Public-Private Partnership Projects from the Perspective of EfficiencyEconomic Effectiveness and Equity A Study of ResidentialRenovation Projects in Chinardquo Sustainability vol 10 no 6 p1951 2018

[10] Y T Liu L Li and M Zhang ldquoEffectiveness evaluation ofinformation management system based on modified normalcloudmodelrdquoAppliedMechanics andMaterials vol 411-414 pp231ndash235 2013

[11] W Zhang and Y Chen ldquoStudy on evaluation of skills trainingeffectiveness in electric power corporationrdquo Applied Mechanicsand Materials vol 263-266 no 1 pp 3400ndash3404 2013

[12] H Liu Z LiW Song andQ Su ldquoFailureMode andEffect Anal-ysis Using Cloud Model Theory and PROMETHEE MethodrdquoIEEE Transactions on Reliability vol 66 no 4 pp 1058ndash10722017

[13] L Linlin and L Yunfei ldquoEffectiveness evaluation of commandand control system based on cloud modelrdquo System Engineeringand Electronics vol 40 no 04 pp 815ndash822 2018

[14] W Debin ldquoEffectiveness Evaluation of Military Communica-tions SystemBased on ANP and Cloud Modelrdquo Fire Control ampCommand Control vol 41 no 08 pp 118ndash124 2016

[15] G Jiao L Tianwei and Z Yun-hai ldquoComprehensive effective-ness evaluation of shipborne navigation equipmentbased onADC and MCGCrdquo Modern Electronics Technique vol 38 no08 pp 58ndash61 2015

Security and Communication Networks 9

[16] D Li andY DuArtificial Intelligence with Uncertainty NationalDefence Industry Press Beijing 2007

[17] W Xinzhou Fuzzy Spatial Information Processing WuhanUniversity Press Wuhan 2003

[18] S Hu D Li Y Liu and D Li ldquoMining weights of land eval-uation factors based on cloud model and correlation analysisrdquoGeomatics and Information Science of Wuhan University vol 31no 5 pp 423ndash427 2006

[19] Li Deyi ldquoLiu Changyu Study on the universality of thenormalCloudmodelrdquoEngineering Science vol 6 no 8 pp 28ndash34 2004

[20] D Li K Di D Li and X Shi ldquoMining association ruleswith linguistic cloud modelsrdquo in Research and Development inKnowledgeDiscovery andDataMining vol 1394ofLectureNotesin Computer Science pp 392-393 Springer Berlin HeidelbergBerlin Heidelberg 1998

[21] W Yingchao and J Hongwen ldquoA normal cloud model-basedstudy of grading prediction of rockburst intensityin deepunderground engineeringrdquoRock and Soil Mechanics vol 36 no4 pp 1189ndash1194 2015

[22] L Changyi L Deyi D Yi et al ldquoSome statistical analysisof thenormal cloud modelrdquo Information and Control vol 34 no 2pp 236ndash239 2005

[23] H Shiyuan L Deren L Yaolin et al ldquoDeterminationandintegration of subjective weights and objectiveweights of landgrading factorsrdquo Geomatics andInformation Science of WuhanUniversity vol 31 no 8 pp 695ndash699 2006

[24] Y Zhang J Yan P Jiang and N Yang ldquoNormal cloud modelbased evaluation of land resources ecological security in Hubeiprovincerdquo Nongye Gongcheng Xuebao vol 29 no 22 pp 252ndash258 2013

[25] Handbook onDynamic Security andPrison Intelligence UnitedNations New York USA 2013

[26] K Yin ldquoResearch on the Effectiveness Evaluation Model ofthe Prison Physical Protection System Based on Grey AnalyticHierarchy Processrdquo Security and Communication Networks vol2017 2017

[27] K Yin ldquoEffectiveness evaluation model research of the prisonphysical protection system in terms of grey analytic hierarchyprocessrdquo in Proceedings of the 2017 IEEE 17th InternationalConference on Communication Technology (ICCT) pp 1873ndash1879 Chengdu October 2017

[28] L Guizhi ldquoAnalysis of effectiveness evaluation index systemfor prison safety management systemrdquo Intelligent Processing andApplication vol 12 pp 42ndash47 2016

[29] S Xunfeng andW Fengwu ldquoPrison informatization and its rolein prison safety managementrdquo Communication amp InformationTechnology vol 7 pp 94ndash97 2014

[30] T L Saaty ldquoThere is no mathematical validity for using fuzzynumber crunching in the analytic hierarchy processrdquo Journal ofSystems Science and Systems Engineering no 4 2006

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom

4 Security and Communication Networks

technology level of the physical protection system of a highsecurity prison can be accurately evaluated by quantitativeindices such as stable running time failure rate and accu-racy and therefore this method has good measurability andoperability

(2) Judgment of information mainly examines the appli-cation of the physical protection system (of a high secu-rity prison) in assistance to analyze study and judge datainformation and the information processing focuses onthe evaluation of the ability to automatically sort identifyand integrate information so as to generate correspondingjudgment results The systemrsquos capability of processing inter-action is mainly reflected in the capability of interactionbetween subsystems the quick response to emergency andthe capability to work 24 hours such as the interactionbetween the video surveillance system and the intrusionalarm system the fire protection system the entrance andexit control system the intercom system and the emergencyalarm system whichwill help identify automatically and sendalarm signals

(3) Detection and monitoring cover not only externalinvasion from outside to inside in periphery protection butalso emergencies that break out from inside to outside Itfocuses on the coverage and sensitivity of various intrusiondetectors as well as the video surveillance index in theprison security system to assess the coverage of the video thecovertness of the front-end equipment such as the cameraand the resolution of the back-end video

(4) The access control index is divided into two partsthe control of personnelrsquos and vehiclesrsquo entrance and exit Itmainly examines the authority of the entrance and exit thetime duration of the entrance and exit the emergent openingand closing of the entrance and exit and the inspection ofsigns of life in and out of vehicles

(5) The evaluation index of personnel patrolling mainlyincludes the management of prison patrollers the designof patrol routes and the personnelrsquos equipment The man-agement of prison patrollers refers to the assignment ofpatrollersrsquo number and the arrangement of patrol time patrolroutes are designed on the basis of the patrollers and shouldcover key and vital areas completely Personnelrsquos equipmentincludes emergency equipment for a single officer in theenvironment of a high security prison

(6) On the one hand the self-protection capabilityrefers to the adaptability fault-tolerant repair capability andresilience of the system after being used Physical protectionequipment is the key part of the physical protection systemFailure of the physical protection equipment will result inthe failure of its protection capability which in turn willaffect the protection effectiveness of the physical protectionsystem On the other hand the systemrsquos self-protectioncapability index is more related to the system maintenanceby the users to adopt the integrated management systemfor physical protection of a high security prison includingequipment backup technical support and system failureconfirmation This capability improves the survivability ofthe system guarantees the benefits of the investment andhelps to play a better role in the systemrsquos advantage of physicalprotection

33 The Effectiveness Evaluation Model for the PhysicalProtection System of a High Security Prison

331 Determination of Comments Most of these commentsare described in ambiguous language The indices for eval-uating the physical protection system are mostly qualitativeindices which cannot be directly quantified and need to beindirectly converted into quantitative indices Therefore weshould represent comments by the one-dimensional cloudmodel and we can develop a set of standard cloud modelsfor evaluation of the index system The following formula isused to solve the digital characteristics of the cloud model

119864119909119894 =

119862119898119894119899119894 119894 = 1119862119898119894119899119894 + 1198621198981198861199091198942 1 lt 119894 lt 119899119862119898119886119909119894 119894 = 119899

(4)

119864119899119894 = 119862119898119886119909119894 minus 1198621198981198941198991198946 (5)

119867119890119894 = 119870 (6)

(Cmin Cmax) is the range of values for comments In theformula 119896 is a constant indicating the degree of ambiguityof certain comments which can be determined based onhistorical data or can be directly given by experts accordingto experience while the value of119867119890 cannot be too large so asto avoid the error of 119864119909 being too large and the result beinginaccurate Based on relevant literature on risk assessment bythe cloudmodel [20 21 28] and according to the effectivenessevaluation criteria for the physical protection system ofa high security prison this paper has set the ranks andcorresponding scores of the comments as follows low risk[0 4] relatively low risk [4 6] medium risk [6 8] relativelyhigh risk [8 9] and high risk [9 10] with the value of Hebeing 003 According to this definition this paper can obtaina table of digital characteristics for standard cloud models ofrisk (Table 2)

Obtain the standard cloud graph with Matlab accordingto data in Table 2

332 Determination of Each Indexrsquos Weight The evalua-tion index system clarifies the affiliation between indicesbut the importance of each index at the same level toits superior index still needs to be determined by usingscientific methods Concerning the hierarchical structure ofthe effectiveness evaluation index system for the physicalprotection system of a high security prison it is appropriateto use the analytic hierarchy process (AHP) to calculate theweight value of each index This paper uses the AHP to solvethe problem of index weight distribution Its main approachis as follows Use Saatyrsquos scaling method for priorities [30]to make a comparison between indices at the same leveland score each one of them in terms of importance andthen construct a corresponding judgment matrix for themaccording to the scores and then verify the consistency of thejudgment matrix If the matrix fails to meet the requirements

Security and Communication Networks 5

Table 2 A set of standard cloud models for evaluation

Comments Low Risk Relatively Low Risk Medium Risk Relatively High Risk High RiskStandard CloudModel (00667003) (50333003) (70333003) (8501667003) (1001667003)

of consistency it needs to be repeatedly reconstructed untilthe requirement of consistency is met Finally the weight ofeach index is obtained by hierarchical single ordering andhierarchical total ordering

333 Determination of the Cloud Model for Each IndexAccording to the risk value judged by the expert group foreach index the cloud model of each level is calculated bythe reverse cloud generator formula without the degree ofcertainty

Firstly the mean value of each set of data samples isobtained

119883 = 1119899119899sum119894=1

119909119894 (7)

The first absolute central moment for each set of data samples

1119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (8)

