Filters








13,570 Hits in 3.8 sec

A fuzzy control system for fitness service based on genetic algorithm during COVID-19 pandemic

Zhihui He, Xiaofeng Li, Xiaolong Li
<span title="2020-12-04">2020</span> <i title="IOS Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5232pusig5eapbukawp5py2bk4" style="color: black;">Journal of Intelligent &amp; Fuzzy Systems</a> </i> &nbsp;
In addition, in order to expand the scope of application of the exercise intensity control model, the service-oriented transformation is carried out to enable it to provide fitness content combinations  ...  In this paper, based on genetic algorithm, a fuzzy control system is proposed to dynamically adjust the exercise ability of the bodybuilders under the comprehensive consideration of parameters.  ...  Li / A fuzzy control system for fitness service fluctuates with the adjustment of the load, and its value is between 10.13, which is too small; The measured subjective value RPE also fluctuates, with a  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jifs-189277">doi:10.3233/jifs-189277</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bg4hq3uwd5gellao2jdselypuq">fatcat:bg4hq3uwd5gellao2jdselypuq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201213215623/https://content.iospress.com/download/journal-of-intelligent-and-fuzzy-systems/ifs189277?id=journal-of-intelligent-and-fuzzy-systems%2Fifs189277" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7c/8b/7c8b0e3a50c5716aa25cc3810d0007a33a449124.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3233/jifs-189277"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Multi Level Integrity Management in LTE/LTE-A Networks

Ouafae Kasmi, Amine Baina, Mostafa Bellafkih
<span title="">2017</span> <i title="ASTES Journal"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/5z5fhzfgard2vod5er2hdyuq54" style="color: black;">Advances in Science, Technology and Engineering Systems</a> </i> &nbsp;
This article aims to propose an incorporation a layer above the quality of service (QoS) controller based on Fuzzy Logic to determine the guaranteed levels of QoS and levels of criticality.  ...  better results and has more efficient in the aspect of chance value for levels of QoS and levels of criticality.  ...  Paper [13] , proposes the verification of SLA using eTOM process [15] for monitoring services.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.25046/aj020384">doi:10.25046/aj020384</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/uz2uaowq5nfhrghxdrpicpngy4">fatcat:uz2uaowq5nfhrghxdrpicpngy4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180722151526/https://www.astesj.com/publications/ASTESJ_020384.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/69/7a/697a509afa026fd513208bb995a0716d54385532.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.25046/aj020384"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Energy Efficient Operation Cycle Determination Scheme of Fuzzy Based IHA in Air Purification IoT

<span title="2020-07-30">2020</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3sfifsouvjgadp4gfj54u3z2ku" style="color: black;">International journal of recent technology and engineering</a> </i> &nbsp;
In addition to the existing fuzzy-based IHA sets, the security limit changes according to the network situation using fuzzy logic and adjusts the security and energy.  ...  In this paper, we introduce a Wireless Sensor Networks (WSNs)-based Internet of Things (IoT) air purification system.  ...  input values of the fuzzy system.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijrte.b4089.079220">doi:10.35940/ijrte.b4089.079220</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bygfbpfd3rgwpgxu5p4tpw5p6e">fatcat:bygfbpfd3rgwpgxu5p4tpw5p6e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200813050200/https://www.ijrte.org/wp-content/uploads/papers/v9i2/B4089079220.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijrte.b4089.079220"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

An Enhanced Detection and Energy-Efficient En-Route Filtering Scheme in Wireless Sensor Networks

Muhammad K.Shahzad
<span title="2020-07-07">2020</span> <i title="Zenodo"> Zenodo </i> &nbsp;
authentication codes (MACs) in a report to evaluate the fitness of a node to be a verification node.  ...  Wireless sensor networks (WSNs), due to their small size, low cost, and untethered communication over a short-range, have great potential for applications and services.  ...  The fuzzy system output value is called the fitness value used to assign a node as verification role. If the fitness value is greater than threshold ( ) node can be verification node.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3933319">doi:10.5281/zenodo.3933319</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6lknnimirjcgncl7l5dkdognxe">fatcat:6lknnimirjcgncl7l5dkdognxe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200716150825/https://zenodo.org/record/3933320/files/3315ieij02.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/1c/80/1c8013c2fb00d9ee9234f5142a0aabd57efe36ff.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3933319"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Novel Algorithm for V2v and V2i Security by Fuzzy Logic Decision in Vanet

<span title="2019-10-10">2019</span> <i title="Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/cj3bm7tgcffurfop7xzswxuks4" style="color: black;">VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE</a> </i> &nbsp;
Hence to realize the highest potential of VANET, the network should be free from attackers, there by all the information exchanged in the network must be reliable should be originated from authenticated  ...  However, Due to the wireless nature of communication in VANETs, it is also prone to various security attacks which are originally present in wireless networks.  ...  RELATED WORK In a short time, a large number of vehicles arrive at in a network and realize the denial of service attack based on computations required more time for verification of vehicles and will lead  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.l3178.1081219">doi:10.35940/ijitee.l3178.1081219</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/a56kzsp56ba4tirorbav5qcdn4">fatcat:a56kzsp56ba4tirorbav5qcdn4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220308075612/https://www.ijitee.org/wp-content/uploads/papers/v8i12/L31781081219.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/37/b9/37b967086a83f617b254af8f45b869c4159c03d8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.35940/ijitee.l3178.1081219"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

A Fuzzy Implementation of Bio metrics With Five Factor Authentication System For Secured Banking

S. Hemamalini, M. L. Alphin Ezhil Manuel
<span title="">2012</span> <i title="Institute for Project Management Pvt. Ltd"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jm3ap4zp2ne7npciuwyd22yhca" style="color: black;">International Journal of Smart Sensor and Adhoc Network.</a> </i> &nbsp;
Remote authentication is the most commonly used method to determine the identity of a remote client.Secure and efficient authentication scheme has been a very important issue with the development of networking  ...  In a Generic Framework for Authentication, preserving security and privacy in distributed systems provide three factors for authentication of clients.  ...  Related W Fuzzy logic Fuzzy logic is a form of many-valued logic, it deals with reasoning that is approximate rather than fixed and exact.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47893/ijssan.2012.1070">doi:10.47893/ijssan.2012.1070</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/boifsnsxz5cptneil5hzlxsefi">fatcat:boifsnsxz5cptneil5hzlxsefi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201025135513/https://www.interscience.in/cgi/viewcontent.cgi?article=1070&amp;context=ijssan" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8d/52/8d52d0834201914466151a62ed2dc1f52d740da8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.47893/ijssan.2012.1070"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Introduction to the Digital and ICT Enabled Services Minitrack

Tilo Bohmann, Ola Henfridsson, Tuure Tuunanen
<span title="">2016</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/zlnwsi4sefbkvlcgv2zcupjqum" style="color: black;">2016 49th Hawaii International Conference on System Sciences (HICSS)</a> </i> &nbsp;
More specifically, the first paper looks at fuzzy exploration in the area of mobile advisory services.  ...  and their temporo-spatial relevance, service ecosystems, social networking and location aware services, hedonic ICT enabled services and finally understanding social and cultural contexts of consumerization  ...  More specifically, the first paper looks at fuzzy exploration in the area of mobile advisory services.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/hicss.2016.155">doi:10.1109/hicss.2016.155</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/hicss/BohmannHT16.html">dblp:conf/hicss/BohmannHT16</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7zqz5uh645bb5ib5pli7l3mdqi">fatcat:7zqz5uh645bb5ib5pli7l3mdqi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180725131119/https://ieeexplore.ieee.org/ielx7/7426593/7427173/07427334.pdf?tp=&amp;arnumber=7427334&amp;isnumber=7427173" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/45/b5/45b583281728ebb838e79a5152e6aaac32bd676e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/hicss.2016.155"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

An Efficient Traffic Congestion Monitoring System on Internet of Vehicles

Duc-Binh Nguyen, Chyi-Ren Dow, Shiow-Fen Hwang
<span title="">2018</span> <i title="Hindawi Limited"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/6o4hgxplrbehxg4t53ub7zmfha" style="color: black;">Wireless Communications and Mobile Computing</a> </i> &nbsp;
service is also provided.  ...  Fuzzy rules-based local segment traffic congestion prediction was performed to determine the traffic congestion state.  ...  Acknowledgments The authors would like to acknowledge the Ministry of Science and Technology of the Republic of China for supporting this research under Contract no. 105-2221-E-035-050-MY2 and Taiwan Government  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/9136813">doi:10.1155/2018/9136813</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/flfponj7b5e67be3kpetrj6nqu">fatcat:flfponj7b5e67be3kpetrj6nqu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190225195338/http://pdfs.semanticscholar.org/7381/cc77d1c68d6c0aa9bcbe499b3b7684db2609.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/73/81/7381cc77d1c68d6c0aa9bcbe499b3b7684db2609.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1155/2018/9136813"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> hindawi.com </button> </a>

Web User Trust Evaluation: A Novel Approach Using Fuzzy Petri Net and Behavior Analysis

Zenan Wu, Liqin Tian, Yi Zhang, Zhigang Wang
<span title="2021-08-13">2021</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nzoj5rayr5hutlurimhzyjlory" style="color: black;">Symmetry</a> </i> &nbsp;
and the trust evaluation values of network users could be obtained more accurately.  ...  In terms of experimental verification, the experimental data came from a self-developed e-book management system.  ...  Conflicts of Interest: The authors declare that there is no conflict of interest regarding the publication of this paper.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/sym13081487">doi:10.3390/sym13081487</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2u65uj2xsfegjghb62slleob34">fatcat:2u65uj2xsfegjghb62slleob34</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210904214317/https://mdpi-res.com/d_attachment/symmetry/symmetry-13-01487/article_deploy/symmetry-13-01487-v2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cd/f4/cdf4e59bae980d68778d5637f36d181926e68594.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/sym13081487"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Page 5444 of Mathematical Reviews Vol. , Issue 88j [page]

<span title="">1988</span> <i title="American Mathematical Society"> <a target="_blank" rel="noopener" href="https://archive.org/details/pub_mathematical-reviews" style="color: black;">Mathematical Reviews </a> </i> &nbsp;
(1-PITT-C) Verification of a class of self-timed computational networks.  ...  computer systems with controlled services.  ... 
<span class="external-identifiers"> </span>
<a target="_blank" rel="noopener" href="https://archive.org/details/sim_mathematical-reviews_1988-10_88j/page/5444" title="read fulltext microfilm" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Archive [Microfilm] <div class="menu fulltext-thumbnail"> <img src="https://archive.org/serve/sim_mathematical-reviews_1988-10_88j/__ia_thumb.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>

Energy Efficient Fuzzy Adaptive Verification Node Selection-Based Path Determination in Wireless Sensor Networks

Muhammad Akram, Tae Cho
<span title="2017-10-10">2017</span> <i title="MDPI AG"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nzoj5rayr5hutlurimhzyjlory" style="color: black;">Symmetry</a> </i> &nbsp;
The report is dropped as soon as the detected false MACs number hits a pre-set threshold value. Attaching bogus MACs to legitimate reports results in denial of service (DoS).  ...  In [11] , we proposed the Fuzzy Adaptive Selection of Intermediate verification Nodes (referred to as FASIN hereafter), which adaptively selects verification nodes based on the attack situation, the energy  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/sym9100220">doi:10.3390/sym9100220</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/2qh2ujpn7vaa3b4s6cvr56wute">fatcat:2qh2ujpn7vaa3b4s6cvr56wute</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180728085850/https://res.mdpi.com/def502009d6844cd3df950c3070c572c6f38349940c4edc1799a595e1a747d9afe4ac2935f50989ea98dea6ee0c0ba4601ee356c2b710270d83d95ef38db82aabe9d57ec928e4827d8b10741ca0cbc942aec465c3ba9ae04e321be75f0f68594d99cca1cf8ba88bf2a7064fc53b1e42d52b0a4d73ab217ebe653518efe1c7ccea19ffcbc2577e87cf16b3c41cbb8a1f19885a1e56be2?filename=&amp;attachment=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7c/28/7c286240db936a7996fd2a4a252732cc44e60ac3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3390/sym9100220"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> mdpi.com </button> </a>

Research on symmetric fuzzy search of medical data outsourcing system under intelligent network

Huiqi Zhao, Qian Chen, Yinglong Wang, Minglei Shu
<span title="">2018</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/a5gjzjadkzbirdua4xdqipotp4" style="color: black;">EURASIP Journal on Wireless Communications and Networking</a> </i> &nbsp;
of fuzzy keyword and supports the verification of search results.  ...  Intelligent networks have developed rapidly in various fields of the world today.  ...  Funding The research is funded by the Natural Science Foundation of Shandong Province.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13638-018-1290-3">doi:10.1186/s13638-018-1290-3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rxqsqnjinzf3tlaqpv4q67zr7u">fatcat:rxqsqnjinzf3tlaqpv4q67zr7u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427152607/https://jwcn-eurasipjournals.springeropen.com/track/pdf/10.1186/s13638-018-1290-3" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b9/bc/b9bc8db7475ff930fed54f28f2f39fbf880366e6.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s13638-018-1290-3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

Context-based Authentication Service for The Mobile Office

Jiyoung Yang, Hyundong Lee, Shi-Kook Rhyoo, Mokdong Chung
<span title="2012-12-31">2012</span> <i title="Korea Multimedia Society"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qh6pwvxgsvfjtgydwmknbgobiy" style="color: black;">Journal of Korea Multimedia Society</a> </i> &nbsp;
Therefore, this paper proposes a context based authentication system which applies security level verification and uses fuzzy algorithm based on the importance of access authority control.  ...  Thus it cannot provide appropriate security service required by the user's proper contexts.  ...  service, thereby providing more appropriate security service.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9717/kmms.2012.15.12.1475">doi:10.9717/kmms.2012.15.12.1475</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/csuezwhaq5asbh2zdwm7ydmo4y">fatcat:csuezwhaq5asbh2zdwm7ydmo4y</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830011301/http://ocean.kisti.re.kr/downfile/volume/kmtd/MTMDCW/2012/v15n12/MTMDCW_2012_v15n12_1475.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/a9/a3/a9a3c6432f328e9ee7a7a0a0ed7abf0f95068ef8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.9717/kmms.2012.15.12.1475"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> Publisher / doi.org </button> </a>

Mobile agent-based cross-layer anomaly detection in smart home sensor networks using fuzzy logic

Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu
<span title="">2015</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lfjucyeexrd75hshl2cngz7doq" style="color: black;">IEEE transactions on consumer electronics</a> </i> &nbsp;
logic-based soft boundaries to characterize behavior of sensor nodes.  ...  study introduces a novel mobile agent-based cross-layer anomaly detection scheme, which takes into account stochastic variability in cross-layer data obtained from received data packets, and defines fuzzy  ...  The third component, namely, Rules Definition offers a service to define fuzzy rules. The GUI of the Configuration Panel is shown in Fig. 3 .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tce.2015.7150594">doi:10.1109/tce.2015.7150594</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kfygs33z4rfszb35he72e6qzeq">fatcat:kfygs33z4rfszb35he72e6qzeq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200507205953/https://research-repository.griffith.edu.au/bitstream/handle/10072/99255/MuthukkumarasamyPUB1262.pdf;jsessionid=4862952A88647805E7ACD1C85BC8B3F6?sequence=1" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/21/d2/21d2b007e7dc02c5d00ede802cadf5aa7512f04e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tce.2015.7150594"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing

Seyed Ahmad Soleymani, Abdul Hanan Abdullah, Mahdi Zareei, Mohammad Hossein Anisi, Cesar Vargas-Rosales, Muhammad Khurram Khan, Shidrokh Goudarzi
<span title="">2017</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/q7qi7j4ckfac7ehf3mjbso4hne" style="color: black;">IEEE Access</a> </i> &nbsp;
In this paper, a fuzzy trust model based on experience and plausibility is proposed to secure the vehicular network.  ...  In vehicular ad hoc networks (VANETs), trust establishment among vehicles is important to secure integrity and reliability of applications.  ...  Algorithm 4 4 Evaluate the Plausibility Level of Sender Input (Msg) LVoD = Location Verification of SENDER (Distance) LVoT = Location Verification of SENDER( Time ) PLAUS Level = Fuzzy-DM (fuzzify(LVoD  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2017.2733225">doi:10.1109/access.2017.2733225</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/7kbh3pfo55dr7dgzeianvwxuae">fatcat:7kbh3pfo55dr7dgzeianvwxuae</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190428163324/http://repository.essex.ac.uk/22262/1/07995031.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/73/4d/734d17dfa7551de766a9886e083eaeaa6afb8672.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/access.2017.2733225"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 13,570 results