Filters








22 Hits in 4.6 sec

Performance Evaluation of Password Authentication using Associative Neural Memory Models

P.E.S.N Krishna Prasasd
2012 International Journal of Advanced Information Technology  
(BPNN),Hopfield Neural Network(HPNN),Bidirectional Associative Memories(BAM),Brain-State-in-a Box(BSB).  ...  They are many ways of providing security to user resources. Password authentication is a very important system security procedure to secure user resources.  ...  ACKNOWLEDGEMENTS The authors would like to thank everyone, whoever remained a great source of help and inspirations in this humble presentation.  ... 
doi:10.5121/ijait.2012.2107 fatcat:mjetdiyuk5fahfapj7jotlpmz4

A survey of biometric approaches of authentication

Nuhu Yusuf, Kamalu Abdullahi Marafa, Kamila Ladan Shehu, Hussaini Mamman, Mustapha Maidawa
2020 International Journal of Advanced Computer Research  
Bauchi for their support and encouragement.  ...  Conflicts of interest The authors have no conflicts of interest to declare. References  ...  The Hopfield neural network with fuzzy logic can provide better accuracy for authentication compared with some of the graphical password's techniques.  ... 
doi:10.19101/ijacr.2019.940152 fatcat:ioj5hhluljaxxmtmicxkd733bq

AI-Assisted Authentication: State of the Art, Taxonomy and Future Roadmap [article]

Guangyi Zhu, Yasir Al-Qaraghuli
2022 arXiv   pre-print
With the emerging AI-assisted authentication schemes, our comprehensive survey provides an overall understanding on a high level, which paves the way for future research in this area.  ...  In this paper, we focus on the applications of artificial intelligence in authentication, which is used in a wide range of scenarios including facial recognition to access buildings, keystroke dynamics  ...  Similarly, A Hopfield Neural Network with fuzzy logic authentication has been come up in 2018. [101] Researchers added the fuzzy logic feature to improve the accuracy of previous work.  ... 
arXiv:2204.12492v1 fatcat:vdeuhy63cvawjdhclricvkq42q

Applications and Evaluations of Bio-Inspired approaches in Cloud Security: A Review

Md Manjurul Ahsan, Kishor Datta Gupta, Abhijit Kumar Nag, Subash Pouydal, Abbas Z. Kouzani, M A Parvez Mahmud
2020 IEEE Access  
Among those, bio-inspired algorithms such as Evolutionary, Swarm, Immune, and Neural algorithms are the most prominent ones which are developed based on nature's ecosystems.  ...  Many of the challenges associated with cloud computing can be specified as network load, security intrusion, authentication, biometric identification, and information leakage.  ...  developed a Genetic tree-based rule induction for network ID systems; Deshai et al. (2016) [90] introduced a Fuzzy Logic-based algorithm, known as Fuzzy-GA ID.  ... 
doi:10.1109/access.2020.3027841 fatcat:f4ufhhyuivfinjraxe2whjdo4a

Biometric Authentication and Identification Using Keystroke Dynamics: A Survey

Salil Partha Banerjee, Damon Woodard
2012 Journal of Pattern Recognition Research  
We also discuss the data acquisition methods, approaches and the performance of the methods used by researchers on standard computer keyboards.  ...  formats, establishment of protocols for evaluating methods, and resolution of privacy issues.  ...  One of the most popular methods in supervised learning is called the backpropagation. One of the popular methods in unsupervised learning is the Hopfield neural network.  ... 
doi:10.13176/11.427 fatcat:6dvdrraht5fmdeoausf4xqnc44

A Holistic Review of Soft Computing Techniques

Philip O. Omolaye
2017 Applied and Computational Mathematics  
formulated to give an idea on how these computing techniques are applied to create intelligent agents to solve a variety of problems.  ...  In this research paper, the authors reviewed journals related to the subject matter with the aim of striking a convincing balance between a system that is capable of tolerance to uncertainty, imprecision  ...  A Novel Approach For Password Authentication Using Bidirectional Associative Memory, Advanced Computing: An International Journal (ACIJ), Vol.2, No.6. [33] Chandra, P., Udayan, G. and Apoorvi, S. (2015  ... 
doi:10.11648/j.acm.20170602.15 fatcat:pfmgraicunfijho23usu3pfn3a

Intrusion Detection System and Artificial Intelligent [chapter]

Khattab M.
2011 Intrusion Detection Systems  
Knowledge of fuzzy logic is one of the theories through which they could build such systems. We can say in general that fuzzy logic as the fuzzy logic and fuzzy set.  ...  Network-based IDS can also be installed on active network elements, for example on router.  ...  results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions  ... 
doi:10.5772/15271 fatcat:4axho5p2ebhy5kwonoh74byrqi

A novel countermeasure technique to protect WSN against denial-of-sleep attacks using firefly and Hopfield neural network (HNN) algorithms

