نتایج جستجو برای: fuzzy identity

تعداد نتایج: 208357  

Journal: :Mathematics 2022

The debate on national identity has been receiving more attention from academics, social planners, and the public in recent years. This study aims to analyse citizens’ different typologies using data International Social Survey Program (ISSP) two waves: 2003 2013. is based 10 countries for which dimensions of construct are first examined through multi-group confirmatory factor analysis (MGCFA)....

2009
Hunny Mehrotra Dakshina Ranjan Kisku V. Bhawani Radhika Banshidhar Majhi Phalguni Gupta

This paper proposes an efficient technique for partitioning large biometric database during identification. In this technique feature vector which comprises of global and local descriptors extracted from offline signature are used by fuzzy clustering technique to partition the database. As biometric features posses no natural order of sorting, thus it is difficult to index them alphabetically o...

2008
Chethan KRISHNAN

M2-branes can blow up into BPS funnels that end on calibrated intersections of M5-branes. In this quick note, we make the observation that the constraints required for the consistency of these solutions are automatic in Bagger-Lambert-Gustavsson (BLG) theory, thanks to the fundamental identity and the supersymmetry of the calibration. We also explain how the previous ad hoc fuzzy funnel constru...

Journal: :JSW 2015
Yingbing Yu

Many organizations face the critical threat of inside attacks from masqueraders who can be either disgruntled employees or external hackers by exploit legitimate user identity to manipulate the system. Intrusion detection systems (IDSs) are deployed to build the normal user profiles and then detect the possible deviation from the past behavior patterns indicating a possible illegal access. In t...

2007
José Rouco Marta Penas Manuel G. Penedo Marcos Ortega Carmen Alonso-Montes

Perceptual grouping is an important part of many computer vision systems. When inferring a new grouping from the primitive features there is always an uncertainty degree on this detection, that might be useful in further reasonings. In this paper, we present a fuzzy logic based system for the computation of the certainties assigned to pairwise line segment relations and introduce its applicatio...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه گیلان - دانشکده فنی و مهندسی 1389

در این پروژه برای اولین بار بهینه سازی بهنگام توابع عضویت فازی در حین عملکرد موتور dc انجام گرفته است. این بهینه سازی توسط الگوریتم فیلترکالمن توسعه یافته و بر اساس خطای لحظه ای سرعت، صورت گرفته است. بطوریکه کارایی کنترلر در کنترل سرعت موتور افزایش می یابد. درواقع فیلتر کالمن شکل ایده آل و مناسب توابع عضویت کنترل کننده fuzzy pid را برای گام بعدی از زمان، براساس حالت کنونی، خطای سرعت کنونی و اطل...

Journal: :Comput. J. 2015
Stavros N. Shiaeles Maria Papadaki

DDoS attacks represent a significant threat for companies, affecting them on a regular basis, as reported in the 2013 Information Security Breaches Survey. The most common target is web services, the downtime of which could lead to significant monetary costs and loss of reputation. IP Spoofing is often used in DDoS attacks not only to protect the identity of offending bots but also to overcome ...

2007
Daesung Moon Sungju Lee Seunghwan Jung Yongwha Chung Miae Park Okyeon Yi

Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non–invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In...

Journal: :Neurocomputing 2014
Fernando Bordignon Fernando A. C. Gomide

Learning from data streams is a contemporary and challenging issue due to the increasing rate of the size and temporal availability of data, turning traditional learning methods impracticable. This work addresses a structure and introduces a learning approach to train uninorm-based hybrid neural networks using extreme learning concepts. Uninorms bring flexibility and generality to fuzzy neuron ...

2011
Maher Aburrous M. A. Hossain Fadi Thabatah Keshav Dahal

Detecting and identifying e-banking Phishing websites is really a complex and dynamic problem involving many factors and criteria. Because of the subjective considerations and the ambiguities involved in the detection, Fuzzy Data Mining Techniques can be an effective tool in assessing and identifying e-banking phishing websites since it offers a more natural way of dealing with quality factors ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید