Sciweavers

203 search results - page 12 / 41
» A Fuzzy Vault Scheme
Sort
View
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
14 years 3 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy
CEC
2009
IEEE
14 years 2 months ago
Automatic clustering with multi-objective Differential Evolution algorithms
—This paper applies the Differential Evolution (DE) algorithm to the task of automatic fuzzy clustering in a Multi-objective Optimization (MO) framework. It compares the performa...
Kaushik Suresh, Debarati Kundu, Sayan Ghosh, Swaga...
BROADNETS
2005
IEEE
14 years 3 months ago
Network selection using fuzzy logic
—The peer-to-peer technology offers many advantages, but at the same time, it poses many novel challenges for the research community. Modern peer-to-peer systems are characterize...
Shubha Kher, Arun K. Somani, Rohit Gupta
ROBOCUP
2001
Springer
111views Robotics» more  ROBOCUP 2001»
14 years 2 months ago
Evolving Fuzzy Logic Controllers for Sony Legged Robots
This paper presents an evolutionary approach to learning a fuzzy logic controller(FLC) employed for reactive behaviour control of Sony legged robots. The learning scheme is divided...
Dongbing Gu, Huosheng Hu
TNN
1998
146views more  TNN 1998»
13 years 9 months ago
Fuzzy lattice neural network (FLNN): a hybrid model for learning
— This paper proposes two hierarchical schemes for learning, one for clustering and the other for classification problems. Both schemes can be implemented on a fuzzy lattice neu...
Vassilios Petridis, Vassilis G. Kaburlasos