3,586 research outputs found

    Strategic programming on graph rewriting systems

    Full text link
    We describe a strategy language to control the application of graph rewriting rules, and show how this language can be used to write high-level declarative programs in several application areas. This language is part of a graph-based programming tool built within the port-graph transformation and visualisation environment PORGY.Comment: In Proceedings IWS 2010, arXiv:1012.533

    A Fuzzy Logic Based Novel Signature Verification System on Bank Cheque with Fractal Dimensions and Connected Components

    Get PDF
    Signature plays its authorization role in almost every document. Proper care should be taken for the verification of the genuineness of the signature in legal documents. Signature verification scheme can be online or offline based on the acquisition type. A novel method for offline signature verification in bank cheques is proposed. It is found out that using fractal dimensions for verification purpose improves the accuracy rate. Also the fundamentals of offline signature verification process are discussed. The proposed system uses connected Components Labeling, Fractal Dimensions and Fuzzy Logic for signature verification. The signature is scanned and preprocessed. Using connected components labeling, the signature is split into regions and each region is labeled uniquely. Feature values for each labeled regions are extracted and normalised. Fractal dimensions of signature images are calculated. Extracted feature values and fractal dimensions are compared with the feature values of the sample signatures for its genuineness. Fuzzy classifies the genuine and forged signatures correctly to its fullest extent. Some signatures may have more noise or it may be complex for the system to identify or classify. Those signatures may need some manual intervention. The proposed verification system shows very good results with good sensitivity and specificity. It has an accuracy of maximum 50%

    Fuzzy Logic Classification of Handwritten Signature Based Computer Access and File Encryption

    Full text link
    Often times computer access and file encryption is successful based on how complex a password will be, how often users could change their complex password, the length of the complex password and how creative users are in creating a complex passsword to stand against unauthorized access to computer resources or files. This research proposes a new way of computer access and file encryption based on the fuzzy logic classification of handwritten signatures. Feature extraction of the handwritten signatures, the Fourier transformation algorithm and the k-Nearest Algorithm could be implemented to determine how close the signature is to the signature on file to grant or deny users access to computer resources and encrypted files. lternatively implementing fuzzy logic algorithms and fuzzy k-Nearest Neighbor algorithm to the captured signature could determine how close a signature is to the one on file to grant or deny access to computer resources and files. This research paper accomplishes the feature recognition firstly by extracting the features as users sign their signatures for storage, and secondly by determining the shortest distance between the signatures. On the other hand this research work accomplish the fuzzy logic recognition firstly by classifying the signature into a membership groups based on their degree of membership and secondly by determining what level of closeness the signatures are from each other. The signatures were collected from three selected input devices- the mouse, I-Pen and the IOGear. This research demonstrates which input device users found efficient and flexible to sign their respective names. The research work also demonstrates the security levels of implementing the fuzzy logic, fuzzy k-Nearest Neighbor, Fourier Transform.Master'sCollege of Arts and Sciences: Computer ScienceUniversity of Michiganhttp://deepblue.lib.umich.edu/bitstream/2027.42/117719/1/Kwarteng.pd

    A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.

    Get PDF
    Kajian ini mencadangkan primitif baru kekunci-awam berasaskan kepada set Fraktal Mandelbrot dan Julia. Penciptaan kekunci-awam primitif berasas Fraktal boleh dilakukan kerana perkaitan yang kuat di antara set Fraktal Mandelbrot dan set Fraktal Julia. This study proposes new public-key primitives based on Mandelbrot and Julia Fractal sets. The creation of the Fractal based public-key primitives is possible because of the strong connection between the Mandelbrot and Julia Fractal sets
    corecore