Variance

1198782 = 1119899 minus 1

119899sum119894=1

(119909119894 minus 119883)2 (9)

Expectation

119864119909 = 119883 (10)

At the same time the entropy can be obtained from the meanvalue

119864119899 = radic1205872 times 1

119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (11)

Based on variance and super entropy we can obtain

119867119890 = radic1198782 minus 1198641198992 (12)

334 Determining Evaluation Results with the Help of theCloud Model Graph Based on the cloud models of thesecond-level indices together with each indexrsquos weight wecan calculate the cloud models of the first-level indices Thecalculation formula is shown in (13)-(15) where Ex En andHe are the evaluation cloudmodels of the (n-1)th level indicesEx1Ex2 sdot sdot sdotExn is the expectation of the cloud model of eachindex at the nth level Ex1Ex2 sdot sdot sdotExn is the entropy of thecloud model of each index at the nth level 1198671198901 1198671198902 sdot sdot sdot 119867119890119899is the super entropy of the cloud model of each index atthe nth level 119894 is the number of indices at the nth level and1205971 1205972 sdot sdot sdot 120597n is the weight of each index at the nth level Wekeep calculating until the integrated cloudmodel of the targetlevel for evaluation is obtained

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 1 Standard cloud model graph for the evaluation model

Ex = 1198641199091 times 1198641198991 times 1205971 + 1198641199092 times 1198641198992 times 1205972 + sdot sdot sdot + 119864119909119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (13)

119864119899 = 1198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (14)

He

= 1198671198901 times 1198641198991 times 1205971 + 1198671198902 times 1198641198992 times 1205972 + sdot sdot sdot + 119867119890119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899(15)

The total model obtains the cloud graph by Matlab asshown in Figure 1 and verifies the evaluation levels of theentire system

4 Results and Analysis

This paper made a case study of the physical protectionsystem of a high security prison which has just completedthe overall reconstruction of its physical protection systemand improved significantly from three aspects defense byprison personnel defense by physical barriers and defenseby technology The configuration of its physical protectionsystem is relatively representative According to the indexsystem the evaluation model and the calculation methodconstructed above the following analysis and calculationwere performed

According to the effectiveness evaluation index systemfor the physical protection system of a high security prisonconstructed in the previous section we organized an expertgroup to score each index item according to the scalingmethod of the AHP and establish a judgment matrix for eachlevel of evaluation indices where we have the following

First level index set

119860 = 1198601 1198602 sdot sdot sdot 119860 119894 (119894 = 1 2 119900) (16)

6 Security and Communication Networks

The weight set of the first level indices

120596 = 1198801 1198802 sdot sdot sdot 119880119894 (119894 = 1 2 119900) (17)

Second level index set

119860 119894 = 119860 1198941 119860 1198942 sdot sdot sdot 119860 119894119895 (119895 = 1 2 119901) (18)

The weight set of the second level indices

120596119894 = 1205961198941 1205961198942 sdot sdot sdot 120596119894119895 (119895 = 1 2 119901) (19)

T is the judgment matrix of A1 A2 and A3 (first levelindices) for evaluating the effectiveness of the physical pro-tection system T1 T2 T3 T6 are the judgment matrices ofA11 A12 A13 A66 (second level indices) for evaluating theeffectiveness of the physical protection systemThe judgmentmatrix of each levelrsquos indices is as follows

T =

[[[[[[[[[[[[[[[[[

1 13

13

15 1 1

33 1 1 1

3 3 13 1 1 1

3 3 15 3 3 1 5 31 1

313

15 1 1

33 1 1 1

3 3 1

]]]]]]]]]]]]]]]]]

T1 =[[[[[[[[[[[[

1 13

13

15

15

3 1 1 13

13

3 1 1 13

135 3 3 1 1

5 3 3 1 1

]]]]]]]]]]]]

T2 =[[[[[[[[[

1 13 1 1

23 1 3 61 1

3 1 12

2 16 2 1

]]]]]]]]]

T3 =[[[[[[[[[

1 12 3 1

32 1 5 1

213

15 1 1

73 2 7 1

]]]]]]]]]

Table 3 Weight vector and consistency judgment

Weight Vector CR ConsistencyJudgment

120596=(00597016060160603986005971606)T 00093 Satisfy1205961=(0055701298012980342403424)

T 00125 Satisfy1205962=(01325053810132501968)T 00938 Satisfy1205963=(01623028790060404894)

T 00071 Satisfy1205964=(080603250402801917)

T 00573 Satisfy1205965=(01638053902973)

T 00079 Satisfy1205966=(01376039350075403935)T 00015 Satisfy

T4 =[[[[[[[[[[

1 13

15

13

3 1 35 3

5 53 1 5

33 1

335 1

]]]]]]]]]]

T5 =[[[[[[

1 13

123 1 2

2 12 1

]]]]]]

T6 =[[[[[[[[

1 13 2 1

33 1 5 112

15 1 1

53 1 5 1

]]]]]]]]

(20)

The weight vector of each levelrsquos indices was calculatedand the consistency was verified as shown in Table 3

Table 3 is the result of the hierarchical single orderingHowever in order to obtain the importance of all the indicesat the same level with respect to the highest level thehierarchical total ordering must also be conducted on thebasis of the hierarchical single ordering The weight vector ofeach index relative to its target level is shown in Table 4

According to the risk criteria defined in Table 2 we askedexperts to score each index and then calculated the cloudmodel characteristics (Ex En and He) from the quantitativeto the qualitative using formula (7)-(12) of the reverse cloudmodel generation algorithm without the degree of certaintyThe result is shown in Table 5

According to the data in Table 5 the integrated cloudmodel for the physical protection system of this high securityprison was calculated by formula (13)-(15) (496486 0267204065) and the cloud graph Figure 2 was crafted

From Figure 2 it can be seen that the risk value ofthis prisonrsquos physical protection system is consistent withthe cloud graph of relatively low risk In other words inrelatively low risk this calculation result is consistent withthe assessment results of some experts and the results from

Security and Communication Networks 7

Table 4 Weight vector of each index relative to its target level

First LevelIndex

WeightVector

SecondLevelIndex

WeightVector

WeightVector inTotal

Ordering

A1 00597

A11 00557 00033A12 01298 00078A13 01298 00078A14 03424 00204A15 03424 00204

A2 01606

A21 01325 00213A22 05381 00865A23 01325 00213A24 01968 00316

A3 01606

A31 01623 0026A32 02879 00462A33 00604 00097A34 04894 00786

A4 03986

A41 00806 00321A42 0325 01295A43 04028 01606A44 01917 00764

A5 00597A51 01638 00098A52 0539 00322A53 02973 00178

A6 01606

A61 01376 00221A62 03935 00632A63 00754 00121A64 03935 00632

survey The entropy and super entropy of the integratedcloud model for evaluation are small which proves thatthe distribution of the cloud is relatively concentrated theopinions are more in unison and the evaluation results aremore reliable Compared with other methods such as pureanalytic hierarchy process this method can be adopted withmore accurate values and then convert these values throughthe cloud model into a graph which shows results moreclearly

5 Conclusion

In general the traditional methods for evaluating the risklevel of security systems focus on evaluation techniquesbut rarely consider the randomness and fuzziness the twoattributes of qualitative language This will cause defects inthese methods no matter how many efforts are made in thesubjective analysis and the reliability and authenticity of theevaluation results are always in question

In this paper the cloud theory was applied to evaluatethe effectiveness of the physical protection system of a highsecurity system and then a case study was adopted to discussthe controllability of risk of such a system with the evaluation

Table 5 Weight vector and cloudmodel of each second level index

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

Means ofInformationCollection

00033 (218180745800864) Low Risk

Quality ofInformationCollection

00078 (381821160101335) Low Risk

Speed ofInformationTransmission

00078 (409091152304516) RelativelyLow Risk

Security ofInformationTransmission

00204 (463641180802454) RelativelyLow Risk

Capabilityof SignalShielding

00204 (309091284402031) Low Risk

Analysis ofInformationContent

00213 (290910621503235) Low Risk

Research on andJudgment ofInformationContent

00865 (190910621503235) Low Risk

Information DataSorting andMining

00213 (254550870103402) Low Risk

InformationInteraction Ability 00316 (536361408702649) Relatively

Low Risk

Detection Range 0026 (618181160101335) MediumRisk

DetectionSensitivity 00462 (327271346504528) Low Risk

Monitoring Place 00097 (363641097902215) Low RiskCovertness ofDetectionEquipment

00786 (572731118704084) RelativelyLow Risk

AccessAuthorization 00321 (490910621503235) Relatively

Low Risk

Response Time 01295 (509091077203612) RelativelyLow Risk

Emergent Opening 01606 (481821429405661) RelativelyLow Risk

Vehicle DetectionCapability 00764 (672730890801571) Medium

RiskManagement ofPrison Patrollers 00098 (790910828600653) Medium

Risk

Patrol Route 00322 (418181015103650) RelativelyLow Risk

Equipment ofPrison Patrollers 00178 (481821160101335) Relatively

Low RiskAnti-DestructionandAnti-InterferenceCapability

00221 (509090849404117) RelativelyLow Risk

Level of OperatingPersonnel 00632 (600001367305750) Medium

Risk

8 Security and Communication Networks

Table 5 Continued

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

BackupManagementCapability

00121 (390911035801343) Low Risk

False Positive Rateand False NegativeRate

00632 (336360662901229) Low Risk

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 2 Cloud graph for evaluating the risk level of the physicalprotection system

method based on the cloud modelThe research results showthat the cloud model for effectiveness evaluation we con-structed can greatly reduce the influence of subjective factorsin the risk evaluation for the physical protection system ofa high security system through the setting calculation andanalysis of relevant parameters and it is very accurate andpractically useful especially when it is used in evaluationtogether with the fuzziness and randomness of qualitativelinguistic concepts To be sure due to the limitations of theconditions further discussion and research are needed in thecomparative study on different cloud models

Data Availability

The data used to support the findings of this study areincluded within the article

