The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We suggested a method of clustering, which allows to build a model of conceptual clustering for objects of fuzzy nature, and also to increase the accuracy of clustering for such objects. We used Cobweb clustering method as a base. We modified the formula of assessing the utility of conceptual clustering for objects with fuzzy parameter values. Then we suggested a modified Cobweb version for working...
We suggested the modification of DBSCAN clustering algorithm for vertically partitioned big data. This modification provides privacy of the information which is transmitted via telecommunication channels between nodes of big data storage. This modification is founded on organization of secure channel which is based on homomorfic and asymmetric encryption. The first one is used for hiding the information...
We use the method based on expert judgments and analytic hierarchy process for information security risks assessment in a typical telecommunication network of the university. We evaluate impacts and possibility values for specific threats at the telecommunication network. We also identify some security vulnerabilities and evaluate them. We use such methods and tools as fuzzy logic, questionnaires,...
We suggested a method for handwritten signature recognition based on fuzzy logic. First of all, we proposed some features of handwritten signature based on curvature properties with fuzzy values. Then we proposed a method for signature recognition based on comparing these fuzzy features. We used collection of signatures MCYT_Signature_100 for testing our method. Signature recognition experiment has...
We investigate the parameters of pseudo-random number generator based on fuzzy logic (FRNG) and select the best one. The first parameter is the "size of buffer", the second parameter is the "number of membership functions for fuzzy variables in FRNG". These parameters play essential role for the FRNG and directly influence to the randomness of the output binary sequence. We investigate...
We suggested new type of fuzzy inference systems (FIS) based on Takagi-Sugeno. We called it enhanced fuzzy regression (EFR). New FIS uses fuzzy coefficients in right parts of the fuzzy rules. Fuzzy approximation theorem has been proved and learning procedure has been suggested for the EFR. We compared EFR with Mamdani FIS and concluded that EFR can be more effective for fuzzy control.
In this paper a fuzzy synchronous stream cipher system has been proposed. We have constructed system in the form of a non-linear feedback shift register to obtain a pseudo-random noise very similar to real random bits stream. The suggested system is deterministic so the same parameters of the fuzzy pseudo-random generator will give the same random bits sequence. The designed system is simple and suitable...
We suggested a method for quantitative information security risk assessment and management in computer networks. We used questionnaires, expert judgments, fuzzy logic and analytic hierarchy process to evaluate an impact and possibility values for specific threats. We suggested fuzzy extension of Common Vulnerability Scoring System for vulnerability assessment. Fuzzy prediction rules are used to describe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.