Reza Fotohi, Somayyeh Firoozi Bari
2020 Journal of Supercomputing  
In this paper, a hybrid approach is proposed based on mobile sink, firefly algorithm based on leach, and Hopfield neural network (WSN-FAHN).  ...  In addition, Hopfield neural network detects the direction route of the sink movement to send data of CH.  ...  The proposed WSN-FAHN approach In this section, we propose a DoSA-immune schema by applying the Firefly, Hopfield Neural Networks (HNN), and RSA optimization.  ... 
doi:10.1007/s11227-019-03131-x fatcat:robyd7n44jcntkmqp7h7sdhgwm

Deep Learning in Mobile and Wireless Networking: A Survey

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 IEEE Communications Surveys and Tutorials  
Subsequently, we provide an encyclopedic review of mobile and wireless networking research based on deep learning, which we categorize by different domains.  ...  The rapid uptake of mobile devices and the rising popularity of mobile applications and services pose unprecedented demands on mobile and wireless networking infrastructure.  ...  In particular, the fuzzy logic system is employed for adjusting the weight of traditional centroids, while the ELM is used for optimization for the localization precision.  ... 
doi:10.1109/comst.2019.2904897 fatcat:xmmrndjbsfdetpa5ef5e3v4xda

Deep Learning in Mobile and Wireless Networking: A Survey [article]

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 arXiv   pre-print
Subsequently, we provide an encyclopedic review of mobile and wireless networking research based on deep learning, which we categorize by different domains.  ...  The rapid uptake of mobile devices and the rising popularity of mobile applications and services pose unprecedented demands on mobile and wireless networking infrastructure.  ...  In particular, the fuzzy logic system is employed for adjusting the weight of traditional centroids, while the ELM is used for optimization for the localization precision.  ... 
arXiv:1803.04311v3 fatcat:awuvyviarvbr5kd5ilqndpfsde

Intrusion Detection Using Soft Computing Techniques

Koushal Kumar, Simranjit Singh
unpublished
The scope of this chapter will encompass core techniques of soft computing including artificial neural networks, Fuzzy Logic Genetic algorithms and hybridization of these approaches.  ...  The findings of this chapter should provide useful insights into the current IDS literature and be a good source for anyone who is interested in the application of soft computing approaches to IDSs.  ...  If a password is weak and is compromised, user authentication cannot prevent unauthorized use.  ... 
fatcat:bj4sfcxrg5dgpg67dy2gj64vnq

Security improvements Zone Routing Protocol in Mobile Ad Hoc Network

Mahsa Seyyedtaj, Mohammad Ali Jabraeil Jamali
2014 International Journal of Computer Applications Technology and Research  
A hybrid routing protocol should use a mixture of both proactive and reactive e approaches. Hence, in the recent years, several hybrid routing protocols are proposed like ZRP [5].  ...  The attractive features of ad-hoc networks such as dynamic topology, absence of central authorities and distributed cooperation hold the promise of revolutionizing the ad-hoc networks across a range of  ...  The principal constituents of soft computing techniques are Fuzzy Logic (FL), Artificial Neural Networks (ANNs), Probabilistic Reasoning (PR), and Genetic Algorithms (GAs) [4] .  ... 
doi:10.7753/ijcatr0309.1001 fatcat:n7yb26a6zbgwnpvfmvka3cnpoq

Super predictive-transform residual vector quantization

E.H. Feria, S.A. Rizvi
Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348)  
User Authenticattion Mechanism [4L]: Authentication basics, Passwords, Authentication tokens, Certificate based & Biometric authentication, Firewall .  ...  Fuzzy Logic: Introduction to Fuzzy Logic, Classical and Fuzzy Sets: Overview of Classical Sets, Membership Function, Fuzzy rule generation.  ... 
doi:10.1109/icip.1999.821654 dblp:conf/icip/FeriaR99 fatcat:dnp5iyo6q5befi4s53kmlazqxu

RESERVOIR FORECASTING NEURO-FUZZY NETWORK AND ITS LEARNING

Yevgeniy Bodyanskiy, Oleksii Tyshchenko, Iryna Pliss
2013 International Journal "Information Theories and Applications   unpublished
In this paper a reservoir is proposed to be built using neo-fuzzy neurons which means that Reservoir Computing and paradigms and fuzzy logic are combined.  ...  The idea of Reservoir Computing has become so popular recently due to its computational efficiency and the fact that just only a linear output layer must be taught.  ...  Acknowledgements The paper is published with financial support by the project ITHEA XXI of the Institute of Information Theories and Applications FOI ITHEA (www.ithea.org) and Association of Developers  ... 
fatcat:4cxbnahbebek7ilgtj3eqjm7eu

Sofia, Institute of Information Theories and Applications FOI ITHEA-2007 15 th Anniversary of the Association of Developers and Users of Intelligent Systems

Kr Markov, Ed
2007 Proceedings of the Fifth International Conference "Information Research and Applications" i.TECH   unpublished
The aim of the conference is to be one more possibility for contacts for scientists.  ...  15 th Anniversary of the Association of Developers and Users of Intelligent Systems (Ukraine); • 10 th Anniversary of the Association for Development of the Information Society (Bulgaria).  ...  We propose a strategy for developing language independent machine emotion recognition, related to the identification of language independent speech features and to the use of additional information from  ... 
fatcat:4l4e2z5dongnrfa4lsggah64bu
« Previous Showing results 1 — 15 out of 22 results