Conflicts of Interest

The author declares that they have no conflicts of interest

Acknowledgments

This work is funded by the project 2018SJA0576 of philoso-phy and social science research in colleges and universitiesin Jiangsu Province the pre-research project LGY201701

of Nanjing Forest Police College and the FundamentalResearch Funds for the Central Universities under grantof LGZD201602 Dr Ke Yin who graduated from NanjingUniversity of Technology and majored in safety engineeringand risk control is now a senior lecturer at Nanjing ForestPolice College

References

[1] F Lawrence ldquoEffective Physical Securityrdquo Elsevier Science ampTechnology p 67 2016

[2] X Jie ldquoApplication and demand of prison safety precautionsystem constructionrdquo Industry Applications vol 02 pp 32ndash352015

[3] Y Zuo ldquoApplication analysis of prison security mode based onbig datardquo Industry Applications vol 2 pp 44ndash48 2015

[4] X Xiaogang ldquoOn constructing prevention mode of securityfrom the trend of the prison situation perspectiverdquo Journal ofAnhui Vocational College of Police Officers vol 11 pp 9ndash13 2012

[5] W Hai-wei ldquoDesign of Comprehensive Security System Basedon Prison Applicationrdquo Computer Knowledge and Technologyvol 11 pp 55ndash60 2015

[6] E G Lambert K I Minor J Gordon J B Wells and N LHogan ldquoExploring the Correlates of Perceived Job Dangerous-ness Among Correctional Staff at a Maximum Security PrisonrdquoCriminal Justice Policy Review vol 29 no 3 pp 215ndash239 2018

[7] J Shea and T Taylor ldquoUsing developmental evaluation asa system of organizational learning An example from SanFranciscordquo Evaluation and Program Planning vol 65 pp 84ndash93 2017

[8] W Tian W Yun and X Zhong ldquoResearch on EffectivenessEvaluation of Peoplersquos Air Defense Material Reserves SystemBased on Cloud Modelrdquo Computer Simulation vol 31 pp 15ndash19 2014

[9] X Cong and L Ma ldquoPerformance Evaluation of Public-Private Partnership Projects from the Perspective of EfficiencyEconomic Effectiveness and Equity A Study of ResidentialRenovation Projects in Chinardquo Sustainability vol 10 no 6 p1951 2018

[10] Y T Liu L Li and M Zhang ldquoEffectiveness evaluation ofinformation management system based on modified normalcloudmodelrdquoAppliedMechanics andMaterials vol 411-414 pp231ndash235 2013

[11] W Zhang and Y Chen ldquoStudy on evaluation of skills trainingeffectiveness in electric power corporationrdquo Applied Mechanicsand Materials vol 263-266 no 1 pp 3400ndash3404 2013

[12] H Liu Z LiW Song andQ Su ldquoFailureMode andEffect Anal-ysis Using Cloud Model Theory and PROMETHEE MethodrdquoIEEE Transactions on Reliability vol 66 no 4 pp 1058ndash10722017

[13] L Linlin and L Yunfei ldquoEffectiveness evaluation of commandand control system based on cloud modelrdquo System Engineeringand Electronics vol 40 no 04 pp 815ndash822 2018

[14] W Debin ldquoEffectiveness Evaluation of Military Communica-tions SystemBased on ANP and Cloud Modelrdquo Fire Control ampCommand Control vol 41 no 08 pp 118ndash124 2016

[15] G Jiao L Tianwei and Z Yun-hai ldquoComprehensive effective-ness evaluation of shipborne navigation equipmentbased onADC and MCGCrdquo Modern Electronics Technique vol 38 no08 pp 58ndash61 2015

Security and Communication Networks 9

[16] D Li andY DuArtificial Intelligence with Uncertainty NationalDefence Industry Press Beijing 2007

[17] W Xinzhou Fuzzy Spatial Information Processing WuhanUniversity Press Wuhan 2003

[18] S Hu D Li Y Liu and D Li ldquoMining weights of land eval-uation factors based on cloud model and correlation analysisrdquoGeomatics and Information Science of Wuhan University vol 31no 5 pp 423ndash427 2006

[19] Li Deyi ldquoLiu Changyu Study on the universality of thenormalCloudmodelrdquoEngineering Science vol 6 no 8 pp 28ndash34 2004

[20] D Li K Di D Li and X Shi ldquoMining association ruleswith linguistic cloud modelsrdquo in Research and Development inKnowledgeDiscovery andDataMining vol 1394ofLectureNotesin Computer Science pp 392-393 Springer Berlin HeidelbergBerlin Heidelberg 1998

[21] W Yingchao and J Hongwen ldquoA normal cloud model-basedstudy of grading prediction of rockburst intensityin deepunderground engineeringrdquoRock and Soil Mechanics vol 36 no4 pp 1189ndash1194 2015

[22] L Changyi L Deyi D Yi et al ldquoSome statistical analysisof thenormal cloud modelrdquo Information and Control vol 34 no 2pp 236ndash239 2005

[23] H Shiyuan L Deren L Yaolin et al ldquoDeterminationandintegration of subjective weights and objectiveweights of landgrading factorsrdquo Geomatics andInformation Science of WuhanUniversity vol 31 no 8 pp 695ndash699 2006

[24] Y Zhang J Yan P Jiang and N Yang ldquoNormal cloud modelbased evaluation of land resources ecological security in Hubeiprovincerdquo Nongye Gongcheng Xuebao vol 29 no 22 pp 252ndash258 2013

[25] Handbook onDynamic Security andPrison Intelligence UnitedNations New York USA 2013

[26] K Yin ldquoResearch on the Effectiveness Evaluation Model ofthe Prison Physical Protection System Based on Grey AnalyticHierarchy Processrdquo Security and Communication Networks vol2017 2017

[27] K Yin ldquoEffectiveness evaluation model research of the prisonphysical protection system in terms of grey analytic hierarchyprocessrdquo in Proceedings of the 2017 IEEE 17th InternationalConference on Communication Technology (ICCT) pp 1873ndash1879 Chengdu October 2017

[28] L Guizhi ldquoAnalysis of effectiveness evaluation index systemfor prison safety management systemrdquo Intelligent Processing andApplication vol 12 pp 42ndash47 2016

[29] S Xunfeng andW Fengwu ldquoPrison informatization and its rolein prison safety managementrdquo Communication amp InformationTechnology vol 7 pp 94ndash97 2014

[30] T L Saaty ldquoThere is no mathematical validity for using fuzzynumber crunching in the analytic hierarchy processrdquo Journal ofSystems Science and Systems Engineering no 4 2006

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom

Security and Communication Networks 5

Table 2 A set of standard cloud models for evaluation

Comments Low Risk Relatively Low Risk Medium Risk Relatively High Risk High RiskStandard CloudModel (00667003) (50333003) (70333003) (8501667003) (1001667003)

of consistency it needs to be repeatedly reconstructed untilthe requirement of consistency is met Finally the weight ofeach index is obtained by hierarchical single ordering andhierarchical total ordering

333 Determination of the Cloud Model for Each IndexAccording to the risk value judged by the expert group foreach index the cloud model of each level is calculated bythe reverse cloud generator formula without the degree ofcertainty

Firstly the mean value of each set of data samples isobtained

119883 = 1119899119899sum119894=1

119909119894 (7)

The first absolute central moment for each set of data samples

1119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (8)

Variance

1198782 = 1119899 minus 1

119899sum119894=1

(119909119894 minus 119883)2 (9)

Expectation

119864119909 = 119883 (10)

At the same time the entropy can be obtained from the meanvalue

119864119899 = radic1205872 times 1

119899119899sum119894=1

1003816100381610038161003816119909119894 minus 1198641199091003816100381610038161003816 (11)

Based on variance and super entropy we can obtain

119867119890 = radic1198782 minus 1198641198992 (12)

334 Determining Evaluation Results with the Help of theCloud Model Graph Based on the cloud models of thesecond-level indices together with each indexrsquos weight wecan calculate the cloud models of the first-level indices Thecalculation formula is shown in (13)-(15) where Ex En andHe are the evaluation cloudmodels of the (n-1)th level indicesEx1Ex2 sdot sdot sdotExn is the expectation of the cloud model of eachindex at the nth level Ex1Ex2 sdot sdot sdotExn is the entropy of thecloud model of each index at the nth level 1198671198901 1198671198902 sdot sdot sdot 119867119890119899is the super entropy of the cloud model of each index atthe nth level 119894 is the number of indices at the nth level and1205971 1205972 sdot sdot sdot 120597n is the weight of each index at the nth level Wekeep calculating until the integrated cloudmodel of the targetlevel for evaluation is obtained

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 1 Standard cloud model graph for the evaluation model

Ex = 1198641199091 times 1198641198991 times 1205971 + 1198641199092 times 1198641198992 times 1205972 + sdot sdot sdot + 119864119909119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (13)

119864119899 = 1198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899 (14)

He

= 1198671198901 times 1198641198991 times 1205971 + 1198671198902 times 1198641198992 times 1205972 + sdot sdot sdot + 119867119890119899 times 119864119899119899 times 1205971198991198641198991 times 1205971 + 1198641198992 times 1205972 + sdot sdot sdot + 119864119899119899 times 120597119899(15)

The total model obtains the cloud graph by Matlab asshown in Figure 1 and verifies the evaluation levels of theentire system

4 Results and Analysis

This paper made a case study of the physical protectionsystem of a high security prison which has just completedthe overall reconstruction of its physical protection systemand improved significantly from three aspects defense byprison personnel defense by physical barriers and defenseby technology The configuration of its physical protectionsystem is relatively representative According to the indexsystem the evaluation model and the calculation methodconstructed above the following analysis and calculationwere performed

According to the effectiveness evaluation index systemfor the physical protection system of a high security prisonconstructed in the previous section we organized an expertgroup to score each index item according to the scalingmethod of the AHP and establish a judgment matrix for eachlevel of evaluation indices where we have the following

First level index set

119860 = 1198601 1198602 sdot sdot sdot 119860 119894 (119894 = 1 2 119900) (16)

6 Security and Communication Networks

The weight set of the first level indices

120596 = 1198801 1198802 sdot sdot sdot 119880119894 (119894 = 1 2 119900) (17)

Second level index set

119860 119894 = 119860 1198941 119860 1198942 sdot sdot sdot 119860 119894119895 (119895 = 1 2 119901) (18)

The weight set of the second level indices

120596119894 = 1205961198941 1205961198942 sdot sdot sdot 120596119894119895 (119895 = 1 2 119901) (19)

T is the judgment matrix of A1 A2 and A3 (first levelindices) for evaluating the effectiveness of the physical pro-tection system T1 T2 T3 T6 are the judgment matrices ofA11 A12 A13 A66 (second level indices) for evaluating theeffectiveness of the physical protection systemThe judgmentmatrix of each levelrsquos indices is as follows

T =

[[[[[[[[[[[[[[[[[

1 13

13

15 1 1

33 1 1 1

3 3 13 1 1 1

3 3 15 3 3 1 5 31 1

313

15 1 1

33 1 1 1

3 3 1

]]]]]]]]]]]]]]]]]

T1 =[[[[[[[[[[[[

1 13

13

15

15

3 1 1 13

13

3 1 1 13

135 3 3 1 1

5 3 3 1 1

]]]]]]]]]]]]

T2 =[[[[[[[[[

1 13 1 1

23 1 3 61 1

3 1 12

2 16 2 1

]]]]]]]]]

T3 =[[[[[[[[[

1 12 3 1

32 1 5 1

213

15 1 1

73 2 7 1

]]]]]]]]]

Table 3 Weight vector and consistency judgment

Weight Vector CR ConsistencyJudgment

120596=(00597016060160603986005971606)T 00093 Satisfy1205961=(0055701298012980342403424)

T 00125 Satisfy1205962=(01325053810132501968)T 00938 Satisfy1205963=(01623028790060404894)

T 00071 Satisfy1205964=(080603250402801917)

T 00573 Satisfy1205965=(01638053902973)

T 00079 Satisfy1205966=(01376039350075403935)T 00015 Satisfy

T4 =[[[[[[[[[[

1 13

15

13

3 1 35 3

5 53 1 5

33 1

335 1

]]]]]]]]]]

T5 =[[[[[[

1 13

123 1 2

2 12 1

]]]]]]

T6 =[[[[[[[[

1 13 2 1

33 1 5 112

15 1 1

53 1 5 1

]]]]]]]]

(20)

The weight vector of each levelrsquos indices was calculatedand the consistency was verified as shown in Table 3

Table 3 is the result of the hierarchical single orderingHowever in order to obtain the importance of all the indicesat the same level with respect to the highest level thehierarchical total ordering must also be conducted on thebasis of the hierarchical single ordering The weight vector ofeach index relative to its target level is shown in Table 4

According to the risk criteria defined in Table 2 we askedexperts to score each index and then calculated the cloudmodel characteristics (Ex En and He) from the quantitativeto the qualitative using formula (7)-(12) of the reverse cloudmodel generation algorithm without the degree of certaintyThe result is shown in Table 5

According to the data in Table 5 the integrated cloudmodel for the physical protection system of this high securityprison was calculated by formula (13)-(15) (496486 0267204065) and the cloud graph Figure 2 was crafted

From Figure 2 it can be seen that the risk value ofthis prisonrsquos physical protection system is consistent withthe cloud graph of relatively low risk In other words inrelatively low risk this calculation result is consistent withthe assessment results of some experts and the results from

Security and Communication Networks 7

Table 4 Weight vector of each index relative to its target level

First LevelIndex

WeightVector

SecondLevelIndex

WeightVector

WeightVector inTotal

Ordering

A1 00597

A11 00557 00033A12 01298 00078A13 01298 00078A14 03424 00204A15 03424 00204

A2 01606

A21 01325 00213A22 05381 00865A23 01325 00213A24 01968 00316

A3 01606

A31 01623 0026A32 02879 00462A33 00604 00097A34 04894 00786

A4 03986

A41 00806 00321A42 0325 01295A43 04028 01606A44 01917 00764

A5 00597A51 01638 00098A52 0539 00322A53 02973 00178

A6 01606

A61 01376 00221A62 03935 00632A63 00754 00121A64 03935 00632

survey The entropy and super entropy of the integratedcloud model for evaluation are small which proves thatthe distribution of the cloud is relatively concentrated theopinions are more in unison and the evaluation results aremore reliable Compared with other methods such as pureanalytic hierarchy process this method can be adopted withmore accurate values and then convert these values throughthe cloud model into a graph which shows results moreclearly

5 Conclusion

In general the traditional methods for evaluating the risklevel of security systems focus on evaluation techniquesbut rarely consider the randomness and fuzziness the twoattributes of qualitative language This will cause defects inthese methods no matter how many efforts are made in thesubjective analysis and the reliability and authenticity of theevaluation results are always in question

In this paper the cloud theory was applied to evaluatethe effectiveness of the physical protection system of a highsecurity system and then a case study was adopted to discussthe controllability of risk of such a system with the evaluation

Table 5 Weight vector and cloudmodel of each second level index

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

Means ofInformationCollection

00033 (218180745800864) Low Risk

Quality ofInformationCollection

00078 (381821160101335) Low Risk

Speed ofInformationTransmission

00078 (409091152304516) RelativelyLow Risk

Security ofInformationTransmission

00204 (463641180802454) RelativelyLow Risk

Capabilityof SignalShielding

00204 (309091284402031) Low Risk

Analysis ofInformationContent

00213 (290910621503235) Low Risk

Research on andJudgment ofInformationContent

00865 (190910621503235) Low Risk

Information DataSorting andMining

00213 (254550870103402) Low Risk

InformationInteraction Ability 00316 (536361408702649) Relatively

Low Risk

Detection Range 0026 (618181160101335) MediumRisk

DetectionSensitivity 00462 (327271346504528) Low Risk

Monitoring Place 00097 (363641097902215) Low RiskCovertness ofDetectionEquipment

00786 (572731118704084) RelativelyLow Risk

AccessAuthorization 00321 (490910621503235) Relatively

Low Risk

Response Time 01295 (509091077203612) RelativelyLow Risk

Emergent Opening 01606 (481821429405661) RelativelyLow Risk

Vehicle DetectionCapability 00764 (672730890801571) Medium

RiskManagement ofPrison Patrollers 00098 (790910828600653) Medium

Risk

Patrol Route 00322 (418181015103650) RelativelyLow Risk

Equipment ofPrison Patrollers 00178 (481821160101335) Relatively

Low RiskAnti-DestructionandAnti-InterferenceCapability

00221 (509090849404117) RelativelyLow Risk

Level of OperatingPersonnel 00632 (600001367305750) Medium

Risk

8 Security and Communication Networks

Table 5 Continued

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

BackupManagementCapability

00121 (390911035801343) Low Risk

False Positive Rateand False NegativeRate

00632 (336360662901229) Low Risk

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 2 Cloud graph for evaluating the risk level of the physicalprotection system

method based on the cloud modelThe research results showthat the cloud model for effectiveness evaluation we con-structed can greatly reduce the influence of subjective factorsin the risk evaluation for the physical protection system ofa high security system through the setting calculation andanalysis of relevant parameters and it is very accurate andpractically useful especially when it is used in evaluationtogether with the fuzziness and randomness of qualitativelinguistic concepts To be sure due to the limitations of theconditions further discussion and research are needed in thecomparative study on different cloud models

Data Availability

The data used to support the findings of this study areincluded within the article

Conflicts of Interest

The author declares that they have no conflicts of interest

Acknowledgments

This work is funded by the project 2018SJA0576 of philoso-phy and social science research in colleges and universitiesin Jiangsu Province the pre-research project LGY201701

of Nanjing Forest Police College and the FundamentalResearch Funds for the Central Universities under grantof LGZD201602 Dr Ke Yin who graduated from NanjingUniversity of Technology and majored in safety engineeringand risk control is now a senior lecturer at Nanjing ForestPolice College

References

[1] F Lawrence ldquoEffective Physical Securityrdquo Elsevier Science ampTechnology p 67 2016

[2] X Jie ldquoApplication and demand of prison safety precautionsystem constructionrdquo Industry Applications vol 02 pp 32ndash352015

[3] Y Zuo ldquoApplication analysis of prison security mode based onbig datardquo Industry Applications vol 2 pp 44ndash48 2015

[4] X Xiaogang ldquoOn constructing prevention mode of securityfrom the trend of the prison situation perspectiverdquo Journal ofAnhui Vocational College of Police Officers vol 11 pp 9ndash13 2012

[5] W Hai-wei ldquoDesign of Comprehensive Security System Basedon Prison Applicationrdquo Computer Knowledge and Technologyvol 11 pp 55ndash60 2015

[6] E G Lambert K I Minor J Gordon J B Wells and N LHogan ldquoExploring the Correlates of Perceived Job Dangerous-ness Among Correctional Staff at a Maximum Security PrisonrdquoCriminal Justice Policy Review vol 29 no 3 pp 215ndash239 2018

[7] J Shea and T Taylor ldquoUsing developmental evaluation asa system of organizational learning An example from SanFranciscordquo Evaluation and Program Planning vol 65 pp 84ndash93 2017

[8] W Tian W Yun and X Zhong ldquoResearch on EffectivenessEvaluation of Peoplersquos Air Defense Material Reserves SystemBased on Cloud Modelrdquo Computer Simulation vol 31 pp 15ndash19 2014

[9] X Cong and L Ma ldquoPerformance Evaluation of Public-Private Partnership Projects from the Perspective of EfficiencyEconomic Effectiveness and Equity A Study of ResidentialRenovation Projects in Chinardquo Sustainability vol 10 no 6 p1951 2018

[10] Y T Liu L Li and M Zhang ldquoEffectiveness evaluation ofinformation management system based on modified normalcloudmodelrdquoAppliedMechanics andMaterials vol 411-414 pp231ndash235 2013

[11] W Zhang and Y Chen ldquoStudy on evaluation of skills trainingeffectiveness in electric power corporationrdquo Applied Mechanicsand Materials vol 263-266 no 1 pp 3400ndash3404 2013

[12] H Liu Z LiW Song andQ Su ldquoFailureMode andEffect Anal-ysis Using Cloud Model Theory and PROMETHEE MethodrdquoIEEE Transactions on Reliability vol 66 no 4 pp 1058ndash10722017

[13] L Linlin and L Yunfei ldquoEffectiveness evaluation of commandand control system based on cloud modelrdquo System Engineeringand Electronics vol 40 no 04 pp 815ndash822 2018

[14] W Debin ldquoEffectiveness Evaluation of Military Communica-tions SystemBased on ANP and Cloud Modelrdquo Fire Control ampCommand Control vol 41 no 08 pp 118ndash124 2016

[15] G Jiao L Tianwei and Z Yun-hai ldquoComprehensive effective-ness evaluation of shipborne navigation equipmentbased onADC and MCGCrdquo Modern Electronics Technique vol 38 no08 pp 58ndash61 2015

Security and Communication Networks 9

[16] D Li andY DuArtificial Intelligence with Uncertainty NationalDefence Industry Press Beijing 2007

[17] W Xinzhou Fuzzy Spatial Information Processing WuhanUniversity Press Wuhan 2003

[18] S Hu D Li Y Liu and D Li ldquoMining weights of land eval-uation factors based on cloud model and correlation analysisrdquoGeomatics and Information Science of Wuhan University vol 31no 5 pp 423ndash427 2006

[19] Li Deyi ldquoLiu Changyu Study on the universality of thenormalCloudmodelrdquoEngineering Science vol 6 no 8 pp 28ndash34 2004

[20] D Li K Di D Li and X Shi ldquoMining association ruleswith linguistic cloud modelsrdquo in Research and Development inKnowledgeDiscovery andDataMining vol 1394ofLectureNotesin Computer Science pp 392-393 Springer Berlin HeidelbergBerlin Heidelberg 1998

[21] W Yingchao and J Hongwen ldquoA normal cloud model-basedstudy of grading prediction of rockburst intensityin deepunderground engineeringrdquoRock and Soil Mechanics vol 36 no4 pp 1189ndash1194 2015

[22] L Changyi L Deyi D Yi et al ldquoSome statistical analysisof thenormal cloud modelrdquo Information and Control vol 34 no 2pp 236ndash239 2005

[23] H Shiyuan L Deren L Yaolin et al ldquoDeterminationandintegration of subjective weights and objectiveweights of landgrading factorsrdquo Geomatics andInformation Science of WuhanUniversity vol 31 no 8 pp 695ndash699 2006

[24] Y Zhang J Yan P Jiang and N Yang ldquoNormal cloud modelbased evaluation of land resources ecological security in Hubeiprovincerdquo Nongye Gongcheng Xuebao vol 29 no 22 pp 252ndash258 2013

[25] Handbook onDynamic Security andPrison Intelligence UnitedNations New York USA 2013

[26] K Yin ldquoResearch on the Effectiveness Evaluation Model ofthe Prison Physical Protection System Based on Grey AnalyticHierarchy Processrdquo Security and Communication Networks vol2017 2017

[27] K Yin ldquoEffectiveness evaluation model research of the prisonphysical protection system in terms of grey analytic hierarchyprocessrdquo in Proceedings of the 2017 IEEE 17th InternationalConference on Communication Technology (ICCT) pp 1873ndash1879 Chengdu October 2017

[28] L Guizhi ldquoAnalysis of effectiveness evaluation index systemfor prison safety management systemrdquo Intelligent Processing andApplication vol 12 pp 42ndash47 2016

[29] S Xunfeng andW Fengwu ldquoPrison informatization and its rolein prison safety managementrdquo Communication amp InformationTechnology vol 7 pp 94ndash97 2014

[30] T L Saaty ldquoThere is no mathematical validity for using fuzzynumber crunching in the analytic hierarchy processrdquo Journal ofSystems Science and Systems Engineering no 4 2006

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom

6 Security and Communication Networks

The weight set of the first level indices

120596 = 1198801 1198802 sdot sdot sdot 119880119894 (119894 = 1 2 119900) (17)

Second level index set

119860 119894 = 119860 1198941 119860 1198942 sdot sdot sdot 119860 119894119895 (119895 = 1 2 119901) (18)

The weight set of the second level indices

120596119894 = 1205961198941 1205961198942 sdot sdot sdot 120596119894119895 (119895 = 1 2 119901) (19)

T is the judgment matrix of A1 A2 and A3 (first levelindices) for evaluating the effectiveness of the physical pro-tection system T1 T2 T3 T6 are the judgment matrices ofA11 A12 A13 A66 (second level indices) for evaluating theeffectiveness of the physical protection systemThe judgmentmatrix of each levelrsquos indices is as follows

T =

[[[[[[[[[[[[[[[[[

1 13

13

15 1 1

33 1 1 1

3 3 13 1 1 1

3 3 15 3 3 1 5 31 1

313

15 1 1

33 1 1 1

3 3 1

]]]]]]]]]]]]]]]]]

T1 =[[[[[[[[[[[[

1 13

13

15

15

3 1 1 13

13

3 1 1 13

135 3 3 1 1

5 3 3 1 1

]]]]]]]]]]]]

T2 =[[[[[[[[[

1 13 1 1

23 1 3 61 1

3 1 12

2 16 2 1

]]]]]]]]]

T3 =[[[[[[[[[

1 12 3 1

32 1 5 1

213

15 1 1

73 2 7 1

]]]]]]]]]

Table 3 Weight vector and consistency judgment

Weight Vector CR ConsistencyJudgment

120596=(00597016060160603986005971606)T 00093 Satisfy1205961=(0055701298012980342403424)

T 00125 Satisfy1205962=(01325053810132501968)T 00938 Satisfy1205963=(01623028790060404894)

T 00071 Satisfy1205964=(080603250402801917)

T 00573 Satisfy1205965=(01638053902973)

T 00079 Satisfy1205966=(01376039350075403935)T 00015 Satisfy

T4 =[[[[[[[[[[

1 13

15

13

3 1 35 3

5 53 1 5

33 1

335 1

]]]]]]]]]]

T5 =[[[[[[

1 13

123 1 2

2 12 1

]]]]]]

T6 =[[[[[[[[

1 13 2 1

33 1 5 112

15 1 1

53 1 5 1

]]]]]]]]

(20)

The weight vector of each levelrsquos indices was calculatedand the consistency was verified as shown in Table 3

Table 3 is the result of the hierarchical single orderingHowever in order to obtain the importance of all the indicesat the same level with respect to the highest level thehierarchical total ordering must also be conducted on thebasis of the hierarchical single ordering The weight vector ofeach index relative to its target level is shown in Table 4

According to the risk criteria defined in Table 2 we askedexperts to score each index and then calculated the cloudmodel characteristics (Ex En and He) from the quantitativeto the qualitative using formula (7)-(12) of the reverse cloudmodel generation algorithm without the degree of certaintyThe result is shown in Table 5

According to the data in Table 5 the integrated cloudmodel for the physical protection system of this high securityprison was calculated by formula (13)-(15) (496486 0267204065) and the cloud graph Figure 2 was crafted

From Figure 2 it can be seen that the risk value ofthis prisonrsquos physical protection system is consistent withthe cloud graph of relatively low risk In other words inrelatively low risk this calculation result is consistent withthe assessment results of some experts and the results from

Security and Communication Networks 7

Table 4 Weight vector of each index relative to its target level

First LevelIndex

WeightVector

SecondLevelIndex

WeightVector

WeightVector inTotal

Ordering

A1 00597

A11 00557 00033A12 01298 00078A13 01298 00078A14 03424 00204A15 03424 00204

A2 01606

A21 01325 00213A22 05381 00865A23 01325 00213A24 01968 00316

A3 01606

A31 01623 0026A32 02879 00462A33 00604 00097A34 04894 00786

A4 03986

A41 00806 00321A42 0325 01295A43 04028 01606A44 01917 00764

A5 00597A51 01638 00098A52 0539 00322A53 02973 00178

A6 01606

A61 01376 00221A62 03935 00632A63 00754 00121A64 03935 00632

survey The entropy and super entropy of the integratedcloud model for evaluation are small which proves thatthe distribution of the cloud is relatively concentrated theopinions are more in unison and the evaluation results aremore reliable Compared with other methods such as pureanalytic hierarchy process this method can be adopted withmore accurate values and then convert these values throughthe cloud model into a graph which shows results moreclearly

5 Conclusion

In general the traditional methods for evaluating the risklevel of security systems focus on evaluation techniquesbut rarely consider the randomness and fuzziness the twoattributes of qualitative language This will cause defects inthese methods no matter how many efforts are made in thesubjective analysis and the reliability and authenticity of theevaluation results are always in question

In this paper the cloud theory was applied to evaluatethe effectiveness of the physical protection system of a highsecurity system and then a case study was adopted to discussthe controllability of risk of such a system with the evaluation

Table 5 Weight vector and cloudmodel of each second level index

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

Means ofInformationCollection

00033 (218180745800864) Low Risk

Quality ofInformationCollection

00078 (381821160101335) Low Risk

Speed ofInformationTransmission

00078 (409091152304516) RelativelyLow Risk

Security ofInformationTransmission

00204 (463641180802454) RelativelyLow Risk

Capabilityof SignalShielding

00204 (309091284402031) Low Risk

Analysis ofInformationContent

00213 (290910621503235) Low Risk

Research on andJudgment ofInformationContent

00865 (190910621503235) Low Risk

Information DataSorting andMining

00213 (254550870103402) Low Risk

InformationInteraction Ability 00316 (536361408702649) Relatively

Low Risk

Detection Range 0026 (618181160101335) MediumRisk

DetectionSensitivity 00462 (327271346504528) Low Risk

Monitoring Place 00097 (363641097902215) Low RiskCovertness ofDetectionEquipment

00786 (572731118704084) RelativelyLow Risk

AccessAuthorization 00321 (490910621503235) Relatively

Low Risk

Response Time 01295 (509091077203612) RelativelyLow Risk

Emergent Opening 01606 (481821429405661) RelativelyLow Risk

Vehicle DetectionCapability 00764 (672730890801571) Medium

RiskManagement ofPrison Patrollers 00098 (790910828600653) Medium

Risk

Patrol Route 00322 (418181015103650) RelativelyLow Risk

Equipment ofPrison Patrollers 00178 (481821160101335) Relatively

Low RiskAnti-DestructionandAnti-InterferenceCapability

00221 (509090849404117) RelativelyLow Risk

Level of OperatingPersonnel 00632 (600001367305750) Medium

Risk

8 Security and Communication Networks

Table 5 Continued

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

BackupManagementCapability

00121 (390911035801343) Low Risk

False Positive Rateand False NegativeRate

00632 (336360662901229) Low Risk

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 2 Cloud graph for evaluating the risk level of the physicalprotection system

method based on the cloud modelThe research results showthat the cloud model for effectiveness evaluation we con-structed can greatly reduce the influence of subjective factorsin the risk evaluation for the physical protection system ofa high security system through the setting calculation andanalysis of relevant parameters and it is very accurate andpractically useful especially when it is used in evaluationtogether with the fuzziness and randomness of qualitativelinguistic concepts To be sure due to the limitations of theconditions further discussion and research are needed in thecomparative study on different cloud models

Data Availability

The data used to support the findings of this study areincluded within the article

Conflicts of Interest

The author declares that they have no conflicts of interest

Acknowledgments

This work is funded by the project 2018SJA0576 of philoso-phy and social science research in colleges and universitiesin Jiangsu Province the pre-research project LGY201701

of Nanjing Forest Police College and the FundamentalResearch Funds for the Central Universities under grantof LGZD201602 Dr Ke Yin who graduated from NanjingUniversity of Technology and majored in safety engineeringand risk control is now a senior lecturer at Nanjing ForestPolice College

References

[1] F Lawrence ldquoEffective Physical Securityrdquo Elsevier Science ampTechnology p 67 2016

[2] X Jie ldquoApplication and demand of prison safety precautionsystem constructionrdquo Industry Applications vol 02 pp 32ndash352015

[3] Y Zuo ldquoApplication analysis of prison security mode based onbig datardquo Industry Applications vol 2 pp 44ndash48 2015

[4] X Xiaogang ldquoOn constructing prevention mode of securityfrom the trend of the prison situation perspectiverdquo Journal ofAnhui Vocational College of Police Officers vol 11 pp 9ndash13 2012

[5] W Hai-wei ldquoDesign of Comprehensive Security System Basedon Prison Applicationrdquo Computer Knowledge and Technologyvol 11 pp 55ndash60 2015

[6] E G Lambert K I Minor J Gordon J B Wells and N LHogan ldquoExploring the Correlates of Perceived Job Dangerous-ness Among Correctional Staff at a Maximum Security PrisonrdquoCriminal Justice Policy Review vol 29 no 3 pp 215ndash239 2018

[7] J Shea and T Taylor ldquoUsing developmental evaluation asa system of organizational learning An example from SanFranciscordquo Evaluation and Program Planning vol 65 pp 84ndash93 2017

[8] W Tian W Yun and X Zhong ldquoResearch on EffectivenessEvaluation of Peoplersquos Air Defense Material Reserves SystemBased on Cloud Modelrdquo Computer Simulation vol 31 pp 15ndash19 2014

[9] X Cong and L Ma ldquoPerformance Evaluation of Public-Private Partnership Projects from the Perspective of EfficiencyEconomic Effectiveness and Equity A Study of ResidentialRenovation Projects in Chinardquo Sustainability vol 10 no 6 p1951 2018

[10] Y T Liu L Li and M Zhang ldquoEffectiveness evaluation ofinformation management system based on modified normalcloudmodelrdquoAppliedMechanics andMaterials vol 411-414 pp231ndash235 2013

[11] W Zhang and Y Chen ldquoStudy on evaluation of skills trainingeffectiveness in electric power corporationrdquo Applied Mechanicsand Materials vol 263-266 no 1 pp 3400ndash3404 2013

[12] H Liu Z LiW Song andQ Su ldquoFailureMode andEffect Anal-ysis Using Cloud Model Theory and PROMETHEE MethodrdquoIEEE Transactions on Reliability vol 66 no 4 pp 1058ndash10722017

[13] L Linlin and L Yunfei ldquoEffectiveness evaluation of commandand control system based on cloud modelrdquo System Engineeringand Electronics vol 40 no 04 pp 815ndash822 2018

[14] W Debin ldquoEffectiveness Evaluation of Military Communica-tions SystemBased on ANP and Cloud Modelrdquo Fire Control ampCommand Control vol 41 no 08 pp 118ndash124 2016

[15] G Jiao L Tianwei and Z Yun-hai ldquoComprehensive effective-ness evaluation of shipborne navigation equipmentbased onADC and MCGCrdquo Modern Electronics Technique vol 38 no08 pp 58ndash61 2015

Security and Communication Networks 9

[16] D Li andY DuArtificial Intelligence with Uncertainty NationalDefence Industry Press Beijing 2007

[17] W Xinzhou Fuzzy Spatial Information Processing WuhanUniversity Press Wuhan 2003

[18] S Hu D Li Y Liu and D Li ldquoMining weights of land eval-uation factors based on cloud model and correlation analysisrdquoGeomatics and Information Science of Wuhan University vol 31no 5 pp 423ndash427 2006

[19] Li Deyi ldquoLiu Changyu Study on the universality of thenormalCloudmodelrdquoEngineering Science vol 6 no 8 pp 28ndash34 2004

[20] D Li K Di D Li and X Shi ldquoMining association ruleswith linguistic cloud modelsrdquo in Research and Development inKnowledgeDiscovery andDataMining vol 1394ofLectureNotesin Computer Science pp 392-393 Springer Berlin HeidelbergBerlin Heidelberg 1998

[21] W Yingchao and J Hongwen ldquoA normal cloud model-basedstudy of grading prediction of rockburst intensityin deepunderground engineeringrdquoRock and Soil Mechanics vol 36 no4 pp 1189ndash1194 2015

[22] L Changyi L Deyi D Yi et al ldquoSome statistical analysisof thenormal cloud modelrdquo Information and Control vol 34 no 2pp 236ndash239 2005

[23] H Shiyuan L Deren L Yaolin et al ldquoDeterminationandintegration of subjective weights and objectiveweights of landgrading factorsrdquo Geomatics andInformation Science of WuhanUniversity vol 31 no 8 pp 695ndash699 2006

[24] Y Zhang J Yan P Jiang and N Yang ldquoNormal cloud modelbased evaluation of land resources ecological security in Hubeiprovincerdquo Nongye Gongcheng Xuebao vol 29 no 22 pp 252ndash258 2013

[25] Handbook onDynamic Security andPrison Intelligence UnitedNations New York USA 2013

[26] K Yin ldquoResearch on the Effectiveness Evaluation Model ofthe Prison Physical Protection System Based on Grey AnalyticHierarchy Processrdquo Security and Communication Networks vol2017 2017

[27] K Yin ldquoEffectiveness evaluation model research of the prisonphysical protection system in terms of grey analytic hierarchyprocessrdquo in Proceedings of the 2017 IEEE 17th InternationalConference on Communication Technology (ICCT) pp 1873ndash1879 Chengdu October 2017

[28] L Guizhi ldquoAnalysis of effectiveness evaluation index systemfor prison safety management systemrdquo Intelligent Processing andApplication vol 12 pp 42ndash47 2016

[29] S Xunfeng andW Fengwu ldquoPrison informatization and its rolein prison safety managementrdquo Communication amp InformationTechnology vol 7 pp 94ndash97 2014

[30] T L Saaty ldquoThere is no mathematical validity for using fuzzynumber crunching in the analytic hierarchy processrdquo Journal ofSystems Science and Systems Engineering no 4 2006

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom

Security and Communication Networks 7

Table 4 Weight vector of each index relative to its target level

First LevelIndex

WeightVector

SecondLevelIndex

WeightVector

WeightVector inTotal

Ordering

A1 00597

A11 00557 00033A12 01298 00078A13 01298 00078A14 03424 00204A15 03424 00204

A2 01606

A21 01325 00213A22 05381 00865A23 01325 00213A24 01968 00316

A3 01606

A31 01623 0026A32 02879 00462A33 00604 00097A34 04894 00786

A4 03986

A41 00806 00321A42 0325 01295A43 04028 01606A44 01917 00764

A5 00597A51 01638 00098A52 0539 00322A53 02973 00178

A6 01606

A61 01376 00221A62 03935 00632A63 00754 00121A64 03935 00632

survey The entropy and super entropy of the integratedcloud model for evaluation are small which proves thatthe distribution of the cloud is relatively concentrated theopinions are more in unison and the evaluation results aremore reliable Compared with other methods such as pureanalytic hierarchy process this method can be adopted withmore accurate values and then convert these values throughthe cloud model into a graph which shows results moreclearly

5 Conclusion

In general the traditional methods for evaluating the risklevel of security systems focus on evaluation techniquesbut rarely consider the randomness and fuzziness the twoattributes of qualitative language This will cause defects inthese methods no matter how many efforts are made in thesubjective analysis and the reliability and authenticity of theevaluation results are always in question

In this paper the cloud theory was applied to evaluatethe effectiveness of the physical protection system of a highsecurity system and then a case study was adopted to discussthe controllability of risk of such a system with the evaluation

