首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 11 毫秒
1.
张淑苗  张书晔  冯全  杨梅 《计算机工程》2011,37(23):147-148,151
在模糊保险箱方案中,通常采用多个干扰点与用户特征点混合构成的集合表示保险箱,这种方法存在多种安全缺陷。为此,提出一种新的保险箱构造方案,该方案利用随机点与用户特征集合构造一个随机多项式,运用该多项式系数表示保险箱。分析结果表明,该方案可以抵抗已知的对模糊保险箱的多种攻击,具有更高的安全性,并能节约存储空间。  相似文献   

2.
为了克服传统指纹Fuzzy Vault算法在应用上的不足,提出了一种改进的Fuzzy Vault算法。主要采用一种新的多项式构造函数的方法来实现待保护密钥和指纹细节特征点的绑定,进而解决了传统Fuzzy Vault算法中密钥长度决定解码时需要匹配细节点个数的问题。实验结果表明,此方法进一步增强了算法的安全性和灵活性。  相似文献   

3.
指纹设备采集到的指纹图像由于不能用统一的参照表示指纹细节点的坐标,因此,同一枚指纹分别在录入和注册时得到的指纹细节点需要对齐。本文采用指纹纹线作为指纹Fuzzy vault对齐的方法,在目标纹线上提取B样条控制点,用这些控制点数据与纹线的距离作为辅助数据来对齐指纹模板。研究分析表明这种方法不会泄露指纹细节点的任何信息。实验结果证明,这种方法具有很好的实时性并能提高指纹Fuzzy vault的配准率。  相似文献   

4.
随着Web2. 0的推广,音乐分享平台纷纷出现.目前的音乐分享平台在用户上传时没有进行检查,导致音乐库里常有大量的冗余.提出了一个基于乐纹的音乐分享平台系统LILT,该系统包含一个含有音乐乐纹的数据库,并通过提取音乐片段的乐纹进行查找判重.建立了6万余首歌的乐纹库,并且在这个库上做了大量测试.测试结果显示,该系统对用户上传的音乐能够有效地识别并判重.在系统识别率、识别速度、指纹鲁棒性测试中均得到了较满意的结果.  相似文献   

5.
《计算机科学与探索》2017,(9):1451-1460
在模糊保险箱(fuzzy vault)算法的具体实现中,几何哈希法是一种用于生物特征模板自动校准的常见技术。针对算法实现时的参数取值模糊问题,研究了影响Fuzzy Vault模板匹配精度的3个参数:图片像素大小、哈希表基点数和哈希表量化参数(α和β)。通过设计单因素实验方法,得到了这3个参数的最优取值范围,并改进了Fuzzy Vault算法细节点的提取范围和基点距离的选取规则,最后基于FVC指纹数据库对算法优化前后的匹配精度进行对比实验。结果表明,优化后算法的拒真率(false rejection rate,FRR)至少降低了9.84%,认假率(false acceptance rate,FAR)至少降低了7.12%,说明该优化方案提高了算法的匹配精度,具有一定的鲁棒性和实用性。  相似文献   

6.
《Real》1998,4(4):233-241
Fuzzy integrals as image filters provide a standard representational form which generalize linear filters such as the averaging filter, morphological filters such as flat dilations and erosions, and order statistic filters such as the median filter. However, fuzzy integral filters are computationally intensive. Computing the output value obtained by fuzzy integral filtering at a point involves sorting all the pixels in a neighborhood of the point according to their values and then computing ordered weighted sum or maximum with respect to an appropriate fuzzy measure. In this paper we discuss some properties of fuzzy integral filters and describe a method for enhancing the processing elements of single instruction, multiple data (SIMD) mesh computers with comparators and counters to efficiently implement fuzzy integral filters.  相似文献   

7.
Current information security techniques based on cryptography are facing a challenge of lacking the exact connection between cryptographic key and legitimate users. Biometrics, which refers to distinctive physiological and behavioral characteristics of human beings, is a more reliable indicator of identity than traditional authentication system such as passwords-based or tokens-based. However, researches on the seamless integration biometric technologies, e.g., fingerprint recognition, with cryptosystem have not been conducted until recent years. In this paper, we provide an overview of recent advancements in fingerprint recognition algorithm with a special focus on the enhancement of low-quality fingerprints and the matching of the distorted fingerprint images, and discuss two representative methods of key release and key generation scheme based on fingerprints. We also propose two solutions for the application in identity authentication without trustworthy third-party in the network environment, and application in digital media protection, aiming to assure the secrecy of fingerprint template and fingerprint-based user authentication.  相似文献   

8.
本文给出了用模糊联想记忆网络实现肯定前件式,否定后件式或同时包含这两种模糊推理形式的充要条件,并提出了一个增加网络神经元的增强学习算法,这种学习算法能够可靠有效地用于任意多个基于规则的不同形式模糊推理。  相似文献   

9.
一种基于插值的室内指纹定位系统设计与实现   总被引:1,自引:0,他引:1  
由于室内环境的复杂性,无线传感器网络WSN(Wireless Sensor Networks)室内定位的精度一直不够理想.本系统在测距定位算法和非测距定位算法的基础上,提出了基于信号强度RSSI(Received Signal Strength Indication)的指纹定位方法.该方法利用Cokriging插值算法建立定位区域的多维RSSI向量指纹,通过匹配目标节点的RSSI向量与指纹RSSI向量确定目标节点的位置范围,最后使用K-中心点聚类算法提取目标节点的实际位置.实际场景实验和仿真实验结果都表明此方法在复杂的室内环境中具有较高的定位精度.  相似文献   

10.
图像处理技术是用计算机对图像进行分析,以达到所需结果的技术,又称影像处理.图像处理一般指数字图像处理,数字图像是指用数字摄像机、扫描仪等设备经过采样和教字化得到的一个大的二维数组,该数组的元素称为像素,其值为一整数,称为灰度值.而目前,我国图像处理水平远远落后于世界先进水平,技术的发展需求迫在眉睫.基于以上原因,本文研究了以模糊信息处理技术为基础的图像处理算法及其实现,用一个简单的程序实践图像处理算法.  相似文献   

11.
介绍一种基于模糊逻辑的数据聚类技术,讨论了模糊C均值聚类方法。模糊C均值算法就是利用模糊逻辑理论和聚类思想,将n样本划分到c个类别中的一个,使得被划分到同一簇的对象之间相似度最大,而不同簇之间的相似度最小。  相似文献   

12.
Robust control designs for a discrete Takagi and Sugeno (T-S) fuzzy model are proposed. The T-S fuzzy model contains (possibly fast) time-varying uncertainty. First, a switching-type robust control is shown to stabilize the T-S fuzzy model asymptotically. Second, a saturation-type robust control is shown to render the T-S model practically stable. In both designs, only the bound of uncertainty is needed. The effectiveness of proposed designs is analyzed rigorously and illustrated by simulations.  相似文献   

13.
CORBA是分布式计算领域的研究热点,性能对于诸如实时、嵌入式CORBA应用至关重要,在高速网络环境下或backbone系统中,端系统的性能是整个系统性能不可忽视的因素,在传统的实时、嵌入CORBA应用中,影响端系统性能的几个主要因素包括操作系统的上下文切换、进程调度以及用户空间与操作系统间的数据复制,文章认为,CORBA的内核级实现可以消除或减小以上开销,KIOIK是基于Linux内核的CORBA实现,阐述了在Linux内核级实现CORBA的若干关键技术,为CORBA端系统的性能优化提出了一个新的思路,最后给出了KIOIK与用户空间CORBA以及核内SunRPC的延迟对比测试结果,并做了相应的性能分析。  相似文献   

14.
Cryptographic systems have been widely used in many information security applications. One main challenge that these systems have faced has been how to protect private keys from attackers. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. In biometric systems, a critical problem is storing biometric templates in a database. However, fuzzy vault systems do not need to directly store these templates since they are combined with private keys by using cryptography. Previous fuzzy vault systems were designed by using fingerprint, face, and so on. However, there has been no attempt to implement a fuzzy vault system that used an iris. In biometric applications, it is widely known that an iris can discriminate between persons better than other biometric modalities. In this paper, we propose a reliable fuzzy vault system based on local iris features. We extracted multiple iris features from multiple local regions in a given iris image, and the exact values of the unordered set were then produced using the clustering method. To align the iris templates with the new input iris data, a shift-matching technique was applied. Experimental results showed that 128-bit private keys were securely and robustly generated by using any given iris data without requiring prealignment.   相似文献   

15.
Enterprise resource planning (ERP) systems enable firms to attain information technology integration. Such integration results in a uniform information system across the entire organization, thus augmenting performance. in this article, the issues and performance of Oracle ERP are discussed based on perspicacious exploratory analyses conducted in two manufacturing firms located in Ohio and Wisconsin. the factors of influence to implement Oracle ERP systems, various issues involved in the process of implementation, and performance of the systems are discussed in detail. the triangulation technique was used to make sure that the qualitative and quantitative findings were congruent. the results of the quantitative analysis and details of the constructs and items identified to measure the constructs are explained elsewhere by the first author. Oracle ERP systems enabled these firms to perform better by simplifying and streamlining their information retrieval and dissemination processes. Oracle's Web-based network computing architecture (NCA) offers many advantages, such as higher scalability and better coordination with suppliers and customers. These case studies provided a foundation for future research to build theoretical models.  相似文献   

16.
ITS中模糊综合评价的实现   总被引:1,自引:0,他引:1  
主要讨论了模糊综合评价的原理,同时详细分析了模糊综合评价在学生评价中的应用模式,最后给出了基于PROLOG实现模糊评价的程序。  相似文献   

17.
In real world, some data have a specific temporal validity that must be appropiately managed. To deal with this kind of data, several proposals of temporal databases have been introduced. Moreover, time can also be affected by imprecision, vagueness, and/or uncertainty, since human beings manage time using temporal indications and temporal notions, which may also be imprecise. For this reason, information systems require appropriate support to accomplish this task. In this work, we present a novel possibilistic valid time model for fuzzy databases including the data structures, the integrity constraints, and the DML. Together with this model, we also present its implementation by means of a fuzzy valid time support module on top of a fuzzy object‐relational database system. The integration of these modules allows to perform queries that combines fuzzy valid time constraints together with fuzzy predicates. Besides, the model and implementation proposed support the crisp valid time model as a particular case of the fuzzy valid time support provided.  相似文献   

18.
提出了一种基于模糊神经网络获取模糊规则及其进行模糊系统参数学习的方法,通过实例进行了自动列车运行系统仿真,总结了这种方法的特点。结论表明,所提出的模糊规则生成和模糊系统学习方法是行之有效的。  相似文献   

19.
Much has been written about best practices and world class manufacturing in recent years. Various practices and improvement programmes have been suggested as best practices, assuming that their adoption would to lead to higher performance. The implementation process of these practices is, however, often neglected in the literature and, hence, relatively poorly understood. The purpose of this article is to provide insight into that process and how different implementation approaches influence performance. An analysis of the implementation of a range of manufacturing action programmes in two companies showed that a broad and incremental implementation approach initially leads to reduced performance followed by a gradual improvement as larger parts of the programmes are institutionalized. A ‘big bang’ implementation approach does not seem to lead to deterioration in performance.  相似文献   

20.
本文描述了一个基于PCI-X总线高速通讯卡的通讯软件接口实现技术,该接口通过虚拟硬件资源,实现了保护的用户级通讯操作,提供报文传输和RDMA两种数据传输方式,实现进程间数据的零拷贝传输,同时基于该接口还支持IP报文的传输。测试中该接口在单链路上实现501MB/s,双链路上实现1002MB/s的带宽,在基于Socket接口的测试中,实现了384MB/s的通讯带宽。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号