Sciweavers

203 search results - page 12 / 41
» A Fuzzy Vault Scheme
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 5 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
CEC
2009
IEEE
15 years 4 months ago
Automatic clustering with multi-objective Differential Evolution algorithms
—This paper applies the Differential Evolution (DE) algorithm to the task of automatic fuzzy clustering in a Multi-objective Optimization (MO) framework. It compares the performa...
Kaushik Suresh, Debarati Kundu, Sayan Ghosh, Swaga...
BROADNETS
2005
IEEE
15 years 5 months ago
Network selection using fuzzy logic
—The peer-to-peer technology offers many advantages, but at the same time, it poses many novel challenges for the research community. Modern peer-to-peer systems are characterize...
Shubha Kher, Arun K. Somani, Rohit Gupta
ROBOCUP
2001
Springer
111views Robotics» more  ROBOCUP 2001»
15 years 4 months ago
Evolving Fuzzy Logic Controllers for Sony Legged Robots
This paper presents an evolutionary approach to learning a fuzzy logic controller(FLC) employed for reactive behaviour control of Sony legged robots. The learning scheme is divided...
Dongbing Gu, Huosheng Hu
TNN
1998
146views more  TNN 1998»
14 years 11 months ago
Fuzzy lattice neural network (FLNN): a hybrid model for learning
— This paper proposes two hierarchical schemes for learning, one for clustering and the other for classification problems. Both schemes can be implemented on a fuzzy lattice neu...
Vassilios Petridis, Vassilis G. Kaburlasos