Table 5 Weight vector and cloudmodel of each second level index

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

Means ofInformationCollection

00033 (218180745800864) Low Risk

Quality ofInformationCollection

00078 (381821160101335) Low Risk

Speed ofInformationTransmission

00078 (409091152304516) RelativelyLow Risk

Security ofInformationTransmission

00204 (463641180802454) RelativelyLow Risk

Capabilityof SignalShielding

00204 (309091284402031) Low Risk

Analysis ofInformationContent

00213 (290910621503235) Low Risk

Research on andJudgment ofInformationContent

00865 (190910621503235) Low Risk

Information DataSorting andMining

00213 (254550870103402) Low Risk

InformationInteraction Ability 00316 (536361408702649) Relatively

Low Risk

Detection Range 0026 (618181160101335) MediumRisk

DetectionSensitivity 00462 (327271346504528) Low Risk

Monitoring Place 00097 (363641097902215) Low RiskCovertness ofDetectionEquipment

00786 (572731118704084) RelativelyLow Risk

AccessAuthorization 00321 (490910621503235) Relatively

Low Risk

Response Time 01295 (509091077203612) RelativelyLow Risk

Emergent Opening 01606 (481821429405661) RelativelyLow Risk

Vehicle DetectionCapability 00764 (672730890801571) Medium

RiskManagement ofPrison Patrollers 00098 (790910828600653) Medium

Risk

Patrol Route 00322 (418181015103650) RelativelyLow Risk

Equipment ofPrison Patrollers 00178 (481821160101335) Relatively

Low RiskAnti-DestructionandAnti-InterferenceCapability

00221 (509090849404117) RelativelyLow Risk

Level of OperatingPersonnel 00632 (600001367305750) Medium

Risk

8 Security and Communication Networks

Table 5 Continued

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

BackupManagementCapability

00121 (390911035801343) Low Risk

False Positive Rateand False NegativeRate

00632 (336360662901229) Low Risk

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 2 Cloud graph for evaluating the risk level of the physicalprotection system

method based on the cloud modelThe research results showthat the cloud model for effectiveness evaluation we con-structed can greatly reduce the influence of subjective factorsin the risk evaluation for the physical protection system ofa high security system through the setting calculation andanalysis of relevant parameters and it is very accurate andpractically useful especially when it is used in evaluationtogether with the fuzziness and randomness of qualitativelinguistic concepts To be sure due to the limitations of theconditions further discussion and research are needed in thecomparative study on different cloud models

Data Availability

The data used to support the findings of this study areincluded within the article

Conflicts of Interest

The author declares that they have no conflicts of interest

Acknowledgments

This work is funded by the project 2018SJA0576 of philoso-phy and social science research in colleges and universitiesin Jiangsu Province the pre-research project LGY201701

of Nanjing Forest Police College and the FundamentalResearch Funds for the Central Universities under grantof LGZD201602 Dr Ke Yin who graduated from NanjingUniversity of Technology and majored in safety engineeringand risk control is now a senior lecturer at Nanjing ForestPolice College

References

[1] F Lawrence ldquoEffective Physical Securityrdquo Elsevier Science ampTechnology p 67 2016

[2] X Jie ldquoApplication and demand of prison safety precautionsystem constructionrdquo Industry Applications vol 02 pp 32ndash352015

[3] Y Zuo ldquoApplication analysis of prison security mode based onbig datardquo Industry Applications vol 2 pp 44ndash48 2015

[4] X Xiaogang ldquoOn constructing prevention mode of securityfrom the trend of the prison situation perspectiverdquo Journal ofAnhui Vocational College of Police Officers vol 11 pp 9ndash13 2012

[5] W Hai-wei ldquoDesign of Comprehensive Security System Basedon Prison Applicationrdquo Computer Knowledge and Technologyvol 11 pp 55ndash60 2015

[6] E G Lambert K I Minor J Gordon J B Wells and N LHogan ldquoExploring the Correlates of Perceived Job Dangerous-ness Among Correctional Staff at a Maximum Security PrisonrdquoCriminal Justice Policy Review vol 29 no 3 pp 215ndash239 2018

[7] J Shea and T Taylor ldquoUsing developmental evaluation asa system of organizational learning An example from SanFranciscordquo Evaluation and Program Planning vol 65 pp 84ndash93 2017

[8] W Tian W Yun and X Zhong ldquoResearch on EffectivenessEvaluation of Peoplersquos Air Defense Material Reserves SystemBased on Cloud Modelrdquo Computer Simulation vol 31 pp 15ndash19 2014

[9] X Cong and L Ma ldquoPerformance Evaluation of Public-Private Partnership Projects from the Perspective of EfficiencyEconomic Effectiveness and Equity A Study of ResidentialRenovation Projects in Chinardquo Sustainability vol 10 no 6 p1951 2018

[10] Y T Liu L Li and M Zhang ldquoEffectiveness evaluation ofinformation management system based on modified normalcloudmodelrdquoAppliedMechanics andMaterials vol 411-414 pp231ndash235 2013

[11] W Zhang and Y Chen ldquoStudy on evaluation of skills trainingeffectiveness in electric power corporationrdquo Applied Mechanicsand Materials vol 263-266 no 1 pp 3400ndash3404 2013

[12] H Liu Z LiW Song andQ Su ldquoFailureMode andEffect Anal-ysis Using Cloud Model Theory and PROMETHEE MethodrdquoIEEE Transactions on Reliability vol 66 no 4 pp 1058ndash10722017

[13] L Linlin and L Yunfei ldquoEffectiveness evaluation of commandand control system based on cloud modelrdquo System Engineeringand Electronics vol 40 no 04 pp 815ndash822 2018

[14] W Debin ldquoEffectiveness Evaluation of Military Communica-tions SystemBased on ANP and Cloud Modelrdquo Fire Control ampCommand Control vol 41 no 08 pp 118ndash124 2016

[15] G Jiao L Tianwei and Z Yun-hai ldquoComprehensive effective-ness evaluation of shipborne navigation equipmentbased onADC and MCGCrdquo Modern Electronics Technique vol 38 no08 pp 58ndash61 2015

Security and Communication Networks 9

[16] D Li andY DuArtificial Intelligence with Uncertainty NationalDefence Industry Press Beijing 2007

[17] W Xinzhou Fuzzy Spatial Information Processing WuhanUniversity Press Wuhan 2003

[18] S Hu D Li Y Liu and D Li ldquoMining weights of land eval-uation factors based on cloud model and correlation analysisrdquoGeomatics and Information Science of Wuhan University vol 31no 5 pp 423ndash427 2006

[19] Li Deyi ldquoLiu Changyu Study on the universality of thenormalCloudmodelrdquoEngineering Science vol 6 no 8 pp 28ndash34 2004

[20] D Li K Di D Li and X Shi ldquoMining association ruleswith linguistic cloud modelsrdquo in Research and Development inKnowledgeDiscovery andDataMining vol 1394ofLectureNotesin Computer Science pp 392-393 Springer Berlin HeidelbergBerlin Heidelberg 1998

[21] W Yingchao and J Hongwen ldquoA normal cloud model-basedstudy of grading prediction of rockburst intensityin deepunderground engineeringrdquoRock and Soil Mechanics vol 36 no4 pp 1189ndash1194 2015

[22] L Changyi L Deyi D Yi et al ldquoSome statistical analysisof thenormal cloud modelrdquo Information and Control vol 34 no 2pp 236ndash239 2005

[23] H Shiyuan L Deren L Yaolin et al ldquoDeterminationandintegration of subjective weights and objectiveweights of landgrading factorsrdquo Geomatics andInformation Science of WuhanUniversity vol 31 no 8 pp 695ndash699 2006

[24] Y Zhang J Yan P Jiang and N Yang ldquoNormal cloud modelbased evaluation of land resources ecological security in Hubeiprovincerdquo Nongye Gongcheng Xuebao vol 29 no 22 pp 252ndash258 2013

[25] Handbook onDynamic Security andPrison Intelligence UnitedNations New York USA 2013

[26] K Yin ldquoResearch on the Effectiveness Evaluation Model ofthe Prison Physical Protection System Based on Grey AnalyticHierarchy Processrdquo Security and Communication Networks vol2017 2017

[27] K Yin ldquoEffectiveness evaluation model research of the prisonphysical protection system in terms of grey analytic hierarchyprocessrdquo in Proceedings of the 2017 IEEE 17th InternationalConference on Communication Technology (ICCT) pp 1873ndash1879 Chengdu October 2017

[28] L Guizhi ldquoAnalysis of effectiveness evaluation index systemfor prison safety management systemrdquo Intelligent Processing andApplication vol 12 pp 42ndash47 2016

[29] S Xunfeng andW Fengwu ldquoPrison informatization and its rolein prison safety managementrdquo Communication amp InformationTechnology vol 7 pp 94ndash97 2014

[30] T L Saaty ldquoThere is no mathematical validity for using fuzzynumber crunching in the analytic hierarchy processrdquo Journal ofSystems Science and Systems Engineering no 4 2006

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom

8 Security and Communication Networks

Table 5 Continued

Second Level Index

WeightVector inTotal

Ordering

Cloud Model EvaluationResults

BackupManagementCapability

00121 (390911035801343) Low Risk

False Positive Rateand False NegativeRate

00632 (336360662901229) Low Risk

1

09

08

07

06

05

04

03

02

01

0

Deg

ree o

f Mem

bers

hip

0 1 2 3 4 5 6 7 8 9 10

Assessed Value

Figure 2 Cloud graph for evaluating the risk level of the physicalprotection system

method based on the cloud modelThe research results showthat the cloud model for effectiveness evaluation we con-structed can greatly reduce the influence of subjective factorsin the risk evaluation for the physical protection system ofa high security system through the setting calculation andanalysis of relevant parameters and it is very accurate andpractically useful especially when it is used in evaluationtogether with the fuzziness and randomness of qualitativelinguistic concepts To be sure due to the limitations of theconditions further discussion and research are needed in thecomparative study on different cloud models

Data Availability

The data used to support the findings of this study areincluded within the article

