نتایج جستجو برای: adversary fuzzy structure
تعداد نتایج: 1657955 فیلتر نتایج به سال:
In this paper, we dene the concepts of compatibility between twofuzzy subsets on Q, the set of states of a max- min general fuzzy automatonand transitivity in a max-min general fuzzy automaton. We then construct auniform structure on Q, and dene a topology on it. We also dene the conceptof semi-uniform structures on a nonempty set X and construct a semi-uniformstructure on the set of states of ...
The theory of distributed computing, lagging in its development behind practice, has been biased in its modelling by employing mechanisms within the model mimicking reality. Reality means, processors can fail. But theory is about predicting consequences of reality, hence if we capture reality by “artificial models,” but those nevertheless make analysis simpler, we should pursue the artificial m...
The main problem in constructing fuzzy systems consists on finding an initial structure for it. The structure of fuzzy systems is composed of the number of fuzzy sets partitioning each variable and their distribution in the universe of discourse. This paper proposes the use of the autonomous-mountain clustering method to identify this structure for applications in fuzzy systems modeling. To inv...
in this paper we extend the notion of degrees of membership and non-membership of intuitionistic fuzzy sets to lattices and introduce a residuated lattice with appropriate operations to serve as semantics of intuitionistic fuzzy logic. it would be a step forward to find an algebraic counterpart for intuitionistic fuzzy logic. we give the main properties of the operations defined and prove som...
In this paper, we will present a cryptanalysis of CRUSH hash structure. Surprisingly, our attack could find pre-image for any desired length of internal message. Time complexity of this attack is completely negligible. We will show that the time complexity of finding a pre-image of any length is O(1). In this attack, an adversary could freely find a pre-image with the length of his own choice f...
The fuzzy vault scheme has recently become popular approaches to biometric template protection. Since the original scheme has been designed to work with unordered biometric features, such a scheme cannot effectively utilize order information. We present in this paper a new fuzzy vault scheme that can effectively utilize the ordered characteristics of biometric features. In this scheme, we devel...
In wireless sensor networks (WSNs), sensor nodes have stringent energy and computation requirements. Since they are left unattended, an adversary can generate false report attacks through compromised nodes. This would result in an increased number of verifications to filter these reports, causing waste of scarce energy resources. In this paper, we propose energy-efficient path configuration met...
This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonymously authenticate, can be severely limited if their use requires possession of the credential owner’s biometric. We target to provide strong security guarantees using minimal trust assumptions, namely that a fresh re...
K e y w o r d s C o m p e n s a t o r y , Fuzzy similarity measure, Inverted wedge system, Backpropagation algorithm. 1. I N T R O D U C T I O N Recently, the neural fuzzy approach to system modeling has become a popular research topic [110]. Moreover, the neural fuzzy method possesses the advantages of both the pure neural and the fuzzy methods; it brings the low-level learning and computation...
Fuzzy modeling generally comprises structure identification and parameter identification. The former determines the structure of a rule-base, whereas the latter determines the contents of each rule. Applying neural networks or genetic algorithms to identify the parameter sets and structures of a fuzzy system is increasingly popular owing to their ability to learn and adapt. However, most conven...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید