The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, Wang et al. showed that Das et al.'s dynamic ID-based remote user authentication scheme is vulnerable to an impersonation attack and can not achieve mutual authentication. Consequently, a more efficient and secure dynamic ID-based remote user authentication scheme was proposed and claimed that it was now secure and of practical value. However, in this paper, we will show that Wang et al...
A discussion on involvement of knowledge based methods in implementation of user friendly computer programs for disabled people is the goal of this paper. The paper presents a concept of a computer program that is aimed to aid blind people dealing with music and music notation. The concept is solely based on computational intelligence methods involved in implementation of the computer program. The...
The research concerns computer-based clinical decision support for laryngopathies. The proposed computer tool is based on a speech signal analysis in the time domain using recurrent neural networks. Such networks have the ability of time series prediction because of their memory nodes as well as local recurrent connections. In our experiments we use the modified Elman-Jordan neural network. For this...
Paper deals with the problem of designing efficient classifiers for a special case of incremental concept drift. We focus on its classification based on the multiple classifier system. For the problem under consideration we propose four simple methods of combining classification and evaluate them via computer experiments.
One of the most important features of fuzzy set theory is its potential for the modeling of natural language expressions. Most works done on this topic focus on some parts of natural language, mostly those that correspond to the so-called “evaluating linguistic expressions”. We build constraints for the mathematical substitutes of these expressions to mark characteristic limits on an ordered scale...
Recently, Khan et al. showed that Wang et al.'s dynamic ID-based remote user authentication scheme is not feasible for real-life implementations such as without preserving anonymity of a user during authentication, user cannot choose the password he/she wants, no provision for revocation of lost or stolen smart card, and can not provide session key agreement. Consequently, an improved version of dynamic...
This paper presents a computational model of language generation, based on Phase Theory, that automatically constructs sentences from underlying numerations. This model incorporates explicit algorithms that determine selection and merger of Lexical Items from a subnumeration, determine the labels of Merged syntactic elements, account for movement of elements within a derivation, and account for when...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.