Conflicts of Interest

The author declares that they have no conflicts of interest

Acknowledgments

This work is funded by the project 2018SJA0576 of philoso-phy and social science research in colleges and universitiesin Jiangsu Province the pre-research project LGY201701

of Nanjing Forest Police College and the FundamentalResearch Funds for the Central Universities under grantof LGZD201602 Dr Ke Yin who graduated from NanjingUniversity of Technology and majored in safety engineeringand risk control is now a senior lecturer at Nanjing ForestPolice College

References

[1] F Lawrence ldquoEffective Physical Securityrdquo Elsevier Science ampTechnology p 67 2016

[2] X Jie ldquoApplication and demand of prison safety precautionsystem constructionrdquo Industry Applications vol 02 pp 32ndash352015

[3] Y Zuo ldquoApplication analysis of prison security mode based onbig datardquo Industry Applications vol 2 pp 44ndash48 2015

[4] X Xiaogang ldquoOn constructing prevention mode of securityfrom the trend of the prison situation perspectiverdquo Journal ofAnhui Vocational College of Police Officers vol 11 pp 9ndash13 2012

[5] W Hai-wei ldquoDesign of Comprehensive Security System Basedon Prison Applicationrdquo Computer Knowledge and Technologyvol 11 pp 55ndash60 2015

[6] E G Lambert K I Minor J Gordon J B Wells and N LHogan ldquoExploring the Correlates of Perceived Job Dangerous-ness Among Correctional Staff at a Maximum Security PrisonrdquoCriminal Justice Policy Review vol 29 no 3 pp 215ndash239 2018

[7] J Shea and T Taylor ldquoUsing developmental evaluation asa system of organizational learning An example from SanFranciscordquo Evaluation and Program Planning vol 65 pp 84ndash93 2017

[8] W Tian W Yun and X Zhong ldquoResearch on EffectivenessEvaluation of Peoplersquos Air Defense Material Reserves SystemBased on Cloud Modelrdquo Computer Simulation vol 31 pp 15ndash19 2014

[9] X Cong and L Ma ldquoPerformance Evaluation of Public-Private Partnership Projects from the Perspective of EfficiencyEconomic Effectiveness and Equity A Study of ResidentialRenovation Projects in Chinardquo Sustainability vol 10 no 6 p1951 2018

[10] Y T Liu L Li and M Zhang ldquoEffectiveness evaluation ofinformation management system based on modified normalcloudmodelrdquoAppliedMechanics andMaterials vol 411-414 pp231ndash235 2013

[11] W Zhang and Y Chen ldquoStudy on evaluation of skills trainingeffectiveness in electric power corporationrdquo Applied Mechanicsand Materials vol 263-266 no 1 pp 3400ndash3404 2013

[12] H Liu Z LiW Song andQ Su ldquoFailureMode andEffect Anal-ysis Using Cloud Model Theory and PROMETHEE MethodrdquoIEEE Transactions on Reliability vol 66 no 4 pp 1058ndash10722017

[13] L Linlin and L Yunfei ldquoEffectiveness evaluation of commandand control system based on cloud modelrdquo System Engineeringand Electronics vol 40 no 04 pp 815ndash822 2018

[14] W Debin ldquoEffectiveness Evaluation of Military Communica-tions SystemBased on ANP and Cloud Modelrdquo Fire Control ampCommand Control vol 41 no 08 pp 118ndash124 2016

[15] G Jiao L Tianwei and Z Yun-hai ldquoComprehensive effective-ness evaluation of shipborne navigation equipmentbased onADC and MCGCrdquo Modern Electronics Technique vol 38 no08 pp 58ndash61 2015

Security and Communication Networks 9

[16] D Li andY DuArtificial Intelligence with Uncertainty NationalDefence Industry Press Beijing 2007

[17] W Xinzhou Fuzzy Spatial Information Processing WuhanUniversity Press Wuhan 2003

[18] S Hu D Li Y Liu and D Li ldquoMining weights of land eval-uation factors based on cloud model and correlation analysisrdquoGeomatics and Information Science of Wuhan University vol 31no 5 pp 423ndash427 2006

[19] Li Deyi ldquoLiu Changyu Study on the universality of thenormalCloudmodelrdquoEngineering Science vol 6 no 8 pp 28ndash34 2004

[20] D Li K Di D Li and X Shi ldquoMining association ruleswith linguistic cloud modelsrdquo in Research and Development inKnowledgeDiscovery andDataMining vol 1394ofLectureNotesin Computer Science pp 392-393 Springer Berlin HeidelbergBerlin Heidelberg 1998

[21] W Yingchao and J Hongwen ldquoA normal cloud model-basedstudy of grading prediction of rockburst intensityin deepunderground engineeringrdquoRock and Soil Mechanics vol 36 no4 pp 1189ndash1194 2015

[22] L Changyi L Deyi D Yi et al ldquoSome statistical analysisof thenormal cloud modelrdquo Information and Control vol 34 no 2pp 236ndash239 2005

[23] H Shiyuan L Deren L Yaolin et al ldquoDeterminationandintegration of subjective weights and objectiveweights of landgrading factorsrdquo Geomatics andInformation Science of WuhanUniversity vol 31 no 8 pp 695ndash699 2006

[24] Y Zhang J Yan P Jiang and N Yang ldquoNormal cloud modelbased evaluation of land resources ecological security in Hubeiprovincerdquo Nongye Gongcheng Xuebao vol 29 no 22 pp 252ndash258 2013

[25] Handbook onDynamic Security andPrison Intelligence UnitedNations New York USA 2013

[26] K Yin ldquoResearch on the Effectiveness Evaluation Model ofthe Prison Physical Protection System Based on Grey AnalyticHierarchy Processrdquo Security and Communication Networks vol2017 2017

[27] K Yin ldquoEffectiveness evaluation model research of the prisonphysical protection system in terms of grey analytic hierarchyprocessrdquo in Proceedings of the 2017 IEEE 17th InternationalConference on Communication Technology (ICCT) pp 1873ndash1879 Chengdu October 2017

[28] L Guizhi ldquoAnalysis of effectiveness evaluation index systemfor prison safety management systemrdquo Intelligent Processing andApplication vol 12 pp 42ndash47 2016

[29] S Xunfeng andW Fengwu ldquoPrison informatization and its rolein prison safety managementrdquo Communication amp InformationTechnology vol 7 pp 94ndash97 2014

[30] T L Saaty ldquoThere is no mathematical validity for using fuzzynumber crunching in the analytic hierarchy processrdquo Journal ofSystems Science and Systems Engineering no 4 2006

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom

Security and Communication Networks 9

[16] D Li andY DuArtificial Intelligence with Uncertainty NationalDefence Industry Press Beijing 2007

[17] W Xinzhou Fuzzy Spatial Information Processing WuhanUniversity Press Wuhan 2003

[18] S Hu D Li Y Liu and D Li ldquoMining weights of land eval-uation factors based on cloud model and correlation analysisrdquoGeomatics and Information Science of Wuhan University vol 31no 5 pp 423ndash427 2006

[19] Li Deyi ldquoLiu Changyu Study on the universality of thenormalCloudmodelrdquoEngineering Science vol 6 no 8 pp 28ndash34 2004

[20] D Li K Di D Li and X Shi ldquoMining association ruleswith linguistic cloud modelsrdquo in Research and Development inKnowledgeDiscovery andDataMining vol 1394ofLectureNotesin Computer Science pp 392-393 Springer Berlin HeidelbergBerlin Heidelberg 1998

[21] W Yingchao and J Hongwen ldquoA normal cloud model-basedstudy of grading prediction of rockburst intensityin deepunderground engineeringrdquoRock and Soil Mechanics vol 36 no4 pp 1189ndash1194 2015

[22] L Changyi L Deyi D Yi et al ldquoSome statistical analysisof thenormal cloud modelrdquo Information and Control vol 34 no 2pp 236ndash239 2005

[23] H Shiyuan L Deren L Yaolin et al ldquoDeterminationandintegration of subjective weights and objectiveweights of landgrading factorsrdquo Geomatics andInformation Science of WuhanUniversity vol 31 no 8 pp 695ndash699 2006

[24] Y Zhang J Yan P Jiang and N Yang ldquoNormal cloud modelbased evaluation of land resources ecological security in Hubeiprovincerdquo Nongye Gongcheng Xuebao vol 29 no 22 pp 252ndash258 2013

[25] Handbook onDynamic Security andPrison Intelligence UnitedNations New York USA 2013

[26] K Yin ldquoResearch on the Effectiveness Evaluation Model ofthe Prison Physical Protection System Based on Grey AnalyticHierarchy Processrdquo Security and Communication Networks vol2017 2017

[27] K Yin ldquoEffectiveness evaluation model research of the prisonphysical protection system in terms of grey analytic hierarchyprocessrdquo in Proceedings of the 2017 IEEE 17th InternationalConference on Communication Technology (ICCT) pp 1873ndash1879 Chengdu October 2017

[28] L Guizhi ldquoAnalysis of effectiveness evaluation index systemfor prison safety management systemrdquo Intelligent Processing andApplication vol 12 pp 42ndash47 2016

[29] S Xunfeng andW Fengwu ldquoPrison informatization and its rolein prison safety managementrdquo Communication amp InformationTechnology vol 7 pp 94ndash97 2014

[30] T L Saaty ldquoThere is no mathematical validity for using fuzzynumber crunching in the analytic hierarchy processrdquo Journal ofSystems Science and Systems Engineering no 4 2006

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom

International Journal of

AerospaceEngineeringHindawiwwwhindawicom Volume 2018

RoboticsJournal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Shock and Vibration

Hindawiwwwhindawicom Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwwwhindawicom

Volume 2018

Hindawi Publishing Corporation httpwwwhindawicom Volume 2013Hindawiwwwhindawicom

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwwwhindawicom Volume 2018

International Journal of

RotatingMachinery

Hindawiwwwhindawicom Volume 2018

Modelling ampSimulationin EngineeringHindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwwwhindawicom Volume 2018

Hindawiwwwhindawicom Volume 2018

Navigation and Observation

International Journal of

Hindawi

wwwhindawicom Volume 2018

Advances in

Multimedia

Submit your manuscripts atwwwhindawicom