نتایج جستجو برای: adversary fuzzy structure
تعداد نتایج: 1657955 فیلتر نتایج به سال:
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed: (1) biometric data are not uniformly distributed; and (2) they are not exactly reproducible. Recent work, most notably that of Dodis, Reyzin, and Smith, has shown how these obstacles may be overcome by allowing some auxiliary public informati...
migration of virtual machine (vm) is a critical challenge in cloud computing. the process to move vms or applications from one physical machine (pm) to another is known as vm migration. in vm migration several issues should be considered. one of the major issues in vm migration problem is selecting an appropriate pm as a destination for a migrating vm. to face this issue, several approaches are...
The emergence of body area networks (BANs) has paved the way for real-time sensing human biometrics in addition to remote control smart wireless medical devices, which turn are beginning revolutionize healthcare industry. However, due their limited power and computational capabilities, they vulnerable a myriad security attacks. To secure BAN sensors against these threats processor-intensive cry...
Communication delay occurs in electric power grid for various reasons, thus affects the performance of the control systems and can cause power loss. This paper analyzes the causes and effects of such communication delays in electric grid system. For the analysis, a simulated power network consisting of several generators is considered, where braking resistors (BR) are used for transient stabili...
The fuzzy commitment scheme is a cryptographic primitive that can be used to protect biometric templates. If multiple records extracted from the same biometric characteristic have been intercepted, their correspondence can be examined, i.e., cross-matching, via the decodability attack. As a countermeasure, Kelkboom et al. proposed to apply a public but record-specific permutation to the feature...
We study the structure of partially ordered monoids generated by certain operators on families of fuzzy languages. These operators are induced by simple, well-known operations on fuzzy languages, like fuzzy homomorphism, fuzzy finite substitution and intersection with regular fuzzy languages. The structure of these monoids provides better insight in the (in)dependency of closure properties of s...
Deriving the analytical structure of fuzzy controllers is very important as it creates a solid foundation for better understanding, insightful analysis, and more e1ective design of fuzzy control systems. We previously developed a technique for deriving the analytical structure of the fuzzy controllers that use Zadeh fuzzy AND operator and the symmetric, identical trapezoidal or triangular input...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید