WorldWideScience

Sample records for password hardened fuzzy

  1. Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault

    OpenAIRE

    Meenakshi, V. S.; Padmavathi, G.

    2010-01-01

    Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this area. Biometric based authentication has proved superior compared to traditional password based authentication. Anyhow biometrics is permanent feature of a person and cannot be reissued when compromised as passwords. To over come this problem, instead of storing the original biometric templates transformed templates can be stored. Whenever the transformation function ...

  2. The Use of Fuzzy Systems for Forecasting the Hardenability of Steel

    Directory of Open Access Journals (Sweden)

    Sitek W.

    2016-06-01

    Full Text Available The goal of the research carried out was to develop the fuzzy systems, allowing the determination of the Jominy hardenability curve based on the chemical composition of structural steels for quenching and tempering. Fuzzy system was created to calculate hardness of the steel, based on the alloying elements concentrations, and to forecast the hardenability curves. This was done based on information from the PN-EN 10083-3: 2008. Examples of hardenability curves calculated for exemplar steels were presented. Results of the research confirmed that fuzzy systems are a useful tool in evaluation the effect of alloying elements on the properties of materials compared to conventional methods. It has been demonstrated the practical usefulness of the developed models which allows forecasting the steels’ Jominy hardenability curve.

  3. Password Usage

    National Research Council Canada - National Science Library

    Burrows, James

    1995-01-01

    ...) personal identity authentication and (2) data access authorization. It establishes the basic criteria for the design, implementation and use of a password system in those systems where passwords are used...

  4. Password Cracking Lab

    OpenAIRE

    2006-01-01

    quiz present Quiz Presentation Interactive Media Element In order for a user to authenticate themselves to a computer with a password, the computer must store some form of the user and rsquo;s password. Computer designers have developed a way of storing the password information in a one-way encrypted format that prevents attackers from taking the stored password information and decrypting it back into user password. The one-way encryption process if often called hashing. This t...

  5. Password Authentication Scheme with Secured Login Interface

    Directory of Open Access Journals (Sweden)

    AKINWALE A. Taofiki

    2009-12-01

    Full Text Available This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study the sequence of code that describe his password, and then enter these code in place of his actual password characters. This approach does not require the input code to be hidden from anyone or converted to placeholder characters for security reasons. Our solution engine regenerates new code for each character each time the carriage return key is struck, producing a hardened password that is convincingly more secure than conventional password entry system against both online and offline attackers. Using empirical data and a prototype implementation of our scheme, we give evidence that our approach is viable in practice, in terms of ease of use, improved security, and performance.

  6. Password Management Systems

    OpenAIRE

    Fiala, Lukáš

    2010-01-01

    The goal is to describe and compare password management utilities and applications for individuals or small teams. Examples of such applications are KeePass, Password Safe, CodeWallet Pro and eWallet. On-line password managers like LastPass or RoboForm are another group of applications. Support for synchronization, sharing passwords in a team or protection against keyloggers (when filling in automatically) may also be included in the criteria.

  7. Fuzzy Commitment

    Science.gov (United States)

    Juels, Ari

    The purpose of this chapter is to introduce fuzzy commitment, one of the earliest and simplest constructions geared toward cryptography over noisy data. The chapter also explores applications of fuzzy commitment to two problems in data security: (1) secure management of biometrics, with a focus on iriscodes, and (2) use of knowledge-based authentication (i.e., personal questions) for password recovery.

  8. Graphical passwords: a qualitative study of password patterns

    CSIR Research Space (South Africa)

    Vorster, J

    2015-03-01

    Full Text Available Graphical passwords schemas are becoming more main-stream. There are many different approaches to graphical passwords, each with its own drawbacks and advantages. There has been many studies to suggest that graphical passwords should be stronger...

  9. The Password Problem

    Energy Technology Data Exchange (ETDEWEB)

    Walkup, Elizabeth [Stanford Univ., CA (United States)

    2016-06-01

    Passwords are an ubiquitous, established part of the Internet today, but they are also a huge security headache. Single sign-on, OAuth, and password managers are some of the solutions to this problem. OAuth is a new, popular method that allows people to use large, common authentication providers for many web applications. However, it comes at the expense of some privacy: OAuth makes users easy to track across websites, applications, and devices. Password managers put the power in the hands of the users, but this vulnerability survey reveals that you have to be extremely careful which program you choose. All in all, password managers are the solution of choice for home users and small organizations, but large companies will probably want to invest in their own SSO solutions.

  10. Science of Guessing Passwords

    Indian Academy of Sciences (India)

    First page Back Continue Last page Graphics. Science of Guessing Passwords. Joseph Bonneau. Ph.D. Thesis,. Univ. of Cambridge, 2012. Advisor: Ross Anderson, FRS. NSA AWARD FOR THE BEST SCIENTIFIC CYBERSECURITY PAPER.

  11. Holidays Come - Passwords Go

    CERN Multimedia

    Computer Security Team

    2011-01-01

    The holiday season is approaching and with it, the best chance of losing your password!!   If you are keen to access your CERN mailbox or other computing facilities at CERN from the Internet café at your hotel, hold on and think twice. Is that local PC trustworthy? Most likely it is not. It might never have been patched, and, thus, has been infected by plenty of computer viruses long time ago. Worse, nasty people might have installed tools which aim at stealing your password once you type it. Therefore, it is better to use your own laptop or mobile phone for such activities. If you decided to connect to CERN from an untrustworthy computer and had typed in your CERN password there – please seriously consider changing your CERN password at http://cern.ch/account as soon as you have access to a trustworthy computer. However, also take care when using your own laptop or mobile device: wireless communication can be intercepted. Many wireless access points, e.g. at airports, do no...

  12. Distributed password cracking

    OpenAIRE

    Crumpacker, John R.

    2009-01-01

    Approved for public release, distribution unlimited Password cracking requires significant processing power, which in today's world is located at a workstation or home in the form of a desktop computer. Berkeley Open Infrastructure for Network Computing (BOINC) is the conduit to this significant source of processing power and John the Ripper is the key. BOINC is a distributed data processing system that incorporates client-server relationships to generically process data. The BOINC structu...

  13. A Survey on Password Security Systems

    OpenAIRE

    Ms. A. G. Khairnar; Prof. N. L. Bhale

    2013-01-01

    Password security is essential for user authentication on small networking system as well large networking system. Till today many researchers introduced various methods to protect passwords on network. Passwords are prone to various types of attacks like brute force attack, password reuse attack, password stealing attack, password cracking attack, etc. This paper gives review on different methods which were introduced for protection of password on a network. This paper also includes work don...

  14. Leakage resilient password systems

    CERN Document Server

    Li, Yingjiu; Deng, Robert H

    2015-01-01

    This book investigates tradeoff between security and usability in designing leakage resilient password systems (LRP) and introduces two practical LRP systems named Cover Pad and ShadowKey. It demonstrates that existing LRP systems are subject to both brute force attacks and statistical attacks and that these attacks cannot be effectively mitigated without sacrificing the usability of LRP systems. Quantitative analysis proves that a secure LRP system in practical settings imposes a considerable amount of cognitive workload unless certain secure channels are involved. The book introduces a secur

  15. Password Authenticated Key Exchange and Protected Password Change Protocols

    Directory of Open Access Journals (Sweden)

    Ting-Yi Chang

    2017-07-01

    Full Text Available In this paper, we propose new password authenticated key exchange (PAKE and protected password change (PPC protocols without any symmetric or public-key cryptosystems. The security of the proposed protocols is based on the computational Diffie-Hellman assumption in the random oracle model. The proposed scheme can resist both forgery server and denial of service attacks.

  16. A study of perceptions of graphical passwords

    CSIR Research Space (South Africa)

    Vorster, JS

    2015-10-01

    Full Text Available Depending on the graphical password schema, the key-space can be even bigger than alpha-numeric passwords. However, in conventional passwords, users will re-use letters within a password. This study investigates graphical passwords for symbol...

  17. Client-server password recovery

    NARCIS (Netherlands)

    Chmielewski, Ł.; Hoepman, J.H.; Rossum, P. van

    2009-01-01

    Human memory is not perfect - people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password from a server using partial knowledge of the

  18. Client-Server Password Recovery

    NARCIS (Netherlands)

    Chmielewski, L.; Hoepman, J.H.; Rossum, P. van

    2009-01-01

    Human memory is not perfect – people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password from a server using partial knowledge of the

  19. Information security : an investigation into password habits

    OpenAIRE

    Richardson, Darren

    2015-01-01

    This thesis considers password security guidelines used in current environments and stipulates that password requirements force users to create and use passwords which are easy for computers to guess but hard for humans to remember. The thesis begins by exploring a number of the most prevalent methods of illicitly obtaining passwords in an attempt to design an experimental method to test the notion of weak password distribution. Password cracking techniques are discussed, as well as less ...

  20. Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

    Directory of Open Access Journals (Sweden)

    Pavel Lozhnikov

    2016-10-01

    Full Text Available The modern encryption methods are reliable if strong keys (passwords are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others to the identities. When a user is authenticated by biometrical characteristics, the problem of protecting a biometrical template stored on a remote server becomes a concern. The paper proposes several methods of generating keys (passwords by means of the fuzzy extractors method based on signature parameters without storing templates in an open way.

  1. Virtual Realization using 3D Password

    OpenAIRE

    A.B.Gadicha; V.B.Gadicha

    2012-01-01

    Current authentication systems suffer from many weaknesses. Textual passwords are commonly used; however, users do not follow their requirements. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Smart cards or tokens can be stolen. Many biometric authentications have been pro...

  2. 3-D Graphical Password Used For Authentication

    OpenAIRE

    Vidya Mhaske-Dhamdhere; Bhakti Pawar; Pallavi Ghodke; Pratibha Yadav

    2012-01-01

    In today’s world, security isimportant aspect in day to day life.So,everyone used various ways for securitypurpose. People use passwords for theirsecurity.Generally, everyone uses textualpassword. Textual password is combinationof alphabets and numbers. People keeptextual password as name of their favoritethings, actors or actress, dish andmeaningful word from dictionary. But theperson who is very close to that person caneasily guess the password.Graphical password is advancedversion of passw...

  3. Self-Service Password Reset

    CERN Multimedia

    IT department

    2011-01-01

    Forgotten your password? Throughout the year, one of the most common requests to the Service Desk concerns password resets.  This is especially the case now that we are at the end of the holiday season and many of us return after a long break. Currently, the only way to have your password reset is to call the Service Desk during the week and within the service hours (07:30 to 18:30). Not anymore!   The IT department is putting up a new service that will allow you to reset the password of your primary CERN account by yourself. Note, that you will still be able to request a password reset by calling the Service Desk as usual and that you will still have to do this if your account has been blocked for any reason.  However, the new service provides you with more flexibility and convenience when your memory has failed you. In order to take advantage of this new service, you must:   • Have a valid, active account   • Register in advance an external...

  4. Password Cracking Using Sony Playstations

    Science.gov (United States)

    Kleinhans, Hugo; Butts, Jonathan; Shenoi, Sujeet

    Law enforcement agencies frequently encounter encrypted digital evidence for which the cryptographic keys are unknown or unavailable. Password cracking - whether it employs brute force or sophisticated cryptanalytic techniques - requires massive computational resources. This paper evaluates the benefits of using the Sony PlayStation 3 (PS3) to crack passwords. The PS3 offers massive computational power at relatively low cost. Moreover, multiple PS3 systems can be introduced easily to expand parallel processing when additional power is needed. This paper also describes a distributed framework designed to enable law enforcement agents to crack encrypted archives and applications in an efficient and cost-effective manner.

  5. Password Hardened Biometric: A Complete Solution of Online Security

    OpenAIRE

    Ajay Sharma; Deo Brat Ojha

    2013-01-01

    In present epoch, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to feel that their transactions are secured from system hackers. Biometric technology provides a solution to this problem in enterprise network security. In this article we enhance the security ...

  6. Advanced Password Tips and Tricks

    Science.gov (United States)

    ... to store passwords online so that a online hacker can't get to them? Kind of defeats the purpose, though I do allow ... will quit browsing over internet. Its many years gone no real benefit I got from those years. I will be ...

  7. Heuristic attacks against graphical password generators

    CSIR Research Space (South Africa)

    Peach, S

    2010-05-01

    Full Text Available In this paper the authors explore heuristic attacks against graphical password generators. A new trend is emerging to use user clickable pictures to generate passwords. This technique of authentication can be successfully used for - for example...

  8. Computer Security: CERN Secure Password Competition

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2015-01-01

    It’s time for a spring clean at the CERN Single Sign-On portal. We will take this opportunity to review all 20,000+ passwords used with CERN primary, secondary and service accounts. This campaign has three purposes: to identify password duplicates, to extend the password history rule to all CERN accounts, and to reward the “best” passwords used at CERN.   The first aim, identifying password duplicates, involves finding different accounts using the same or similar passwords. As of 1 April, we will prevent the use of a password if it is already in use by someone else. We will notify the affected users well in advance and also provide them with the email addresses of peers using the same or similar passwords - this Facebook-like feature will allow users to form interest groups and share experiences of their password (usage).  In parallel, we will extend the password history rule to all CERN accounts. This history currently prevents you from reusing any pas...

  9. Cloud Password Manager Using Privacy-preserved Biometrics

    OpenAIRE

    Chu, Huiguang

    2014-01-01

    Using one password for all web services is not secure because the leakage of the password compromises all the web services accounts; while using independent passwords for different web services is inconvenient for the identity claimant to memorize. A password manager is used to address this security-convenience paradox by storing and retrieving multiple existing passwords using one master password. On the other hand, a password manager liberates human brain by enabling people to generate stro...

  10. Guidelines for ethical nudging in password authentication

    OpenAIRE

    Renaud, Karen; Zimmermann, Verena

    2018-01-01

    Nudging has been adopted by many disciplines in the last decade in order to achieve behavioural change. Information security is no exception. A number of attempts have been made to nudge end-users towards stronger passwords. Here we report on our deployment of an enriched nudge displayed to participants on the system enrolment page, when a password has to be chosen. The enriched nudge was successful in that participants chose significantly longer and stronger passwords. One thing that struck ...

  11. Keystroke Dynamics-Based Credential Hardening Systems

    Science.gov (United States)

    Bartlow, Nick; Cukic, Bojan

    abstract Keystroke dynamics are becoming a well-known method for strengthening username- and password-based credential sets. The familiarity and ease of use of these traditional authentication schemes combined with the increased trustworthiness associated with biometrics makes them prime candidates for application in many web-based scenarios. Our keystroke dynamics system uses Breiman’s random forests algorithm to classify keystroke input sequences as genuine or imposter. The system is capable of operating at various points on a traditional ROC curve depending on application-specific security needs. As a username/password authentication scheme, our approach decreases the system penetration rate associated with compromised passwords up to 99.15%. Beyond presenting results demonstrating the credential hardening effect of our scheme, we look into the notion that a user’s familiarity to components of a credential set can non-trivially impact error rates.

  12. A Pilot Study of Multiple Password Interference Between Text and Map-Based Passwords

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Lee, Wang

    2017-01-01

    Today’s computer users have to remember several passwords for each of their accounts. It is easily noticed that people may have difficulty in remembering multiple passwords, which result in a weak password selection. Previous studies have shown that recall success rates are not statistically...

  13. Evaluation of Professional Cloud Password Management Tools

    DEFF Research Database (Denmark)

    Schougaard, Daniel; Dragoni, Nicola; Spognardi, Angelo

    2016-01-01

    , password managers have slowly been migrating into the cloud. In this paper we review and analyze current professional password managers in the cloud. We discuss several functional and nonfunctional requirements to evaluate existing solutions and we sum up their strengths and weaknesses. The main conclusion...

  14. The Characteristics of User-Generated Passwords

    Science.gov (United States)

    1990-03-01

    electronic keys), user interface tokens (pocket devices that can generate one-time passwords) and fixed password devices ( plastic cards that contain...APPENDIX B-7 DIFFREM DIFFICULTY REMfEIBERING by PASSCHAR PASSORD CARACTERISTICS PASSCHAR Pate I of 1 Count 1 Row Pet IALPHAVET NUMERIC ALPHANUM ASCII Cal Pet

  15. An Alternative Method for Understanding User-Chosen Passwords

    Directory of Open Access Journals (Sweden)

    Zhixiong Zheng

    2018-01-01

    Full Text Available We present in this paper an alternative method for understanding user-chosen passwords. In password research, much attention has been given to increasing the security and usability of individual passwords for common users. Few of them focus on the relationships between passwords; therefore we explore the relationships between passwords: modification-based, similarity-based, and probability-based. By regarding passwords as vertices, we shed light on how to transform a dataset of passwords into a password graph. Subsequently, we introduce some novel notions from graph theory and report on a number of inner properties of passwords from the perspective of graph. With the assistance of Python Graph-tool, we are able to visualize our password graph to deliver an intuitive grasp of user-chosen passwords. Five real-world password datasets are used in our experiments to fulfill our thorough experiments. We discover that (1 some passwords in a dataset are tightly connected with each other; (2 they have the tendency to gather together as a cluster like they are in a social network; (3 password graph has logarithmic distribution for its degrees. Top clusters in password graph could be exploited to obtain the effective mangling rules for cracking passwords. Also, password graph can be utilized for a new kind of password strength meter.

  16. Computer Security: pimp up your password

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    In the past, we have repeatedly stated the importance of a well-chosen, complex and unique password, for your account at CERN (see the article “Oops, there it goes…”), but also for your accounts on Facebook, Amazon and all other sites (see the article “The value of your password”). While this is all still valid, it might not be enough anymore…   Of course, making your password complex (with letters, symbols, numbers, using mathematical formulas, song titles or poems; see our recommendations) is still a must. It is still a necessity to avoid using the same password for several sites and essential not to share the password with anyone else (“your password is your toothbrush - you don’t share it and you change it regularly”). But this is not always sufficient. Passwords can be cracked not only through guessing or brute-force dictionary attacks (hence the requirement for a complex password not to be ...

  17. The pattern-richness of graphical passwords

    CSIR Research Space (South Africa)

    Vorster, JS

    2016-08-01

    Full Text Available . Jansen’s Picture Password scheme [11] is perhaps the most usable cue-recall based Fig. 1. Different graphical password schemes: (a: top-left) Blonder’s original patent image; (b: top-right) Draw-a-secret example; (c: bottom- left) Deja-vu; (d: bottom... theoretical limit on the number of different passwords per image. The initial idea from Blonder was soon followed by a variety of schemes that avoided the initial patent by using other mechanisms of schemes. Draw-a-Secret (DAS), abstractly proposed by Syukri...

  18. Hacking of Passwords in Windows Environment

    OpenAIRE

    C.K. GOEL; GAURAV ARYA

    2012-01-01

    Hacking is so simple! Not only the operating system‟s loop holes offers opportunities to hackers but also the applications like Skype and Google Chrome developed for the operating systems are quite attractive to hackers. In this paper I present the various ways in which the passwords like user account‟s passwords stored by the operating system or the passwords required by different applications are stored on the system and can be hacked by intended hackers. This paper presents in depth resear...

  19. Survey on Password Quality and Confidentiality

    OpenAIRE

    Šolić, Krešimir; Očevčić, Hrvoje; Blažević, Damir

    2015-01-01

    In this paper are presented results of empirical survey on password quality self-assessment and several privacy issues regarding password manipulation among information systems' users. Data was collected by questioning 627 e-mail users that were adults, Croatian national and were using e-mail system on regular basis. Comparisons among different kind of users were done regarding age, gender, technical background knowledge, university degree and experience in usage. Results of statistical analy...

  20. 1000 passwords exposed, what about yours?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    In the last three issues of the Bulletin, we have stressed the importance of the secrecy of your password. Remember: Your password should be treated like a toothbrush: do not share it, and change it regularly! And this is not only valid for your CERN password, but also for any other password you use to log into your university or laboratory, Facebook or Twitter portals, or other web sites.   Unfortunately, recent security checks have revealed a huge area for improvement here. Within a period of only one week, more than 1000 different passwords passed through the CERN outer perimeter firewall in clear text. “Clear text” means that the password was readable to any adversary able to intercept the communication. Make sure your web connection is secure! This can easily be checked in the address bar of your web browser. If the address starts with “HTTPS”, everything is fine. If it is only “HTTP” (without “S&rd...

  1. Remembering Multiple Passwords by Way of Minimal-Feedback Hints

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Passwords are a prominent mechanism for user authentication but entail a conflict between ease of use and security in that passwords must be both easy to remember for the password holder and difficult to guess for everybody else. To support users in remembering their passwords minimal-feedback...

  2. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  3. SPAM: Beware of emails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and must never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake emails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake email message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, however future cases may still occur. Users need to be vigilant for any requests for passwords or personal data. Fake emails should be immediately deleted. In case of questions on this topic, you may contact helpdesk@cern.ch. CERN IT Department

  4. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  5. Secure and Usable Bio-Passwords based on Confidence Interval

    OpenAIRE

    Aeyoung Kim; Geunshik Han; Seung-Hyun Seo

    2017-01-01

    The most popular user-authentication method is the password. Many authentication systems try to enhance their security by enforcing a strong password policy, and by using the password as the first factor, something you know, with the second factor being something you have. However, a strong password policy and a multi-factor authentication system can make it harder for a user to remember the password and login in. In this paper a bio-password-based scheme is proposed as a unique authenticatio...

  6. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  7. What is a good Toothbrush, erm, Password?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Do you remember the answer to the question posed in the previous issue of the Bulletin? "Your password should be treated like a toothbrush: do not share it and change it regularly!" After our last article, we received a series of questions on how to choose a good password and remember it easily… Thus, here we go.   A good password is: • private: used and known by one person only; • secret: it does not appear in clear text in any file or program or on a piece of paper pinned to the monitor; • easily remembered: so there is no need to write it down; • at least 8 characters long with a mixture of at least 3 of the following: upper case letters, lower case letters, digits and symbols; • not to be found in a dictionary of any major language nor guessable by any program in a reasonable time.   Here are some hints to help you choose good passwords: • Choose a line o...

  8. Change in the CERN account password reset procedure

    CERN Multimedia

    IT Department

    2008-01-01

    From Since 19 August 19th 2008, the security of the CERN account password reset procedure has been strengthened. As a result, users requesting to have their password reset by the Computing Helpdesk will be asked to provide some private personal information prior to resetting their CERN account password. Please note that all relevant information about the CERN account and password can be found at http://cern.ch/it-dep/AccountsandpasswordsatCERN.htm Thank you in advance for your cooperation. IT Department

  9. Change in the CERN account password reset procedure

    CERN Multimedia

    IT Department

    2008-01-01

    Since 19 August 2008, the security of the CERN account password reset procedure has been strengthened. As a result, users asking to have their password reset by the Computing Helpdesk will be asked to provide some personal information prior to resetting their CERN account password. Please note that all relevant information about CERN accounts and passwords can be found at http://cern.ch/it-dep/AccountsandpasswordsatCERN.htm Thank you in advance for your cooperation. IT Department

  10. A Comparison of Password Techniques for Multilevel Authentication Mechanisms

    Science.gov (United States)

    1990-06-01

    a user may associative passwords profile around the Beatles . In this case, cues may include "abbey", "john", "yellow" and "george" and have responses...Provost The research summarized herein was accomplished with funding provided by the Research Council of the Naval Postgraduate School. Reproduction of...traditional, user-selected passwords, system-generated passwords, passphrases, cognitive passwords and associative pas-wods. While the mechanisms employed

  11. Password Cracking on Graphics Processing Unit Based Systems

    OpenAIRE

    N. Gopalakrishna Kini; Ranjana Paleppady; Akshata K. Naik

    2015-01-01

    Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper proposes how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the ...

  12. General Framework for Evaluating Password Complexity and Strength

    OpenAIRE

    Sahin, Cem S.; Lychev, Robert; Wagner, Neal

    2015-01-01

    Although it is common for users to select bad passwords that can be easily cracked by attackers, password-based authentication remains the most widely-used method. To encourage users to select good passwords, enterprises often enforce policies. Such policies have been proven to be ineffectual in practice. Accurate assessment of a password's resistance to cracking attacks is still an unsolved problem, and our work addresses this challenge. Although the best way to determine how difficult it ma...

  13. Secure and Usable Bio-Passwords based on Confidence Interval

    Directory of Open Access Journals (Sweden)

    Aeyoung Kim

    2017-02-01

    Full Text Available The most popular user-authentication method is the password. Many authentication systems try to enhance their security by enforcing a strong password policy, and by using the password as the first factor, something you know, with the second factor being something you have. However, a strong password policy and a multi-factor authentication system can make it harder for a user to remember the password and login in. In this paper a bio-password-based scheme is proposed as a unique authentication method, which uses biometrics and confidence interval sets to enhance the security of the log-in process and make it easier as well. The method offers a user-friendly solution for creating and registering strong passwords without the user having to memorize them. Here we also show the results of our experiments which demonstrate the efficiency of this method and how it can be used to protect against a variety of malicious attacks.

  14. A Password System Based on Sketches

    Science.gov (United States)

    2016-07-12

    Cognometric—recognition-based methods (also referred to as search met- ric [10]) 3 3. Locimetric— cued - recall based methods. Drawmetric systems require users to...chosen, hence the term cued - recall . The most prominent cued - recall based method is PassPoints [6, 7, 8]. Pass- Points presents the user with a single...around for more than a decade. Graphical passwords belong to one of three groups (as proposed in [9]): 1. Drawmetric— recall -based methods60 2

  15. Computer Security: the value of your password

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Of course, your passwords have a value to you as they allow you to access your computer and your Facebook page, to buy on Amazon, to create a Twitter feed, and to use a multitude of computing services provided by CERN. But have you ever thought of their value to the malicious people of this world?    With your account password, I can take over your computer. I can install software allowing me to enable your microphone and listen to your communications and what is happening around you as long as your computer is turned on. I can take regular screenshots and monitor you while you work. With that, I can try to determine your working habits, your online behaviour, the way you write e-mails… Useful, if I want to impersonate you believably (e.g. to attack CERN and the systems you are working on at CERN). What’s more, with access to your computer, I can install a keylogger to record your every keystroke – including when you type all your other passwords: ...

  16. Don’t let Chrome expose your passwords

    CERN Multimedia

    Computer Security Team

    2013-01-01

    Do you still struggle with remembering your password? Is this despite our many attempts to help you: “Train your Brain: Don't put your password on paper!" (article here), “Creativity@CERN” (article here) and “Maths to the rescue!" (article here)? Then you might have considered the “save your password” features in Chrome, Firefox or Internet Explorer… these features remember your Facebook, CERN, Twitter, Amazon and ebay passwords. But be careful: it might be easy for someone to read them!   If enabled, Chrome, Firefox, Internet Explorer and others can remember the password of specific sites after you’ve logged in to those sites the first time. As the passwords are, however, stored in plain text, they can still be read out by anyone with access to that computer. In Chrome, just type “chrome://settings/passwords” and click the password you want to reveal. Or in F...

  17. A hardenability test proposal

    Energy Technology Data Exchange (ETDEWEB)

    Murthy, N.V.S.N. [Ingersoll-Rand (I) Ltd., Bangalore (India)

    1996-12-31

    A new approach for hardenability evaluation and its application to heat treatable steels will be discussed. This will include an overview and deficiencies of the current methods and discussion on the necessity for a new approach. Hardenability terminology will be expanded to avoid ambiguity and over-simplification as encountered with the current system. A new hardenability definition is proposed. Hardenability specification methods are simplified and rationalized. The new hardenability evaluation system proposed here utilizes a test specimen with varying diameter as an alternative to the cylindrical Jominy hardenability test specimen and is readily applicable to the evaluation of a wide variety of steels with different cross-section sizes.

  18. Password Cracking and Countermeasures in Computer Security: A Survey

    OpenAIRE

    Han, Aaron L. -F.; Wong, Derek F.; Chao, Lidia S.

    2014-01-01

    With the rapid development of internet technologies, social networks, and other related areas, user authentication becomes more and more important to protect the data of the users. Password authentication is one of the widely used methods to achieve authentication for legal users and defense against intruders. There have been many password cracking methods developed during the past years, and people have been designing the countermeasures against password cracking all the time. However, we fi...

  19. The Effect of Password Management Procedures on the Entropy of User Selected Passwords

    Science.gov (United States)

    Enamait, John D.

    2012-01-01

    Maintaining the security of information contained within computer systems poses challenges for users and administrators. Attacks on information systems continue to rise. Specifically, attacks that target user authentication are increasingly popular. These attacks are based on the common perception that traditional alphanumeric passwords are weak…

  20. Computer Security: Don’t copy/paste passwords!

    CERN Multimedia

    Computer Security Team

    2014-01-01

    What do umbrellas, hair, wars and passwords have in common? Over time, they all get lost.   While some losses are inevitable, we can at least help you reduce the impact. Millions of passwords are stolen or lost every year. Partly because of inattentive users falling for “Phishing” traps, where adversaries simply ask people for their passwords; partly due to compromised web sites having had their database of passwords stolen. For example, over the past few years, eBay recently asked their 145 million users to change their passwords, LinkedIn lost 6.5 million hashed* passwords, and the hacking of the CERN HyperNews service rendered 4745 password hashes public. Just recently, 860,000 usernames, e-mail addresses and hashed passwords were stolen from the MacRumors forum, and Adobe lost a record 150 million e-mail/password combinations. So far, not good. At CERN, 746 people were notified when their CERN e-mail address was found among these combination...

  1. Afs password expiration starts Feb 2nd 2004

    CERN Multimedia

    2004-01-01

    Due to security reasons, and in agreement with CERN management, afs/lxplus passwords will fall into line with Nice/Mail passwords on February 2nd and expire annually. As of the above date afs account holders who have not changed their passwords for over a year will have a 60 day grace period to make a change. Following this date their passwords will become invalid. What does this mean to you? If you have changed your afs password in the past 10 months the only difference is that 60 days before expiration you will receive a warning message. Similar warnings will also appear nearer the time of expiration. If you have not changed your password for more than 10 months, then, as of February 2nd you will have 60 days to change it using the command ‘kpasswd'. Help to choose a good password can be found at: http://security.web.cern.ch/security/passwords/ If you have been given a temporary password at any time by the Helpdesk or registration team this will automatically fall into the expiration category ...

  2. A probabilistic framework for improved password strength metrics

    OpenAIRE

    GALBALLY HERRERO JAVIER; COISEL IWEN; SANCHEZ MARTIN JOSE IGNACIO

    2014-01-01

    In spite of the growing adoption of two factor authentication systems, sometimes combined with hardware tokens and biometrics, the usage of passwords is still by far the most wide spread authentication method for both on-line systems and off-line applications. The password is in most of the cases chosen by the weakest link of the security chain, the user. For that reason, user passwords are audited and passwords policies are carefully created, in an attempt to maximize the security of t...

  3. Are Password Management Applications Viable? An Analysis of User Training and Reactions

    Science.gov (United States)

    Ciampa, Mark

    2011-01-01

    Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…

  4. Analysing Password Protocol Security Against Off-line Dictionary Attacks

    NARCIS (Netherlands)

    Corin, R.J.; Doumen, J.M.; Etalle, Sandro; Busi, Nadia; Gorrieri, Roberto; Martinelli, Fabio

    We study the security of password protocols against off-line dictionary attacks. In addition to the standard adversary abilities, we also consider further cryptographic advantages given to the adversary when considering the password protocol being instantiated with particular encryption schemes. We

  5. Threats of Password Pattern Leakage Using Smartwatch Motion Recognition Sensors

    Directory of Open Access Journals (Sweden)

    Jihun Kim

    2017-06-01

    Full Text Available Thanks to the development of Internet of Things (IoT technologies, wearable markets have been growing rapidly. Smartwatches can be said to be the most representative product in wearable markets, and involve various hardware technologies in order to overcome the limitations of small hardware. Motion recognition sensors are a representative example of those hardware technologies. However, smartwatches and motion recognition sensors that can be worn by users may pose security threats of password pattern leakage. In the present paper, passwords are inferred through experiments to obtain password patterns inputted by users using motion recognition sensors, and verification of the results and the accuracy of the results is shown.

  6. Analysis of the Perfect Table Fuzzy Rainbow Tradeoff

    Directory of Open Access Journals (Sweden)

    Byoung-Il Kim

    2014-01-01

    Full Text Available Cryptanalytic time memory tradeoff algorithms are tools for inverting one-way functions, and they are used in practice to recover passwords that restrict access to digital documents. This work provides an accurate complexity analysis of the perfect table fuzzy rainbow tradeoff algorithm. Based on the analysis results, we show that the lesser known fuzzy rainbow tradeoff performs better than the original rainbow tradeoff, which is widely believed to be the best tradeoff algorithm. The fuzzy rainbow tradeoff can attain higher online efficiency than the rainbow tradeoff and do so at a lower precomputation cost.

  7. Cryptanalysis of Password Protection of Oracle Database Management System (DBMS)

    Science.gov (United States)

    Koishibayev, Timur; Umarova, Zhanat

    2016-04-01

    This article discusses the currently available encryption algorithms in the Oracle database, also the proposed upgraded encryption algorithm, which consists of 4 steps. In conclusion we make an analysis of password encryption of Oracle Database.

  8. Password compliance for PACS work stations: Implications for ...

    African Journals Online (AJOL)

    2017-12-01

    Dec 1, 2017 ... this reason that the contributions of both human and technical factors in normative ... reflect on the research outcome of the first author's dissertation in .... section, accounting for the 78% use of shared departmental passwords.

  9. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication

    Science.gov (United States)

    Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru

    In this paper, we propose password recovery attacks against challenge-response authentication protocols. Our attacks use a message difference for a MD5 collision attack proposed in IEICE 2008. First, we show how to efficiently find a message pair that collides with the above message difference. Second, we show that a password used in authenticated post office protocol (APOP) can be recovered practically. We also show that the password recovery attack can be applied to a session initiation protocol (SIP) and digest authentication. Our attack can recover up to the first 31 password characters in a short time and up to the first 60 characters faster than the naive search method. We have implemented our attack and confirmed that 31 characters can be successfully recovered.

  10. Distributed One Time Password Infrastructure for Linux Environments

    Directory of Open Access Journals (Sweden)

    Alberto Benito Peral

    2018-04-01

    Full Text Available Nowadays, there is a lot of critical information and services hosted on computer systems. The proper access control to these resources is essential to avoid malicious actions that could cause huge losses to home and professional users. The access control systems have evolved from the first password based systems to the modern mechanisms using smart cards, certificates, tokens, biometric systems, etc. However, when designing a system, it is necessary to take into account their particular limitations, such as connectivity, infrastructure or budget. In addition, one of the main objectives must be to ensure the system usability, but this property is usually orthogonal to the security. Thus, the use of password is still common. In this paper, we expose a new password based access control system that aims to improve password security with the minimum impact in the system usability.

  11. A Distributed Password Scheme for Network Operating Systems

    National Research Council Canada - National Science Library

    Roth, Christopher

    2002-01-01

    Password-based user identification and authentication in a network-based operating system generally relies upon a single file that contains user information and the encoded or hashed representations...

  12. New Algorithm of Automatic Complex Password Generator Employing Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Sura Jasim Mohammed

    2018-01-01

    Full Text Available Due to the occurred increasing in information sharing, internet popularization, E-commerce transactions, and data transferring, security and authenticity become an important and necessary subject. In this paper an automated schema was proposed to generate a strong and complex password which is based on entering initial data such as text (meaningful and simple information or not, with the concept of encoding it, then employing the Genetic Algorithm by using its operations crossover and mutation to generated different data from the entered one. The generated password is non-guessable and can be used in many and different applications and internet services like social networks, secured system, distributed systems, and online services. The proposed password generator achieved diffusion, randomness, and confusions, which are very necessary, required and targeted in the resulted password, in addition to the notice that the length of the generated password differs from the length of initial data, and any simple changing and modification in the initial data produces more and clear modification in the generated password. The proposed work was done using visual basic programing language.

  13. User Behaviours Associated with Password Security and Management

    Directory of Open Access Journals (Sweden)

    Kay Bryant

    2006-11-01

    Full Text Available Control mechanisms established on the boundary of an information system are an important preliminary step to minimising losses from security breaches. The primary function of such controls is to restrict the use of information systems and resources to authorized users. Password-based systems remain the predominant method of user authentication despite the many sophisticated and viable security alternatives that have emerged from research and development. However, the literature shows that passwords are often compromised through the poor security and management practices of users. This paper examines user password composition and security practices for email accounts. The results of a survey that examines user practice in creating and using passwords are reported. The results show that many users know about the risks of hackers, viruses and so on and take preliminary steps to combat them such as having passwords longer than eight characters. However, this appears to be as far as many users are willing to accede to the probability that their information and computing resources can be compromised. This paper makes some recommendations for the education of users in creating and maintaining their passwords. The responsibility for these educational programs can be shared between governments, organisations, educational institutions at all levels, and software vendors.

  14. Provably Secure Password-based Authentication in TLS

    Energy Technology Data Exchange (ETDEWEB)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  15. What do passwords and toothbrushes have in common?

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Your password is your entry token into the digital world. eBay, Amazon, Facebook, Twitter, FNAL, DESY, and CERN - all ask you for a password to authenticate and prove that you are you. And vice versa. If I know your password, I can impersonate you and use your money to buy from eBay or Amazon, post nasty messages on your Twitter or Facebook profile, or misuse CERN's/DESY's/FNAL's computing facilities in your name!   CERN accounts have been compromised in the past and misused to send spam across the world. Are you keen to delete tens of thousands of return e-mails from your mailbox? It's no fun. Would you give me your UBS bankcard and its PIN number? Of course not! Please apply the same sensitivity to your digital credentials, i.e. passwords, SSH keys, certificates, CERN card, etc. Beware of attempts to "steal" your password. CERN's computing staff, including the Computer Security Team, will never ask for your password (nor will any other legitimate person at Facebook, FNAL, eBay...

  16. Statistical analysis of large passwords lists, used to optimize brute force attacks

    CSIR Research Space (South Africa)

    Van Heerden, RP

    2009-03-01

    Full Text Available , necessarily, right? 2.1 Locating Password lists Password lists were located through the Internet by two methods: • Internet search engines • Peer to Peer networks 2.1.1 Internet search engines The three most popular search engines are (Nielsen 2008... response to “password list”. Figure 3: MSN response to “password list”. Figure 4: Google response to “password list” with constraints. The most common password lists found using Internet search engines were default password lists. These lists...

  17. Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers

    Directory of Open Access Journals (Sweden)

    Mohammed Farik

    2015-08-01

    Full Text Available Abstract Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are resistant to brute-force attack. A comparative analysis is performed to show the improved strengths of passwords derived via this algorithm. Implementation of this algorithm in routers will ensure setup of brute-force attack resistant passwords.

  18. Algorithm To Ensure And Enforce Brute-Force Attack-Resilient Password In Routers

    OpenAIRE

    Mohammed Farik; ABM Shawkat Ali

    2015-01-01

    Abstract Issues of weak login passwords arising from default passwords in wired and wireless routers has been a concern for more than a decade. In this research we develop and test an algorithm to ensure and enforce passwords in routers that are resistant to brute-force attack. A comparative analysis is performed to show the improved strengths of passwords derived via this algorithm. Implementation of this algorithm in routers will ensure setup of brute-force attack resistant passwords.

  19. SPAM: Beware of e-mails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  20. Fuzzy logic

    CERN Document Server

    Smets, P

    1995-01-01

    We start by describing the nature of imperfect data, and giving an overview of the various models that have been proposed. Fuzzy sets theory is shown to be an extension of classical set theory, and as such has a proeminent role or modelling imperfect data. The mathematic of fuzzy sets theory is detailled, in particular the role of the triangular norms. The use of fuzzy sets theory in fuzzy logic and possibility theory,the nature of the generalized modus ponens and of the implication operator for approximate reasoning are analysed. The use of fuzzy logic is detailled for application oriented towards process control and database problems.

  1. Fuzzy Languages

    Science.gov (United States)

    Rahonis, George

    The theory of fuzzy recognizable languages over bounded distributive lattices is presented as a paradigm of recognizable formal power series. Due to the idempotency properties of bounded distributive lattices, the equality of fuzzy recognizable languages is decidable, the determinization of multi-valued automata is effective, and a pumping lemma exists. Fuzzy recognizable languages over finite and infinite words are expressively equivalent to sentences of the multi-valued monadic second-order logic. Fuzzy recognizability over bounded ℓ-monoids and residuated lattices is briefly reported. The chapter concludes with two applications of fuzzy recognizable languages to real world problems in medicine.

  2. Password-based authenticated key exchange scheme using smart card

    Science.gov (United States)

    Liu, Hui; Zhong, Shaojun

    2013-03-01

    A protocol that allows any two entities to negotiate a shared session key is commonly called a key exchange protocol. If the protocol provides a function to authenticate each other, we call the protocol authenticated key exchange protocol (AKE). Password authentication key exchange (PAKE) is the AKE protocol in which the two entities share a humanmemorable password. Most of current PAKE relies on the existence of a public key infrastructure, which sometime is impossible for a certain environments such as low computational device due to the computation overhead. In this paper, we propose password-based authenticated key exchange using smart card. Compared to previous PAKE, our protocol is more efficient because our protocol is based on ECC. Thereby, the proposed protocol can be well applied to low computation device.

  3. Cracking PwdHash: A Bruteforce Attack on Client-side Password Hashing

    OpenAIRE

    Llewellyn-Jones, David; Rymer, Graham Matthew

    2017-01-01

    PwdHash is a widely-used tool for client-side password hashing. Originally released as a browser extension, it replaces the user’s password with a hash that combines both the password and the website’s domain. As a result, while the user only remembers a single secret, the passwords received are all unique for each site. We demonstrate how the hashcat password recovery tool can be extended to allow passwords generated using PwdHash to be identified and recovered, revealing the user’s master p...

  4. Fundamentals of sketch-based passwords a general framework

    CERN Document Server

    Riggan, Benjamin S; Wang, Cliff

    2015-01-01

    This SpringerBrief explores graphical password systems and examines novel drawing-based methods in terms of security, usability, and human computer-interactions. It provides a systematic approach for recognizing, comparing, and matching sketch-based passwords in the context of modern computing systems. The book offers both a security and usability analysis of the accumulative framework used for incorporating handwriting biometrics and a human computer-interaction performance analysis. The chapters offer new perspectives and experimental results regarding model uniqueness, recognition tolerance

  5. Password compliance for PACS work stations: Implications for ...

    African Journals Online (AJOL)

    To reflect on the outcome of a dissertation which argues that the minimum standards of effective password use prescribed by the information security sector are not suitable to the emergency-driven medical environment, and that their application as required by law raises new and unforeseen ethical dilemmas. Method.

  6. Appraising the Strength of Users Passwords in Computing Systems ...

    African Journals Online (AJOL)

    Human resources and malicious applications steal user identity, potentially resulting in a direct loss of highly sensitive information and hard currency to affected victims. To protect sensitive information, commercial and corporate sites extensively employ the use of textual passwords, which when used over an encrypted ...

  7. Hardening Azure applications

    CERN Document Server

    Gaurav, Suraj

    2015-01-01

    Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform. This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability when deployed at scale. While the techniques are implemented in .NET and optimized for Azure, the principles here will also be valuable for users of other cloud-based development platforms. Applications come in a variety of forms, from simple apps that can be bui

  8. Radiation hardenable coating mixture

    International Nuclear Information System (INIS)

    Howard, D.D.

    1977-01-01

    This invention relates to coatings that harden under radiation and to their compositions. Specifically, this invention concerns unsaturated urethane resins polymerisable by addition and to compositions, hardening under the effect of radiation, containing these resins. These resins feature the presence of at least one unsaturated ethylenic terminal group of structure CH 2 =C and containing the product of the reaction of an organic isocyanate compound with at least two isocyanate groups and one polyester polyol with at least two hydroxyl groups, and one unsaturated monomer compound polymerisable by addition having a single active hydrogen group reacting with the isocyanate [fr

  9. New Algebraic Groups Produced By Graphical Passwords Based On Colorings And Labellings

    Directory of Open Access Journals (Sweden)

    Sun Hui

    2017-01-01

    Full Text Available Safety of plain text passwords has been questioned in current researching information passwords. Graphical passwords are another way for alternative text-based passwords and to improve the user account security. As we are constructing Topsnut-graphical passwords that can be traced to an idea of “Graph structure plus the number theory” proposed first by Hongyu Wang with her colleagues, we find that some of Topsnut-graphical passwords can be composed of algebraic groups under the principle of Abelian additive finite group. We apply the odd-elegant labelling of graph theory to produce Topsnut-graphical passwords, and verify our Topsnut-graphical passwords can form algebraic groups, called labelling graphical groups. Our results can provide those users who have business in two or more banks, and our methods are easily transformed into algorithms with polynomial times.

  10. Analysis Of Default Passwords In Routers Against Brute-Force Attack

    OpenAIRE

    Mohammed Farik; ABM Shawkat Ali

    2015-01-01

    Abstract Password authentication is the main means of access control on network routers and router manufacturers provide a default password for initial login to the router. While there has been many publications regarding the minimum requirements of a good password how widely the manufacturers themselves are adhering to the minimum standards and whether these passwords can withstand brute-force attack are not widely known. The novelty of this research is that this is the first time default...

  11. Relational Demonic Fuzzy Refinement

    Directory of Open Access Journals (Sweden)

    Fairouz Tchier

    2014-01-01

    Full Text Available We use relational algebra to define a refinement fuzzy order called demonic fuzzy refinement and also the associated fuzzy operators which are fuzzy demonic join (⊔fuz, fuzzy demonic meet (⊓fuz, and fuzzy demonic composition (□fuz. Our definitions and properties are illustrated by some examples using mathematica software (fuzzy logic.

  12. Concrete, hardened: Self desiccation

    DEFF Research Database (Denmark)

    Hansen, Ernst Jan De Place; Hansen, Kurt Kielsgaard; Persson, Bertil

    1999-01-01

    The test method covers the determination of internal relative humidity (RH) in hardened concrete and cement mortar using RH instruments. The determination of RH is done on crushed samples of concrete or cement motar. This test method is only for measuring equipment which gives off or takes up...

  13. On the Fuzzy Convergence

    Directory of Open Access Journals (Sweden)

    Abdul Hameed Q. A. Al-Tai

    2011-01-01

    Full Text Available The aim of this paper is to introduce and study the fuzzy neighborhood, the limit fuzzy number, the convergent fuzzy sequence, the bounded fuzzy sequence, and the Cauchy fuzzy sequence on the base which is adopted by Abdul Hameed (every real number r is replaced by a fuzzy number r¯ (either triangular fuzzy number or singleton fuzzy set (fuzzy point. And then, we will consider that some results respect effect of the upper sequence on the convergent fuzzy sequence, the bounded fuzzy sequence, and the Cauchy fuzzy sequence.

  14. How secure is your information system? An investigation into actual healthcare worker password practices.

    Science.gov (United States)

    Cazier, Joseph A; Medlin, B Dawn

    2006-09-27

    For most healthcare information systems, passwords are the first line of defense in keeping patient and administrative records private and secure. However, this defense is only as strong as the passwords employees chose to use. A weak or easily guessed password is like an open door to the medical records room, allowing unauthorized access to sensitive information. In this paper, we present the results of a study of actual healthcare workers' password practices. In general, the vast majority of these passwords have significant security problems on several dimensions. Implications for healthcare professionals are discussed.

  15. General Framework for Evaluating Password Complexity and Strength

    Science.gov (United States)

    2015-11-15

    MD5 or SHA-1. Finally, an adversary is represented 1. We will drop the subscript when it is clear which alphabet is being considered. 2. We use an...when information about protection function or attacker’s capabil- ities is not clear (the most typical scenario when users are asked to select a...stronger password requirements: User attitudes and behaviors,” in Pro- ceedings of the Sixth Symposium on Usable Privacy and Security, ser. SOUPS ’10. New

  16. RHOBOT: Radiation hardened robotics

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, P.C.; Posey, L.D. [Sandia National Labs., Albuquerque, NM (United States)

    1997-10-01

    A survey of robotic applications in radioactive environments has been conducted, and analysis of robotic system components and their response to the varying types and strengths of radiation has been completed. Two specific robotic systems for accident recovery and nuclear fuel movement have been analyzed in detail for radiation hardness. Finally, a general design approach for radiation-hardened robotics systems has been developed and is presented. This report completes this project which was funded under the Laboratory Directed Research and Development program.

  17. RHOBOT: Radiation hardened robotics

    International Nuclear Information System (INIS)

    Bennett, P.C.; Posey, L.D.

    1997-10-01

    A survey of robotic applications in radioactive environments has been conducted, and analysis of robotic system components and their response to the varying types and strengths of radiation has been completed. Two specific robotic systems for accident recovery and nuclear fuel movement have been analyzed in detail for radiation hardness. Finally, a general design approach for radiation-hardened robotics systems has been developed and is presented. This report completes this project which was funded under the Laboratory Directed Research and Development program

  18. Grind hardening process

    CERN Document Server

    Salonitis, Konstantinos

    2015-01-01

    This book presents the grind-hardening process and the main studies published since it was introduced in 1990s.  The modelling of the various aspects of the process, such as the process forces, temperature profile developed, hardness profiles, residual stresses etc. are described in detail. The book is of interest to the research community working with mathematical modeling and optimization of manufacturing processes.

  19. Radiation hardening coating material

    International Nuclear Information System (INIS)

    McDonald, W.H.; Prucnal, P.J.; DeMajistre, Robert.

    1977-01-01

    This invention concerns a radiation hardening coating material. First a resin is prepared by reaction of bisphenol diglycidylic ether with acrylic or methacrylic acids. Then the reactive solvent is prepared by reaction of acrylic or methacrylic acids with epichlorhydrine or epibromhydrine. Then a solution consisting of the resin dissolved in the reactive solvent is prepared. A substrate (wood, paper, polyesters, polyamines etc.) is coated with this composition and exposed to ionizing radiations (electron beams) or ultraviolet radiations [fr

  20. Fuzzy promises

    DEFF Research Database (Denmark)

    Anker, Thomas Boysen; Kappel, Klemens; Eadie, Douglas

    2012-01-01

    as narrative material to communicate self-identity. Finally, (c) we propose that brands deliver fuzzy experiential promises through effectively motivating consumers to adopt and play a social role implicitly suggested and facilitated by the brand. A promise is an inherently ethical concept and the article...... concludes with an in-depth discussion of fuzzy brand promises as two-way ethical commitments that put requirements on both brands and consumers....

  1. Analysis Of Default Passwords In Routers Against Brute-Force Attack

    Directory of Open Access Journals (Sweden)

    Mohammed Farik

    2015-08-01

    Full Text Available Abstract Password authentication is the main means of access control on network routers and router manufacturers provide a default password for initial login to the router. While there has been many publications regarding the minimum requirements of a good password how widely the manufacturers themselves are adhering to the minimum standards and whether these passwords can withstand brute-force attack are not widely known. The novelty of this research is that this is the first time default passwords have been analyzed and documented from such a large variety of router models to reveal password strengths or weaknesses against brute-force attacks. Firstly individual default router password of each model was collected tabulated and tested using password strength meter for entropy. Then descriptive statistical analysis was performed on the tabulated data. The analysis revealed quantitatively how strong or weak default passwords are against brute-force attacks. The results of this research give router security researchers router manufacturers router administrators a useful guide on the strengths and weaknesses of passwords that follow similar patterns.

  2. The password practices applied by South African online consumers: Perception versus reality

    Directory of Open Access Journals (Sweden)

    Rika Butler

    2015-07-01

    Full Text Available Background: The ability to identify and authenticate users is regarded as the foundation of computer security. Although new authentication technologies are evolving, passwords are the most common method used to control access in most computer systems. Research suggests that a large portion of computer security password breaches are the result of poor user security behaviour. The password creation and management practices that online consumers apply have a direct effect on the level of computer security and are often targeted in attacks. Objectives: The objective of this study was to investigate South African online consumers’ computer password security practices and to determine whether consumers’ perceptions regarding their password security ability is reflected in the password creation and management practices that they apply. Method: A Web-based survey was designed to (1 determine online consumers’ perceptions of their skills and competence in respect of computer password security and (2 determine the practices that South African online consumers apply when creating and managing passwords. The measures applied were then compared to (1 the users’ perceptions about their computer password security abilities and (2 the results of international studies to determine agreement and inconsistencies. Results: South African online consumers regard themselves as proficient password users. However, various instances of unsafe passwords practices were identified. The results of this South African study correspond with the results of various international studies confirming that challenges to ensure safe online transacting are in line with international challenges. Conclusion: There is a disparity between South African online consumers’ perceived ability regarding computer password security and the password creation and management practices that they apply.

  3. Practical aspects of systems hardening

    International Nuclear Information System (INIS)

    Shepherd, W.J.

    1989-01-01

    Applications of hardening technology in a practical system require a balance between the factors governing affordability, producibility, and survivability of the finished design. Without careful consideration of the top-level system operating constraints, a design engineer may find himself with a survivable but overweight, unproductive, expensive design. This paper explores some lessons learned in applying hardening techniques to several laser communications programs and is intended as an introductory guide to novice designers faced with the task of hardening a space system

  4. Nuclear effects hardened shelters

    International Nuclear Information System (INIS)

    Lindke, P.

    1990-01-01

    This paper reports on the Houston Fearless 76 Government Projects Group that has been actively engaged for more than twenty-five years as a sub-contractor and currently as a prime contractor in the design, manufacture, repair and logistics support of custom mobile ground stations and their equipment accommodations. Other associated products include environmental control units (ECU's), mobilizers for shelters and a variety of mobile power generation units (MPU's). Since 1984, Houston Fearless 76 has designed and manufactured four 8 foot by 8 foot x 22 foot nuclear hardened mobile shelters. These shelters were designed to contain electronic data processing/reduction equipment. One shelter is currently being operated by the Air Force as a Defense Intelligence Agency (DIA) approved and certified Special Compartmented Information Facility (SCIF). During the development and manufacturing process of the shelters, we received continual technical assistance and design concept evaluations from Science Applications International Corporation (SAIC) Operations Analysis and Logistics Engineering Division and the Nondestructive Inspection Lab at McClellan AFB. SAIC was originally employed by the Air Force to design the nuclear hardening specifications applied to these shelters

  5. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Directory of Open Access Journals (Sweden)

    Seung-hwan Ju

    2013-01-01

    Full Text Available The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  6. A study on user authentication methodology using numeric password and fingerprint biometric information.

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  7. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  8. All in a day's work: Password cracking for the rest of us

    OpenAIRE

    Blakstad, Jørgen Wahl; Nergård, Rune; Jaatun, Martin Gilje; Gligoroski, Danilo

    2009-01-01

    The majority of computer systems are still protected primarily with a user name and password, and many users employ the same password on multiple systems. Additionally, some of the most popular operating systems such as Windows XP, Windows Vista and the upcoming Windows 7, still use ad-hoc constructed hash functions such as LM, while many Linux variants use the broken hash function MD5. This paper describes an experiment where we have tested the strengthof a selection of passwords when conver...

  9. Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones

    DEFF Research Database (Denmark)

    Meng, Weizhi; Li, Wenjuan; Kwok, Lam For

    2017-01-01

    Graphical passwords (GPs) are recognised as one of the potential alternatives in addressing the limitations in conventional text-based password authentication. With the rapid development of mobile devices (i.e., the increase of computing power), GP-based systems have already been implemented...... and its impact on graphical password creation is an important topic in the literature. In this paper, our interest is to investigate the influence of multi-touch behaviours on users’ habit in creating graphical passwords, especially on click-draw based GPs (shortly CD-GPS) on mobile devices...

  10. Improving computer security for authentication of users: influence of proactive password restrictions.

    Science.gov (United States)

    Proctor, Robert W; Lien, Mei-Ching; Vu, Kim-Phuong L; Schultz, E Eugene; Salvendy, Gavriel

    2002-05-01

    Entering a username-password combination is a widely used procedure for identification and authentication in computer systems. However, it is a notoriously weak method, in that the passwords adopted by many users are easy to crack. In an attempt to improve security, proactive password checking may be used, in which passwords must meet several criteria to be more resistant to cracking. In two experiments, we examined the influence of proactive password restrictions on the time that it took to generate an acceptable password and to use it subsequently to long in. The required length was a minimum of five characters in Experiment 1 and eight characters in Experiment 2. In both experiments, one condition had only the length restriction, and the other had additional restrictions. The additional restrictions greatly increased the time it took to generate the password but had only a small effect on the time it took to use it subsequently to long in. For the five-character passwords, 75% were cracked when no other restrictions were imposed, and this was reduced to 33% with the additional restrictions. For the eight-character passwords, 17% were cracked with no other restrictions, and 12.5% with restrictions. The results indicate that increasing the minimum character length reduces crackability and increases security, regardless of whether additional restrictions are imposed.

  11. Voice Biometrics as a Way to Self-service Password Reset

    Science.gov (United States)

    Hohgräfe, Bernd; Jacobi, Sebastian

    Password resets are time consuming. Especially when urgent jobs need to be done, it is cumbersome to inform the user helpdesk, to identify oneself and then to wait for response. It is easy to enter a wrong password multiple times, which leads to the blocking of the application. Voice biometrics is an easy and secure way for individuals to reset their own password. Read more about how you can ease the burden of your user helpdesk and how voice biometric password resets benefit your expense situation without harming your security.

  12. Assessment of current practices in creating and using passwords as a control mechanism for information access

    Directory of Open Access Journals (Sweden)

    P. L. Wessels

    2007-11-01

    Full Text Available One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information.

  13. Individual differences in cyber security behaviors: an examination of who is sharing passwords.

    Science.gov (United States)

    Whitty, Monica; Doodson, James; Creese, Sadie; Hodges, Duncan

    2015-01-01

    In spite of the number of public advice campaigns, researchers have found that individuals still engage in risky password practices. There is a dearth of research available on individual differences in cyber security behaviors. This study focused on the risky practice of sharing passwords. As predicted, we found that individuals who scored high on a lack of perseverance were more likely to share passwords. Contrary to our hypotheses, we found younger [corrected] people and individuals who score high on self-monitoring were more likely to share passwords. We speculate on the reasons behind these findings, and examine how they might be considered in future cyber security educational campaigns.

  14. Computer Security: Enter the Cloud, pay with your password

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Let me tell you a story that recently happened to a colleague of mine. She was looking for a nice e-mail client for her brand new Android smartphone. She found several apps suiting her needs, installed all of them on her phone, configured them with her CERN password so that they could access her CERN e-mails and tested them thoroughly. In the end, she was happy with one and deleted the other apps.   But she wasn’t happy for long: over the following days, she realized that many new e-mails in her CERN mailbox were mysteriously marked as “read” despite her never having accessed them. A dedicated analysis of the CERN e-mail logs showed that one of the e-mail app providers was still downloading her emails - even though she had uninstalled the corresponding app from her smartphone. In fact, her CERN password had ended up in the Cloud, continuing to allow access to her inbox (similar to what Google does when you let Gmail pull your e-mails from your CERN mailbox). Neit...

  15. Fuzzy Clustering

    DEFF Research Database (Denmark)

    Berks, G.; Keyserlingk, Diedrich Graf von; Jantzen, Jan

    2000-01-01

    A symptom is a condition indicating the presence of a disease, especially, when regarded as an aid in diagnosis.Symptoms are the smallest units indicating the existence of a disease. A syndrome on the other hand is an aggregate, set or cluster of concurrent symptoms which together indicate...... and clustering are the basic concerns in medicine. Classification depends on definitions of the classes and their required degree of participant of the elements in the cases' symptoms. In medicine imprecise conditions are the rule and therefore fuzzy methods are much more suitable than crisp ones. Fuzzy c......-mean clustering is an easy and well improved tool, which has been applied in many medical fields. We used c-mean fuzzy clustering after feature extraction from an aphasia database. Factor analysis was applied on a correlation matrix of 26 symptoms of language disorders and led to five factors. The factors...

  16. Diamond Fuzzy Number

    Directory of Open Access Journals (Sweden)

    T. Pathinathan

    2015-01-01

    Full Text Available In this paper we define diamond fuzzy number with the help of triangular fuzzy number. We include basic arithmetic operations like addition, subtraction of diamond fuzzy numbers with examples. We define diamond fuzzy matrix with some matrix properties. We have defined Nested diamond fuzzy number and Linked diamond fuzzy number. We have further classified Right Linked Diamond Fuzzy number and Left Linked Diamond Fuzzy number. Finally we have verified the arithmetic operations for the above mentioned types of Diamond Fuzzy Numbers.

  17. "Fuzzy stuff"

    DEFF Research Database (Denmark)

    Christensen, Line Hjorth

    "Fuzzy stuff". Exploring the displacement of the design sketch. What kind of knowledge can historical sketches reveal when they have outplayed their primary instrumental function in the design process and are moved into a museum collection? What are the rational benefits of ‘archival displacement...

  18. Password Complexity Recommendations: xezandpAxat8Um or P4$$w0rd!!!!

    Science.gov (United States)

    2014-10-01

    have we seen the computer screen with fast- scrolling characters, with good answers being indicated one by one? This is not a MasterMind game ! Password...security/2013/ 05/how-crackers-make-minced- meat -out-of-your-passwords (Access Date: 2014-04-02). 18 DRDC-RDDC-2014-R27 DOCUMENT CONTROL DATA (Security

  19. Multi-agent integrated password management (MIPM) application secured with encryption

    Science.gov (United States)

    Awang, Norkhushaini; Zukri, Nurul Hidayah Ahmad; Rashid, Nor Aimuni Md; Zulkifli, Zuhri Arafah; Nazri, Nor Afifah Mohd

    2017-10-01

    Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128-bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.

  20. Relational Demonic Fuzzy Refinement

    OpenAIRE

    Tchier, Fairouz

    2014-01-01

    We use relational algebra to define a refinement fuzzy order called demonic fuzzy refinement and also the associated fuzzy operators which are fuzzy demonic join $({\\bigsqcup }_{\\mathrm{\\text{f}}\\mathrm{\\text{u}}\\mathrm{\\text{z}}})$ , fuzzy demonic meet $({\\sqcap }_{\\mathrm{\\text{f}}\\mathrm{\\text{u}}\\mathrm{\\text{z}}})$ , and fuzzy demonic composition $({\\square }_{\\mathrm{\\text{f}}\\mathrm{\\text{u}}\\mathrm{\\text{z}}})$ . Our definitions and properties are illustrated by some examples using ma...

  1. Exploring Topsnut-Graphical Passwords by Twin Odd-elegant Trees

    Directory of Open Access Journals (Sweden)

    Wang Hong-yu

    2017-01-01

    Full Text Available Graphical passwords are facing a good opportunity as 2-dimension codes are accepted by many people, since it has been applied in mobile devices, electronic equipments with touch screen, and so on. QR codes can be considered as a type of graphical passwords. Topsnut-graphical password differs from the existing graphical passwords, and has been investigated and developed. In this article, a new type of Topsnut-graphical passwords has been designed by technique of graph theory, called twin odd-elegant labelling. We make the twin odd-elegant graphs for one-key vs two or more locks (conversely, one-lock vs two or more keys. These Topsnut-GPWs show perfect matching characteristics of locks (TOE-lock-models and keys (TOE-key-models. We show examples for testing our methods which can be easily transformed into effective algorithms.

  2. Privacy Leakage in Mobile Sensing: Your Unlock Passwords Can Be Leaked through Wireless Hotspot Functionality

    Directory of Open Access Journals (Sweden)

    Jie Zhang

    2016-01-01

    Full Text Available Mobile sensing has become a new style of applications and most of the smart devices are equipped with varieties of sensors or functionalities to enhance sensing capabilities. Current sensing systems concentrate on how to enhance sensing capabilities; however, the sensors or functionalities may lead to the leakage of users’ privacy. In this paper, we present WiPass, a way to leverage the wireless hotspot functionality on the smart devices to snoop the unlock passwords/patterns without the support of additional hardware. The attacker can “see” your unlock passwords/patterns even one meter away. WiPass leverages the impacts of finger motions on the wireless signals during the unlocking period to analyze the passwords/patterns. To practically implement WiPass, we are facing the difficult feature extraction and complex unlock passwords matching, making the analysis of the finger motions challenging. To conquer the challenges, we use DCASW to extract feature and hierarchical DTW to do unlock passwords matching. Besides, the combination of amplitude and phase information is used to accurately recognize the passwords/patterns. We implement a prototype of WiPass and evaluate its performance under various environments. The experimental results show that WiPass achieves the detection accuracy of 85.6% and 74.7% for passwords/patterns detection in LOS and in NLOS scenarios, respectively.

  3. DETEKSI KEDIPAN MATA DENGAN HAAR CASCADE CLASSIFIER DAN CONTOUR UNTUK PASSWORD LOGIN SISTEM

    Directory of Open Access Journals (Sweden)

    Muhammad Syarif

    2015-11-01

    Full Text Available Keamanan  merupakan menjadi prioritas utama dalam era teknologi informasi, yang meliputi keamanan data, hardware atau software. Untuk menjaga keamanan diperlukan data pribadi sebagai autentifikasi dan validasi pengguna yang sah. Password merupakan data pribadi yang dimasukan pengguna secara langsung melalui keyboard. Memasukan data password melalui keyboard mudah dicuri dengan aplikasi Keylogger. Tahun 2008, 78% terdapat ancaman pencurian informasi rahasia data pengguna, dan 76% menggunakan komponen keystroke logging untuk mencuri informasi seperti akun bank online. beberapa variasi password yang dapat meminimalisir interaksi langsung pengguna dengan keyboard adalah memanfaatkan kedipan mata menjadi password. Dalam paper ini akan di pakai teknik Haar Cascade Classifier sebagai metode deteksi bagian tubuh tertentu suatu obyek, dan metode Contour sebagai deteksi kontur pada object spesifik, teknik ini dapat mendeteksi mata dan indikasi adanya kedipan, berdasarkan jarak, posisi obyek dan posisi sumber cahaya tertentu.Hasil dari penelitian yang di lakukan dengan memanfaatkan template deteksi kontur mata sempurna sebagai acuan kedipan mata. Nilai threshold juga berpengaruh pada hasil kontur yang dihasilkan dari berbagai jenis mata baik bentuk maupun warnanya. Berdasarkan hasil pengujian terhadap 15 sampel password kedipan, didapatkan akurasi 71,43 %, dan pengujian keystroke dengan aplikasi keylogger, password kedipan tidak terekam dalam log file keylogger. Kata Kunci: Deteksi kedipan mata, Haar cascade Classifier, Contour, password, login sistem.

  4. Radiation-hardenable diluents for radiation-hardenable compositions

    International Nuclear Information System (INIS)

    Schuster, K.E.; Rosenkranz, H.J.; Furh, K.; Ruedolph, H.

    1979-01-01

    Radiation-crosslinkable diluents for radiation-hardenable compositions (binders) consisting of a mixture of triacrylates of a reaction product of trimethylol propane and ethylene oxide with an average degree of ethoxylation of from 2.5 to 4 are described. The ethoxylated trimethylol propane is substantially free from trimethylol propane and has the following distribution: 4 to 5% by weight of monoethoxylation product, 14 to 16% by weight of diethoxylation product, 20 to 30% by weight of triethoxylation product, 20 to 30% by weight of tetraethoxylation product, 16 to 18% by weight of pentaethoxylation product, and 6 to 8% by weight of hexaethoxylation product. The diluents effectively reduce the viscosity of radiation-hardenable compositions and do not have any adverse effect upon their reactivity or upon the properties of the resulting hardened products

  5. Introduction to fuzzy systems

    CERN Document Server

    Chen, Guanrong

    2005-01-01

    Introduction to Fuzzy Systems provides students with a self-contained introduction that requires no preliminary knowledge of fuzzy mathematics and fuzzy control systems theory. Simplified and readily accessible, it encourages both classroom and self-directed learners to build a solid foundation in fuzzy systems. After introducing the subject, the authors move directly into presenting real-world applications of fuzzy logic, revealing its practical flavor. This practicality is then followed by basic fuzzy systems theory. The book also offers a tutorial on fuzzy control theory, based mainly on th

  6. The weak-password problem: Chaos, criticality, and encrypted p-CAPTCHAs

    Science.gov (United States)

    Laptyeva, T. V.; Flach, S.; Kladko, K.

    2011-09-01

    Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak-password problem. Building upon chaotic dynamics, criticality at phase transitions, CAPTCHA recognition, and computational round-off errors, we design an algorithm that strengthens the security of passwords. The core idea of our simple method is to split a long and secure password into two components. The first component is memorized by the user. The second component is transformed into a CAPTCHA image and then protected using the evolution of a two-dimensional dynamical system close to a phase transition, in such a way that standard brute-force attacks become ineffective. We expect our approach to have wide applications for authentication and encryption technologies.

  7. Optical image encryption using password key based on phase retrieval algorithm

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2016-04-01

    A novel optical image encryption system is proposed using password key based on phase retrieval algorithm (PRA). In the encryption process, a shared image is taken as a symmetric key and the plaintext is encoded into the phase-only mask based on the iterative PRA. The linear relationship between the plaintext and ciphertext is broken using the password key, which can resist the known plaintext attack. The symmetric key and the retrieved phase are imported into the input plane and Fourier plane of 4f system during the decryption, respectively, so as to obtain the plaintext on the CCD. Finally, we analyse the key space of the password key, and the results show that the proposed scheme can resist a brute force attack due to the flexibility of the password key.

  8. Using Combined One-Time Password for Prevention of Phishing Attacks

    Directory of Open Access Journals (Sweden)

    S. Nasiri

    2017-12-01

    Full Text Available Αs technologies and communications develop, more sabotaging attacks occur including phishing attacks which jeopardize users' security and critical information like their passwords and credentials. Several solutions have been proposed for existing dangers. One of which is the use of one-time passwords. This issue has remained as a main challenge and requires more extensive research. In this research, we have focused on one-time password combinations and we also have proposed solutions based on behavioral patterns which lead to significant optimizations while tending the simplicity for users. Efficiency of the proposed method has been measured through defining scenarios, modeling and simulations based on a prevention rate index. In addition, complexity coefficient of the proposed method showing the probability of unpredictability of passwords for attackers has been calculated. Ultimately, a descriptive comparison has shown that the proposed method is superior to some of the existing methods.

  9. An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards

    OpenAIRE

    Pathan, Al-Sakib Khan; Hong, Choong Seon

    2007-01-01

    With the recent proliferation of distributed systems and networking, remote authentication has become a crucial task in many networking applications. Various schemes have been proposed so far for the two-party remote authentication; however, some of them have been proved to be insecure. In this paper, we propose an efficient timestamp-based password authentication scheme using smart cards. We show various types of forgery attacks against a previously proposed timestamp-based password authenti...

  10. METODE RESET PASSWORD LEVEL ROOT PADA RELATIONAL DATABASE MANAGEMENT SYSTEM (RDBMS MySQL

    Directory of Open Access Journals (Sweden)

    Taqwa Hariguna

    2011-08-01

    Full Text Available Database merupakan sebuah hal yang penting untuk menyimpan data, dengan database organisasi akan mendapatkan keuntungan dalam beberapa hal, seperti kecepatan akases dan mengurangi penggunaan kertas, namun dengan implementasi database tidak jarang administrator database lupa akan password yang digunakan, hal ini akan mempersulit dalam proses penangganan database. Penelitian ini bertujuan untuk menggali cara mereset password level root pada relational database management system MySQL.

  11. Intuitionistic supra fuzzy topological spaces

    International Nuclear Information System (INIS)

    Abbas, S.E.

    2004-01-01

    In this paper, We introduce an intuitionistic supra fuzzy closure space and investigate the relationship between intuitionistic supra fuzzy topological spaces and intuitionistic supra fuzzy closure spaces. Moreover, we can obtain intuitionistic supra fuzzy topological space induced by an intuitionistic fuzzy bitopological space. We study the relationship between intuitionistic supra fuzzy closure space and the intuitionistic supra fuzzy topological space induced by an intuitionistic fuzzy bitopological space

  12. Hesitant fuzzy sets theory

    CERN Document Server

    Xu, Zeshui

    2014-01-01

    This book provides the readers with a thorough and systematic introduction to hesitant fuzzy theory. It presents the most recent research results and advanced methods in the field. These includes: hesitant fuzzy aggregation techniques, hesitant fuzzy preference relations, hesitant fuzzy measures, hesitant fuzzy clustering algorithms and hesitant fuzzy multi-attribute decision making methods. Since its introduction by Torra and Narukawa in 2009, hesitant fuzzy sets have become more and more popular and have been used for a wide range of applications, from decision-making problems to cluster analysis, from medical diagnosis to personnel appraisal and information retrieval. This book offers a comprehensive report on the state-of-the-art in hesitant fuzzy sets theory and applications, aiming at becoming a reference guide for both researchers and practitioners in the area of fuzzy mathematics and other applied research fields (e.g. operations research, information science, management science and engineering) chara...

  13. Fuzzy logic in management

    CERN Document Server

    Carlsson, Christer; Fullér, Robert

    2004-01-01

    Fuzzy Logic in Management demonstrates that difficult problems and changes in the management environment can be more easily handled by bringing fuzzy logic into the practice of management. This explicit theme is developed through the book as follows: Chapter 1, "Management and Intelligent Support Technologies", is a short survey of management leadership and what can be gained from support technologies. Chapter 2, "Fuzzy Sets and Fuzzy Logic", provides a short introduction to fuzzy sets, fuzzy relations, the extension principle, fuzzy implications and linguistic variables. Chapter 3, "Group Decision Support Systems", deals with group decision making, and discusses methods for supporting the consensus reaching processes. Chapter 4, "Fuzzy Real Options for Strategic Planning", summarizes research where the fuzzy real options theory was implemented as a series of models. These models were thoroughly tested on a number of real life investments, and validated in 2001. Chapter 5, "Soft Computing Methods for Reducing...

  14. Why fuzzy controllers should be fuzzy

    International Nuclear Information System (INIS)

    Nowe, A.

    1996-01-01

    Fuzzy controllers are usually looked at as crisp valued mappings especially when artificial intelligence learning techniques are used to build up the controller. By doing so the semantics of a fuzzy conclusion being a fuzzy restriction on the viable control actions is non-existing. In this paper the authors criticise from an approximation point of view using a fuzzy controller to express a crisp mapping does not seem the right way to go. Secondly it is illustrated that interesting information is contained in a fuzzy conclusion when indeed this conclusion is considered as a fuzzy restriction. This information turns out to be very valuable when viability problems are concerned, i.e. problems where the objective is to keep a system within predefined boundaries

  15. Working hardening modelization in zirconium alloys

    International Nuclear Information System (INIS)

    Sanchez, P.; Pochettino, Alberto A.

    1999-01-01

    Working hardening effects on mechanical properties and crystallographic textures formation in Zr-based alloys are studied. The hardening mechanisms for different grain deformations and topological conditions of simple crystal yield are considered. Results obtained show that the differences in the cold rolling textures (L and T textures) can be related with hardening microstructural parameters. (author)

  16. Fuzzy Neuroidal Nets and Recurrent Fuzzy Computations

    Czech Academy of Sciences Publication Activity Database

    Wiedermann, Jiří

    2001-01-01

    Roč. 11, č. 6 (2001), s. 675-686 ISSN 1210-0552. [SOFSEM 2001 Workshop on Soft Computing. Piešťany, 29.11.2001-30.11.2001] R&D Projects: GA ČR GA201/00/1489; GA AV ČR KSK1019101 Institutional research plan: AV0Z1030915 Keywords : fuzzy computing * fuzzy neural nets * fuzzy Turing machines * non-uniform computational complexity Subject RIV: BA - General Mathematics

  17. Solution hardening and strain hardening at elevated temperatures

    International Nuclear Information System (INIS)

    Kocks, U.F.

    1982-10-01

    Solutes can significantly increase the rate of strain hardening; as a consequence, the saturation stress, at which strain hardening tends to cease for a given temperature and strain rate, is increased more than the yield stress: this is the major effect of solutes on strength at elevated temperatures, especially in the regime where dynamic strain-aging occurs. It is shown that local solute mobility can affect both the rate of dynamic recovery and the dislocation/dislocation interaction strength. The latter effect leads to multiplicative solution strengthening. It is explained by a new model based on repeated dislocation unlocking, in a high-temperature limit, which also rationalizes the stress dependence of static and dynamic strain-aging, and may help explain the plateau of the yield stress at elevated temperatures. 15 figures

  18. Fuzzy Itand#244; Integral Driven by a Fuzzy Brownian Motion

    Directory of Open Access Journals (Sweden)

    Didier Kumwimba Seya

    2015-11-01

    Full Text Available In this paper we take into account the fuzzy stochastic integral driven by fuzzy Brownian motion. To define the metric between two fuzzy numbers and to take into account the limit of a sequence of fuzzy numbers, we invoke the Hausdorff metric. First this fuzzy stochastic integral is constructed for fuzzy simple stochastic functions, then the construction is done for fuzzy stochastic integrable functions.

  19. Radiation-hardened bulk CMOS technology

    International Nuclear Information System (INIS)

    Dawes, W.R. Jr.; Habing, D.H.

    1979-01-01

    The evolutionary development of a radiation-hardened bulk CMOS technology is reviewed. The metal gate hardened CMOS status is summarized, including both radiation and reliability data. The development of a radiation-hardened bulk silicon gate process which was successfully implemented to a commercial microprocessor family and applied to a new, radiation-hardened, LSI standard cell family is also discussed. The cell family is reviewed and preliminary characterization data is presented. Finally, a brief comparison of the various radiation-hardened technologies with regard to performance, reliability, and availability is made

  20. Superheat effect on bainite steel hardenability

    International Nuclear Information System (INIS)

    Kubachek, V.V.; Sklyuev, P.V.

    1978-01-01

    The bainite hardenability of 34KhN1M and 35 KhN1M2Ph steels has been investigated by the end-face hardening technique. It is established that, as the temperature of austenitization rises from 900 to 1280 deg C, the temperature of bainite transformation increases and bainite hardenability of the steels falls off. A repeated slow heating to 900 deg C of previously overheated 34KhN1M steel breaks up grain, lowers the temperature of the bainite transformation and raises the hardenability to values obtained with ordinary hardening from 900 deg C. A similar heating of previously overheated 35KhN1M2Ph steel is accompanied by restoration of initial coarse grains and maintenance of both the elevated bainite transformation temperature and to lower hardenability corresponding to hardening from the temperature of previous overheating

  1. A non-linear kinematic hardening function

    International Nuclear Information System (INIS)

    Ottosen, N.S.

    1977-05-01

    Based on the classical theory of plasticity, and accepting the von Mises criterion as the initial yield criterion, a non-linear kinematic hardening function applicable both to Melan-Prager's and to Ziegler's hardening rule is proposed. This non-linear hardening function is determined by means of the uniaxial stress-strain curve, and any such curve is applicable. The proposed hardening function considers the problem of general reversed loading, and a smooth change in the behaviour from one plastic state to another nearlying plastic state is obtained. A review of both the kinematic hardening theory and the corresponding non-linear hardening assumptions is given, and it is shown that material behaviour is identical whether Melan-Prager's or Ziegler's hardening rule is applied, provided that the von Mises yield criterion is adopted. (author)

  2. Radiation hardening of semiconductor parts

    International Nuclear Information System (INIS)

    Anon.

    1993-01-01

    This chapter is an overview of total-ionizing-dose and single-event hardening techniques and should be used as a guide to a range of research publications. It should be stressed that there is no clear and simple route to a radiation-tolerant silicon integrated circuit. What works for one fabrication process may not work for another, and there are many complex interactions within individual processes and designs. The authors have attempted to highlight the most important factors and those process changes which should bring improved hardness. The main point is that radiation-hardening as a procedure must be approached in a methodical fashion and with a good understanding of the response mechanisms involved

  3. Scintillation-Hardened GPS Receiver

    Science.gov (United States)

    Stephens, Donald R.

    2015-01-01

    CommLargo, Inc., has developed a scintillation-hardened Global Positioning System (GPS) receiver that improves reliability for low-orbit missions and complies with NASA's Space Telecommunications Radio System (STRS) architecture standards. A software-defined radio (SDR) implementation allows a single hardware element to function as either a conventional radio or as a GPS receiver, providing backup and redundancy for platforms such as the International Space Station (ISS) and high-value remote sensing platforms. The innovation's flexible SDR implementation reduces cost, weight, and power requirements. Scintillation hardening improves mission reliability and variability. In Phase I, CommLargo refactored an open-source GPS software package with Kalman filter-based tracking loops to improve performance during scintillation and also demonstrated improved navigation during a geomagnetic storm. In Phase II, the company generated a new field-programmable gate array (FPGA)-based GPS waveform to demonstrate on NASA's Space Communication and Navigation (SCaN) test bed.

  4. Radiation-hardened control system

    International Nuclear Information System (INIS)

    Vandermolen, R.I.; Smith, S.F.; Emery, M.S.

    1993-01-01

    A radiation-hardened bit-slice control system with associated input/output circuits was developed to prove that programmable circuits could be constructed to successfully implement intelligent functions in a highly radioactive environment. The goal for this effort was to design and test a programmable control system that could withstand a minimum total dose of 10 7 rads (gamma). The Radiation Hardened Control System (RHCS) was tested in operation at a dose rate that ranged up to 135 krad/h, with an average total dose of 10.75 Mrads. Further testing beyond the required 10 7 rads was also conducted. RHCS performed properly through the target dose of 10 7 rads, and sporadic intermittent failures in some programmable logic devices were noted after ∼ 13 Mrads

  5. Energetic model of metal hardening

    Directory of Open Access Journals (Sweden)

    Ignatova O.N.

    2011-01-01

    Full Text Available Based on Bailey hypothesis on the link between strain hardening and elastic lattice defect energy this paper suggests a shear strength energetic model that takes into consideration plastic strain intensity and rate as well as softening related to temperature annealing and dislocation annihilation. Metal strain hardening was demonstrated to be determined only by elastic strain energy related to the energy of accumulated defects. It is anticipated that accumulation of the elastic energy of defects is governed by plastic work. The suggested model has a reasonable agreement with the available experimental data for copper up to P = 70 GPa , for aluminum up to P = 10 GPa and for tantalum up to P = 20 GPa.

  6. Paired fuzzy sets

    DEFF Research Database (Denmark)

    Rodríguez, J. Tinguaro; Franco de los Ríos, Camilo; Gómez, Daniel

    2015-01-01

    In this paper we want to stress the relevance of paired fuzzy sets, as already proposed in previous works of the authors, as a family of fuzzy sets that offers a unifying view for different models based upon the opposition of two fuzzy sets, simply allowing the existence of different types...

  7. Fuzzy measures and integrals

    Czech Academy of Sciences Publication Activity Database

    Mesiar, Radko

    2005-01-01

    Roč. 28, č. 156 (2005), s. 365-370 ISSN 0165-0114 R&D Projects: GA ČR(CZ) GA402/04/1026 Institutional research plan: CEZ:AV0Z10750506 Keywords : fuzzy measures * fuzzy integral * regular fuzzy integral Subject RIV: BA - General Mathematics Impact factor: 1.039, year: 2005

  8. Fuzzy Graph Language Recognizability

    OpenAIRE

    Kalampakas , Antonios; Spartalis , Stefanos; Iliadis , Lazaros

    2012-01-01

    Part 5: Fuzzy Logic; International audience; Fuzzy graph language recognizability is introduced along the lines of the established theory of syntactic graph language recognizability by virtue of the algebraic structure of magmoids. The main closure properties of the corresponding class are investigated and several interesting examples of fuzzy graph languages are examined.

  9. Intuitionistic Fuzzy Subbialgebras and Duality

    Directory of Open Access Journals (Sweden)

    Wenjuan Chen

    2014-01-01

    Full Text Available We investigate connections between bialgebras and Atanassov’s intuitionistic fuzzy sets. Firstly we define an intuitionistic fuzzy subbialgebra of a bialgebra with an intuitionistic fuzzy subalgebra structure and also with an intuitionistic fuzzy subcoalgebra structure. Secondly we investigate the related properties of intuitionistic fuzzy subbialgebras. Finally we prove that the dual of an intuitionistic fuzzy strong subbialgebra is an intuitionistic fuzzy strong subbialgebra.

  10. Probabilistic fuzzy systems as additive fuzzy systems

    NARCIS (Netherlands)

    Almeida, R.J.; Verbeek, N.; Kaymak, U.; Costa Sousa, da J.M.; Laurent, A.; Strauss, O.; Bouchon-Meunier, B.; Yager, R.

    2014-01-01

    Probabilistic fuzzy systems combine a linguistic description of the system behaviour with statistical properties of data. It was originally derived based on Zadeh’s concept of probability of a fuzzy event. Two possible and equivalent additive reasoning schemes were proposed, that lead to the

  11. Optimality Conditions for Fuzzy Number Quadratic Programming with Fuzzy Coefficients

    Directory of Open Access Journals (Sweden)

    Xue-Gang Zhou

    2014-01-01

    Full Text Available The purpose of the present paper is to investigate optimality conditions and duality theory in fuzzy number quadratic programming (FNQP in which the objective function is fuzzy quadratic function with fuzzy number coefficients and the constraint set is fuzzy linear functions with fuzzy number coefficients. Firstly, the equivalent quadratic programming of FNQP is presented by utilizing a linear ranking function and the dual of fuzzy number quadratic programming primal problems is introduced. Secondly, we present optimality conditions for fuzzy number quadratic programming. We then prove several duality results for fuzzy number quadratic programming problems with fuzzy coefficients.

  12. Countable Fuzzy Topological Space and Countable Fuzzy Topological Vector Space

    Directory of Open Access Journals (Sweden)

    Apu Kumar Saha

    2015-06-01

    Full Text Available This paper deals with countable fuzzy topological spaces, a generalization of the notion of fuzzy topological spaces. A collection of fuzzy sets F on a universe X forms a countable fuzzy topology if in the definition of a fuzzy topology, the condition of arbitrary supremum is relaxed to countable supremum. In this generalized fuzzy structure, the continuity of fuzzy functions and some other related properties are studied. Also the class of countable fuzzy topological vector spaces as a generalization of the class of fuzzy topological vector spaces has been introduced and investigated.

  13. Recurrent fuzzy ranking methods

    Science.gov (United States)

    Hajjari, Tayebeh

    2012-11-01

    With the increasing development of fuzzy set theory in various scientific fields and the need to compare fuzzy numbers in different areas. Therefore, Ranking of fuzzy numbers plays a very important role in linguistic decision-making, engineering, business and some other fuzzy application systems. Several strategies have been proposed for ranking of fuzzy numbers. Each of these techniques has been shown to produce non-intuitive results in certain case. In this paper, we reviewed some recent ranking methods, which will be useful for the researchers who are interested in this area.

  14. Fuzzy social choice theory

    CERN Document Server

    B Gibilisco, Michael; E Albert, Karen; N Mordeson, John; J Wierman, Mark; D Clark, Terry

    2014-01-01

    This book offers a comprehensive analysis of the social choice literature and shows, by applying fuzzy sets, how the use of fuzzy preferences, rather than that of strict ones, may affect the social choice theorems. To do this, the book explores the presupposition of rationality within the fuzzy framework and shows that the two conditions for rationality, completeness and transitivity, do exist with fuzzy preferences. Specifically, this book examines: the conditions under which a maximal set exists; the Arrow’s theorem;  the Gibbard-Satterthwaite theorem; and the median voter theorem.  After showing that a non-empty maximal set does exists for fuzzy preference relations, this book goes on to demonstrating the existence of a fuzzy aggregation rule satisfying all five Arrowian conditions, including non-dictatorship. While the Gibbard-Satterthwaite theorem only considers individual fuzzy preferences, this work shows that both individuals and groups can choose alternatives to various degrees, resulting in a so...

  15. Improved chaotic maps-based password-authenticated key agreement using smart cards

    Science.gov (United States)

    Lin, Han-Yu

    2015-02-01

    Elaborating on the security of password-based authenticated key agreement, in this paper, the author cryptanalyzes a chaotic maps-based password-authenticated key agreement proposed by Guo and Chang recently. Specifically, their protocol could not achieve strong user anonymity due to a fixed parameter and a malicious adversary is able to derive the shared session key by manipulating the property of Chebyshev chaotic maps. Additionally, the author also presents an improved scheme to eliminate the above weaknesses and still maintain the efficiency.

  16. Backup key generation model for one-time password security protocol

    Science.gov (United States)

    Jeyanthi, N.; Kundu, Sourav

    2017-11-01

    The use of one-time password (OTP) has ushered new life into the existing authentication protocols used by the software industry. It introduced a second layer of security to the traditional username-password authentication, thus coining the term, two-factor authentication. One of the drawbacks of this protocol is the unreliability of the hardware token at the time of authentication. This paper proposes a simple backup key model that can be associated with the real world applications’user database, which would allow a user to circumvent the second authentication stage, in the event of unavailability of the hardware token.

  17. Induction Hardening of External Gear

    Science.gov (United States)

    Bukanin, V. A.; Ivanov, A. N.; Zenkov, A. E.; Vologdin, V. V.; Vologdin, V. V., Jr.

    2018-03-01

    Problems and solution of gear induction hardening are described. Main attention is paid to the parameters of heating and cooling systems. ELTA 7.0 program has been used to obtain the required electrical parameters of inductor, power sources, resonant circuits, as well as to choose the quenching media. Comparison of experimental and calculated results of investigation is provided. In order to compare advantages and disadvantages of single- and dual-frequency heating processes, many variants of these technologies were simulated. The predicted structure and hardness of steel gears are obtained by use of the ELTA data base taken into account the Continuous Cooling Transformation diagrams.

  18. A Novel Radiation Hardened CAM

    CERN Document Server

    Shojaii, Seyed Ruhollah; The ATLAS collaboration

    2018-01-01

    This poster describes an innovative Content Addressable Memory cell with radiation hardened (RH-CAM) architecture. The RH-CAM is designed in a commercial 28 nm CMOS technology. The circuit has been simulated in worst-case conditions, and the effects due to single particles are analyzed injecting a fault current into a circuit node. The proposed architecture can perform on-time pattern recognition tasks in harsh environments, such as very front-end electronics in hadron colliders and in space applications.

  19. Optimization of resistively hardened latches

    International Nuclear Information System (INIS)

    Gagne, G.; Savaria, Y.

    1990-01-01

    The design of digital circuits tolerant to single-event upsets is considered. The results of a study are presented on which an analytical model was used to predict the behavior of a standard resistively hardened latch. It is shown that a worst case analysis for all possible single-event upset situations (on the latch or in the logic) can be derived from studying the effects of a transient disturbed write cycle. The existence of an intrinsic minimum write period to tolerate a transient of a given duration is also demonstrated

  20. Solving fully fuzzy transportation problem using pentagonal fuzzy numbers

    Science.gov (United States)

    Maheswari, P. Uma; Ganesan, K.

    2018-04-01

    In this paper, we propose a simple approach for the solution of fuzzy transportation problem under fuzzy environment in which the transportation costs, supplies at sources and demands at destinations are represented by pentagonal fuzzy numbers. The fuzzy transportation problem is solved without converting to its equivalent crisp form using a robust ranking technique and a new fuzzy arithmetic on pentagonal fuzzy numbers. To illustrate the proposed approach a numerical example is provided.

  1. Instabilities in power law gradient hardening materials

    DEFF Research Database (Denmark)

    Niordson, Christian Frithiof; Tvergaard, Viggo

    2005-01-01

    Tension and compression instabilities are investigated for specimens with dimensions in the micron range. A finite strain generalization of a higher order strain gradient plasticity theory is implemented in a finite element scheme capable of modeling power law hardening materials. Effects...... of gradient hardening are found to delay the onset of localization under plane strain tension, and significantly reduce strain gradients in the localized zone. For plane strain compression gradient hardening is found to increase the load-carrying capacity significantly....

  2. Influence of Cooling Condition on the Performance of Grinding Hardened Layer in Grind-hardening

    Science.gov (United States)

    Wang, G. C.; Chen, J.; Xu, G. Y.; Li, X.

    2018-02-01

    45# steel was grinded and hardened on a surface grinding machine to study the effect of three different cooling media, including emulsion, dry air and liquid nitrogen, on the microstructure and properties of the hardened layer. The results show that the microstructure of material surface hardened with emulsion is pearlite and no hardened layer. The surface roughness is small and the residual stress is compressive stress. With cooling condition of liquid nitrogen and dry air, the specimen surface are hardened, the organization is martensite, the surface roughness is also not changed, but high hardness of hardened layer and surface compressive stress were obtained when grinding using liquid nitrogen. The deeper hardened layer grinded with dry air was obtained and surface residual stress is tensile stress. This study provides an experimental basis for choosing the appropriate cooling mode to effectively control the performance of grinding hardened layer.

  3. Introduction to Fuzzy Set Theory

    Science.gov (United States)

    Kosko, Bart

    1990-01-01

    An introduction to fuzzy set theory is described. Topics covered include: neural networks and fuzzy systems; the dynamical systems approach to machine intelligence; intelligent behavior as adaptive model-free estimation; fuzziness versus probability; fuzzy sets; the entropy-subsethood theorem; adaptive fuzzy systems for backing up a truck-and-trailer; product-space clustering with differential competitive learning; and adaptive fuzzy system for target tracking.

  4. Decomposition of fuzzy continuity and fuzzy ideal continuity via fuzzy idealization

    International Nuclear Information System (INIS)

    Zahran, A.M.; Abbas, S.E.; Abd El-baki, S.A.; Saber, Y.M.

    2009-01-01

    Recently, El-Naschie has shown that the notion of fuzzy topology may be relevant to quantum paretical physics in connection with string theory and E-infinity space time theory. In this paper, we study the concepts of r-fuzzy semi-I-open, r-fuzzy pre-I-open, r-fuzzy α-I-open and r-fuzzy β-I-open sets, which is properly placed between r-fuzzy openness and r-fuzzy α-I-openness (r-fuzzy pre-I-openness) sets regardless the fuzzy ideal topological space in Sostak sense. Moreover, we give a decomposition of fuzzy continuity, fuzzy ideal continuity and fuzzy ideal α-continuity, and obtain several characterization and some properties of these functions. Also, we investigate their relationship with other types of function.

  5. Fuzzy risk matrix

    International Nuclear Information System (INIS)

    Markowski, Adam S.; Mannan, M. Sam

    2008-01-01

    A risk matrix is a mechanism to characterize and rank process risks that are typically identified through one or more multifunctional reviews (e.g., process hazard analysis, audits, or incident investigation). This paper describes a procedure for developing a fuzzy risk matrix that may be used for emerging fuzzy logic applications in different safety analyses (e.g., LOPA). The fuzzification of frequency and severity of the consequences of the incident scenario are described which are basic inputs for fuzzy risk matrix. Subsequently using different design of risk matrix, fuzzy rules are established enabling the development of fuzzy risk matrices. Three types of fuzzy risk matrix have been developed (low-cost, standard, and high-cost), and using a distillation column case study, the effect of the design on final defuzzified risk index is demonstrated

  6. Foundations Of Fuzzy Control

    DEFF Research Database (Denmark)

    Jantzen, Jan

    The objective of this textbook is to acquire an understanding of the behaviour of fuzzy logic controllers. Under certain conditions a fuzzy controller is equivalent to a proportional-integral-derivative (PID) controller. Using that equivalence as a link, the book applies analysis methods from...... linear and nonlinear control theory. In the linear domain, PID tuning methods and stability analyses are transferred to linear fuzzy controllers. The Nyquist plot shows the robustness of different settings of the fuzzy gain parameters. As a result, a fuzzy controller is guaranteed to perform as well...... as any PID controller. In the nonlinear domain, the stability of four standard control surfaces is analysed by means of describing functions and Nyquist plots. The self-organizing controller (SOC) is shown to be a model reference adaptive controller. There is a possibility that a nonlinear fuzzy PID...

  7. Intuitionistic fuzzy calculus

    CERN Document Server

    Lei, Qian

    2017-01-01

    This book offers a comprehensive and systematic review of the latest research findings in the area of intuitionistic fuzzy calculus. After introducing the intuitionistic fuzzy numbers’ operational laws and their geometrical and algebraic properties, the book defines the concept of intuitionistic fuzzy functions and presents the research on the derivative, differential, indefinite integral and definite integral of intuitionistic fuzzy functions. It also discusses some of the methods that have been successfully used to deal with continuous intuitionistic fuzzy information or data, which are different from the previous aggregation operators focusing on discrete information or data. Mainly intended for engineers and researchers in the fields of fuzzy mathematics, operations research, information science and management science, this book is also a valuable textbook for postgraduate and advanced undergraduate students alike.

  8. FUZZY RINGS AND ITS PROPERTIES

    Directory of Open Access Journals (Sweden)

    Karyati Karyati

    2017-01-01

      One of algebraic structure that involves a binary operation is a group that is defined  an un empty set (classical with an associative binary operation, it has identity elements and each element has an inverse. In the structure of the group known as the term subgroup, normal subgroup, subgroup and factor group homomorphism and its properties. Classical algebraic structure is developed to algebraic structure fuzzy by the researchers as an example semi group fuzzy and fuzzy group after fuzzy sets is introduced by L. A. Zadeh at 1965. It is inspired of writing about semi group fuzzy and group of fuzzy, a research on the algebraic structure of the ring is held with reviewing ring fuzzy, ideal ring fuzzy, homomorphism ring fuzzy and quotient ring fuzzy with its properties. The results of this study are obtained fuzzy properties of the ring, ring ideal properties fuzzy, properties of fuzzy ring homomorphism and properties of fuzzy quotient ring by utilizing a subset of a subset level  and strong level  as well as image and pre-image homomorphism fuzzy ring.   Keywords: fuzzy ring, subset level, homomorphism fuzzy ring, fuzzy quotient ring

  9. 27 CFR 73.12 - What security controls must I use for identification codes and passwords?

    Science.gov (United States)

    2010-04-01

    ... Firearms ALCOHOL AND TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY (CONTINUED) PROCEDURES AND PRACTICES ELECTRONIC SIGNATURES; ELECTRONIC SUBMISSION OF FORMS Electronic Signatures § 73.12 What security controls must I use for identification codes and passwords? If you use electronic signatures based upon use...

  10. Simple group password-based authenticated key agreements for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Wang, Ching-Cheng

    2013-04-01

    The security and privacy are important issues for electronic patient records (EPRs). The goal of EPRs is sharing the patients' medical histories such as the diagnosis records, reports and diagnosis image files among hospitals by the Internet. So the security issue for the integrated EPR information system is essential. That is, to ensure the information during transmission through by the Internet is secure and private. The group password-based authenticated key agreement (GPAKE) allows a group of users like doctors, nurses and patients to establish a common session key by using password authentication. Then the group of users can securely communicate by using this session key. Many approaches about GAPKE employ the public key infrastructure (PKI) in order to have higher security. However, it not only increases users' overheads and requires keeping an extra equipment for storing long-term secret keys, but also requires maintaining the public key system. This investigation presents a simple group password-based authenticated key agreement (SGPAKE) protocol for the integrated EPR information system. The proposed SGPAKE protocol does not require using the server or users' public keys. Each user only remembers his weak password shared with a trusted server, and then can obtain a common session key. Then all users can securely communicate by using this session key. The proposed SGPAKE protocol not only provides users with convince, but also has higher security.

  11. Password-only authenticated three-party key exchange with provable security in the standard model.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Kim, Junghwan; Kang, Hyun-Kyu; Kim, Jinsoo; Paik, Juryon; Won, Dongho

    2014-01-01

    Protocols for password-only authenticated key exchange (PAKE) in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000), which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.

  12. An efficient three-party password-based key agreement protocol using extended chaotic maps

    International Nuclear Information System (INIS)

    Shu Jian

    2015-01-01

    Three-party password-based key agreement protocols allow two users to authenticate each other via a public channel and establish a session key with the aid of a trusted server. Recently, Farash et al. [Farash M S, Attari M A 2014 “An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps”, Nonlinear Dynamics 77(7): 399–411] proposed a three-party key agreement protocol by using the extended chaotic maps. They claimed that their protocol could achieve strong security. In the present paper, we analyze Farash et al.’s protocol and point out that this protocol is vulnerable to off-line password guessing attack and suffers communication burden. To handle the issue, we propose an efficient three-party password-based key agreement protocol using extended chaotic maps, which uses neither symmetric cryptosystems nor the server’s public key. Compared with the relevant schemes, our protocol provides better performance in terms of computation and communication. Therefore, it is suitable for practical applications. (paper)

  13. Password-Only Authenticated Three-Party Key Exchange with Provable Security in the Standard Model

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Protocols for password-only authenticated key exchange (PAKE in the three-party setting allow two clients registered with the same authentication server to derive a common secret key from their individual password shared with the server. Existing three-party PAKE protocols were proven secure under the assumption of the existence of random oracles or in a model that does not consider insider attacks. Therefore, these protocols may turn out to be insecure when the random oracle is instantiated with a particular hash function or an insider attack is mounted against the partner client. The contribution of this paper is to present the first three-party PAKE protocol whose security is proven without any idealized assumptions in a model that captures insider attacks. The proof model we use is a variant of the indistinguishability-based model of Bellare, Pointcheval, and Rogaway (2000, which is one of the most widely accepted models for security analysis of password-based key exchange protocols. We demonstrated that our protocol achieves not only the typical indistinguishability-based security of session keys but also the password security against undetectable online dictionary attacks.

  14. Metamathematics of fuzzy logic

    CERN Document Server

    Hájek, Petr

    1998-01-01

    This book presents a systematic treatment of deductive aspects and structures of fuzzy logic understood as many valued logic sui generis. Some important systems of real-valued propositional and predicate calculus are defined and investigated. The aim is to show that fuzzy logic as a logic of imprecise (vague) propositions does have well-developed formal foundations and that most things usually named `fuzzy inference' can be naturally understood as logical deduction.

  15. Fuzzy Control Tutorial

    DEFF Research Database (Denmark)

    Dotoli, M.; Jantzen, Jan

    1999-01-01

    The tutorial concerns automatic control of an inverted pendulum, especially rule based control by means of fuzzy logic. A ball balancer, implemented in a software simulator in Matlab, is used as a practical case study. The objectives of the tutorial are to teach the basics of fuzzy control......, and to show how to apply fuzzy logic in automatic control. The tutorial is distance learning, where students interact one-to-one with the teacher using e-mail....

  16. Intuitionistic fuzzy logics

    CERN Document Server

    T Atanassov, Krassimir

    2017-01-01

    The book offers a comprehensive survey of intuitionistic fuzzy logics. By reporting on both the author’s research and others’ findings, it provides readers with a complete overview of the field and highlights key issues and open problems, thus suggesting new research directions. Starting with an introduction to the basic elements of intuitionistic fuzzy propositional calculus, it then provides a guide to the use of intuitionistic fuzzy operators and quantifiers, and lastly presents state-of-the-art applications of intuitionistic fuzzy sets. The book is a valuable reference resource for graduate students and researchers alike.

  17. Fuzzy control and identification

    CERN Document Server

    Lilly, John H

    2010-01-01

    This book gives an introduction to basic fuzzy logic and Mamdani and Takagi-Sugeno fuzzy systems. The text shows how these can be used to control complex nonlinear engineering systems, while also also suggesting several approaches to modeling of complex engineering systems with unknown models. Finally, fuzzy modeling and control methods are combined in the book, to create adaptive fuzzy controllers, ending with an example of an obstacle-avoidance controller for an autonomous vehicle using modus ponendo tollens logic.

  18. Hardening of niobium alloys at precrystallization annealing

    International Nuclear Information System (INIS)

    Vasil'eva, E.V.; Pustovalov, V.A.

    1989-01-01

    Niobium base alloys were investigated. It is shown that precrystallization annealing of niobium-molybdenum, niobium-vanadium and niobium-zirconium alloys elevates much more sufficiently their resistance to microplastic strains, than to macroplastic strains. Hardening effect differs sufficiently for different alloys. The maximal hardening is observed for niobium-vanadium alloys, the minimal one - for niobium-zirconium alloys

  19. Investigation of a Hardened Cement Paste Grout

    DEFF Research Database (Denmark)

    Esteves, Luis Pedro; Sørensen, Eigil Verner

    This report documents a series of tests performed on a hardened cement paste grout delivered by the client, Det Norske Veritas A/S.......This report documents a series of tests performed on a hardened cement paste grout delivered by the client, Det Norske Veritas A/S....

  20. Radiation hardening of integrated circuits technologies

    International Nuclear Information System (INIS)

    Auberton-Herve, A.J.; Leray, J.L.

    1991-01-01

    The radiation hardening studies started in the mid decade -1960-1970. To survive the different military or space radiative environment, a new engineering science borned, to understand the degradation of electronics components. The different solutions to improve the electronic behavior in such environment, have been named radiation hardening of the technologies. Improvement of existing technologies, and qualification method have been widely studied. However, at the other hand, specific technologies was developped : The Silicon On Insulator technologies for CMOS or Bipolar. The HSOI3HD technology (supported by DGA-CEA DAM and LETI with THOMSON TMS) offers today the highest hardening level for the integration density of hundreds of thousand transistors on the same silicon. Full complex systems would be realized on a single die with a technological radiation hardening and no more system hardening

  1. Challenges in hardening technologies using shallow-trench isolation

    International Nuclear Information System (INIS)

    Shaneyfelt, M.R.; Dodd, P.E.; Draper, B.L.; Flores, R.S.

    1998-02-01

    Challenges related to radiation hardening CMOS technologies with shallow-trench isolation are explored. Results show that trench hardening can be more difficult than simply replacing the trench isolation oxide with a hardened field oxide

  2. Comparison of Thermal Creep Strain Calculation Results Using Time Hardening and Strain Hardening Rules

    International Nuclear Information System (INIS)

    Kim, Junehyung; Cheon, Jinsik; Lee, Byoungoon; Lee, Chanbock

    2014-01-01

    One of the design criteria for the fuel rod in PGSFR is the thermal creep strain of the cladding, because the cladding is exposed to a high temperature for a long time during reactor operation period. In general, there are two kind of calculation scheme for thermal creep strain: time hardening and strain hardening rules. In this work, thermal creep strain calculation results for HT9 cladding by using time hardening and strain hardening rules are compared by employing KAERI's current metallic fuel performance analysis code, MACSIS. Also, thermal creep strain calculation results by using ANL's metallic fuel performance analysis code, LIFE-METAL which adopts strain hardening rule are compared with those by using MACSIS. Thermal creep strain calculation results for HT9 cladding by using time hardening and strain hardening rules were compared by employing KAERI's current metallic fuel performance analysis code, MACSIS. Also, thermal creep strain calculation results by using ANL's metallic fuel performance analysis code, LIFE-METAL which adopts strain hardening rule were compared with those by using MACSIS. Tertiary creep started earlier in time hardening rule than in strain hardening rule. Also, calculation results by MACSIS with strain hardening and those obtained by using LIFE-METAL were almost identical to each other

  3. Electron beam hardened paint binder

    International Nuclear Information System (INIS)

    Johnson, O.B.; Labana, S.S.

    1976-01-01

    The invention concerns a paint binder hardened by the effect of electron beams (0.1-100 Mrad/sec). It consists of a dispersion of (A) an ethylenic unsaturated material in (B) at least one vinyl monomer. The component (A) in a reaction product of degraded rubber particles (0.1-4 μm) and an ethylenic unsaturated component with a reactive epoxy, hydroxy or carboxy group which is bonded to the rubber particles by ester or urethane compounds. The rubber particles possess a nucleus and a cross-linked elastomeric acryl polymer, an outer shell with reactive groups and an intermediate layer formed by the monomers of the nucleus and the shell. The manner of production is described in great detail and supplemented by 157 examples. The coatings are suitable to coat articles which will be subject to deformation. (UWI) [de

  4. Radiation hardening of smart electronics

    International Nuclear Information System (INIS)

    Mayo, C.W.; Cain, V.R.; Marks, K.A.; Millward, D.G.

    1991-02-01

    Microprocessor based ''smart'' pressure, level, and flow transmitters were tested to determine the radiation hardness of this class of electronic instrumentation for use in reactor building applications. Commercial grade Complementary Metal Oxide Semiconductor (CMOS) integrated circuits used in these transmitters were found to fail at total gamma dose levels between 2500 and 10,000 rad. This results in an unacceptably short lifetime in many reactor building radiation environments. Radiation hardened integrated circuits can, in general, provide satisfactory service life for normal reactor operations when not restricted to the extremely low power budget imposed by standard 4--20 mA two-wire instrument loops. The design of these circuits will require attention to vendor radiation hardness specifications, dose rates, process control with respect to radiation hardness factors, and non-volatile programmable memory technology. 3 refs., 2 figs

  5. Relations Among Some Fuzzy Entropy Formulae

    Institute of Scientific and Technical Information of China (English)

    卿铭

    2004-01-01

    Fuzzy entropy has been widely used to analyze and design fuzzy systems, and many fuzzy entropy formulae have been proposed. For further in-deepth analysis of fuzzy entropy, the axioms and some important formulae of fuzzy entropy are introduced. Some equivalence results among these fuzzy entropy formulae are proved, and it is shown that fuzzy entropy is a special distance measurement.

  6. 31 CFR 363.19 - What should I do if I become aware that my password or other form of authentication has become...

    Science.gov (United States)

    2010-07-01

    ... that my password or other form of authentication has become compromised? 363.19 Section 363.19 Money... that my password or other form of authentication has become compromised? If you become aware that your password has become compromised, that any other form of authentication has been compromised, lost, stolen...

  7. On Intuitionistic Fuzzy Filters of Intuitionistic Fuzzy Coframes

    Directory of Open Access Journals (Sweden)

    Rajesh K. Thumbakara

    2013-01-01

    Full Text Available Frame theory is the study of topology based on its open set lattice, and it was studied extensively by various authors. In this paper, we study quotients of intuitionistic fuzzy filters of an intuitionistic fuzzy coframe. The quotients of intuitionistic fuzzy filters are shown to be filters of the given intuitionistic fuzzy coframe. It is shown that the collection of all intuitionistic fuzzy filters of a coframe and the collection of all intutionistic fuzzy quotient filters of an intuitionistic fuzzy filter are coframes.

  8. FUZZY FUSION OF PCA, ICA AND ILDA FACE ALGORITHMS FOR ENHANCED USER AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    PRASHANT KUMAR JAIN

    2017-09-01

    Full Text Available Use of biometrics has increased over last few years due to its inherent advantages over customary identification tools such as token card and password, etc. In biometrics, after fingerprint, face recognition is second most preferred method with reasonably good accuracy. In some applications like CCTV cameras where face of a person is available for processing, face recognition techniques can to be very useful. In this paper, integration of face recognition techniques PCA, ICA and ILDA using fuzzy fusion method is detailed. The preliminary results clearly reveal that the fusion of methods improves the accuracy of the user identification.

  9. Possibility Fuzzy Soft Set

    Directory of Open Access Journals (Sweden)

    Shawkat Alkhazaleh

    2011-01-01

    Full Text Available We introduce the concept of possibility fuzzy soft set and its operation and study some of its properties. We give applications of this theory in solving a decision-making problem. We also introduce a similarity measure of two possibility fuzzy soft sets and discuss their application in a medical diagnosis problem.

  10. Properties of Bipolar Fuzzy Hypergraphs

    OpenAIRE

    Akram, M.; Dudek, W. A.; Sarwar, S.

    2013-01-01

    In this article, we apply the concept of bipolar fuzzy sets to hypergraphs and investigate some properties of bipolar fuzzy hypergraphs. We introduce the notion of $A-$ tempered bipolar fuzzy hypergraphs and present some of their properties. We also present application examples of bipolar fuzzy hypergraphs.

  11. Statistical Methods for Fuzzy Data

    CERN Document Server

    Viertl, Reinhard

    2011-01-01

    Statistical data are not always precise numbers, or vectors, or categories. Real data are frequently what is called fuzzy. Examples where this fuzziness is obvious are quality of life data, environmental, biological, medical, sociological and economics data. Also the results of measurements can be best described by using fuzzy numbers and fuzzy vectors respectively. Statistical analysis methods have to be adapted for the analysis of fuzzy data. In this book, the foundations of the description of fuzzy data are explained, including methods on how to obtain the characterizing function of fuzzy m

  12. Laser Surface Hardening of Groove Edges

    Science.gov (United States)

    Hussain, A.; Hamdani, A. H.; Akhter, R.; Aslam, M.

    2013-06-01

    Surface hardening of groove-edges made of 3Cr13 Stainless Steel has been carried out using 500 W CO2 laser with a rectangular beam of 2.5×3 mm2. The processing speed was varied from 150-500 mm/min. It was seen that the hardened depth increases with increase in laser interaction time. A maximum hardened depth of around 1mm was achieved. The microhardness of the transformed zone was 2.5 times the hardness of base metal. The XRD's and microstructural analysis were also reported.

  13. Chaotic maps-based password-authenticated key agreement using smart cards

    Science.gov (United States)

    Guo, Cheng; Chang, Chin-Chen

    2013-06-01

    Password-based authenticated key agreement using smart cards has been widely and intensively researched. Inspired by the semi-group property of Chebyshev maps and key agreement protocols based on chaotic maps, we proposed a novel chaotic maps-based password-authenticated key agreement protocol with smart cards. In our protocol, we avoid modular exponential computing or scalar multiplication on elliptic curve used in traditional authenticated key agreement protocols using smart cards. Our analysis shows that our protocol has comprehensive characteristics and can withstand attacks, including the insider attack, replay attack, and others, satisfying essential security requirements. Performance analysis shows that our protocol can refrain from consuming modular exponential computing and scalar multiplication on an elliptic curve. The computational cost of our protocol compared with related protocols is acceptable.

  14. A New Type of Graphical Passwords Based on Odd-Elegant Labelled Graphs

    Directory of Open Access Journals (Sweden)

    Hongyu Wang

    2018-01-01

    Full Text Available Graphical password (GPW is one of various passwords used in information communication. The QR code, which is widely used in the current world, is one of GPWs. Topsnut-GPWs are new-type GPWs made by topological structures (also, called graphs and number theory, but the existing GPWs use pictures/images almost. We design new Topsnut-GPWs by means of a graph labelling, called odd-elegant labelling. The new Topsnut-GPWs will be constructed by Topsnut-GPWs having smaller vertex numbers; in other words, they are compound Topsnut-GPWs such that they are more robust to deciphering attacks. Furthermore, the new Topsnut-GPWs can induce some mathematical problems and conjectures.

  15. Construction of fuzzy automata by fuzzy experiments

    International Nuclear Information System (INIS)

    Mironov, A.

    1994-01-01

    The solving the problem of canonical realization of partial reaction morphisms (PRM) for automata in toposes and fuzzy automata is addressed. This problem extends the optimal construction problem for finite deterministic automata by experiments. In the present paper the conception of canonical realization of PRM for automata in toposes is introduced and the sufficient conditions for the existence of canonical realizations for PRM in toposes are presented. As a consequence of this result the existence of canonical realizations for PRM in the category of fuzzy sets over arbitrary complete chain is proven

  16. Construction of fuzzy automata by fuzzy experiments

    Energy Technology Data Exchange (ETDEWEB)

    Mironov, A [Moscow Univ. (Russian Federation). Dept. of Mathematics and Computer Science

    1994-12-31

    The solving the problem of canonical realization of partial reaction morphisms (PRM) for automata in toposes and fuzzy automata is addressed. This problem extends the optimal construction problem for finite deterministic automata by experiments. In the present paper the conception of canonical realization of PRM for automata in toposes is introduced and the sufficient conditions for the existence of canonical realizations for PRM in toposes are presented. As a consequence of this result the existence of canonical realizations for PRM in the category of fuzzy sets over arbitrary complete chain is proven.

  17. Password Based Distribution Panel and Circuit Breaker Operation for the Safety of Lineman during Maintenance Work

    OpenAIRE

    Hudedmani, Mallikarjun G; Ummannanavar, Nitin; Mudaliar, Mani Dheeraj; Sooji, Chandana; Bogar, Mala

    2017-01-01

    Security is the prime concern in our day to day life while performing any activity. In the current scenario, accidental death of lineman is often read and evidenced. In this direction, a safety measure to safe guard the operator is found very necessary looking into the present working style. The electric lineman safety system is designed to control the control panel doors and circuit breaker by using a password for the safety. Critical electrical accidents to lineman are on the rise during el...

  18. A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE, PASSWORD AND OTP

    OpenAIRE

    K. Krishna Prasad; P. S. Aithal

    2018-01-01

    By definition, Authentication is using one or multiple mechanisms to show that you are who you claim to be. As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services. The modern research study reveals that fingerprint is not so secured like secured a password which consists of alphanumeric characters, number and special characters. Fingerprints are left at crime places, on materials or at the door which is usually class of late...

  19. On the security flaws in ID-based password authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-01-01

    Telecare medical information systems (TMIS) enable healthcare delivery services. However, access of these services via public channel raises security and privacy issues. In recent years, several smart card based authentication schemes have been introduced to ensure secure and authorized communication between remote entities over the public channel for the (TMIS). We analyze the security of some of the recently proposed authentication schemes of Lin, Xie et al., Cao and Zhai, and Wu and Xu's for TMIS. Unfortunately, we identify that these schemes failed to satisfy desirable security attributes. In this article we briefly discuss four dynamic ID-based authentication schemes and demonstrate their failure to satisfy desirable security attributes. The study is aimed to demonstrate how inefficient password change phase can lead to denial of server scenario for an authorized user, and how an inefficient login phase causes the communication and computational overhead and decrease the performance of the system. Moreover, we show the vulnerability of Cao and Zhai's scheme to known session specific temporary information attack, vulnerability of Wu and Xu's scheme to off-line password guessing attack, and vulnerability of Xie et al.'s scheme to untraceable on-line password guessing attack.

  20. Creating Clinical Fuzzy Automata with Fuzzy Arden Syntax.

    Science.gov (United States)

    de Bruin, Jeroen S; Steltzer, Heinz; Rappelsberger, Andrea; Adlassnig, Klaus-Peter

    2017-01-01

    Formal constructs for fuzzy sets and fuzzy logic are incorporated into Arden Syntax version 2.9 (Fuzzy Arden Syntax). With fuzzy sets, the relationships between measured or observed data and linguistic terms are expressed as degrees of compatibility that model the unsharpness of the boundaries of linguistic terms. Propositional uncertainty due to incomplete knowledge of relationships between clinical linguistic concepts is modeled with fuzzy logic. Fuzzy Arden Syntax also supports the construction of fuzzy state monitors. The latter are defined as monitors that employ fuzzy automata to observe gradual transitions between different stages of disease. As a use case, we re-implemented FuzzyARDS, a previously published clinical monitoring system for patients suffering from acute respiratory distress syndrome (ARDS). Using the re-implementation as an example, we show how key concepts of fuzzy automata, i.e., fuzzy states and parallel fuzzy state transitions, can be implemented in Fuzzy Arden Syntax. The results showed that fuzzy state monitors can be implemented in a straightforward manner.

  1. The microstructural origin of work hardening stages

    DEFF Research Database (Denmark)

    Hughes, D. A.; Hansen, N.

    2018-01-01

    The strain evolution of the flow stress and work hardening rate in stages III and IV is explored by utilizing a fully described deformation microstructure. Extensive measurements by transmission electron microscopy reveal a hierarchical subdivision of grains by low angle incidental dislocation...... addition of the classical Taylor and Hall-Petch formulations. Model predictions agree closely with experimental values of flow stress and work hardening rate in stages III and IV. Strong connections between the evolutionary stages of the deformation microstructure and work hardening rates create a new...... (modern) basis for the classic problem of work hardening in metals and alloys. These connections lead the way for the future development of ultra high strength ductile metals produced via plastic deformation.(c) 2018 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved....

  2. Model predictive control using fuzzy decision functions

    NARCIS (Netherlands)

    Kaymak, U.; Costa Sousa, da J.M.

    2001-01-01

    Fuzzy predictive control integrates conventional model predictive control with techniques from fuzzy multicriteria decision making, translating the goals and the constraints to predictive control in a transparent way. The information regarding the (fuzzy) goals and the (fuzzy) constraints of the

  3. COMPLEX SURFACE HARDENING OF STEEL ARTICLES

    Directory of Open Access Journals (Sweden)

    A. V. Kovalchuk

    2014-01-01

    Full Text Available The method of complex surface hardening of steel detailswas designed. The method is a compound of two processes of hardening: chemical heat treatment and physical vapor deposition (PVD of the coating. The result, achieved in this study is much higher, than in other work on this topic and is cumulative. The method designed can be used in mechanical engineering, medicine, energetics and is perspective for military and space technologies.

  4. Approximations of Fuzzy Systems

    Directory of Open Access Journals (Sweden)

    Vinai K. Singh

    2013-03-01

    Full Text Available A fuzzy system can uniformly approximate any real continuous function on a compact domain to any degree of accuracy. Such results can be viewed as an existence of optimal fuzzy systems. Li-Xin Wang discussed a similar problem using Gaussian membership function and Stone-Weierstrass Theorem. He established that fuzzy systems, with product inference, centroid defuzzification and Gaussian functions are capable of approximating any real continuous function on a compact set to arbitrary accuracy. In this paper we study a similar approximation problem by using exponential membership functions

  5. Beyond fuzzy spheres

    International Nuclear Information System (INIS)

    Govindarajan, T R; Padmanabhan, Pramod; Shreecharan, T

    2010-01-01

    We study polynomial deformations of the fuzzy sphere, specifically given by the cubic or the Higgs algebra. We derive the Higgs algebra by quantizing the Poisson structure on a surface in R 3 . We find that several surfaces, differing by constants, are described by the Higgs algebra at the fuzzy level. Some of these surfaces have a singularity and we overcome this by quantizing this manifold using coherent states for this nonlinear algebra. This is seen in the measure constructed from these coherent states. We also find the star product for this non-commutative algebra as a first step in constructing field theories on such fuzzy spaces.

  6. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    International Nuclear Information System (INIS)

    Xie Qi; Hu Bin; Chen Ke-Fei; Liu Wen-Hao; Tan Xiao

    2015-01-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. (paper)

  7. Chaotic maps and biometrics-based anonymous three-party authenticated key exchange protocol without using passwords

    Science.gov (United States)

    Xie, Qi; Hu, Bin; Chen, Ke-Fei; Liu, Wen-Hao; Tan, Xiao

    2015-11-01

    In three-party password authenticated key exchange (AKE) protocol, since two users use their passwords to establish a secure session key over an insecure communication channel with the help of the trusted server, such a protocol may suffer the password guessing attacks and the server has to maintain the password table. To eliminate the shortages of password-based AKE protocol, very recently, according to chaotic maps, Lee et al. [2015 Nonlinear Dyn. 79 2485] proposed a first three-party-authenticated key exchange scheme without using passwords, and claimed its security by providing a well-organized BAN logic test. Unfortunately, their protocol cannot resist impersonation attack, which is demonstrated in the present paper. To overcome their security weakness, by using chaotic maps, we propose a biometrics-based anonymous three-party AKE protocol with the same advantages. Further, we use the pi calculus-based formal verification tool ProVerif to show that our AKE protocol achieves authentication, security and anonymity, and an acceptable efficiency. Project supported by the Natural Science Foundation of Zhejiang Province, China (Grant No. LZ12F02005), the Major State Basic Research Development Program of China (Grant No. 2013CB834205), and the National Natural Science Foundation of China (Grant No. 61070153).

  8. Fuzzy Rough Ring and Its Prop erties

    Institute of Scientific and Technical Information of China (English)

    REN Bi-jun; FU Yan-ling

    2013-01-01

    This paper is devoted to the theories of fuzzy rough ring and its properties. The fuzzy approximation space generated by fuzzy ideals and the fuzzy rough approximation operators were proposed in the frame of fuzzy rough set model. The basic properties of fuzzy rough approximation operators were analyzed and the consistency between approximation operators and the binary operation of ring was discussed.

  9. Fuzzy data analysis

    CERN Document Server

    Bandemer, Hans

    1992-01-01

    Fuzzy data such as marks, scores, verbal evaluations, imprecise observations, experts' opinions and grey tone pictures, are quite common. In Fuzzy Data Analysis the authors collect their recent results providing the reader with ideas, approaches and methods for processing such data when looking for sub-structures in knowledge bases for an evaluation of functional relationship, e.g. in order to specify diagnostic or control systems. The modelling presented uses ideas from fuzzy set theory and the suggested methods solve problems usually tackled by data analysis if the data are real numbers. Fuzzy Data Analysis is self-contained and is addressed to mathematicians oriented towards applications and to practitioners in any field of application who have some background in mathematics and statistics.

  10. Fuzzy stochastic multiobjective programming

    CERN Document Server

    Sakawa, Masatoshi; Katagiri, Hideki

    2011-01-01

    With a stress on interactive decision-making, this work breaks new ground by covering both the random nature of events related to environments, and the fuzziness of human judgements. The text runs from mathematical preliminaries to future research directions.

  11. Fuzzy Control Teaching Models

    Directory of Open Access Journals (Sweden)

    Klaus-Dietrich Kramer

    2016-05-01

    Full Text Available Many degree courses at technical universities include the subject of control systems engineering. As an addition to conventional approaches Fuzzy Control can be used to easily find control solutions for systems, even if they include nonlinearities. To support further educational training, models which represent a technical system to be controlled are required. These models have to represent the system in a transparent and easy cognizable manner. Furthermore, a programming tool is required that supports an easy Fuzzy Control development process, including the option to verify the results and tune the system behavior. In order to support the development process a graphical user interface is needed to display the fuzzy terms under real time conditions, especially with a debug system and trace functionality. The experiences with such a programming tool, the Fuzzy Control Design Tool (FHFCE Tool, and four fuzzy teaching models will be presented in this paper. The methodical and didactical objective in the utilization of these teaching models is to develop solution strategies using Computational Intelligence (CI applications for Fuzzy Controllers in order to analyze different algorithms of inference or defuzzyfication and to verify and tune those systems efficiently.

  12. Fuzzy forecasting based on fuzzy-trend logical relationship groups.

    Science.gov (United States)

    Chen, Shyi-Ming; Wang, Nai-Yi

    2010-10-01

    In this paper, we present a new method to predict the Taiwan Stock Exchange Capitalization Weighted Stock Index (TAIEX) based on fuzzy-trend logical relationship groups (FTLRGs). The proposed method divides fuzzy logical relationships into FTLRGs based on the trend of adjacent fuzzy sets appearing in the antecedents of fuzzy logical relationships. First, we apply an automatic clustering algorithm to cluster the historical data into intervals of different lengths. Then, we define fuzzy sets based on these intervals of different lengths. Then, the historical data are fuzzified into fuzzy sets to derive fuzzy logical relationships. Then, we divide the fuzzy logical relationships into FTLRGs for forecasting the TAIEX. Moreover, we also apply the proposed method to forecast the enrollments and the inventory demand, respectively. The experimental results show that the proposed method gets higher average forecasting accuracy rates than the existing methods.

  13. The secondary hardening phenomenon in strain-hardened MP35N alloy

    International Nuclear Information System (INIS)

    Asgari, S.; El-Danaf, E.; Shaji, E.; Kalidindi, S.R.; Doherty, R.D.

    1998-01-01

    Mechanical testing and microscopy techniques were used to investigate the influence of aging on the structure and strengthening of MP35N alloy. It was confirmed that aging the deformed material at 600 C for 4 h provided additional strengthening, here referred to as secondary hardening, in addition to the primary strain hardening. The secondary hardening phenomenon was shown to be distinctly different from typical age hardening processes in that it only occurred in material deformed beyond a certain cold work level. At moderate strains, aging caused a shift in the entire stress-strain curve of the annealed material to higher stresses while at high strains, it produced shear localization and limited work softening. The secondary hardening increment was also found to be grain size dependent. The magnitude of the secondary hardening appeared to be controlled by the flow stress in the strain hardened material. A model is proposed to explain the observations and is supported by direct experimental evidence. The model is based on formation of h.c.p. nuclei through the Suzuki mechanism, that is segregation of solute atoms to stacking faults, on aging the strain hardened material. The h.c.p. precipitates appear to thicken only in the presence of high dislocation density produced by prior cold work

  14. Simultaneous surface engineering and bulk hardening of precipitation hardening stainless steel

    DEFF Research Database (Denmark)

    Frandsen, Rasmus Berg; Christiansen, Thomas; Somers, Marcel A. J.

    2006-01-01

    This article addresses simultaneous bulk precipitation hardening and low temperature surface engineering of two commercial precipitation hardening stainless steels: Sandvik Nanoflex® and Uddeholm Corrax®. Surface engineering comprised gaseous nitriding or gaseous carburising. Microstructural....... The duration and temperature of the nitriding/carburising surface hardening treatment can be chosen in agreement with the thermal treatment for obtaining optimal bulk hardness in the precipitation hardening stainless steel....... characterisation of the cases developed included X-ray diffraction analysis, reflected light microscopy and micro-hardness testing. It was found that the incorporation of nitrogen or carbon resulted in a hardened case consisting of a combination of (tetragonal) martensite and expanded (cubic) austenite...

  15. Password cracking

    OpenAIRE

    Χριστοφάκης, Μιχαήλ Κ.

    2014-01-01

    Information security is the next big thing in computers society because of the rapidly growing security incidents and the outcomes of those. Hacking and cracking existed even from the start of the eighties decade when there was the first step of the interconnection through the internet between humans. From then and ever after there was a big explosion of such incidents mostly because of the worldwide web which was introduced in the early nineties. Following the huge steps forward of computers...

  16. Precipitation and Hardening in Magnesium Alloys

    Science.gov (United States)

    Nie, Jian-Feng

    2012-11-01

    Magnesium alloys have received an increasing interest in the past 12 years for potential applications in the automotive, aircraft, aerospace, and electronic industries. Many of these alloys are strong because of solid-state precipitates that are produced by an age-hardening process. Although some strength improvements of existing magnesium alloys have been made and some novel alloys with improved strength have been developed, the strength level that has been achieved so far is still substantially lower than that obtained in counterpart aluminum alloys. Further improvements in the alloy strength require a better understanding of the structure, morphology, orientation of precipitates, effects of precipitate morphology, and orientation on the strengthening and microstructural factors that are important in controlling the nucleation and growth of these precipitates. In this review, precipitation in most precipitation-hardenable magnesium alloys is reviewed, and its relationship with strengthening is examined. It is demonstrated that the precipitation phenomena in these alloys, especially in the very early stage of the precipitation process, are still far from being well understood, and many fundamental issues remain unsolved even after some extensive and concerted efforts made in the past 12 years. The challenges associated with precipitation hardening and age hardening are identified and discussed, and guidelines are outlined for the rational design and development of higher strength, and ultimately ultrahigh strength, magnesium alloys via precipitation hardening.

  17. Shapley's value for fuzzy games

    Directory of Open Access Journals (Sweden)

    Raúl Alvarado Sibaja

    2009-02-01

    Full Text Available This is the continuation of a previous article titled "Fuzzy Games", where I defined a new type of games based on the Multilinear extensions f, of characteristic functions and most of standard theorems for cooperative games also hold for this new type of games: The fuzzy games. Now we give some other properties and the extension of the definition of Shapley¨s Value for Fuzzy Games Keywords: game theory, fuzzy sets, multiattribute decisions.

  18. Recovering Data from Password Protected Data Security Applications in Android Based Smartphones

    Directory of Open Access Journals (Sweden)

    Hammad Riaz

    2016-06-01

    Full Text Available The standard method of mobile forensic analysis is to attach the mobile device to forensic tools and to perform logical, file system, or physical extraction. A hindrance in analysis arises if the mobile is not properly supported or data in the handset is secured using data security android applications. The techniques discussed in this paper help in the analysis and extraction of data files secured using data hiding password protected android based applications. A few well known data protection android applications are analyzed. The analysis was performed on both partially supported and fully supported sets.

  19. A procedure for the hardening of materials

    International Nuclear Information System (INIS)

    Dearnaley, G.

    1984-01-01

    A method of hardening metals or ceramics which have fcc, bcc or hcp structures in which two species of differing atomic radii are introduced into the material to be hardened. One species is of a size such that it can diffuse through the lattice normally. The other is of a size such that it can diffuse readily only along dislocations. Ion bombardment is the preferred method of introducing the species with different atomic radii. The material to be hardened is subjected to heat and plastic deformation so as to cause a large number of dislocations with jogs. The species meet at the jogs where they interact and are trapped and set up strain fields which prevent further deformation of the material. (author)

  20. An Anisotropic Hardening Model for Springback Prediction

    Science.gov (United States)

    Zeng, Danielle; Xia, Z. Cedric

    2005-08-01

    As more Advanced High-Strength Steels (AHSS) are heavily used for automotive body structures and closures panels, accurate springback prediction for these components becomes more challenging because of their rapid hardening characteristics and ability to sustain even higher stresses. In this paper, a modified Mroz hardening model is proposed to capture realistic Bauschinger effect at reverse loading, such as when material passes through die radii or drawbead during sheet metal forming process. This model accounts for material anisotropic yield surface and nonlinear isotropic/kinematic hardening behavior. Material tension/compression test data are used to accurately represent Bauschinger effect. The effectiveness of the model is demonstrated by comparison of numerical and experimental springback results for a DP600 straight U-channel test.

  1. An Anisotropic Hardening Model for Springback Prediction

    International Nuclear Information System (INIS)

    Zeng, Danielle; Xia, Z. Cedric

    2005-01-01

    As more Advanced High-Strength Steels (AHSS) are heavily used for automotive body structures and closures panels, accurate springback prediction for these components becomes more challenging because of their rapid hardening characteristics and ability to sustain even higher stresses. In this paper, a modified Mroz hardening model is proposed to capture realistic Bauschinger effect at reverse loading, such as when material passes through die radii or drawbead during sheet metal forming process. This model accounts for material anisotropic yield surface and nonlinear isotropic/kinematic hardening behavior. Material tension/compression test data are used to accurately represent Bauschinger effect. The effectiveness of the model is demonstrated by comparison of numerical and experimental springback results for a DP600 straight U-channel test

  2. CHARACTERIZATIONS OF FUZZY SOFT PRE SEPARATION AXIOMS

    OpenAIRE

    El-Latif, Alaa Mohamed Abd

    2015-01-01

    − The notions of fuzzy pre open soft sets and fuzzy pre closed soft sets were introducedby Abd El-latif et al. [2]. In this paper, we continue the study on fuzzy soft topological spaces andinvestigate the properties of fuzzy pre open soft sets, fuzzy pre closed soft sets and study variousproperties and notions related to these structures. In particular, we study the relationship betweenfuzzy pre soft interior fuzzy pre soft closure. Moreover, we study the properties of fuzzy soft pre regulars...

  3. Technology of hardening fills for mined spaces

    International Nuclear Information System (INIS)

    Simek, P.; Holas, M.; Chyla, A.; Pech, P.

    1985-01-01

    The technology is described of hardening fills for mined spaces of uranium deposits in North Bohemian chalk. A special equipment was developed for the controlled preparation of a hardening mixture. The composition of the fill is determined by the strength of the filled rock, expecially by the standard strength, i.e., the minimal strength of the filling under uniaxial pressure. The said parameter determines the consumption of binding materials and thereby the total costs of the filling. A description is presented of the filling technology, including rabbit tube transport of the mixture and quality control. (Pu)

  4. Radiation hardening revisited: Role of intracascade clustering

    DEFF Research Database (Denmark)

    Singh, B.N.; Foreman, A.J.E.; Trinkaus, H.

    1997-01-01

    be explained in terms of conventional dispersed-barrier hardening because (a) the grown-in dislocations are not free, and (b) irradiation-induced defect clusters are not rigid indestructible Orowan obstacles. A new model called 'cascade-induced source hardening' is presented where glissile loops produced...... directly in cascades are envisaged to decorate the grown-in dislocations so that they cannot act as dislocation sources. The upper yield stress is related to the breakaway stress which is necessary to pull the dislocation away from the clusters/loops decorating it. The magnitude of the breakaway stress has...

  5. A pedagogical example of second-order arithmetic sequences applied to the construction of computer passwords by upper elementary grade students

    Science.gov (United States)

    Coggins, Porter E.

    2015-04-01

    The purpose of this paper is (1) to present how general education elementary school age students constructed computer passwords using digital root sums and second-order arithmetic sequences, (2) argue that computer password construction can be used as an engaging introduction to generate interest in elementary school students to study mathematics related to computer science, and (3) share additional mathematical ideas accessible to elementary school students that can be used to create computer passwords. This paper serves to fill a current gap in the literature regarding the integration of mathematical content accessible to upper elementary school students and aspects of computer science in general, and computer password construction in particular. In addition, the protocols presented here can serve as a hook to generate further interest in mathematics and computer science. Students learned to create a random-looking computer password by using biometric measurements of their shoe size, height, and age in months and to create a second-order arithmetic sequence, then converted the resulting numbers into characters that become their computer passwords. This password protocol can be used to introduce students to good computer password habits that can serve a foundation for a life-long awareness of data security. A refinement of the password protocol is also presented.

  6. A neural fuzzy controller learning by fuzzy error propagation

    Science.gov (United States)

    Nauck, Detlef; Kruse, Rudolf

    1992-01-01

    In this paper, we describe a procedure to integrate techniques for the adaptation of membership functions in a linguistic variable based fuzzy control environment by using neural network learning principles. This is an extension to our work. We solve this problem by defining a fuzzy error that is propagated back through the architecture of our fuzzy controller. According to this fuzzy error and the strength of its antecedent each fuzzy rule determines its amount of error. Depending on the current state of the controlled system and the control action derived from the conclusion, each rule tunes the membership functions of its antecedent and its conclusion. By this we get an unsupervised learning technique that enables a fuzzy controller to adapt to a control task by knowing just about the global state and the fuzzy error.

  7. The foundations of fuzzy control

    CERN Document Server

    Lewis, Harold W

    1997-01-01

    Harold Lewis applied a cross-disciplinary approach in his highly accessible discussion of fuzzy control concepts. With the aid of fifty-seven illustrations, he thoroughly presents a unique mathematical formalism to explain the workings of the fuzzy inference engine and a novel test plant used in the research. Additionally, the text posits a new viewpoint on why fuzzy control is more popular in some countries than in others. A direct and original view of Japanese thinking on fuzzy control methods, based on the author's personal knowledge of - and association with - Japanese fuzzy research, is also included.

  8. WHY FUZZY QUALITY?

    Directory of Open Access Journals (Sweden)

    Abbas Parchami

    2016-09-01

    Full Text Available Such as other statistical problems, we may confront with uncertain and fuzzy concepts in quality control. One particular case in process capability analysis is a situation in which specification limits are two fuzzy sets. In such a uncertain and vague environment, the produced product is not qualified with a two-valued Boolean view, but to some degree depending on the decision-maker strictness and the quality level of the produced product. This matter can be cause to a rational decision-making on the quality of the production line. First, a comprehensive approach is presented in this paper for modeling the fuzzy quality concept. Then, motivations and advantages of applying this flexible approach instead of using classical quality are mentioned.

  9. Secure and Efficient User Authentication Scheme Based on Password and Smart Card for Multiserver Environment

    Directory of Open Access Journals (Sweden)

    Yan Zhao

    2018-01-01

    Full Text Available The rapid development of information and network technologies motivates the emergence of various new computing paradigms, such as distributed computing, cloud computing, and edge computing. This also enables more and more network enterprises to provide multiple different services simultaneously. To ensure these services can only be accessed conveniently by authorized users, many password and smart card based authentication schemes for multiserver architecture have been proposed. Recently, Truong et al. introduced an identity based user authentication scheme on elliptic curve cryptography in multiserver environment and claimed that their scheme is secure against popular attacks. However, in this paper, we point out that their scheme suffers from offline password guessing and impersonation attack and fails to achieve security requirements of this kind of authentication scheme. Moreover, we put forward a new scheme to conquer security pitfalls in the above scheme. Security analysis indicates that the proposed scheme can be free from well-known attacks. Performance discussion demonstrates that our scheme has advantages in terms of both security property and computation efficiency and thus is more desirable for practical applications in multiserver environment.

  10. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  11. Train your brain: Don’t put your password on paper!

    CERN Multimedia

    Computer Security Team

    2012-01-01

    I completely acknowledge that constructing a good password can be difficult. And remembering it for some time isn’t easy, either. However, noting it down on a sheet of paper and hiding it in a drawer in your office (or even attaching a sticky note to your monitor) isn’t a valid solution. It violates CERN Computing Rules.   You can do better! Train your brain! Here are some hints to help you choose good passwords: Choose a line or two from a song or poem, and use the first letter of each word. For example, "In Xanadu did Kubla Kahn a stately pleasure dome decree!" becomes "IXdKKaspdd!"; Use a long passphrase like the sentence "InXanaduDidKublaKahnAStatelyPleasureDomeDecree!" itself; Alternate between one consonant and one or two vowels with mixed upper/lower case. This provides nonsense words that are usually pronounceable, and thus easily remembered. For example: "Weze-Xupe" or "DediNida...

  12. [Microstructural changes in hardened beans (Phaseolus vulgaris)].

    Science.gov (United States)

    Mujica, Maria Virginia; Granito, Marisela; Soto, Naudy

    2015-06-01

    (Phaseolus vulgaris). The hardening of Phaseolus vulgaris beans stored at high temperature and high relative humidity is one of the main constraints for consumption. The objective of this research was to evaluate by scanning electron microscopy, structural changes in cotyledons and testa of the hardened beans. The freshly harvested grains were stored for twelve months under two conditions: 5 ° C-34% RH and 37 ° C-75% RH, in order to promote hardening. The stored raw and cooked grains were lyophilized and fractured. The sections of testa and cotyledons were observed in an electron microscope JSM-6390. After twelve months, grains stored at 37 ° C-75% RH increased their hardness by 503%, whereas there were no significant changes in grains stored at 5 ° C-34% RH. At the microstructural level, the cotyledons of the raw grains show clear differences in appearance of the cell wall, into the intercellular space size and texture matrix protein. There were also differences in compaction of palisade and sub-epidermal layer in the testa of raw grains. After cooking, cotyledon cells of the soft grains were well separated while these ofhard grains were seldom separated. In conclusion, the found differences in hard and soft grains showed a significant participation of both structures, cotyledons and testa, in the grains hardening.

  13. Radiation dose effects, hardening of electronic components

    International Nuclear Information System (INIS)

    Dupont-Nivet, E.

    1991-01-01

    This course reviews the mechanism of interaction between ionizing radiation and a silicon oxide type dielectric, in particular the effect of electron-hole pairs creation in the material. Then effects of cumulated dose on electronic components and especially in MOS technology are examined. Finally methods hardening of these components are exposed. 93 refs

  14. CASE-HARDENING OF STAINLESS STEEL

    DEFF Research Database (Denmark)

    2004-01-01

    The invention relates to case-hardening of a stainless steel article by means of gas including carbon and/or nitrogen, whereby carbon and/or nitrogen atoms diffuse through the surface into the article. The method includes activating the surface of the article, applying a top layer on the activated...

  15. Thermomechanical properties of radiation hardened oligoesteracrylates

    International Nuclear Information System (INIS)

    Lomonosova, N.V.; Chikin, Yu.A.

    1984-01-01

    Thermomechanical properties of radiation hardened oligoesteracrylates are studied by the methods of isothermal heating and thermal mechanics. Films of dimethacrylate of ethylene glycol, triethylene glycol (TGM-3), tetraethylene glycol, tridecaethylene glycol and TGM-3 mixture with methyl methacrylate hardened by different doses (5-150 kGy) using Co 60 installation with a dose rate of 2x10 -3 kGy/s served as a subject of the research. During oligoesteracrylate hargening a space network is formed, chain sections between lattice points of which are in a stressed state. Maximum of deformation is observed at 210-220 deg C on thermomechanical curves of samples hardened by doses > 5 kGy, which form and intensity is dependent on an absorbed dose. Presence of a high-temperature maximum on diaqrams of isometric heating of spatially cross-linked oligoesteracrylates is discovered. High thermal stability of three-dimensional network of radiation hardened oligoesteracrylates provides satisfactory tensile properties (40% of initial strength) in sample testing an elevated temperatures (200-250 deg C)

  16. (L,M-Fuzzy σ-Algebras

    Directory of Open Access Journals (Sweden)

    Fu-Gui Shi

    2010-01-01

    Full Text Available The notion of (L,M-fuzzy σ-algebras is introduced in the lattice value fuzzy set theory. It is a generalization of Klement's fuzzy σ-algebras. In our definition of (L,M-fuzzy σ-algebras, each L-fuzzy subset can be regarded as an L-measurable set to some degree.

  17. The first order fuzzy predicate logic (I)

    International Nuclear Information System (INIS)

    Sheng, Y.M.

    1986-01-01

    Some analysis tools of fuzzy measures, Sugeno's integrals, etc. are introduced into the semantic of the first order predicate logic to explain the concept of fuzzy quantifiers. The truth value of a fuzzy quantification proposition is represented by Sugeno's integral. With this framework, several important notions of formation rules, fuzzy valutions and fuzzy validity are discussed

  18. Radiation hardened COTS-based 32-bit microprocessor

    International Nuclear Information System (INIS)

    Haddad, N.; Brown, R.; Cronauer, T.; Phan, H.

    1999-01-01

    A high performance radiation hardened 32-bit RISC microprocessor based upon a commercial single chip CPU has been developed. This paper presents the features of radiation hardened microprocessor, the methods used to radiation harden this device, the results of radiation testing, and shows that the RAD6000 is well-suited for the vast majority of space applications. (authors)

  19. Fuzzy efficiency without convexity

    DEFF Research Database (Denmark)

    Hougaard, Jens Leth; Balezentis, Tomas

    2014-01-01

    approach builds directly upon the definition of Farrell's indexes of technical efficiency used in crisp FDH. Therefore we do not require the use of fuzzy programming techniques but only utilize ranking probabilities of intervals as well as a related definition of dominance between pairs of intervals. We...

  20. Neuro-fuzzy system modeling based on automatic fuzzy clustering

    Institute of Scientific and Technical Information of China (English)

    Yuangang TANG; Fuchun SUN; Zengqi SUN

    2005-01-01

    A neuro-fuzzy system model based on automatic fuzzy clustering is proposed.A hybrid model identification algorithm is also developed to decide the model structure and model parameters.The algorithm mainly includes three parts:1) Automatic fuzzy C-means (AFCM),which is applied to generate fuzzy rules automatically,and then fix on the size of the neuro-fuzzy network,by which the complexity of system design is reducesd greatly at the price of the fitting capability;2) Recursive least square estimation (RLSE).It is used to update the parameters of Takagi-Sugeno model,which is employed to describe the behavior of the system;3) Gradient descent algorithm is also proposed for the fuzzy values according to the back propagation algorithm of neural network.Finally,modeling the dynamical equation of the two-link manipulator with the proposed approach is illustrated to validate the feasibility of the method.

  1. Hierarchical type-2 fuzzy aggregation of fuzzy controllers

    CERN Document Server

    Cervantes, Leticia

    2016-01-01

    This book focuses on the fields of fuzzy logic, granular computing and also considering the control area. These areas can work together to solve various control problems, the idea is that this combination of areas would enable even more complex problem solving and better results. In this book we test the proposed method using two benchmark problems: the total flight control and the problem of water level control for a 3 tank system. When fuzzy logic is used it make it easy to performed the simulations, these fuzzy systems help to model the behavior of a real systems, using the fuzzy systems fuzzy rules are generated and with this can generate the behavior of any variable depending on the inputs and linguistic value. For this reason this work considers the proposed architecture using fuzzy systems and with this improve the behavior of the complex control problems.

  2. Word Similarity from Dictionaries: Inferring Fuzzy Measures from Fuzzy Graphs

    Directory of Open Access Journals (Sweden)

    Vicenc Torra

    2008-01-01

    Full Text Available WORD SIMILARITY FROM DICTIONARIES: INFERRING FUZZY MEASURES FROM FUZZY GRAPHS The computation of similarities between words is a basic element of information retrieval systems, when retrieval is not solely based on word matching. In this work we consider a measure between words based on dictionaries. This is achieved assuming that a dictionary is formalized as a fuzzy graph. We show that the approach permits to compute measures not only for pairs of words but for sets of them.

  3. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2015-01-01

    Full Text Available We present the first provably-secure three-party password-only authenticated key exchange (PAKE protocol that can run in only two communication rounds. Our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol. The protocol is proven secure in a variant of the widely-accepted model of Bellare, Pointcheval and Rogaway (2000 without any idealized assumptions on the cryptographic primitives used. We also investigate the security of the two-round, three-party PAKE protocol of Wang, Hu and Li (2010 and demonstrate that this protocol cannot achieve implicit key authentication in the presence of an active adversary.

  4. Fuzzy control. Fundamentals, stability and design of fuzzy controllers

    Energy Technology Data Exchange (ETDEWEB)

    Michels, K. [Fichtner GmbH und Co. KG, Stuttgart (Germany); Klawonn, F. [Fachhochschule Braunschweig/Wolfenbuettel (Germany). Fachbereich Informatik; Kruse, R. [Magdeburg Univ. (Germany). Fakultaet Informatik, Abt. Wiss.- und Sprachverarbeitung; Nuernberger, A. (eds.) [California Univ., Berkeley, CA (United States). Computer Science Division

    2006-07-01

    The book provides a critical discussion of fuzzy controllers from the perspective of classical control theory. Special emphases are placed on topics that are of importance for industrial applications, like (self-) tuning of fuzzy controllers, optimisation and stability analysis. The book is written as a textbook for graduate students as well as a comprehensive reference book about fuzzy control for researchers and application engineers. Starting with a detailed introduction to fuzzy systems and control theory the reader is guided to up-to-date research results. (orig.)

  5. Structural heredity influence upon principles of strain wave hardening

    Science.gov (United States)

    Kiricheck, A. V.; Barinov, S. V.; Yashin, A. V.

    2017-02-01

    It was established experimentally that by penetration of a strain wave through material hardened not only the technological modes of processing, but also a technological heredity - the direction of the fibers of the original macrostructure have an influence upon the diagram of microhardness. By penetration of the strain wave along fibers, the degree of hardening the material is less, however, a product is hardened throughout its entire section mainly along fibers. In the direction of the strain waves across fibers of the original structure of material, the degree of material hardening is much higher, the depth of the hardened layer with the degree of hardening not less than 50% makes at least 3 mm. It was found that under certain conditions the strain wave can completely change the original structure of the material. Thus, a heterogeneously hardened structure characterized by the interchange of harder and more viscous areas is formed, which is beneficial for assurance of high operational properties of material.

  6. Hydrogen embrittlement susceptibility of laser-hardened 4140 steel

    Energy Technology Data Exchange (ETDEWEB)

    Tsay, L.W.; Lin, Z.W. [Nat. Taiwan Ocean Univ., Keelung (Taiwan). Inst. of Mater. Eng.; Shiue, R.K. [Institute of Materials Sciences and Engineering, National Dong Hwa University, Hualien, Taiwan (Taiwan); Chen, C. [Institute of Materials Sciences and Engineering, National Taiwan University, Taipei, Taiwan (Taiwan)

    2000-10-15

    Slow strain rate tensile (SSRT) tests were performed to investigate the susceptibility to hydrogen embrittlement of laser-hardened AISI 4140 specimens in air, gaseous hydrogen and saturated H{sub 2}S solution. Experimental results indicated that round bar specimens with two parallel hardened bands on opposite sides along the loading axis (i.e. the PH specimens), exhibited a huge reduction in tensile ductility for all test environments. While circular-hardened (CH) specimens with 1 mm hardened depth and 6 mm wide within the gauge length were resistant to gaseous hydrogen embrittlement. However, fully hardened CH specimens became susceptible to hydrogen embrittlement for testing in air at a lower strain rate. The strength of CH specimens increased with decreasing the depth of hardened zones in a saturated H{sub 2}S solution. The premature failure of hardened zones in a susceptible environment caused the formation of brittle intergranular fracture and the decrease in tensile ductility. (orig.)

  7. Fuzzy pharmacology: theory and applications.

    Science.gov (United States)

    Sproule, Beth A; Naranjo, Claudio A; Türksen, I Burhan

    2002-09-01

    Fuzzy pharmacology is a term coined to represent the application of fuzzy logic and fuzzy set theory to pharmacological problems. Fuzzy logic is the science of reasoning, thinking and inference that recognizes and uses the real world phenomenon that everything is a matter of degree. It is an extension of binary logic that is able to deal with complex systems because it does not require crisp definitions and distinctions for the system components. In pharmacology, fuzzy modeling has been used for the mechanical control of drug delivery in surgical settings, and work has begun evaluating its use in other pharmacokinetic and pharmacodynamic applications. Fuzzy pharmacology is an emerging field that, based on these initial explorations, warrants further investigation.

  8. Radiation-hardened optoelectronic components: detectors

    International Nuclear Information System (INIS)

    Wiczer, J.J.

    1986-01-01

    In this talk, we will survey recent research in the area of radiation hardened optical detectors. We have studied conventional silicon photodiode structures, special radiation hardened silicon photodiodes, and special double heterojunction AlGaAs/GaAs photodiodes in neutron, gamma, pulsed x-ray and charged particle environments. We will present results of our work and summarize other research in this area. Our studies have shown that detectors can be made to function acceptably after exposures to neutron fluences of 10 15 n/cm 2 , total dose gamma exposures of 10 8 rad (Si), and flash x-ray environments of 10 8 rad/sec (Si). We will describe detector structures that can operate through these conditions, pre-rad and post-rad operational characteristics, and experimental conditions that produced these results. 23 refs., 10 figs., 1 tab

  9. Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference

    Directory of Open Access Journals (Sweden)

    Benxiao Tang

    2018-01-01

    Full Text Available Digital password lock has been commonly used on mobile devices as the primary authentication method. Researches have demonstrated that sensors embedded on mobile devices can be employed to infer the password. However, existing works focus on either each single keystroke inference or entire password sequence inference, which are user-dependent and require huge efforts to collect the ground truth training data. In this paper, we design a novel side-channel attack system, called Niffler, which leverages the user-independent features of movements of tapping consecutive buttons to infer unlocking passwords on smartphones. We extract angle features to reflect the changing trends and build a multicategory classifier combining the dynamic time warping algorithm to infer the probability of each movement. We further use the Markov model to model the unlocking process and use the sequences with the highest probabilities as the attack candidates. Moreover, the sensor readings of successful attacks will be further fed back to continually improve the accuracy of the classifier. In our experiments, 100,000 samples collected from 25 participants are used to evaluate the performance of Niffler. The results show that Niffler achieves 70% and 85% accuracy with 10 attempts in user-independent and user-dependent environments with few training samples, respectively.

  10. Hardened Solar Array High Temperature Adhesive.

    Science.gov (United States)

    1981-04-01

    SHERWOOO. D SASIU.IS F3361S-0-C-201S UNCLASSI ED 1AC-SCG-IOOIIR AFVAL-TR-OL-201? NLm,,hinii EhhhEE11I1 AFWAL-TR-81- 2017 i : HARDENED SOLAR ARRAY D HIGH...Tg and as a consequence forms a film on the container and also precipitates as tacky waxlike particles, rather than the desired flocullated

  11. Hardening by means of ionising radiation

    International Nuclear Information System (INIS)

    Spoor, H.; Demmler, K.

    1979-01-01

    The polymerisable ethylic unsaturated mixture can be hardened by means of electron irradiation and used as a corrosion preventive layer. The mixture mainly consists of at least a di-olefinic unsaturated polyester, partial esters of polycarbonic acids, in particular the monoester of dicarbonic acids, with a copolymerizable C-C double bond, and mono-olefine unsaturated hydrocarbons, for example vinyl aromatics. The coatings exhibit good adhesion to the substrate, in particular to metal, and good flexibility. (DG) [de

  12. Stochastic Optimal Estimation with Fuzzy Random Variables and Fuzzy Kalman Filtering

    Institute of Scientific and Technical Information of China (English)

    FENG Yu-hu

    2005-01-01

    By constructing a mean-square performance index in the case of fuzzy random variable, the optimal estimation theorem for unknown fuzzy state using the fuzzy observation data are given. The state and output of linear discrete-time dynamic fuzzy system with Gaussian noise are Gaussian fuzzy random variable sequences. An approach to fuzzy Kalman filtering is discussed. Fuzzy Kalman filtering contains two parts: a real-valued non-random recurrence equation and the standard Kalman filtering.

  13. Hardening CISCO Devices based on Cryptography and Security Protocols - Part One: Background Theory

    Directory of Open Access Journals (Sweden)

    Faisal Waheed

    2018-07-01

    Full Text Available Network Security is a vital part of any corporate and enterprise network. Network attacks greatly compromise not only the sensitive data of the consumers but also cause outages to these networks. Thus inadequately protected networks need to be “hardened”. The hardening of network devices refers to the hardware and software components, device operating system’s features, management controls, access-list restrictions, operational configurations and above all making sure that the data and credentials are not stored or transferred in ‘plaintext’ over the network. This article investigates the use of cryptography and network protocols based on encryption, to meet the need for essential security requirements. Use of non-secure protocols, underrating and misconfigurations of management protection are reasons behind network devices not properly being hardened; hence leaving vulnerabilities for the intruders. The gap identified after conducting intense search and review of past work is used as the foundation to present solutions. When performing cryptography techniques by encrypting packets using tunnelling and security protocols, management level credentials are encrypted. These include password encryption and exceptional analysis of the emulated IOS (Internetwork Operating System. Necessary testing is carried out to evaluate an acceptable level of protection of these devices. In a virtual testing environment, security flaws are found mainly in the emulated IOS. The discoveries does not depend on the hardware or chassis of a networking device. Since routers primarily rely on its Operating System (OS, attackers focus on manipulating the command line configuration before initiating an attack. Substantial work is devoted to implementation and testing of a router based on Cryptography and Security Protocols in the border router. This is deployed at the core layer and acts as the first point of entry of any trusted and untrusted traffic. A step

  14. Intuitionistic fuzzy aggregation and clustering

    CERN Document Server

    Xu, Zeshui

    2012-01-01

    This book offers a systematic introduction to the clustering algorithms for intuitionistic fuzzy values, the latest research results in intuitionistic fuzzy aggregation techniques, the extended results in interval-valued intuitionistic fuzzy environments, and their applications in multi-attribute decision making, such as supply chain management, military system performance evaluation, project management, venture capital, information system selection, building materials classification, and operational plan assessment, etc.

  15. Fatigue of coated and laser hardened steels

    International Nuclear Information System (INIS)

    La Cruz, P. de.

    1990-01-01

    In the present work the effect of ion nitriding, laser hardening and hot dip galvanizing upon the fatigue limit and notch sensitivity of a B-Mn Swedish steel SS 2131 have been investigated. The fatigue tests were performed in plane reverse bending fatigue (R=1). The quenched and tempered condition was taken as the reference condition. The microstructure, microhardness, fracture surface and coating appearance of the fatigue surface treated specimens were studied. Residual stress and retained austenite measurements were also carried out. It was found that ion nitriding improves the fatigue limit by 53 % for smooth specimens and by 115 % for notched specimens. Laser hardening improves the fatigue limit by 18 % and 56 % for smooth and notched specimen respectively. Hot dip galvanizing gives a slight deterioration of the fatigue limit (9 % and 10 % for smooth and notched specimen respectively). Ion nitriding and laser hardening decrease the value of the notch sensitivity factor q by 78 % and 65 % respectively. Hot dip galvanizing does not modify it. A simple schematic model based on a residual stress distribution, has been used to explain the different effects. It seems that the presence of the higher compressive residual stresses and the higher uniformity of the microstructure may be the causes of the better fatigue performance of ion nitrided specimens. (119 refs.) (author)

  16. Beam hardening correction algorithm in microtomography images

    International Nuclear Information System (INIS)

    Sales, Erika S.; Lima, Inaya C.B.; Lopes, Ricardo T.; Assis, Joaquim T. de

    2009-01-01

    Quantification of mineral density of bone samples is directly related to the attenuation coefficient of bone. The X-rays used in microtomography images are polychromatic and have a moderately broad spectrum of energy, which makes the low-energy X-rays passing through a sample to be absorbed, causing a decrease in the attenuation coefficient and possibly artifacts. This decrease in the attenuation coefficient is due to a process called beam hardening. In this work the beam hardening of microtomography images of vertebrae of Wistar rats subjected to a study of hyperthyroidism was corrected by the method of linearization of the projections. It was discretized using a spectrum in energy, also called the spectrum of Herman. The results without correction for beam hardening showed significant differences in bone volume, which could lead to a possible diagnosis of osteoporosis. But the data with correction showed a decrease in bone volume, but this decrease was not significant in a confidence interval of 95%. (author)

  17. Beam hardening correction algorithm in microtomography images

    Energy Technology Data Exchange (ETDEWEB)

    Sales, Erika S.; Lima, Inaya C.B.; Lopes, Ricardo T., E-mail: esales@con.ufrj.b, E-mail: ricardo@lin.ufrj.b [Coordenacao dos Programas de Pos-graduacao de Engenharia (COPPE/UFRJ), Rio de Janeiro, RJ (Brazil). Lab. de Instrumentacao Nuclear; Assis, Joaquim T. de, E-mail: joaquim@iprj.uerj.b [Universidade do Estado do Rio de Janeiro (UERJ), Nova Friburgo, RJ (Brazil). Inst. Politecnico. Dept. de Engenharia Mecanica

    2009-07-01

    Quantification of mineral density of bone samples is directly related to the attenuation coefficient of bone. The X-rays used in microtomography images are polychromatic and have a moderately broad spectrum of energy, which makes the low-energy X-rays passing through a sample to be absorbed, causing a decrease in the attenuation coefficient and possibly artifacts. This decrease in the attenuation coefficient is due to a process called beam hardening. In this work the beam hardening of microtomography images of vertebrae of Wistar rats subjected to a study of hyperthyroidism was corrected by the method of linearization of the projections. It was discretized using a spectrum in energy, also called the spectrum of Herman. The results without correction for beam hardening showed significant differences in bone volume, which could lead to a possible diagnosis of osteoporosis. But the data with correction showed a decrease in bone volume, but this decrease was not significant in a confidence interval of 95%. (author)

  18. GRAVITY PIPELINE TRANSPORT FOR HARDENING FILLING MIXTURES

    Directory of Open Access Journals (Sweden)

    Leonid KROUPNIK

    2015-12-01

    Full Text Available In underground mining of solid minerals becoming increasingly common development system with stowing hardening mixtures. In this case the natural ore array after it is replaced by an artificial excavation of solidified filling mixture consisting of binder, aggregates and water. Such a mixture is prepared on the surface on special stowing complexes and transported underground at special stowing pipelines. However, it is transported to the horizons of a few kilometers, which requires a sustainable mode of motion of such a mixture in the pipeline. Hardening stowing mixture changes its rheological characteristics over time, which complicates the calculation of the parameters of pipeline transportation. The article suggests a method of determining the initial parameters of such mixtures: the status coefficient, indicator of transportability, coefficient of hydrodynamic resistance to motion of the mixture. These indicators characterize the mixture in terms of the possibility to transport it through pipes. On the basis of these indicators is proposed methodology for calculating the parameters of pipeline transport hardening filling mixtures in drift mode when traffic on the horizontal part of the mixture under pressure column of the mixture in the vertical part of the backfill of the pipeline. This technique allows stable operation is guaranteed to provide pipeline transportation.

  19. Novel circuits for radiation hardened memories

    International Nuclear Information System (INIS)

    Haraszti, T.P.; Mento, R.P.; Moyer, N.E.; Grant, W.M.

    1992-01-01

    This paper reports on implementation of large storage semiconductor memories which combine radiation hardness with high packing density, operational speed, and low power dissipation and require both hardened circuit and hardened process technologies. Novel circuits, including orthogonal shuffle type of write-read arrays, error correction by weighted bidirectional codes and associative iterative repair circuits, are proposed for significant improvements of SRAMs' immunity against the effects of total dose and cosmic particle impacts. The implementation of the proposed circuit resulted in fault-tolerant 40-Mbit and 10-Mbit monolithic memories featuring a data rate of 120 MHz and power dissipation of 880 mW. These experimental serial-parallel memories were fabricated with a nonhardened standard CMOS processing technology, yet provided a total dose hardness of 1 Mrad and a projected SEU rate of 1 x 10 - 12 error/bit/day. Using radiation hardened processing improvements by factors of 10 to 100 are predicted in both total dose hardness and SEU rate

  20. On the mathematics of fuzziness

    Energy Technology Data Exchange (ETDEWEB)

    Chulichkov, A.I.; Chulichkova, N.M.; Pyt`ev, Y. P.; Smolnik, L.

    1994-12-31

    The problem of the minimax linear interpretation of stochastic measurements with fuzzy conditions on values of the object`s parameters is considered. The result of a measurement interpretation is the fuzzy element (u, h, alpha, mu(.,.,.)), where u is the object`s parameter estimation, h is the estimation accuracy and alpha is the reliability of interpretation, mu is the characteristic function of a fuzzy element. Reliability is the characteristic of the agreement between fuzzy a priori information and measuring data. The information on the values of the parameters of an object under investigation is interactively submitted to the computer.

  1. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  2. Fuzzy vulnerability matrix

    International Nuclear Information System (INIS)

    Baron, Jorge H.; Rivera, S.S.

    2000-01-01

    The so-called vulnerability matrix is used in the evaluation part of the probabilistic safety assessment for a nuclear power plant, during the containment event trees calculations. This matrix is established from what is knows as Numerical Categories for Engineering Judgement. This matrix is usually established with numerical values obtained with traditional arithmetic using the set theory. The representation of this matrix with fuzzy numbers is much more adequate, due to the fact that the Numerical Categories for Engineering Judgement are better represented with linguistic variables, such as 'highly probable', 'probable', 'impossible', etc. In the present paper a methodology to obtain a Fuzzy Vulnerability Matrix is presented, starting from the recommendations on the Numerical Categories for Engineering Judgement. (author)

  3. Spinning the fuzzy sphere

    International Nuclear Information System (INIS)

    Berenstein, David; Dzienkowski, Eric; Lashof-Regas, Robin

    2015-01-01

    We construct various exact analytical solutions of the SO(3) BMN matrix model that correspond to rotating fuzzy spheres and rotating fuzzy tori. These are also solutions of Yang Mills theory compactified on a sphere times time and they are also translationally invariant solutions of the N=1"∗ field theory with a non-trivial charge density. The solutions we construct have a ℤ_N symmetry, where N is the rank of the matrices. After an appropriate ansatz, we reduce the problem to solving a set of polynomial equations in 2N real variables. These equations have a discrete set of solutions for each value of the angular momentum. We study the phase structure of the solutions for various values of N. Also the continuum limit where N→∞, where the problem reduces to finding periodic solutions of a set of coupled differential equations. We also study the topology change transition from the sphere to the torus.

  4. Radial Fuzzy Systems

    Czech Academy of Sciences Publication Activity Database

    Coufal, David

    2017-01-01

    Roč. 319, 15 July (2017), s. 1-27 ISSN 0165-0114 R&D Projects: GA MŠk(CZ) LD13002 Institutional support: RVO:67985807 Keywords : fuzzy systems * radial functions * coherence Subject RIV: BA - General Mathematics OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 2.718, year: 2016

  5. Fuzzy Clustering Methods and their Application to Fuzzy Modeling

    DEFF Research Database (Denmark)

    Kroszynski, Uri; Zhou, Jianjun

    1999-01-01

    Fuzzy modeling techniques based upon the analysis of measured input/output data sets result in a set of rules that allow to predict system outputs from given inputs. Fuzzy clustering methods for system modeling and identification result in relatively small rule-bases, allowing fast, yet accurate....... An illustrative synthetic example is analyzed, and prediction accuracy measures are compared between the different variants...

  6. On residual stresses and fatigue of laser hardened steels

    International Nuclear Information System (INIS)

    Lin, Ru.

    1992-01-01

    This thesis deals with studies on residual stresses and fatigue properties of laser-transformation hardened steels. Two types of specimens, cylinders and fatigue specimens were used in the studies. The cylinders, made of Swedish steels SS 2244 and SS 2258 which correspond to AISI 4140 and AISI 52100 respectively, were locally hardened by a single scan of laser beam in the longitudinal direction, with various laser parameters. Residual stress distributions across the hardened tracks were measured by means of X-ray diffraction. The origins of residual stresses were investigated and discussed. For the fatigue specimens, including smooth and notched types made of Swedish steels SS 2244, SS 2225 and SS 1572 (similar to AISI 4140, AISI 4130 and AISI 1035, respectively), laser hardening was carried out in the gauge section. The residual stress field induced by the hardening process and the fatigue properties by plane bending fatigue test were studied. In order to investigate the stability of the residual stress field, stress measurements were also made on specimens being loaded near the fatigue limits for over 10 7 cycles. Further the concept of local fatigue strength was employed to correlate quantitatively the effect of hardness and residual stress field on the fatigue limits. In addition a group of smooth specimens of SS 2244 was induction hardened and the hardening results were compared with the corresponding laser hardened ones in terms of residual stress and fatigue behaviour. It has been found that compressive stresses exist in the hardened zone of all the specimens studied. The laser hardening condition, the specimen and how the hardening is carried out can significantly affect the residual stress field. Laser hardening can greatly improve the fatigue properties by inducing a hardened and compressed surface layer. (112 refs.)(au)

  7. On residual stresses and fatigue of laser hardened steels

    Energy Technology Data Exchange (ETDEWEB)

    Lin, Ru.

    1992-01-01

    This thesis deals with studies on residual stresses and fatigue properties of laser-transformation hardened steels. Two types of specimens, cylinders and fatigue specimens were used in the studies. The cylinders, made of Swedish steels SS 2244 and SS 2258 which correspond to AISI 4140 and AISI 52100 respectively, were locally hardened by a single scan of laser beam in the longitudinal direction, with various laser parameters. Residual stress distributions across the hardened tracks were measured by means of X-ray diffraction. The origins of residual stresses were investigated and discussed. For the fatigue specimens, including smooth and notched types made of Swedish steels SS 2244, SS 2225 and SS 1572 (similar to AISI 4140, AISI 4130 and AISI 1035, respectively), laser hardening was carried out in the gauge section. The residual stress field induced by the hardening process and the fatigue properties by plane bending fatigue test were studied. In order to investigate the stability of the residual stress field, stress measurements were also made on specimens being loaded near the fatigue limits for over 10[sup 7] cycles. Further the concept of local fatigue strength was employed to correlate quantitatively the effect of hardness and residual stress field on the fatigue limits. In addition a group of smooth specimens of SS 2244 was induction hardened and the hardening results were compared with the corresponding laser hardened ones in terms of residual stress and fatigue behaviour. It has been found that compressive stresses exist in the hardened zone of all the specimens studied. The laser hardening condition, the specimen and how the hardening is carried out can significantly affect the residual stress field. Laser hardening can greatly improve the fatigue properties by inducing a hardened and compressed surface layer. (112 refs.)(au).

  8. Fatigue hardening and softening studies on strain hardened 18-8 austenitic stainless steel

    International Nuclear Information System (INIS)

    Ramakrishna Prasad, C.; Vasudevan, R.

    1976-01-01

    Metals when subjected to fatigue harden or soften depending on their previous mechanical history. Annealed or mildly cold worked metals are known to harden while severely cold worked metals soften when subjected to fatigue loading. In the present work samples of austenitic 18-8 steel cold worked to 11% and 22% reduction in area were mounted in a vertical pulsator and fatigued in axial tension-compression. Clear cut effects were produced and it was noticed that these depended on the extent of cold work, the amplitude as well as the number of cycles of fatigue and mean stress if any. (orig.) [de

  9. When Sharing Is a Bad Idea: The Effects of Online Social Network Engagement and Sharing Passwords with Friends on Cyberbullying Involvement.

    Science.gov (United States)

    Meter, Diana J; Bauman, Sheri

    2015-08-01

    Every day, children and adolescents communicate online via social networking sites (SNSs). They also report sharing passwords with peers and friends, a potentially risky behavior in regard to cyber safety. This longitudinal study tested the hypotheses that social network engagement in multiple settings would predict more cyberbullying involvement over time, and that youth who reported sharing passwords would also experience an increase in cyberbullying involvement. Data were collected at two time points one year apart from 1,272 third through eighth grade students. In line with the first study hypothesis, participating in more online SNSs was associated with increased cyberbullying involvement over time, as well as sharing passwords over time. Cyberbullying involvement at T1 predicted decreases in sharing passwords over time, suggesting that youth become aware of the dangers of sharing passwords as a result of their experience. Sharing passwords at T1 was unrelated to cyberbullying involvement at T2. Although it seems that youth may be learning from their previous mistakes, due to the widespread use of social media and normality of sharing passwords among young people, it is important to continue to educate youth about cyber safety and risky online behavior.

  10. Laser transformation hardening effect on hardening zone features and surface hardness of tool steel AISI D2

    Directory of Open Access Journals (Sweden)

    D. Lesyk

    2017-06-01

    Full Text Available The relationship of technological input regimes of the laser transformation hardening on change the hardening depth, hardening width, and hardening angle, as well as surface hardness of the tool steel AISI D2 using multifactor experiment with elements of the analysis of variance and regression equations was determined. The laser transformation hardening process implemented by controlling the heating temperature using Nd:YAG fiber laser with scanner, pyrometer and proportional-integral-differential controller. The linear and quadratic regression models are developed, as well as response surface to determine the effect of the heating temperature and feed rate of the treated surface on the energy density of the laser beam, hardening depths, hardening width, hardening angle, and surface hardness are designed. The main effect on the energy density of the laser beam has a velocity laser treatment, on the other hand, the main effect on the geometrical parameters of the laser hardened zone and surface hardness has temperature heating are shown. The optimum magnitudes of the heating temperature (1270 °C and feed rate of the treated surface (90 mm/min for laser transformation hardening of the tool steel AISI D2 using fiber laser with scanner were defined.

  11. Fuzzy linguistic model for interpolation

    International Nuclear Information System (INIS)

    Abbasbandy, S.; Adabitabar Firozja, M.

    2007-01-01

    In this paper, a fuzzy method for interpolating of smooth curves was represented. We present a novel approach to interpolate real data by applying the universal approximation method. In proposed method, fuzzy linguistic model (FLM) applied as universal approximation for any nonlinear continuous function. Finally, we give some numerical examples and compare the proposed method with spline method

  12. Fuzzy Logic in Medicine and Bioinformatics

    Directory of Open Access Journals (Sweden)

    Angela Torres

    2006-01-01

    Full Text Available The purpose of this paper is to present a general view of the current applications of fuzzy logic in medicine and bioinformatics. We particularly review the medical literature using fuzzy logic. We then recall the geometrical interpretation of fuzzy sets as points in a fuzzy hypercube and present two concrete illustrations in medicine (drug addictions and in bioinformatics (comparison of genomes.

  13. Algebraic Aspects of Families of Fuzzy Languages

    NARCIS (Netherlands)

    Asveld, P.R.J.; Heylen, Dirk K.J.; Nijholt, Antinus; Scollo, Giuseppe

    2000-01-01

    We study operations on fuzzy languages such as union, concatenation,Kleene $\\star$, intersection with regular fuzzy languages, and several kinds of (iterated) fuzzy substitution. Then we consider families of fuzzy languages, closed under a fixed collection of these operations, which results in the

  14. BUSFET -- A radiation-hardened SOI transistor

    International Nuclear Information System (INIS)

    Schwank, J.R.; Shaneyfelt, M.R.; Draper, B.L.; Dodd, P.E.

    1999-01-01

    The total-dose hardness of SOI technology is limited by radiation-induced charge trapping in gate, field, and SOI buried oxides. Charge trapping in the buried oxide can lead to back-channel leakage and makes hardening SOI transistors more challenging than hardening bulk-silicon transistors. Two avenues for hardening the back-channel are (1) to use specially prepared SOI buried oxides that reduce the net amount of trapped positive charge or (2) to design transistors that are less sensitive to the effects of trapped charge in the buried oxide. In this work, the authors propose a partially-depleted SOI transistor structure for mitigating the effects of trapped charge in the buried oxide on radiation hardness. They call this structure the BUSFET--Body Under Source FET. The BUSFET utilizes a shallow source and a deep drain. As a result, the silicon depletion region at the back channel caused by radiation-induced charge trapping in the buried oxide does not form a conducting path between source and drain. Thus, the BUSFET structure design can significantly reduce radiation-induced back-channel leakage without using specially prepared buried oxides. Total dose hardness is achieved without degrading the intrinsic SEU or dose rate hardness of SOI technology. The effectiveness of the BUSFET structure for reducing total-dose back-channel leakage depends on several variables, including the top silicon film thickness and doping concentration, and the depth of the source. 3-D simulations show that for a body doping concentration of 10 18 cm -3 , a drain bias of 3 V, and a source depth of 90 nm, a silicon film thickness of 180 nm is sufficient to almost completely eliminate radiation-induced back-channel leakage. However, for a doping concentration of 3 x 10 17 cm -3 , a thicker silicon film (300 nm) must be used

  15. Fuzzy control in environmental engineering

    CERN Document Server

    Chmielowski, Wojciech Z

    2016-01-01

    This book is intended for engineers, technicians and people who plan to use fuzzy control in more or less developed and advanced control systems for manufacturing processes, or directly for executive equipment. Assuming that the reader possesses elementary knowledge regarding fuzzy sets and fuzzy control, by way of a reminder, the first parts of the book contain a reminder of the theoretical foundations as well as a description of the tools to be found in the Matlab/Simulink environment in the form of a toolbox. The major part of the book presents applications for fuzzy controllers in control systems for various manufacturing and engineering processes. It presents seven processes and problems which have been programmed using fuzzy controllers. The issues discussed concern the field of Environmental Engineering. Examples are the control of a flood wave passing through a hypothetical, and then the real Dobczyce reservoir in the Raba River, which is located in the upper Vistula River basin in Southern Poland, th...

  16. Design of interpretable fuzzy systems

    CERN Document Server

    Cpałka, Krzysztof

    2017-01-01

    This book shows that the term “interpretability” goes far beyond the concept of readability of a fuzzy set and fuzzy rules. It focuses on novel and precise operators of aggregation, inference, and defuzzification leading to flexible Mamdani-type and logical-type systems that can achieve the required accuracy using a less complex rule base. The individual chapters describe various aspects of interpretability, including appropriate selection of the structure of a fuzzy system, focusing on improving the interpretability of fuzzy systems designed using both gradient-learning and evolutionary algorithms. It also demonstrates how to eliminate various system components, such as inputs, rules and fuzzy sets, whose reduction does not adversely affect system accuracy. It illustrates the performance of the developed algorithms and methods with commonly used benchmarks. The book provides valuable tools for possible applications in many fields including expert systems, automatic control and robotics.

  17. On Intuitionistic Fuzzy Sets Theory

    CERN Document Server

    Atanassov, Krassimir T

    2012-01-01

    This book aims to be a  comprehensive and accurate survey of state-of-art research on intuitionistic fuzzy sets theory and could be considered a continuation and extension of the author´s previous book on Intuitionistic Fuzzy Sets, published by Springer in 1999 (Atanassov, Krassimir T., Intuitionistic Fuzzy Sets, Studies in Fuzziness and soft computing, ISBN 978-3-7908-1228-2, 1999). Since the aforementioned  book has appeared, the research activity of the author within the area of intuitionistic fuzzy sets has been expanding into many directions. The results of the author´s most recent work covering the past 12 years as well as the newest general ideas and open problems in this field have been therefore collected in this new book.

  18. Safety critical application of fuzzy control

    International Nuclear Information System (INIS)

    Schildt, G.H.

    1995-01-01

    After an introduction into safety terms a short description of fuzzy logic will be given. Especially, for safety critical applications of fuzzy controllers a possible controller structure will be described. The following items will be discussed: Configuration of fuzzy controllers, design aspects like fuzzfiication, inference strategies, defuzzification and types of membership functions. As an example a typical fuzzy rule set will be presented. Especially, real-time behaviour a fuzzy controllers is mentioned. An example of fuzzy controlling for temperature control purpose within a nuclear reactor together with membership functions and inference strategy of such a fuzzy controller will be presented. (author). 4 refs, 17 figs

  19. Image matching navigation based on fuzzy information

    Institute of Scientific and Technical Information of China (English)

    田玉龙; 吴伟仁; 田金文; 柳健

    2003-01-01

    In conventional image matching methods, the image matching process is mostly based on image statistic information. One aspect neglected by all these methods is that there is much fuzzy information contained in these images. A new fuzzy matching algorithm based on fuzzy similarity for navigation is presented in this paper. Because the fuzzy theory is of the ability of making good description of the fuzzy information contained in images, the image matching method based on fuzzy similarity would look forward to producing good performance results. Experimental results using matching algorithm based on fuzzy information also demonstrate its reliability and practicability.

  20. Radiation protection and fuzzy set theory

    International Nuclear Information System (INIS)

    Nishiwaki, Y.

    1993-01-01

    In radiation protection we encounter a variety of sources of uncertainties which are due to fuzziness in our cognition or perception of objects. For systematic treatment of this type of uncertainty, the concepts of fuzzy sets or fuzzy measures could be applied to construct system models, which may take into consideration both subjective or intrinsic fuzziness and objective or extrinsic fuzziness. The theory of fuzzy sets and fuzzy measures is still in a developing stage, but its concept may be applied to various problems of subjective perception of risk, nuclear safety, radiation protection and also to the problems of man-machine interface and human factor engineering or ergonomic

  1. Coating compositions hardenable by ionization beams

    International Nuclear Information System (INIS)

    Chaudhari, D.; Haering, E.; Dobbelstein, A.; Hoselmann, W.

    1976-01-01

    Coating compositions hardenable by ionizing radiation are described which contain as binding agents a mixture of at least 1 unsaturated olefin compound containing urethane groups, and at least 1 further unsaturated olefin compound that may be copolymerized. The unsaturated olefin compound containing the urethane groups is a reaction product of a compound containing carboxylic acid groups and a compound containing at least 1 isocyanate group where the mixture of the two olefins may contain conventional additives of the lacquer industry. 6 claims, no drawings

  2. An Innovative Radiation Hardened CAM Architecture

    CERN Document Server

    Shojaii, Seyed Ruhollah; The ATLAS collaboration

    2018-01-01

    This article describes an innovative Content Addressable Memory (CAM) cell with radiation hardened (RH) architecture. The RH-CAM is designed in a commercial 28 nm CMOS technology. The circuit has been simulated in worst-case conditions, and the effects due to single particles have been analyzed by injecting a current pulse into a circuit node. The proposed architecture is suitable for on-time pattern recognition tasks in harsh environments, such as front-end electronics in hadron colliders and in space applications.

  3. Radiation-hardened nonvolatile MNOS RAM

    International Nuclear Information System (INIS)

    Wrobel, T.F.; Dodson, W.H.; Hash, G.L.; Jones, R.V.; Nasby, R.D.; Olson, R.J.

    1983-01-01

    A radiation hardened nonvolatile MNOS RAM is being developed at Sandia National Laboratories. The memory organization is 128 x 8 bits and utilizes two p-channel MNOS transistors per memory cell. The peripheral circuitry is constructed with CMOS metal gate and is processed with standard Sandia rad-hard processing techniques. The devices have memory retention after a dose-rate exposure of 1E12 rad(Si)/s, are functional after total dose exposure of 1E6 rad(Si), and are dose-rate upset resistant to levels of 7E8 rad(Si)/s

  4. Radiation-hardened CMOS integrated circuits

    International Nuclear Information System (INIS)

    Pikor, A.; Reiss, E.M.

    1980-01-01

    Substantial effort has been directed at radiation-hardening CMOS integrated circuits using various oxide processes. While most of these integrated circuits have been successful in demonstrating megarad hardness, further investigations have shown that the 'wet-oxide process' is most compatible with the RCA CD4000 Series process. This article describes advances in the wet-oxide process that have resulted in multimegarad hardness and yield to MIL-M-38510 screening requirements. The implementation of these advances into volume manufacturing is geared towards supplying devices for aerospace requirements such as the Defense Meterological Satellite program (DMSP) and the Global Positioning Satellite (GPS). (author)

  5. Application of submerged induction hardening; Ekichu koshuha yakiire no jitsuyoka

    Energy Technology Data Exchange (ETDEWEB)

    Nishimori, Y; Nagai, Y; Amii, Y [Mazda Motor Corp., Hiroshima (Japan); Tanaka, Y [Netsuren Co. Ltd., Tokyo (Japan); Mizuma, T [Toyo Advanced Technologies Co. Ltd., Hiroshima (Japan)

    1997-10-01

    As a cost-cutting measure, the linerless diesel engine was adopted by applying submerged induction hardening process which can harden partial inner surface of cylinder block bore. In applying this process, (1) development of induction coil which can form any shape of quenched pattern and (2) the development of machining technology which can hone precisely the distorted bore after quenching, were important. With these improvements, submerged Induction hardening was made practical. 1 ref., 11 figs.

  6. Hardening device, by inserts, of electronic component against radiation

    International Nuclear Information System (INIS)

    Val, C.

    1987-01-01

    The hardening device includes at least two materials, one with high atomic number with respect to the other. One of these materials is set as inserts in a layer of the other material. The hardening device is then made by stacking of such layers, the insert density varying from one layer to the other, making thus vary the atomic number resulting from the hardening device along its thickness, following a predefined law [fr

  7. Investigation of srawberry hardening in low temperatures in vitro

    OpenAIRE

    Lukoševičiūtė, Vanda; Rugienius, Rytis; Kavaliauskaitė, Danguolė

    2007-01-01

    Cold resistance of different strawberry varieties in vitro and ability to retain hardening after defrosting and repeated hardening. Phytohormons – gibberellin and abscisic acid added in the growing medium were investigated in Horticulture plant genetic and biotechnology department of LIH. We tried to model common conditions in temperate zone when freeze-thaw cycles often occur during wintertime. For investigation in vitro strawberries for the first time hardened in light at the temperature of...

  8. Configurable Radiation Hardened High Speed Isolated Interface ASIC, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — NVE Corporation will design and build an innovative, low cost, flexible, configurable, radiation hardened, galvanically isolated, interface ASIC chip set that will...

  9. The use of passwords to introduce theconcepts of spanning set and span

    Directory of Open Access Journals (Sweden)

    Andrea Cárcamo

    2017-01-01

    Full Text Available The aim of this paper is to present a proposal for teaching linear algebra based on heuristic of emergent models and mathematical modelling. This proposal begins with a problematic situation  related  to  the  creation  and  use  of  secure  passwords,  which  leads  first-year  students  of  engineering  toward  the  construction  of  the  concepts  of  spanning  set  and  span. The  proposal  is  designed  from  the  results  of  the  two  cycles  of  experimentation  teaching, design-based  research,  which  give  evidence  that  allows  students  to  progress  from  a  situation in a real context to the concepts of linear algebra. This proposal, previously adapted, could have similar results when applied to another group of students.

  10. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  11. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication

    Directory of Open Access Journals (Sweden)

    Jaejin Jang

    2016-08-01

    Full Text Available Wireless access points (WAPs are devices that provide Internet connectivity to devices such as desktops, laptops, smartphones, and tablets. Hence, it is important to provide sufficient availability to devices and security for the traffic that is routed by a WAP. However, attackers can decrease the network bandwidth or obtain the traffic including private data such as search histories, login information, and device usage patterns by exploiting the vulnerabilities in firmware upgrades to install malicious firmware. To address this problem, we propose a sustainable and practical firmware upgrade for a WAP using password-based authentication. The proposed upgrade protocol ensures security by adding freshness to the firmware whenever a firmware upgrade occurs. This freshness is different for each event and each firmware; therefore, even if the freshness of one firmware is exposed, the others are secure. In addition, confidentiality, integrity, and authentication are ensured. Furthermore, the proposed protocol can be easily implemented and adapted to WAPs. Experiments are performed to evaluate the upgrade time, resource usage, and code size in wired and wireless connected environments by implementing a prototype and analyzing the security of the protocol. The results show that the proposed upgrade is secure and practical.

  12. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer

    Science.gov (United States)

    Mannan, Mohammad; van Oorschot, P. C.

    Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token).

  13. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  14. Fuzzy portfolio model with fuzzy-input return rates and fuzzy-output proportions

    Science.gov (United States)

    Tsaur, Ruey-Chyn

    2015-02-01

    In the finance market, a short-term investment strategy is usually applied in portfolio selection in order to reduce investment risk; however, the economy is uncertain and the investment period is short. Further, an investor has incomplete information for selecting a portfolio with crisp proportions for each chosen security. In this paper we present a new method of constructing fuzzy portfolio model for the parameters of fuzzy-input return rates and fuzzy-output proportions, based on possibilistic mean-standard deviation models. Furthermore, we consider both excess or shortage of investment in different economic periods by using fuzzy constraint for the sum of the fuzzy proportions, and we also refer to risks of securities investment and vagueness of incomplete information during the period of depression economics for the portfolio selection. Finally, we present a numerical example of a portfolio selection problem to illustrate the proposed model and a sensitivity analysis is realised based on the results.

  15. Improvement of Fuzzy Image Contrast Enhancement Using Simulated Ergodic Fuzzy Markov Chains

    Directory of Open Access Journals (Sweden)

    Behrouz Fathi-Vajargah

    2014-01-01

    Full Text Available This paper presents a novel fuzzy enhancement technique using simulated ergodic fuzzy Markov chains for low contrast brain magnetic resonance imaging (MRI. The fuzzy image contrast enhancement is proposed by weighted fuzzy expected value. The membership values are then modified to enhance the image using ergodic fuzzy Markov chains. The qualitative performance of the proposed method is compared to another method in which ergodic fuzzy Markov chains are not considered. The proposed method produces better quality image.

  16. The World of Combinatorial Fuzzy Problems and the Efficiency of Fuzzy Approximation Algorithms

    OpenAIRE

    Yamakami, Tomoyuki

    2015-01-01

    We re-examine a practical aspect of combinatorial fuzzy problems of various types, including search, counting, optimization, and decision problems. We are focused only on those fuzzy problems that take series of fuzzy input objects and produce fuzzy values. To solve such problems efficiently, we design fast fuzzy algorithms, which are modeled by polynomial-time deterministic fuzzy Turing machines equipped with read-only auxiliary tapes and write-only output tapes and also modeled by polynomia...

  17. Induction surface hardening of hard coated steels

    Energy Technology Data Exchange (ETDEWEB)

    Pantleon, K.; Kessler, O.; Hoffann, F.; Mayr, P. [Stiftung Inst. fuer Werkstofftechnik, Bremen (Germany)

    1999-11-01

    The properties of hard coatings deposited using CVD processes are usually excellent. However, high deposition temperatures negatively influence the substrate properties, especially in the case of low alloyed steels. Therefore, a subsequent heat treatment is necessary to restore the properties of steel substrates. Here, induction surface hardening is used as a method of heat treatment after the deposition of TiN hard coatings on AISI 4140 (DIN42CrMo4) substrates. The influences of the heat treatment on both the coating and the substrate properties are discussed in relation to the parameters of induction heating. Thereby, the heating time, heating atmosphere and the power input into the coating-substrate compounds are varied. As a result of induction surface hardening, the properties of the substrates are improved without losing good coating properties. High hardness values in the substrate near the interface allow the AISI 4140 substrates to support TiN hard coatings very well. Consequently, higher critical loads are measured in scratch tests after the heat treatment. Also, compressive residual stresses in the substrate are generated. In addition, only a very low distortion appears. (orig.)

  18. An Improvement of Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps.

    Science.gov (United States)

    Moon, Jongho; Choi, Younsung; Kim, Jiye; Won, Dongho

    2016-03-01

    Recently, numerous extended chaotic map-based password authentication schemes that employ smart card technology were proposed for Telecare Medical Information Systems (TMISs). In 2015, Lu et al. used Li et al.'s scheme as a basis to propose a password authentication scheme for TMISs that is based on biometrics and smart card technology and employs extended chaotic maps. Lu et al. demonstrated that Li et al.'s scheme comprises some weaknesses such as those regarding a violation of the session-key security, a vulnerability to the user impersonation attack, and a lack of local verification. In this paper, however, we show that Lu et al.'s scheme is still insecure with respect to issues such as a violation of the session-key security, and that it is vulnerable to both the outsider attack and the impersonation attack. To overcome these drawbacks, we retain the useful properties of Lu et al.'s scheme to propose a new password authentication scheme that is based on smart card technology and requires the use of chaotic maps. Then, we show that our proposed scheme is more secure and efficient and supports security properties.

  19. Type-2 fuzzy granular models

    CERN Document Server

    Sanchez, Mauricio A; Castro, Juan R

    2017-01-01

    In this book, a series of granular algorithms are proposed. A nature inspired granular algorithm based on Newtonian gravitational forces is proposed. A series of methods for the formation of higher-type information granules represented by Interval Type-2 Fuzzy Sets are also shown, via multiple approaches, such as Coefficient of Variation, principle of justifiable granularity, uncertainty-based information concept, and numerical evidence based. And a fuzzy granular application comparison is given as to demonstrate the differences in how uncertainty affects the performance of fuzzy information granules.

  20. Fuzzy resource optimization for safeguards

    International Nuclear Information System (INIS)

    Zardecki, A.; Markin, J.T.

    1991-01-01

    Authorization, enforcement, and verification -- three key functions of safeguards systems -- form the basis of a hierarchical description of the system risk. When formulated in terms of linguistic rather than numeric attributes, the risk can be computed through an algorithm based on the notion of fuzzy sets. Similarly, this formulation allows one to analyze the optimal resource allocation by maximizing the overall detection probability, regarded as a linguistic variable. After summarizing the necessary elements of the fuzzy sets theory, we outline the basic algorithm. This is followed by a sample computation of the fuzzy optimization. 10 refs., 1 tab

  1. Fuzzy improvement of the SQL

    Directory of Open Access Journals (Sweden)

    Hudec Miroslav

    2011-01-01

    Full Text Available Structured Query Language (SQL is used to obtain data from relational databases. Fuzzy improvement of SQL queries has advantages in cases when the user cannot unambiguously define selection criteria or when the user wants to examine data that almost meet the given criteria. In this paper we examine a realization of the fuzzy querying concept. For this purposes the fuzzy generalized logical condition for the WHERE part of the SQL is created. It allows users to create queries by linguistic terms. The proposed model is an extension of the SQL so that no modification inside databases has to be undertaken.

  2. Fuzzy expert systems using CLIPS

    Science.gov (United States)

    Le, Thach C.

    1994-01-01

    This paper describes a CLIPS-based fuzzy expert system development environment called FCLIPS and illustrates its application to the simulated cart-pole balancing problem. FCLIPS is a straightforward extension of CLIPS without any alteration to the CLIPS internal structures. It makes use of the object-oriented and module features in CLIPS version 6.0 for the implementation of fuzzy logic concepts. Systems of varying degrees of mixed Boolean and fuzzy rules can be implemented in CLIPS. Design and implementation issues of FCLIPS will also be discussed.

  3. Integrating Fuzzy AHP and Fuzzy ARAS for evaluating financial performance

    Directory of Open Access Journals (Sweden)

    Abdolhamid Safaei Ghadikolaei

    2014-09-01

    Full Text Available Multi Criteria Decision Making (MCDM is an advanced field of Operation Research; recently MCDM methods are efficient and common tools for performance evaluation in many areas such as finance and economy. The aim of this study is to show one of applications of mathematics in real word. This study with considering value based measures and accounting based measures simultaneously, provided a hybrid approach of MCDM methods in fuzzy environment for financial performance evaluation of automotive and parts manufacturing industry of Tehran stock exchange (TSE.for this purpose Fuzzy analytic hierarchy process (FAHP is applied to determine the relative important of each criterion, then The companies are ranked according their financial performance by using fuzzy additive ratio assessment (Fuzzy ARAS method. The finding of this study showed effective of this approach in evaluating financial performance.

  4. Bake hardening of nanograin AA7075 aluminum alloy

    International Nuclear Information System (INIS)

    Dehghani, Kamran

    2011-01-01

    Highlights: ► The bake hardening behavior of AA7075 was studied and compared with its coarse-grain counterpart. ► Nanograin AA7075 exhibited 88–100% increase in bake hardenability. ► Nanograin AA7075 exhibited 36–38% increase in final yield strength after baking. ► Maximum bake hardenability and final yield stress were about 185 MPa and 719 MPa. - Abstract: In the present work, the bake hardening of nanostructured AA7075 aluminum alloy was compared with that of its coarse-grain counterpart. Surface severe plastic deformation (SSPD) was used to produce nanograin layers on both surfaces of workpieces. The nanostructured layers were characterized using scanning electron microscopy (SEM) and atomic force microscopy (AFM) techniques. The thickness of nanostructured layer, having the grains of 50–110 nm, was about 75 μm on each side of workpiece. The bake hardenability of nanograin and coarse-grain AA7075 was then compared by pre-straining to 2, 4 and 6% followed by baking at 100 °C and 200 °C for 20 min. Comparing to coarse-grain case, there was about 88–100% increase in bake hardenability and about 36–38% increase in yield strength after the bake hardening of present nanograin AA7075. Such an increase in bake hardenability and strength was achieved when the thickness of two nanograin layers was about only one-tenth of the whole thickness.

  5. Work hardening correlation for monotonic loading based on state variables

    International Nuclear Information System (INIS)

    Huang, F.H.; Li, C.Y.

    1977-01-01

    An absolute work hardening correlation in terms of the hardness parameter and the internal stress based on the state variable approach was developed. It was found applicable to a variety of metals and alloys. This correlation predicts strain rate insensitive work hardening properties at low homologous temperatures and produces strain rate effects at higher homologous temperatures without involving thermally induced recovery processes

  6. Analysis of the work-hardening process in spheroidized steels

    International Nuclear Information System (INIS)

    Pacheco, J.L.

    1981-07-01

    An elementary model for the work-hardening process in duplex-structures steels (ferrite - spheroidite) is proposed and tested on low, medium and high carbon content, which seems to give good results concerning the influence of the volume fraction and particle size of the second phase on the work-hardening behaviour. (Author) [pt

  7. Design and characterization of cellulose nanocrystal-enhanced epoxy hardeners

    Science.gov (United States)

    Shane X. Peng; Robert J. Moon; Jeffrey P. Youngblood

    2014-01-01

    Cellulose nanocrystals (CNCs) are renewable, sustainable, and abundant nanomaterial widely used as reinforcing fillers in the field of polymer nanocomposites. In this study, two-part epoxy systems with CNC-enhanced hardeners were fabricated. Three types of hardeners, Jeffamine D400 (JD400), diethylenetriamine (DETA), and (±)-trans-1,2- diaminocyclohexane (DACH), were...

  8. ANISOTROPIC STRAIN-HARDENING IN POLYCRYSTALLINE COPPER AND ALUMINUM

    NARCIS (Netherlands)

    HESS, F

    1993-01-01

    A new viscoplastic model for the plastic stress-strain behaviour of f.c.c. metals is presented. In this model the strain hardening results from increasing dislocation densities. The observed stagnation of strain hardening after strain reversals is explained by a lowering of the increase in

  9. Pemodelan Sistem Fuzzy Dengan Menggunakan Matlab

    Directory of Open Access Journals (Sweden)

    Afan Galih Salman

    2010-12-01

    Full Text Available Fuzzy logic is a method in soft computing category, a method that could process uncertain, inaccurate, and less cost implemented data. Some methods in soft computing category besides fuzzy logic are artificial network nerve, probabilistic reasoning, and evolutionary computing. Fuzzy logic has the ability to develop fuzzy system that is intelligent system in uncertain environment. Some stages in fuzzy system formation process is input and output analysis, determining input and output variable, defining each fuzzy set member function, determining rules based on experience or knowledge of an expert in his field, and implementing fuzzy system. Overall, fuzzy logic uses simple mathematical concept, understandable, detectable uncertain and accurate data. Fuzzy system could create and apply expert experiences directly without exercise process and effort to decode the knowledge into a computer until becoming a modeling system that could be relied on decision making.

  10. Implementation of Steiner point of fuzzy set.

    Science.gov (United States)

    Liang, Jiuzhen; Wang, Dejiang

    2014-01-01

    This paper deals with the implementation of Steiner point of fuzzy set. Some definitions and properties of Steiner point are investigated and extended to fuzzy set. This paper focuses on establishing efficient methods to compute Steiner point of fuzzy set. Two strategies of computing Steiner point of fuzzy set are proposed. One is called linear combination of Steiner points computed by a series of crisp α-cut sets of the fuzzy set. The other is an approximate method, which is trying to find the optimal α-cut set approaching the fuzzy set. Stability analysis of Steiner point of fuzzy set is also studied. Some experiments on image processing are given, in which the two methods are applied for implementing Steiner point of fuzzy image, and both strategies show their own advantages in computing Steiner point of fuzzy set.

  11. Fuzzy histogram for internal and external fuzzy directional relations

    OpenAIRE

    Salamat , Nadeem; Zahzah , El-Hadi

    2009-01-01

    5 Pages; Spatial relations have key point importance in image analysis and computer vision. Numerous technics have been developed to study these relations especially directional relations. Modern digital computers give rise to quantitative methods and among them fuzzy methods have core importance due to handling imprecise knowledge information and vagueness. In most fuzzy methods external directional relations are considered which are useful for small scale space image analysis but in large s...

  12. Solution of Fuzzy Differential Equations Using Fuzzy Sumudu Transforms

    Directory of Open Access Journals (Sweden)

    Raheleh Jafari

    2018-01-01

    Full Text Available The uncertain nonlinear systems can be modeled with fuzzy differential equations (FDEs and the solutions of these equations are applied to analyze many engineering problems. However, it is very difficult to obtain solutions of FDEs. In this paper, the solutions of FDEs are approximated by utilizing the fuzzy Sumudu transform (FST method. Significant theorems are suggested in order to explain the properties of FST. The proposed method is validated with three real examples.

  13. A review of the stages of work hardening

    Energy Technology Data Exchange (ETDEWEB)

    Rollett, A.D.; Kocks, U.F.

    1993-07-01

    Stages of work hardening are reviewed with emphasis on links between each stage. Simple quantitative descriptions are given for each stage. Similarities between stage I, easy glide, and stage IV, large strain hardening, are pointed out both in terms of magnitude of the hardening rate and of the underlying mechanism of dislocation debris accumulation. Stage II is described as an athermal hardening stage that occurs when statistical variations in the dislocation ``forest`` lead to geometrical storage of dislocations. The steadily decreasing hardening rate observed in stage III is characterized by the increasing rate of loss of dislocation density due to dynamic recovery. Stage III appears to have an asymptote to a saturation stress which is determined by the characteristics of the dislocation tangles, or cell walls. The imperfect nature of the dynamic recovery process, however, leads to the accumulation of dislocation debris and this, by analogy with stage 1, causes the apparent saturation stress to rise, thus causing stage IV.

  14. Theta-Generalized closed sets in fuzzy topological spaces

    International Nuclear Information System (INIS)

    El-Shafei, M.E.; Zakari, A.

    2006-01-01

    In this paper we introduce the concepts of theta-generalized closed fuzzy sets and generalized fuzzy sets in topological spaces. Furthermore, generalized fuzzy sets are extended to theta-generalized fuzzy sets. Also, we introduce the concepts of fuzzy theta-generalized continuous and fuzzy theta-generalized irresolute mappings. (author)

  15. Coating compositions hardenable by ionization beams

    International Nuclear Information System (INIS)

    Chaudhari, D.; Haering, E.; Dobbelstein, A.; Hoselmann, W.

    1976-01-01

    Coating compositions hardenable by ionizing radiation comprise as binding agents a mixture of A. at least 1 unsaturated olefin compound containing urethane groups, and B. at least 1 further unsaturated olefin compound that may be copolymerized. The unsaturated olefin compound A. containing the urethane groups in a reaction product of (a) a compound of the general formula (CHR 1 = CR 2 COOCH 2 CH(OH)CH 2 O CO-)/sub n/R where n is 1 or 2, where R stands for a straight chain or branched alkyl group of valence n, where R 1 is hydrogen, methyl; or the group -COOCH 2 CH(OH)CH 2 OCOR 3 - where R 3 is a monovalent alkyl residue and where R 2 is hydrogen or methyl, and (b) a compound containing at least 1 isocyanate group where the mixture of (A) and (B) may contain conventional additives of the lacquer industry. 6 claims

  16. Radiation hardening of MOS devices by boron

    International Nuclear Information System (INIS)

    Danchenko, V.

    1975-01-01

    A novel technique is disclosed for radiation hardening of MOS devices and specifically for stabilizing the gate threshold potential at room temperature of a radiation subjected MOS field-effect device of the type having a semiconductor substrate, an insulating layer of oxide on the substrate, and a gate electrode disposed on the insulating layer. In the preferred embodiment, the novel inventive technique contemplates the introduction of boron into the insulating oxide, the boron being introduced within a layer of the oxide of about 100A to 300A thickness immediately adjacent the semiconductor-insulator interface. The concentration of boron in the oxide layer is preferably maintained on the order of 10 atoms/ cm 3 . The novel technique serves to reduce and substantially annihilate radiation induced positive gate charge accumulations, which accumulations, if not eliminated, would cause shifting of the gate threshold potential of a radiation subjected MOS device, and thus render the device unstable and/or inoperative. (auth)

  17. Rapid cold hardening: a gut feeling.

    Science.gov (United States)

    Worland, M R; Convey, P; Luke ov , A

    2000-01-01

    This study examined the rate of cold hardening of a field population of Antarctic springtails and the effect of eating food with particular levels of ice nucleating activity on the animal's whole body freezing point. The SCPs of samples of c. 20, freshly collected, Cryptopygus antarcticus were measured hourly over a 32 hour collection period using differential scanning calorimetry and related to habitat temperature. The mean SCP of the springtails increased from -24 to -10 degree C during which time the habitat temperature warmed slowly from -2.5 to +2.5 degree C. In laboratory experiments, previously starved, cold tolerant springtails were fed on selected species of algae with measured SCP's but there was no clear correlation between the SCP of food and that of the animals after feeding. Microscopic examination of faecal pellets and guts from springtails showed that algal cells were completely destroyed during digestion.

  18. An extension of fuzzy decisi

    Directory of Open Access Journals (Sweden)

    Basem Mohamed Elomda

    2013-07-01

    Full Text Available This paper presents a new extension to Fuzzy Decision Maps (FDMs by allowing use of fuzzy linguistic values to represent relative importance among criteria in the preference matrix as well as representing relative influence among criteria for computing the steady-state matrix in the stage of Fuzzy Cognitive Map (FCM. The proposed model is called the Linguistic Fuzzy Decision Networks (LFDNs. The proposed LFDN provides considerable flexibility to decision makers when solving real world Multi-Criteria Decision-Making (MCDM problems. The performance of the proposed LFDN model is compared with the original FDM using a previously published case study. The result of comparison ensures the ability to draw the same decisions with a more realistic decision environment.

  19. FUZZY LOGIC IN LEGAL EDUCATION

    Directory of Open Access Journals (Sweden)

    Z. Gonul BALKIR

    2011-04-01

    Full Text Available The necessity of examination of every case within its peculiar conditions in social sciences requires different approaches complying with the spirit and nature of social sciences. Multiple realities require different and various perceptual interpretations. In modern world and social sciences, interpretation of perception of valued and multi-valued have been started to be understood by the principles of fuzziness and fuzzy logic. Having the verbally expressible degrees of truthness such as true, very true, rather true, etc. fuzzy logic provides the opportunity for the interpretation of especially complex and rather vague set of information by flexibility or equivalence of the variables’ of fuzzy limitations. The methods and principles of fuzzy logic can be benefited in examination of the methodological problems of law, especially in the applications of filling the legal loopholes arising from the ambiguities and interpretation problems in order to understand the legal rules in a more comprehensible and applicable way and the efficiency of legal implications. On the other hand, fuzzy logic can be used as a technical legal method in legal education and especially in legal case studies and legal practice applications in order to provide the perception of law as a value and the more comprehensive and more quality perception and interpretation of value of justice, which is the core value of law. In the perception of what happened as it has happened in legal relationships and formations, the understanding of social reality and sociological legal rules with multi valued sense perspective and the their applications in accordance with the fuzzy logic’s methods could create more equivalent and just results. It can be useful for the young lawyers and law students as a facilitating legal method especially in the materialization of the perception and interpretation of multi valued and variables. Using methods and principles of fuzzy logic in legal

  20. On the mathematics of fuzziness

    Energy Technology Data Exchange (ETDEWEB)

    Kerre, E. [Ghent Univ. (Belgium)

    1994-12-31

    During the past twenty-five years, the scientific community has been working very extensively on the development of reliable models for the representation and manipulation of impreciseness and uncertainty that pervade the real world. Fuzzy set theory is one of the most popular theories able to treat incomplete information. In this paper, the basic mathematical principles underlying fuzzy set theory are outlined. Special attention is paid to the way that set theory has influenced the development of mathematics in a positive way.

  1. On the mathematics of fuzziness

    International Nuclear Information System (INIS)

    Kerre, E.

    1994-01-01

    During the past twenty-five years, the scientific community has been working very extensively on the development of reliable models for the representation and manipulation of impreciseness and uncertainty that pervade the real world. Fuzzy set theory is one of the most popular theories able to treat incomplete information. In this paper, the basic mathematical principles underlying fuzzy set theory are outlined. Special attention is paid to the way that set theory has influenced the development of mathematics in a positive way

  2. Fuzzy reasoning on Horn Set

    International Nuclear Information System (INIS)

    Liu, X.; Fang, K.

    1986-01-01

    A theoretical study in fuzzy reasoning on Horn Set is presented in this paper. The authors first introduce the concepts of λ-Horn Set of clauses and λ-Input Half Lock deduction. They then use the λ-resolution method to discuss fuzzy reasoning on λ-Horn set of clauses. It is proved that the proposed λ-Input Half Lock resolution method is complete with the rules in certain format

  3. A Fuzzy Query Mechanism for Human Resource Websites

    Science.gov (United States)

    Lai, Lien-Fu; Wu, Chao-Chin; Huang, Liang-Tsung; Kuo, Jung-Chih

    Users' preferences often contain imprecision and uncertainty that are difficult for traditional human resource websites to deal with. In this paper, we apply the fuzzy logic theory to develop a fuzzy query mechanism for human resource websites. First, a storing mechanism is proposed to store fuzzy data into conventional database management systems without modifying DBMS models. Second, a fuzzy query language is proposed for users to make fuzzy queries on fuzzy databases. User's fuzzy requirement can be expressed by a fuzzy query which consists of a set of fuzzy conditions. Third, each fuzzy condition associates with a fuzzy importance to differentiate between fuzzy conditions according to their degrees of importance. Fourth, the fuzzy weighted average is utilized to aggregate all fuzzy conditions based on their degrees of importance and degrees of matching. Through the mutual compensation of all fuzzy conditions, the ordering of query results can be obtained according to user's preference.

  4. Fuzzy barrier distributions

    International Nuclear Information System (INIS)

    Piasecki, E.

    2009-01-01

    Heavy-ion collisions often produce a fusion barrier distribution with structures displaying a fingerprint of couplings to highly collective excitations [1]. Basically the same distribution can be obtained from large-angle quasi-elastic scattering, though here the role of the many weak direct-reaction channels is unclear. For 2 0N e + 9 0Z r we have observed the barrier structures expected for the highly deformed neon projectile, but for 2 0N e + 9 2Z r we find completely smooth distribution (see Fig.1). We find that transfer channels in these systems are of similar strength but single particle excitations are significantly stronger in the latter case. They apparently reduce the 'resolving power' of the quasi-elastic channel, what leads to smeared out, or 'fuzzy' barrier distribution. This is the first case when such a phenomenon has been observed.(author)

  5. On Fuzzy β-I-open sets and Fuzzy β-I-continuous functions

    International Nuclear Information System (INIS)

    Keskin, Aynur

    2009-01-01

    In this paper, first of all we obtain some properties and characterizations of fuzzy β-I-open sets. After that, we also define the notion of β-I-closed sets and obtain some properties. Lastly, we introduce the notions of fuzzy β-I-continuity with the help of fuzzy β-I-open sets to obtain decomposition of fuzzy continuity.

  6. On Fuzzy {beta}-I-open sets and Fuzzy {beta}-I-continuous functions

    Energy Technology Data Exchange (ETDEWEB)

    Keskin, Aynur [Department of Mathematics, Faculty of Science and Arts, Selcuk University, Campus, 42075 Konya (Turkey)], E-mail: akeskin@selcuk.edu.tr

    2009-11-15

    In this paper, first of all we obtain some properties and characterizations of fuzzy {beta}-I-open sets. After that, we also define the notion of {beta}-I-closed sets and obtain some properties. Lastly, we introduce the notions of fuzzy {beta}-I-continuity with the help of fuzzy {beta}-I-open sets to obtain decomposition of fuzzy continuity.

  7. Hardening and softening mechanisms of pearlitic steel wire under torsion

    International Nuclear Information System (INIS)

    Zhao, Tian-Zhang; Zhang, Shi-Hong; Zhang, Guang-Liang; Song, Hong-Wu; Cheng, Ming

    2014-01-01

    Highlights: • Mechanical behavior of pearlitic steel wire is studied using torsion. • Work hardening results from refinement lamellar pearlitic structure. • Softening results from recovery, shear bands and lamellar fragmentations. • A microstructure based analytical flow stress model is established. - Abstract: The mechanical behaviors and microstructure evolution of pearlitic steel wires under monotonic shear deformation have been investigated by a torsion test and a number of electron microscopy techniques including scanning electron microscopy (SEM) and transmission electron microscopy (TEM), with an aim to reveal the softening and hardening mechanisms of a randomly oriented pearlitic structure during a monotonic stain path. Significantly different from the remarkable strain hardening in cold wire drawing, the strain hardening rate during torsion drops to zero quickly after a short hardening stage. The microstructure observations indicate that the inter-lamellar spacing (ILS) decreases and the dislocations accumulate with strain, which leads to hardening of the material. Meanwhile, when the strain is larger than 0.154, the enhancement of dynamic recovery, shear bands (SBs) and cementite fragmentations results in the softening and balances the strain hardening. A microstructure based analytical flow stress model with considering the influence of ILS on the mean free path of dislocations and the softening caused by SBs and cementite fragmentations, has been established and the predicted flow shear curve meets well with the measured curve in the torsion test

  8. Numerical and experimental comparison of plastic work-hardening rules

    International Nuclear Information System (INIS)

    Haisler, W.E.

    1977-01-01

    The purpose of this paper is to describe recent numerical and experimental correlation studies of several plastic work-hardening rules. The mechanical sublayer model and the combined kinematic-isotropic hardening rules are examined and the numerical results for several structural geometries are compared to experimental results. Both monotonic and cyclic loads are considered. The governing incremental plasticity relations are developed for both work-hardening models. The combined kinematic-isotropic hardening model is developed in terms of a ratio γ which controls the relative contribution of kinematic hardening (yield surface translation) and isotropic hardening (yield surface expansion). In addition to making use of a uniaxial stress-strain curve as input data, the model allows for the input of a yield surface size vs. uniaxial plastic strain curve obtained from a cyclic uniaxial reverse loading test. The mechanical sublayer model is developed in general form and a new method for determining the sublayer parameters (stress weighting factors and yield stresses) is presented. It is demonstrated that former procedures used to obtain the sublayer parameters are inconsistent for multiaxial loading. Numerical and experimental results are presented for a cylinder, circular plate with punch, and a steel pressure vessel. The numerical results are obtained with the computer program AGGIE I. The comparison study indicates that reasonable agreement is obtained with both hardening models; the choice depending upon whether the loading is monotonic or cyclic

  9. Supply chain management under fuzziness recent developments and techniques

    CERN Document Server

    Öztayşi, Başar

    2014-01-01

    Supply Chain Management Under Fuzziness presents recently developed fuzzy models and techniques for supply chain management. These include: fuzzy PROMETHEE, fuzzy AHP, fuzzy ANP, fuzzy VIKOR, fuzzy DEMATEL, fuzzy clustering, fuzzy linear programming, and fuzzy inference systems. The book covers both practical applications and new developments concerning these methods. This book offers an excellent resource for researchers and practitioners in supply chain management and logistics, and will provide them with new suggestions and directions for future research. Moreover, it will support graduate students in their university courses, such as specialized courses on supply chains and logistics, as well as related courses in the fields of industrial engineering, engineering management and business administration.

  10. Stability Analysis of Interconnected Fuzzy Systems Using the Fuzzy Lyapunov Method

    Directory of Open Access Journals (Sweden)

    Ken Yeh

    2010-01-01

    Full Text Available The fuzzy Lyapunov method is investigated for use with a class of interconnected fuzzy systems. The interconnected fuzzy systems consist of J interconnected fuzzy subsystems, and the stability analysis is based on Lyapunov functions. Based on traditional Lyapunov stability theory, we further propose a fuzzy Lyapunov method for the stability analysis of interconnected fuzzy systems. The fuzzy Lyapunov function is defined in fuzzy blending quadratic Lyapunov functions. Some stability conditions are derived through the use of fuzzy Lyapunov functions to ensure that the interconnected fuzzy systems are asymptotically stable. Common solutions can be obtained by solving a set of linear matrix inequalities (LMIs that are numerically feasible. Finally, simulations are performed in order to verify the effectiveness of the proposed stability conditions in this paper.

  11. Fuzzy relational calculus theory, applications and software

    CERN Document Server

    Peeva, Ketty

    2004-01-01

    This book examines fuzzy relational calculus theory with applications in various engineering subjects. The scope of the text covers unified and exact methods with algorithms for direct and inverse problem resolution in fuzzy relational calculus. Extensive engineering applications of fuzzy relation compositions and fuzzy linear systems (linear, relational and intuitionistic) are discussed. Some examples of such applications include solutions of equivalence, reduction and minimization problems in fuzzy machines, pattern recognition in fuzzy languages, optimization and inference engines in textile and chemical engineering, etc. A comprehensive overview of the authors' original work in fuzzy relational calculus is also provided in each chapter. The attached CD-Rom contains a toolbox with many functions for fuzzy calculations, together with an original algorithm for inverse problem resolution in MATLAB. This book is also suitable for use as a textbook in related courses at advanced undergraduate and graduate level...

  12. Compound Option Pricing under Fuzzy Environment

    Directory of Open Access Journals (Sweden)

    Xiandong Wang

    2014-01-01

    Full Text Available Considering the uncertainty of a financial market includes two aspects: risk and vagueness; in this paper, fuzzy sets theory is applied to model the imprecise input parameters (interest rate and volatility. We present the fuzzy price of compound option by fuzzing the interest and volatility in Geske’s compound option pricing formula. For each α, the α-level set of fuzzy prices is obtained according to the fuzzy arithmetics and the definition of fuzzy-valued function. We apply a defuzzification method based on crisp possibilistic mean values of the fuzzy interest rate and fuzzy volatility to obtain the crisp possibilistic mean value of compound option price. Finally, we present a numerical analysis to illustrate the compound option pricing under fuzzy environment.

  13. Fuzzy Arden Syntax: A fuzzy programming language for medicine.

    Science.gov (United States)

    Vetterlein, Thomas; Mandl, Harald; Adlassnig, Klaus-Peter

    2010-05-01

    The programming language Arden Syntax has been optimised for use in clinical decision support systems. We describe an extension of this language named Fuzzy Arden Syntax, whose original version was introduced in S. Tiffe's dissertation on "Fuzzy Arden Syntax: Representation and Interpretation of Vague Medical Knowledge by Fuzzified Arden Syntax" (Vienna University of Technology, 2003). The primary aim is to provide an easy means of processing vague or uncertain data, which frequently appears in medicine. For both propositional and number data types, fuzzy equivalents have been added to Arden Syntax. The Boolean data type was generalised to represent any truth degree between the two extremes 0 (falsity) and 1 (truth); fuzzy data types were introduced to represent fuzzy sets. The operations on truth values and real numbers were generalised accordingly. As the conditions to decide whether a certain programme unit is executed or not may be indeterminate, a Fuzzy Arden Syntax programme may split. The data in the different branches may be optionally aggregated subsequently. Fuzzy Arden Syntax offers the possibility to formulate conveniently Medical Logic Modules (MLMs) based on the principle of a continuously graded applicability of statements. Furthermore, ad hoc decisions about sharp value boundaries can be avoided. As an illustrative example shows, an MLM making use of the features of Fuzzy Arden Syntax is not significantly more complex than its Arden Syntax equivalent; in the ideal case, a programme handling crisp data remains practically unchanged when compared to its fuzzified version. In the latter case, the output data, which can be a set of weighted alternatives, typically depends continuously from the input data. In typical applications an Arden Syntax MLM can produce a different output after only slight changes of the input; discontinuities are in fact unavoidable when the input varies continuously but the output is taken from a discrete set of possibilities

  14. Work hardening behavior study of structural alloys for cryogenic applications

    International Nuclear Information System (INIS)

    Chu, D.; Morris, J.W. Jr.

    1992-01-01

    Previous investigation on aluminum-lithium alloys have indicated different dependencies of the work hardening behavior on temperature. This variation in temperature dependence is attributed to differences in microstructure rather than composition. An understanding of the microstructural effect on the observed thermal dependency is important as it may allow the tailoring of deformation properties through mechanical processing. Work hardening analyses on other aluminum alloys and a number of structural steels have been performed to better elucidate the role played by microstructure in determining the work hardening behavior. In the paper correlations between the differences in mechanical behavior and the various microstructures observed are presented

  15. Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network

    Science.gov (United States)

    Kim, Ho J.; Lim, Joon S.

    2018-03-01

    Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.

  16. ANALYSIS OF FUZZY QUEUES: PARAMETRIC PROGRAMMING APPROACH BASED ON RANDOMNESS - FUZZINESS CONSISTENCY PRINCIPLE

    OpenAIRE

    Dhruba Das; Hemanta K. Baruah

    2015-01-01

    In this article, based on Zadeh’s extension principle we have apply the parametric programming approach to construct the membership functions of the performance measures when the interarrival time and the service time are fuzzy numbers based on the Baruah’s Randomness- Fuzziness Consistency Principle. The Randomness-Fuzziness Consistency Principle leads to defining a normal law of fuzziness using two different laws of randomness. In this article, two fuzzy queues FM...

  17. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  18. Fuzzy upper bounds and their applications

    Energy Technology Data Exchange (ETDEWEB)

    Soleimani-damaneh, M. [Department of Mathematics, Faculty of Mathematical Science and Computer Engineering, Teacher Training University, 599 Taleghani Avenue, Tehran 15618 (Iran, Islamic Republic of)], E-mail: soleimani_d@yahoo.com

    2008-04-15

    This paper considers the concept of fuzzy upper bounds and provides some relevant applications. Considering a fuzzy DEA model, the existence of a fuzzy upper bound for the objective function of the model is shown and an effective approach to solve that model is introduced. Some dual interpretations are provided, which are useful for practical purposes. Applications of the concept of fuzzy upper bounds in two physical problems are pointed out.

  19. Neuro-fuzzy Control of Integrating Processes

    Directory of Open Access Journals (Sweden)

    Anna Vasičkaninová

    2011-11-01

    Full Text Available Fuzzy technology is adaptive and easily applicable in different areas.Fuzzy logic provides powerful tools to capture the perceptionof natural phenomena. The paper deals with tuning of neuro-fuzzy controllers for integrating plant and for integrating plantswith time delay. The designed approach is verified on three examples by simulations and compared plants with classical PID control.Designed fuzzy controllers lead to better closed-loop control responses then classical PID controllers.

  20. FFLP problem with symmetric trapezoidal fuzzy numbers

    Directory of Open Access Journals (Sweden)

    Reza Daneshrad

    2015-04-01

    Full Text Available The most popular approach for solving fully fuzzy linear programming (FFLP problems is to convert them into the corresponding deterministic linear programs. Khan et al. (2013 [Khan, I. U., Ahmad, T., & Maan, N. (2013. A simplified novel technique for solving fully fuzzy linear programming problems. Journal of Optimization Theory and Applications, 159(2, 536-546.] claimed that there had been no method in the literature to find the fuzzy optimal solution of a FFLP problem without converting it into crisp linear programming problem, and proposed a technique for the same. Others showed that the fuzzy arithmetic operation used by Khan et al. (2013 had some problems in subtraction and division operations, which could lead to misleading results. Recently, Ezzati et al. (2014 [Ezzati, R., Khorram, E., & Enayati, R. (2014. A particular simplex algorithm to solve fuzzy lexicographic multi-objective linear programming problems and their sensitivity analysis on the priority of the fuzzy objective functions. Journal of Intelligent and Fuzzy Systems, 26(5, 2333-2358.] defined a new operation on symmetric trapezoidal fuzzy numbers and proposed a new algorithm to find directly a lexicographic/preemptive fuzzy optimal solution of a fuzzy lexicographic multi-objective linear programming problem by using new fuzzy arithmetic operations, but their model was not fully fuzzy optimization. In this paper, a new method, by using Ezzati et al. (2014’s fuzzy arithmetic operation and a fuzzy version of simplex algorithm, is proposed for solving FFLP problem whose parameters are represented by symmetric trapezoidal fuzzy number without converting the given problem into crisp equivalent problem. By using the proposed method, the fuzzy optimal solution of FFLP problem can be easily obtained. A numerical example is provided to illustrate the proposed method.

  1. Robust and Reusable Fuzzy Extractors

    Science.gov (United States)

    Boyen, Xavier

    The use of biometric features as key material in security protocols has often been suggested to relieve their owner from the need to remember long cryptographic secrets. The appeal of biometric data as cryptographic secrets stems from their high apparent entropy, their availability to their owner, and their relative immunity to loss. In particular, they constitute a very effective basis for user authentication, especially when combined with complementary credentials such as a short memorized password or a physical token. However, the use of biometrics in cryptography does not come without problems. Some difficulties are technical, such as the lack of uniformity and the imperfect reproducibility of biometrics, but some challenges are more fundamental.

  2. A SELF-ORGANISING FUZZY LOGIC CONTROLLER

    African Journals Online (AJOL)

    ES Obe

    One major drawback of fuzzy logic controllers is the difficulty encountered in the construction of a rule- base ... The greatest limitation of fuzzy logic control is the lack ..... c(kT)= e(kT)-e((k-1)T). (16) .... with the aid of fuzzy models”, It in Industrial.

  3. Forecasting Enrollments with Fuzzy Time Series.

    Science.gov (United States)

    Song, Qiang; Chissom, Brad S.

    The concept of fuzzy time series is introduced and used to forecast the enrollment of a university. Fuzzy time series, an aspect of fuzzy set theory, forecasts enrollment using a first-order time-invariant model. To evaluate the model, the conventional linear regression technique is applied and the predicted values obtained are compared to the…

  4. On the intuitionistic fuzzy inner product spaces

    International Nuclear Information System (INIS)

    Goudarzi, M.; Vaezpour, S.M.; Saadati, R.

    2009-01-01

    In this paper, the definition of intuitionistic fuzzy inner product is given. By virtue of this definition, some convergence theorems, Schwarts inequality and the orthogonal concept for intuitionistic fuzzy inner product spaces are established and introduced. Moreover the relationship between this kind of spaces and intuitionistic fuzzy normed spaces is considered.

  5. Fuzzy control of pressurizer dynamic process

    International Nuclear Information System (INIS)

    Ming Zhedong; Zhao Fuyu

    2006-01-01

    Considering the characteristics of pressurizer dynamic process, the fuzzy control system that takes the advantages of both fuzzy controller and PID controller is designed for the dynamic process in pressurizer. The simulation results illustrate this type of composite control system is with better qualities than those of single fuzzy controller and single PID controller. (authors)

  6. Possible use of fuzzy logic in database

    Directory of Open Access Journals (Sweden)

    Vaclav Bezdek

    2011-04-01

    Full Text Available The article deals with fuzzy logic and its possible use in database systems. At first fuzzy thinking style is shown on a simple example. Next the advantages of the fuzzy approach to database searching are considered on the database of used cars in the Czech Republic.

  7. Effectiveness of Securities with Fuzzy Probabilistic Return

    Directory of Open Access Journals (Sweden)

    Krzysztof Piasecki

    2011-01-01

    Full Text Available The generalized fuzzy present value of a security is defined here as fuzzy valued utility of cash flow. The generalized fuzzy present value cannot depend on the value of future cash flow. There exists such a generalized fuzzy present value which is not a fuzzy present value in the sense given by some authors. If the present value is a fuzzy number and the future value is a random one, then the return rate is given as a probabilistic fuzzy subset on a real line. This kind of return rate is called a fuzzy probabilistic return. The main goal of this paper is to derive the family of effective securities with fuzzy probabilistic return. Achieving this goal requires the study of the basic parameters characterizing fuzzy probabilistic return. Therefore, fuzzy expected value and variance are determined for this case of return. These results are a starting point for constructing a three-dimensional image. The set of effective securities is introduced as the Pareto optimal set determined by the maximization of the expected return rate and minimization of the variance. Finally, the set of effective securities is distinguished as a fuzzy set. These results are obtained without the assumption that the distribution of future values is Gaussian. (original abstract

  8. The majority rule in a fuzzy environment.

    OpenAIRE

    Montero, Javier

    1986-01-01

    In this paper, an axiomatic approach to rational decision making in a fuzzy environment is studied. In particular, the majority rule is proposed as a rational way for aggregating fuzzy opinions in a group, when such agroup is defined as a fuzzy set.

  9. The fuzzy approach to statistical analysis

    NARCIS (Netherlands)

    Coppi, Renato; Gil, Maria A.; Kiers, Henk A. L.

    2006-01-01

    For the last decades, research studies have been developed in which a coalition of Fuzzy Sets Theory and Statistics has been established with different purposes. These namely are: (i) to introduce new data analysis problems in which the objective involves either fuzzy relationships or fuzzy terms;

  10. Open Source Radiation Hardened by Design Technology

    Science.gov (United States)

    Shuler, Robert

    2016-01-01

    The proposed technology allows use of the latest microcircuit technology with lowest power and fastest speed, with minimal delay and engineering costs, through new Radiation Hardened by Design (RHBD) techniques that do not require extensive process characterization, technique evaluation and re-design at each Moore's Law generation. The separation of critical node groups is explicitly parameterized so it can be increased as microcircuit technologies shrink. The technology will be open access to radiation tolerant circuit vendors. INNOVATION: This technology would enhance computation intensive applications such as autonomy, robotics, advanced sensor and tracking processes, as well as low power applications such as wireless sensor networks. OUTCOME / RESULTS: 1) Simulation analysis indicates feasibility. 2)Compact voting latch 65 nanometer test chip designed and submitted for fabrication -7/2016. INFUSION FOR SPACE / EARTH: This technology may be used in any digital integrated circuit in which a high level of resistance to Single Event Upsets is desired, and has the greatest benefit outside low earth orbit where cosmic rays are numerous.

  11. Radiation-hardened microwave communications system

    International Nuclear Information System (INIS)

    Smith, S.F.; Crutcher, R.I.; Vandermolen, R.I.

    1990-01-01

    The consolidated fuel reprocessing program (CFRP) at the Oak Ridge National Laboratory (ORNL) has been developing signal transmission techniques and equipment to improve the efficiency of remote handling operations for nuclear applications. These efforts have been largely directed toward the goals of (a) remotely controlling bilateral force-reflecting servomanipulators for dexterous manipulation-based operations in remote maintenance tasks and (b) providing television viewing of the work site. In September 1987, developmental microwave transceiving hardware operating with dish antennas was demonstrated in the advanced integrated maintenance system (AIMS) facility at ORNL, successfully implementing both high-quality one-way television transmissions and simultaneous bidirectional digital control data transmissions with very low error rates. Initial test results based on digital transmission at a 1.0-Mbaud data rate indicated that the error rates of the microwave system were comparable to those of a hardwired system. During these test intervals, complex manipulator operations were performed, and the AIMS transporter was moved repeatedly without adverse effects on data integrity. Results of these tests have been factored into subsequent phases of the development program, with an ultimate goal of designing a fully radiation-hardened microwave signal transmission system for use in nuclear facilities

  12. Fuzzy commutative algebra and its application in mechanical engineering

    International Nuclear Information System (INIS)

    Han, J.; Song, H.

    1996-01-01

    Based on literature data, this paper discusses the whole mathematical structure about point-fuzzy number set F(R). By introducing some new operations about addition, subtraction, multiplication, division and scalar multiplication, we prove that F(R) can form fuzzy linear space, fuzzy commutative ring, fuzzy commutative algebra in order. Furthermore, we get that A is fuzzy commutative algebra for any fuzzy subset. At last, we give an application of point-fuzzy number to mechanical engineering

  13. Fuzzy logic of Aristotelian forms

    Energy Technology Data Exchange (ETDEWEB)

    Perlovsky, L.I. [Nichols Research Corp., Lexington, MA (United States)

    1996-12-31

    Model-based approaches to pattern recognition and machine vision have been proposed to overcome the exorbitant training requirements of earlier computational paradigms. However, uncertainties in data were found to lead to a combinatorial explosion of the computational complexity. This issue is related here to the roles of a priori knowledge vs. adaptive learning. What is the a-priori knowledge representation that supports learning? I introduce Modeling Field Theory (MFT), a model-based neural network whose adaptive learning is based on a priori models. These models combine deterministic, fuzzy, and statistical aspects to account for a priori knowledge, its fuzzy nature, and data uncertainties. In the process of learning, a priori fuzzy concepts converge to crisp or probabilistic concepts. The MFT is a convergent dynamical system of only linear computational complexity. Fuzzy logic turns out to be essential for reducing the combinatorial complexity to linear one. I will discuss the relationship of the new computational paradigm to two theories due to Aristotle: theory of Forms and logic. While theory of Forms argued that the mind cannot be based on ready-made a priori concepts, Aristotelian logic operated with just such concepts. I discuss an interpretation of MFT suggesting that its fuzzy logic, combining a-priority and adaptivity, implements Aristotelian theory of Forms (theory of mind). Thus, 2300 years after Aristotle, a logic is developed suitable for his theory of mind.

  14. A Radiation Hardened Housekeeping Slave Node (RH-HKSN) ASIC

    Data.gov (United States)

    National Aeronautics and Space Administration — This projects seeks to continue the development of the Radiation Hardened Housekeeping Slave Node (RH-HKSN) ASIC. The effort has taken parallel paths by implementing...

  15. Stress corrosion cracking evaluation of precipitation-hardening stainless steel

    Science.gov (United States)

    Humphries, T. S.; Nelson, E. E.

    1970-01-01

    Accelerated test program results show which precipitation hardening stainless steels are resistant to stress corrosion cracking. In certain cases stress corrosion susceptibility was found to be associated with the process procedure.

  16. Radiation-chemical hardening of phenol-formaldehyde oligomers

    International Nuclear Information System (INIS)

    Shlapatskaya, V.V.; Omel'chenko, S.I.

    1978-01-01

    Radiation-chemical hardening of phenol formaldehyde oligomers of the resol type has been studied in the presence of furfural and diallylphthalate diluents. The samples have been hardened on an electron accelerator at an electron energy of 1.0-1.1 MeV and a dose rate of 2-3 Mrad/s. The kinetics of hardening has been studied on the yield of gel fraction within the range of absorbed doses from 7 to 400 Mrad. Radiation-chemical hardening of the studied compositions is activated with sensitizers, namely, amines, metal chlorides, and heterocyclic derivatives of metals. Furfural and diallylphthalate compositions are suitable for forming glass-fibre plastic items by the wet method and coatings under the action of ionizing radiations

  17. Technologies Enabling Custom Radiation-Hardened Component Development, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Two primary paths are available for the creation of a Rad-Hard ASIC. The first approach is to use a radiation hardened process such as existing Rad-Hard foundries....

  18. system hardening architecture for safer access to critical business

    African Journals Online (AJOL)

    eobe

    System hardening is a defence strategy, where several different security measures are applied at various layers, all of which .... commerce have tremendously imparted on corporate services ..... Technology and Exploring Engineering, Vol. 2,.

  19. Space Qualified, Radiation Hardened, Dense Monolithic Flash Memory, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Radiation hardened nonvolatile memories for space is still primarily confined to EEPROM. There is high density effective or cost effective NVM solution available to...

  20. Generation Mechanism of Work Hardened Surface Layer in Metal Cutting

    Science.gov (United States)

    Hikiji, Rikio; Kondo, Eiji; Kawagoishi, Norio; Arai, Minoru

    Finish machining used to be carried out in grinding, but it is being replaced by cutting with very small undeformed chip thickness. In ultra precision process, the effects of the cutting conditions and the complicated factors on the machined surface integrity are the serious problems. In this research, work hardened surface layer was dealt with as an evaluation of the machined surface integrity and the effect of the mechanical factors on work hardening was investigated experimentally in orthogonal cutting. As a result, it was found that work hardened surface layer was affected not only by the shear angle varied under the cutting conditions and the thrust force of cutting resistance, but also by the thrust force acting point, the coefficient of the thrust force and the compressive stress equivalent to the bulk hardness. Furthermore, these mechanical factors acting on the depth of the work hardened surface layer were investigated with the calculation model.

  1. Radiation Hardened Ethernet PHY and Switch Fabric, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Innoflight will develop a new family of radiation hardened (up to 3 Mrad(Si)), fault-tolerant, high data-rate (up to 8 Gbps), low power Gigabit Ethernet PHY and...

  2. Space Qualified, Radiation Hardened, Dense Monolithic Flash Memory, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Space Micro proposes to build a radiation hardened by design (RHBD) flash memory, using a modified version of our RH-eDRAM Memory Controller to solve all the single...

  3. System Hardening Architecture for Safer Access to Critical Business ...

    African Journals Online (AJOL)

    System Hardening Architecture for Safer Access to Critical Business Data. ... and the threat is growing faster than the potential victims can deal with. ... in this architecture are applied to the host, application, operating system, user, and the ...

  4. Implementing fuzzy polynomial interpolation (FPI and fuzzy linear regression (LFR

    Directory of Open Access Journals (Sweden)

    Maria Cristina Floreno

    1996-05-01

    Full Text Available This paper presents some preliminary results arising within a general framework concerning the development of software tools for fuzzy arithmetic. The program is in a preliminary stage. What has been already implemented consists of a set of routines for elementary operations, optimized functions evaluation, interpolation and regression. Some of these have been applied to real problems.This paper describes a prototype of a library in C++ for polynomial interpolation of fuzzifying functions, a set of routines in FORTRAN for fuzzy linear regression and a program with graphical user interface allowing the use of such routines.

  5. DMILL circuits. The hardened electronics decuples its performances

    International Nuclear Information System (INIS)

    Anon.

    1998-01-01

    Thanks to the DMILL (mixed logic-linear hardening) technology under development at the CEA, MHS, a French company specialized in the fabrication of integrated circuits now produces hardened electronic circuits ten times more resistant to radiations than its competitors. Outside the initial market (several thousands of circuits for the LHC particle accelerator of Geneva), a broad choice of applications is opened to this technology: national defense, space, civil nuclear and medical engineering, and high temperature applications. Short paper. (J.S.)

  6. Micromilling of hardened tool steel for mould making applications

    DEFF Research Database (Denmark)

    Bissacco, Giuliano; Hansen, Hans Nørgaard; De Chiffre, Leonardo

    2005-01-01

    geometries as those characterizing injection moulding moulds. The realization of the micromilling process in connection with hardened tool steel as workpiece material is particularly challenging. The low strength of the miniaturized end mills implies reduction and accurate control of the chip load which...... wear. This paper presents the micromilling process applied to the manufacturing of micro injection moulding moulds in hardened tool steel, presenting experimental evidence and possible solutions to the above-mentioned issues....

  7. Radiation hardening of metals irradiated by heavy ions

    International Nuclear Information System (INIS)

    Didyk, A.Yu.; Skuratov, V.A.; Mikhajlova, N.Yu.; Regel', V.R.

    1988-01-01

    The damage dose dependence in the 10 -4 -10 -2 dpa region of radiation hardening of Al, V, Ni, Cu irradiated by xenon ions with 124 MeV energy is investigated using the microhardness technique and transmission electron microscope. It is shown that the pure metals radiation hardening is stimulated for defects clusters with the typical size less than 5 nm, as in the case of neutron and the light charge ion irradiation

  8. Quick fuzzy backpropagation algorithm.

    Science.gov (United States)

    Nikov, A; Stoeva, S

    2001-03-01

    A modification of the fuzzy backpropagation (FBP) algorithm called QuickFBP algorithm is proposed, where the computation of the net function is significantly quicker. It is proved that the FBP algorithm is of exponential time complexity, while the QuickFBP algorithm is of polynomial time complexity. Convergence conditions of the QuickFBP, resp. the FBP algorithm are defined and proved for: (1) single output neural networks in case of training patterns with different targets; and (2) multiple output neural networks in case of training patterns with equivalued target vector. They support the automation of the weights training process (quasi-unsupervised learning) establishing the target value(s) depending on the network's input values. In these cases the simulation results confirm the convergence of both algorithms. An example with a large-sized neural network illustrates the significantly greater training speed of the QuickFBP rather than the FBP algorithm. The adaptation of an interactive web system to users on the basis of the QuickFBP algorithm is presented. Since the QuickFBP algorithm ensures quasi-unsupervised learning, this implies its broad applicability in areas of adaptive and adaptable interactive systems, data mining, etc. applications.

  9. Radiation-hardened bulk Si-gate CMOS microprocessor family

    International Nuclear Information System (INIS)

    Stricker, R.E.; Dingwall, A.G.F.; Cohen, S.; Adams, J.R.; Slemmer, W.C.

    1979-01-01

    RCA and Sandia Laboratories jointly developed a radiation-hardened bulk Si-gate CMOS technology which is used to fabricate the CDP-1800 series microprocessor family. Total dose hardness of 1 x 10 6 rads (Si) and transient upset hardness of 5 x 10 8 rads (Si)/sec with no latch up at any transient level was achieved. Radiation-hardened parts manufactured to date include the CDP-1802 microprocessor, the CDP-1834 ROM, the CDP-1852 8-bit I/O port, the CDP-1856 N-bit 1 of 8 decoder, and the TCC-244 256 x 4 Static RAM. The paper is divided into three parts. In the first section, the basic fundamentals of the non-hardened C 2 L technology used for the CDP-1800 series microprocessor parts is discussed along with the primary reasons for hardening this technology. The second section discusses the major changes in the fabrication sequence that are required to produce radiation-hardened devices. The final section details the electrical performance characteristics of the hardened devices as well as the effects of radiation on device performance. Also included in this section is a discussion of the TCC-244 256 x 4 Static RAM designed jointly by RCA and Sandia Laboratories for this application

  10. On Intuitionistic Fuzzy Context-Free Languages

    Directory of Open Access Journals (Sweden)

    Jianhua Jin

    2013-01-01

    automata theory. Additionally, we introduce the concepts of Chomsky normal form grammar (IFCNF and Greibach normal form grammar (IFGNF based on intuitionistic fuzzy sets. The results of our study indicate that intuitionistic fuzzy context-free languages generated by IFCFGs are equivalent to those generated by IFGNFs and IFCNFs, respectively, and they are also equivalent to intuitionistic fuzzy recognizable step functions. Then some operations on the family of intuitionistic fuzzy context-free languages are discussed. Finally, pumping lemma for intuitionistic fuzzy context-free languages is investigated.

  11. A fuzzy controller for NPPs

    International Nuclear Information System (INIS)

    Schildt, G.H.

    1997-01-01

    A fuzzy controller for safety related process control is presented for applications in the field of NPPs. The size of necessary rules is relatively small. Thus, there exists a real chance for verification and validation of software due to the fact that the whole software can be structured into standard fuzzy software (like fuzzyfication, inference algorithms, and defuzzyfication), real-time operating system software, and the contents of the rule base. Furthermore, there is an excellent advantage fuel to real-time behaviour, because program execution time is much more predictable than for conventional PID-controller software. Additionally, up to now special know-how does exist to prove stability of fuzzy controller. Hardware design has been done due to fundamental principles of safety technique like watch dog function, dynamization principles, and quiescent current principle. (author). 3 refs, 5 figs

  12. A fuzzy controller for NPPs

    International Nuclear Information System (INIS)

    Schildt, G.H.

    1996-01-01

    After an introduction into safety terms a fuzzy controller for safety related process control will be presented, especially for applications in the field of NPPs. One can show that the size of necessary rules is relatively small. Thus, there exists a real chance for verification and validation of software due to the fact that the whole software can be structured into standard fuzzy software (like fuzzyfication, inference algorithms, and defuzzyfication), real-time operating system software, and the contents of the rule base. Furthermore, there is an excellent advantage due to real-time behaviour, because program execution time can be much more planned than for conventional PID-controller software. Additionally, up to now special know-how does exist to prove stability of fuzzy controller. Hardware design has been done due to fundamental principles of safety technique like watch dog function, dynamization principle, and quiescent current principle

  13. A fuzzy controller for NPPs

    Energy Technology Data Exchange (ETDEWEB)

    Schildt, G H [Technische Univ., Vienna (Austria)

    1997-07-01

    A fuzzy controller for safety related process control is presented for applications in the field of NPPs. The size of necessary rules is relatively small. Thus, there exists a real chance for verification and validation of software due to the fact that the whole software can be structured into standard fuzzy software (like fuzzyfication, inference algorithms, and defuzzyfication), real-time operating system software, and the contents of the rule base. Furthermore, there is an excellent advantage fuel to real-time behaviour, because program execution time is much more predictable than for conventional PID-controller software. Additionally, up to now special know-how does exist to prove stability of fuzzy controller. Hardware design has been done due to fundamental principles of safety technique like watch dog function, dynamization principles, and quiescent current principle. (author). 3 refs, 5 figs.

  14. Combining fuzzy mathematics with fuzzy logic to solve business management problems

    Science.gov (United States)

    Vrba, Joseph A.

    1993-12-01

    Fuzzy logic technology has been applied to control problems with great success. Because of this, many observers fell that fuzzy logic is applicable only in the control arena. However, business management problems almost never deal with crisp values. Fuzzy systems technology--a combination of fuzzy logic, fuzzy mathematics and a graphical user interface--is a natural fit for developing software to assist in typical business activities such as planning, modeling and estimating. This presentation discusses how fuzzy logic systems can be extended through the application of fuzzy mathematics and the use of a graphical user interface to make the information contained in fuzzy numbers accessible to business managers. As demonstrated through examples from actual deployed systems, this fuzzy systems technology has been employed successfully to provide solutions to the complex real-world problems found in the business environment.

  15. Global sensitivity analysis for fuzzy inputs based on the decomposition of fuzzy output entropy

    Science.gov (United States)

    Shi, Yan; Lu, Zhenzhou; Zhou, Yicheng

    2018-06-01

    To analyse the component of fuzzy output entropy, a decomposition method of fuzzy output entropy is first presented. After the decomposition of fuzzy output entropy, the total fuzzy output entropy can be expressed as the sum of the component fuzzy entropy contributed by fuzzy inputs. Based on the decomposition of fuzzy output entropy, a new global sensitivity analysis model is established for measuring the effects of uncertainties of fuzzy inputs on the output. The global sensitivity analysis model can not only tell the importance of fuzzy inputs but also simultaneously reflect the structural composition of the response function to a certain degree. Several examples illustrate the validity of the proposed global sensitivity analysis, which is a significant reference in engineering design and optimization of structural systems.

  16. Developing precipitation hardenable high entropy alloys

    Science.gov (United States)

    Gwalani, Bharat

    High entropy alloys (HEAs) is a concept wherein alloys are constructed with five or more elements mixed in equal proportions; these are also known as multi-principle elements (MPEs) or complex concentrated alloys (CCAs). This PhD thesis dissertation presents research conducted to develop precipitation-hardenable high entropy alloys using a much-studied fcc-based equi-atomic quaternary alloy (CoCrFeNi). Minor additions of aluminium make the alloy amenable for precipitating ordered intermetallic phases in an fcc matrix. Aluminum also affects grain growth kinetics and Hall-Petch hardenability. The use of a combinatorial approach for assessing composition-microstructure-property relationships in high entropy alloys, or more broadly in complex concentrated alloys; using laser deposited compositionally graded AlxCrCuFeNi 2 (0 mechanically processed via conventional techniques. The phase stability and mechanical properties of these alloys have been investigated and will be presented. Additionally, the activation energy for grain growth as a function of Al content in these complex alloys has also been investigated. Change in fcc grain growth kinetic was studied as a function of aluminum; the apparent activation energy for grain growth increases by about three times going from Al0.1CoCrFeNi (3% Al (at%)) to Al0.3CoCrFeNi. (7% Al (at%)). Furthermore, Al addition leads to the precipitation of highly refined ordered L12 (gamma') and B2 precipitates in Al0.3CoCrFeNi. A detailed investigation of precipitation of the ordered phases in Al0.3CoCrFeNi and their thermal stability is done using atom probe tomography (APT), transmission electron microscopy (TEM) and Synchrotron X-ray in situ and ex situ analyses. The alloy strengthened via grain boundary strengthening following the Hall-Petch relationship offers a large increment of strength with small variation in grain size. Tensile strength of the Al0.3CoFeNi is increased by 50% on precipitation fine-scale gamma' precipitates

  17. Zinc coated sheet steel for press hardening

    Science.gov (United States)

    Ghanbari, Zahra N.

    Galvanized steels are of interest to enhance corrosion resistance of press-hardened steels, but concerns related to liquid metal embrittlement have been raised. The objective of this study was to assess the soak time and temperature conditions relevant to the hot-stamping process during which Zn penetration did or did not occur in galvanized 22MnB5 press-hardening steel. A GleebleRTM 3500 was used to heat treat samples using hold times and temperatures similar to those used in industrial hot-stamping. Deformation at both elevated temperature and room temperature were conducted to assess the coating and substrate behavior related to forming (at high temperature) and service (at room temperature). The extent of alloying between the coating and substrate was assessed on undeformed samples heat treated under similar conditions to the deformed samples. The coating transitioned from an α + Gamma1 composition to an α (bcc Fe-Zn) phase with increased soak time. This transition likely corresponded to a decrease in availability of Zn-rich liquid in the coating during elevated temperature deformation. Penetration of Zn into the substrate sheet in the undeformed condition was not observed for any of the processing conditions examined. The number and depth of cracks in the coating and substrate steel was also measured in the hot-ductility samples. The number of cracks appeared to increase, while the depth of cracks appeared to decrease, with increasing soak time and increasing soak temperature. The crack depth appeared to be minimized in the sample soaked at the highest soak temperature (900 °C) for intermediate and extended soak times (300 s or 600 s). Zn penetration into the substrate steel was observed in the hot-ductility samples soaked at each hold temperature for the shortest soak time (10 s) before being deformed at elevated temperature. Reduction of area and elongation measurements showed that the coated sample soaked at the highest temperature and longest soak time

  18. Frechet differentiation of nonlinear operators between fuzzy normed spaces

    International Nuclear Information System (INIS)

    Yilmaz, Yilmaz

    2009-01-01

    By the rapid advances in linear theory of fuzzy normed spaces and fuzzy bounded linear operators it is natural idea to set and improve its nonlinear peer. We aimed in this work to realize this idea by introducing fuzzy Frechet derivative based on the fuzzy norm definition in Bag and Samanta [Bag T, Samanta SK. Finite dimensional fuzzy normed linear spaces. J Fuzzy Math 2003;11(3):687-705]. The definition is divided into two part as strong and weak fuzzy Frechet derivative so that it is compatible with strong and weak fuzzy continuity of operators. Also we restate fuzzy compact operator definition of Lael and Nouroizi [Lael F, Nouroizi K. Fuzzy compact linear operators. Chaos, Solitons and Fractals 2007;34(5):1584-89] as strongly and weakly fuzzy compact by taking into account the compatibility. We prove also that weak Frechet derivative of a nonlinear weakly fuzzy compact operator is also weakly fuzzy compact.

  19. Extracting material response from simple mechanical tests on hardening-softening-hardening viscoplastic solids

    Science.gov (United States)

    Mohan, Nisha

    Compliant foams are usually characterized by a wide range of desirable mechanical properties. These properties include viscoelasticity at different temperatures, energy absorption, recoverability under cyclic loading, impact resistance, and thermal, electrical, acoustic and radiation-resistance. Some foams contain nano-sized features and are used in small-scale devices. This implies that the characteristic dimensions of foams span multiple length scales, rendering modeling their mechanical properties difficult. Continuum mechanics-based models capture some salient experimental features like the linear elastic regime, followed by non-linear plateau stress regime. However, they lack mesostructural physical details. This makes them incapable of accurately predicting local peaks in stress and strain distributions, which significantly affect the deformation paths. Atomistic methods are capable of capturing the physical origins of deformation at smaller scales, but suffer from impractical computational intensity. Capturing deformation at the so-called meso-scale, which is capable of describing the phenomenon at a continuum level, but with some physical insights, requires developing new theoretical approaches. A fundamental question that motivates the modeling of foams is `how to extract the intrinsic material response from simple mechanical test data, such as stress vs. strain response?' A 3D model was developed to simulate the mechanical response of foam-type materials. The novelty of this model includes unique features such as the hardening-softening-hardening material response, strain rate-dependence, and plastically compressible solids with plastic non-normality. Suggestive links from atomistic simulations of foams were borrowed to formulate a physically informed hardening material input function. Motivated by a model that qualitatively captured the response of foam-type vertically aligned carbon nanotube (VACNT) pillars under uniaxial compression [2011,"Analysis of

  20. Fuzzy Entropy: Axiomatic Definition and Neural Networks Model

    Institute of Scientific and Technical Information of China (English)

    QINGMing; CAOYue; HUANGTian-min

    2004-01-01

    The measure of uncertainty is adopted as a measure of information. The measures of fuzziness are known as fuzzy information measures. The measure of a quantity of fuzzy information gained from a fuzzy set or fuzzy system is known as fuzzy entropy. Fuzzy entropy has been focused and studied by many researchers in various fields. In this paper, firstly, the axiomatic definition of fuzzy entropy is discussed. Then, neural networks model of fuzzy entropy is proposed, based on the computing capability of neural networks. In the end, two examples are discussed to show the efficiency of the model.

  1. Application of fuzzy logic to social choice theory

    CERN Document Server

    Mordeson, John N; Clark, Terry D

    2015-01-01

    Fuzzy social choice theory is useful for modeling the uncertainty and imprecision prevalent in social life yet it has been scarcely applied and studied in the social sciences. Filling this gap, Application of Fuzzy Logic to Social Choice Theory provides a comprehensive study of fuzzy social choice theory.The book explains the concept of a fuzzy maximal subset of a set of alternatives, fuzzy choice functions, the factorization of a fuzzy preference relation into the ""union"" (conorm) of a strict fuzzy relation and an indifference operator, fuzzy non-Arrowian results, fuzzy versions of Arrow's

  2. Ellipsoidal fuzzy learning for smart car platoons

    Science.gov (United States)

    Dickerson, Julie A.; Kosko, Bart

    1993-12-01

    A neural-fuzzy system combined supervised and unsupervised learning to find and tune the fuzzy-rules. An additive fuzzy system approximates a function by covering its graph with fuzzy rules. A fuzzy rule patch can take the form of an ellipsoid in the input-output space. Unsupervised competitive learning found the statistics of data clusters. The covariance matrix of each synaptic quantization vector defined on ellipsoid centered at the centroid of the data cluster. Tightly clustered data gave smaller ellipsoids or more certain rules. Sparse data gave larger ellipsoids or less certain rules. Supervised learning tuned the ellipsoids to improve the approximation. The supervised neural system used gradient descent to find the ellipsoidal fuzzy patches. It locally minimized the mean-squared error of the fuzzy approximation. Hybrid ellipsoidal learning estimated the control surface for a smart car controller.

  3. Fuzzy Stochastic Optimization Theory, Models and Applications

    CERN Document Server

    Wang, Shuming

    2012-01-01

    Covering in detail both theoretical and practical perspectives, this book is a self-contained and systematic depiction of current fuzzy stochastic optimization that deploys the fuzzy random variable as a core mathematical tool to model the integrated fuzzy random uncertainty. It proceeds in an orderly fashion from the requisite theoretical aspects of the fuzzy random variable to fuzzy stochastic optimization models and their real-life case studies.   The volume reflects the fact that randomness and fuzziness (or vagueness) are two major sources of uncertainty in the real world, with significant implications in a number of settings. In industrial engineering, management and economics, the chances are high that decision makers will be confronted with information that is simultaneously probabilistically uncertain and fuzzily imprecise, and optimization in the form of a decision must be made in an environment that is doubly uncertain, characterized by a co-occurrence of randomness and fuzziness. This book begins...

  4. Fuzzy logic controller using different inference methods

    International Nuclear Information System (INIS)

    Liu, Z.; De Keyser, R.

    1994-01-01

    In this paper the design of fuzzy controllers by using different inference methods is introduced. Configuration of the fuzzy controllers includes a general rule-base which is a collection of fuzzy PI or PD rules, the triangular fuzzy data model and a centre of gravity defuzzification algorithm. The generalized modus ponens (GMP) is used with the minimum operator of the triangular norm. Under the sup-min inference rule, six fuzzy implication operators are employed to calculate the fuzzy look-up tables for each rule base. The performance is tested in simulated systems with MATLAB/SIMULINK. Results show the effects of using the fuzzy controllers with different inference methods and applied to different test processes

  5. Introduction to fuzzy logic using Matlab

    CERN Document Server

    Sivanandam, SN; Deepa, S N

    2006-01-01

    Fuzzy Logic, at present is a hot topic, among academicians as well various programmers. This book is provided to give a broad, in-depth overview of the field of Fuzzy Logic. The basic principles of Fuzzy Logic are discussed in detail with various solved examples. The different approaches and solutions to the problems given in the book are well balanced and pertinent to the Fuzzy Logic research projects. The applications of Fuzzy Logic are also dealt to make the readers understand the concept of Fuzzy Logic. The solutions to the problems are programmed using MATLAB 6.0 and the simulated results are given. The MATLAB Fuzzy Logic toolbox is provided for easy reference.

  6. Outdoor altitude stabilization of QuadRotor based on type-2 fuzzy and fuzzy PID

    Science.gov (United States)

    Wicaksono, H.; Yusuf, Y. G.; Kristanto, C.; Haryanto, L.

    2017-11-01

    This paper presents a design of altitude stabilization of QuadRotor based on type-2 fuzzy and fuzzy PID. This practical design is implemented outdoor. Barometric and sonar sensor were used in this experiment as an input for the controller YoHe. The throttle signal as a control input was provided by the controller to leveling QuadRotor in particular altitude and known well as altitude stabilization. The parameter of type-2 fuzzy and fuzzy PID was tuned in several heights to get the best control parameter for any height. Type-2 fuzzy produced better result than fuzzy PID but had a slow response in the beginning.

  7. Complex Fuzzy Set-Valued Complex Fuzzy Measures and Their Properties

    Science.gov (United States)

    Ma, Shengquan; Li, Shenggang

    2014-01-01

    Let F*(K) be the set of all fuzzy complex numbers. In this paper some classical and measure-theoretical notions are extended to the case of complex fuzzy sets. They are fuzzy complex number-valued distance on F*(K), fuzzy complex number-valued measure on F*(K), and some related notions, such as null-additivity, pseudo-null-additivity, null-subtraction, pseudo-null-subtraction, autocontionuous from above, autocontionuous from below, and autocontinuity of the defined fuzzy complex number-valued measures. Properties of fuzzy complex number-valued measures are studied in detail. PMID:25093202

  8. Fuzzy view of environment

    Directory of Open Access Journals (Sweden)

    Bajat Branislav

    2007-01-01

    Full Text Available A period of fifty years has been reached since the introduction of the first applications based upon geographical information systems (GIS. GIS has not only influenced the development of methods, collection techniques, processing, manipulation and visualization of spatial data. It influenced also the expansion of scientific research in geosciences, as well as the technical disciplines that are engaged in spatial analysis. Nowadays, GIS is becoming the tool for verification and practical implementation of models and algorithms that have been developed within the frame of basic scientific disciplines. The meaning of the GIS acronym is becoming more and more related to term of Geographical or Geo Information Sciences. Scientific concepts that are increasingly applied in GIS are more emphasized in that way. GIS computational techniques, required also the development of geographical data models that should effectively support GIS operations. These models represent formal equivalents of conceptual models used by people in observing geographic phenomena. Spatial phenomena used to be mapped as clearly defined points with known coordinates, or as lines which connect the very same points, or as polygons with exactly defined borders. They were mapped previously in analog form and nowadays in digital format. This approach of perceiving a space, data analyses and visualization of spatial quires is limited on the application of basic rules of Boolean algebra and binary logic, with final results presented as classical thematic maps. The need for a mathematical model that would describe uncertainty of spatial data, resulted in the introduction of the theory of fuzzy sets in spatial analysis. Moreover, this model will provide a solution for visualization and grouping up of spatial phenomena in classes which do not have clearly defined borders.

  9. On Modeling the Behavior of Comparators for Complex Fuzzy Objects in a Fuzzy Object-Relational Database Management System

    Directory of Open Access Journals (Sweden)

    JuanM. Medina

    2012-08-01

    Full Text Available This paper proposes a parameterized definition for fuzzy comparators on complex fuzzy datatypes like fuzzy collections with conjunctive semantics and fuzzy objects. This definition and its implementation on a Fuzzy Object-Relational Database Management System (FORDBMS provides the designer with a powerful tool to adapt the behavior of these operators to the semantics of the considered application.

  10. Process design of press hardening with gradient material property influence

    International Nuclear Information System (INIS)

    Neugebauer, R.; Schieck, F.; Rautenstrauch, A.

    2011-01-01

    Press hardening is currently used in the production of automotive structures that require very high strength and controlled deformation during crash tests. Press hardening can achieve significant reductions of sheet thickness at constant strength and is therefore a promising technology for the production of lightweight and energy-efficient automobiles. The manganese-boron steel 22MnB5 have been implemented in sheet press hardening owing to their excellent hot formability, high hardenability, and good temperability even at low cooling rates. However, press-hardened components have shown poor ductility and cracking at relatively small strains. A possible solution to this problem is a selective increase of steel sheet ductility by press hardening process design in areas where the component is required to deform plastically during crash tests. To this end, process designers require information about microstructure and mechanical properties as a function of the wide spectrum of cooling rates and sequences and austenitizing treatment conditions that can be encountered in production environments. In the present work, a Continuous Cooling Transformation (CCT) diagram with corresponding material properties of sheet steel 22MnB5 was determined for a wide spectrum of cooling rates. Heating and cooling programs were conducted in a quenching dilatometer. Motivated by the importance of residual elasticity in crash test performance, this property was measured using a micro-bending test and the results were integrated into the CCT diagrams to complement the hardness testing results. This information is essential for the process design of press hardening of sheet components with gradient material properties.

  11. Filters in Fuzzy Class Theory

    Czech Academy of Sciences Publication Activity Database

    Kroupa, Tomáš

    2008-01-01

    Roč. 159, č. 14 (2008), s. 1773-1787 ISSN 0165-0114 R&D Projects: GA MŠk 1M0572; GA AV ČR KJB100300502 Institutional research plan: CEZ:AV0Z10750506 Keywords : filter * prime filter * fuzzy class theory Subject RIV: BA - General Mathematics Impact factor: 1.833, year: 2008

  12. Structural Completeness in Fuzzy Logics

    Czech Academy of Sciences Publication Activity Database

    Cintula, Petr; Metcalfe, G.

    2009-01-01

    Roč. 50, č. 2 (2009), s. 153-183 ISSN 0029-4527 R&D Projects: GA MŠk(CZ) 1M0545 Institutional research plan: CEZ:AV0Z10300504 Keywords : structral logics * fuzzy logics * structural completeness * admissible rules * primitive variety * residuated lattices Subject RIV: BA - General Mathematics

  13. Fuzzy Querying: Issues and Perspectives..

    Czech Academy of Sciences Publication Activity Database

    Kacprzyk, J.; Pasi, G.; Vojtáš, Peter; Zadrozny, S.

    2000-01-01

    Roč. 36, č. 6 (2000), s. 605-616 ISSN 0023-5954 Institutional research plan: AV0Z1030915 Keywords : flexible querying * information retrieval * fuzzy databases Subject RIV: BA - General Mathematics http://dml.cz/handle/10338.dmlcz/135376

  14. The fuzzy bag model revisited

    International Nuclear Information System (INIS)

    Pilotto, F.; Vasconcellos, C.A.Z.; Coelho, H.T.

    2001-01-01

    In this work we develop a new version of the fuzzy bag model. Th main ideas is to include the conservation of energy and momentum in the model. This feature is not included in the original formulation of the fuzzy bag model, but is of paramount importance to interpret the model as being a bag model - that, is a model in which the outward pressure of the quarks inside the bag is balanced by the inward pressure of the non-perturbative vacuum outside the bag - as opposed to a relativistic potential model, in which there is no energy-momentum conservation. In the MT bag model, as well as in the original version of the fuzzy bag model, the non-perturbative QCD vacuum is parametrized by a constant B in the Lagrangian density. One immediate consequence of including energy-momentum conservation in the fuzzy bag model is that the bag constant B will acquire a radial dependence, B = B(r). (author)

  15. The fuzzy bag model revisited

    Energy Technology Data Exchange (ETDEWEB)

    Pilotto, F.; Vasconcellos, C.A.Z. [Rio Grande do Sul Univ., Porto Alegre, RS (Brazil). Inst. de Fisica; Coelho, H.T. [Pernambuco Univ., Recife, PE (Brazil). Inst. de Fisica

    2001-07-01

    In this work we develop a new version of the fuzzy bag model. Th main ideas is to include the conservation of energy and momentum in the model. This feature is not included in the original formulation of the fuzzy bag model, but is of paramount importance to interpret the model as being a bag model - that, is a model in which the outward pressure of the quarks inside the bag is balanced by the inward pressure of the non-perturbative vacuum outside the bag - as opposed to a relativistic potential model, in which there is no energy-momentum conservation. In the MT bag model, as well as in the original version of the fuzzy bag model, the non-perturbative QCD vacuum is parametrized by a constant B in the Lagrangian density. One immediate consequence of including energy-momentum conservation in the fuzzy bag model is that the bag constant B will acquire a radial dependence, B = B(r). (author)

  16. Fuzzy audit risk modeling algorithm

    Directory of Open Access Journals (Sweden)

    Zohreh Hajihaa

    2011-07-01

    Full Text Available Fuzzy logic has created suitable mathematics for making decisions in uncertain environments including professional judgments. One of the situations is to assess auditee risks. During recent years, risk based audit (RBA has been regarded as one of the main tools to fight against fraud. The main issue in RBA is to determine the overall audit risk an auditor accepts, which impact the efficiency of an audit. The primary objective of this research is to redesign the audit risk model (ARM proposed by auditing standards. The proposed model of this paper uses fuzzy inference systems (FIS based on the judgments of audit experts. The implementation of proposed fuzzy technique uses triangular fuzzy numbers to express the inputs and Mamdani method along with center of gravity are incorporated for defuzzification. The proposed model uses three FISs for audit, inherent and control risks, and there are five levels of linguistic variables for outputs. FISs include 25, 25 and 81 rules of if-then respectively and officials of Iranian audit experts confirm all the rules.

  17. Fuzzy Evidence in Identification, Forecasting and Diagnosis

    CERN Document Server

    Rotshtein, Alexander P

    2012-01-01

    The purpose of this book is to present a methodology for designing and tuning fuzzy expert systems in order to identify nonlinear objects; that is, to build input-output models using expert and experimental information. The results of these identifications are used for direct and inverse fuzzy evidence in forecasting and diagnosis problem solving. The book is organised as follows: Chapter 1 presents the basic knowledge about fuzzy sets, genetic algorithms and neural nets necessary for a clear understanding of the rest of this book. Chapter 2 analyzes direct fuzzy inference based on fuzzy if-then rules. Chapter 3 is devoted to the tuning of fuzzy rules for direct inference using genetic algorithms and neural nets. Chapter 4 presents models and algorithms for extracting fuzzy rules from experimental data. Chapter 5 describes a method for solving fuzzy logic equations necessary for the inverse fuzzy inference in diagnostic systems. Chapters 6 and 7 are devoted to inverse fuzzy inference based on fu...

  18. Fuzzy tree automata and syntactic pattern recognition.

    Science.gov (United States)

    Lee, E T

    1982-04-01

    An approach of representing patterns by trees and processing these trees by fuzzy tree automata is described. Fuzzy tree automata are defined and investigated. The results include that the class of fuzzy root-to-frontier recognizable ¿-trees is closed under intersection, union, and complementation. Thus, the class of fuzzy root-to-frontier recognizable ¿-trees forms a Boolean algebra. Fuzzy tree automata are applied to processing fuzzy tree representation of patterns based on syntactic pattern recognition. The grade of acceptance is defined and investigated. Quantitative measures of ``approximate isosceles triangle,'' ``approximate elongated isosceles triangle,'' ``approximate rectangle,'' and ``approximate cross'' are defined and used in the illustrative examples of this approach. By using these quantitative measures, a house, a house with high roof, and a church are also presented as illustrative examples. In addition, three fuzzy tree automata are constructed which have the capability of processing the fuzzy tree representations of ``fuzzy houses,'' ``houses with high roofs,'' and ``fuzzy churches,'' respectively. The results may have useful applications in pattern recognition, image processing, artificial intelligence, pattern database design and processing, image science, and pictorial information systems.

  19. Influence of Hardening Model on Weld Residual Stress Distribution

    Energy Technology Data Exchange (ETDEWEB)

    Mullins, Jonathan; Gunnars, Jens (Inspecta Technology AB, Stockholm (Sweden))

    2009-06-15

    This study is the third stage of a project sponsored by the Swedish Radiation Safety Authority (SSM) to improve the weld residual stress modelling procedures currently used in Sweden. The aim of this study was to determine which material hardening model gave the best agreement with experimentally measured weld residual stress distributions. Two girth weld geometries were considered: 19mm and 65mm thick girth welds with Rin/t ratios of 10.5 and 2.8, respectively. The FE solver ABAQUS Standard v6.5 was used for analysis. As a preliminary step some improvements were made to the welding simulation procedure used in part one of the project. First, monotonic stress strain curves and a mixed isotropic/kinematic hardening model were sourced from the literature for 316 stainless steel. Second, more detailed information was obtained regarding the geometry and welding sequence for the Case 1 weld (compared with phase 1 of this project). Following the preliminary step, welding simulations were conducted using isotropic, kinematic and mixed hardening models. The isotropic hardening model gave the best overall agreement with experimental measurements; it is therefore recommended for future use in welding simulations. The mixed hardening model gave good agreement for predictions of the hoop stress but tended to under estimate the magnitude of the axial stress. It must be noted that two different sources of data were used for the isotropic and mixed models in this study and this may have contributed to the discrepancy in predictions. When defining a mixed hardening model it is difficult to delineate the relative contributions of isotropic and kinematic hardening and for the model used it may be that a greater isotropic hardening component should have been specified. The kinematic hardening model consistently underestimated the magnitude of both the axial and hoop stress and is not recommended for use. Two sensitivity studies were also conducted. In the first the effect of using a

  20. Influence of Hardening Model on Weld Residual Stress Distribution

    International Nuclear Information System (INIS)

    Mullins, Jonathan; Gunnars, Jens

    2009-06-01

    This study is the third stage of a project sponsored by the Swedish Radiation Safety Authority (SSM) to improve the weld residual stress modelling procedures currently used in Sweden. The aim of this study was to determine which material hardening model gave the best agreement with experimentally measured weld residual stress distributions. Two girth weld geometries were considered: 19mm and 65mm thick girth welds with Rin/t ratios of 10.5 and 2.8, respectively. The FE solver ABAQUS Standard v6.5 was used for analysis. As a preliminary step some improvements were made to the welding simulation procedure used in part one of the project. First, monotonic stress strain curves and a mixed isotropic/kinematic hardening model were sourced from the literature for 316 stainless steel. Second, more detailed information was obtained regarding the geometry and welding sequence for the Case 1 weld (compared with phase 1 of this project). Following the preliminary step, welding simulations were conducted using isotropic, kinematic and mixed hardening models. The isotropic hardening model gave the best overall agreement with experimental measurements; it is therefore recommended for future use in welding simulations. The mixed hardening model gave good agreement for predictions of the hoop stress but tended to under estimate the magnitude of the axial stress. It must be noted that two different sources of data were used for the isotropic and mixed models in this study and this may have contributed to the discrepancy in predictions. When defining a mixed hardening model it is difficult to delineate the relative contributions of isotropic and kinematic hardening and for the model used it may be that a greater isotropic hardening component should have been specified. The kinematic hardening model consistently underestimated the magnitude of both the axial and hoop stress and is not recommended for use. Two sensitivity studies were also conducted. In the first the effect of using a

  1. Computer modelling of age hardening for cast aluminium alloys

    International Nuclear Information System (INIS)

    Wu, Linda; Ferguson, W George

    2009-01-01

    Age hardening, or precipitation hardening, is one of the most widely adopted techniques for strengthening of aluminium alloys. Although various age hardening models have been developed for aluminium alloys, from the large volume of literature reviewed, it appears that the bulk of the research has been concentrated on wrought aluminium alloys, only a few of the established precipitation models have been applied to the casting aluminium alloys. In the present work, there are two modelling methods that have been developed and applied to the casting aluminium alloys A356 and A357. One is based on the Shercliff-Ashby methodology to produce a process model, by which we mean a mathematical relationship between process variables (alloy composition, ageing temperature and time) and material properties (yield strength or hardness) through microstructure evolution (precipitate radius, volume fraction). The other method is based on the Kampmann and Wagner Numerical (KWN) model which deals with concomitant nucleation, growth and coarsening and is thus capable of predicting the full evolution of the particle size distribution and then a strength model is used to evaluate the resulting change in hardness or yield strength at room temperature by taking into account contributions from lattice resistance, solid solution hardening and precipitation hardening.

  2. General analytical shakedown solution for structures with kinematic hardening materials

    Science.gov (United States)

    Guo, Baofeng; Zou, Zongyuan; Jin, Miao

    2016-09-01

    The effect of kinematic hardening behavior on the shakedown behaviors of structure has been investigated by performing shakedown analysis for some specific problems. The results obtained only show that the shakedown limit loads of structures with kinematic hardening model are larger than or equal to those with perfectly plastic model of the same initial yield stress. To further investigate the rules governing the different shakedown behaviors of kinematic hardening structures, the extended shakedown theorem for limited kinematic hardening is applied, the shakedown condition is then proposed, and a general analytical solution for the structural shakedown limit load is thus derived. The analytical shakedown limit loads for fully reversed cyclic loading and non-fully reversed cyclic loading are then given based on the general solution. The resulting analytical solution is applied to some specific problems: a hollow specimen subjected to tension and torsion, a flanged pipe subjected to pressure and axial force and a square plate with small central hole subjected to biaxial tension. The results obtained are compared with those in literatures, they are consistent with each other. Based on the resulting general analytical solution, rules governing the general effects of kinematic hardening behavior on the shakedown behavior of structure are clearly.

  3. On fuzzy quasi continuity and an application of fuzzy set theory

    CERN Document Server

    Mahmoud, R A

    2003-01-01

    Where as classical topology has been developed closely connected with classical analysis describing topological phenomena in analysis, fuzzy topology with its important application in quantum gravity indicated by Witten and Elnaschie, has only been introduced as an analogue of the classical topology. The development of fuzzy topology without close relations to analytical problems did not give the possibility of testing successfully the applicability of the new notions and results. Till now this situation did not change, essentially. Although, many types of fuzzy sets and fuzzy functions having the quasi-property in both of weak and strong than openness and continuity, respectively, have been studied in detail. Many properties on fuzzy topological spaces such as compactness are discussed via fuzzy notion. While others are far from being completely devoted in its foundation. So, this paper is devoted to present a new class of fuzzy quasi-continuous functions via fuzzy compactness has been defined. Some characte...

  4. Influence of fuzzy norms and other heuristics on "Mixed fuzzy rule formation" - [Corrigendum

    OpenAIRE

    Gabriel, Thomas R.; Berthold, Michael R.

    2008-01-01

    We hereby correct an error in Ref. [2], in which we studied the influence of various parameters that affect the generalization performance of fuzzy models constructed using the mixed fuzzy rule formation method [1].

  5. Minimal solution for inconsistent singular fuzzy matrix equations

    Directory of Open Access Journals (Sweden)

    M. Nikuie

    2013-10-01

    Full Text Available The fuzzy matrix equations $Ailde{X}=ilde{Y}$ is called a singular fuzzy matrix equations while the coefficients matrix of its equivalent crisp matrix equations be a singular matrix. The singular fuzzy matrix equations are divided into two parts: consistent singular matrix equations and inconsistent fuzzy matrix equations. In this paper, the inconsistent singular fuzzy matrix equations is studied and the effect of generalized inverses in finding minimal solution of an inconsistent singular fuzzy matrix equations are investigated.

  6. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks"

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963

  7. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  8. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  9. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  10. Influence of coolant motion on structure of hardened steel element

    Directory of Open Access Journals (Sweden)

    A. Kulawik

    2008-08-01

    Full Text Available Presented paper is focused on volumetric hardening process using liquid low melting point metal as a coolant. Effect of convective motion of the coolant on material structure after hardening is investigated. Comparison with results obtained for model neglecting motion of liquid is executed. Mathematical and numerical model based on Finite Element Metod is described. Characteristic Based Split (CBS method is used to uncouple velocities and pressure and finally to solve Navier-Stokes equation. Petrov-Galerkin formulation is employed to stabilize convective term in heat transport equation. Phase transformations model is created on the basis of Johnson-Mehl and Avrami laws. Continuous cooling diagram (CTPc for C45 steel is exploited in presented model of phase transformations. Temporary temperatures, phases participation, thermal and structural strains in hardening element and coolant velocities are shown and discussed.

  11. Investigation of magnesium oxychloride cement at the initial hardening stage

    Directory of Open Access Journals (Sweden)

    Averina Galina

    2018-01-01

    Full Text Available The paper investigates the process of variation of magnesium oxychloride cement deformations at the initial hardening stage depending on the activity of magnesium oxide powder which is determined by the parameters of the source material burning. Investigation is focused on magnesium cements obtained from pure magnesium hydroxide. Source materials were burnt at various temperatures with the purpose to obtain magnesium oxide powder with different activity. Regular content of hydrated phases was determined in hardened magnesium cement prepared on the basis of binders with different activity. The study reveals the influence of magnesium oxide powder activity on the process of deformation occurrence in hardened magnesium cement and its tendency to crack formation.

  12. Effect of ethephon on hardening of Pachystroma longifolium seedlings

    Directory of Open Access Journals (Sweden)

    João Alexandre Lopes Dranski

    2013-06-01

    Full Text Available Immediately after planting, tree seedlings face adverse environmental and biotic stresses that must be overcome to ensure survival and to yield a desirable growth. Hardening practices in the nursery may help improve seedling stress resistance through reduction of aboveground plant tissues and increased root volume and biomass. We conducted an assay to quantify changes in the morphogenesis following application of ethephon on seedlings of Pachystroma longifolium (Ness I. M. Johnst.during hardening. The results showed no effect of the ethephon treatments on the number of leaves but a reduction of up to 50% in seedling height increment, and an increase in stem diameter increment of up to 44% with the 600 mg L-1 ethephon treatment, which consequently altered seedling Dickson Quality Index. Our results indicate that ethephon may help to promote desired morphological changes that occur during seedling hardening in nurseries.

  13. Branching structure and strain hardening of branched metallocene polyethylenes

    International Nuclear Information System (INIS)

    Torres, Enrique; Li, Si-Wan; Costeux, Stéphane; Dealy, John M.

    2015-01-01

    There have been a number of studies of a series of branched metallocene polyethylenes (BMPs) made in a solution, continuous stirred tank reactor (CSTR) polymerization. The materials studied vary in branching level in a systematic way, and the most highly branched members of the series exhibit mild strain hardening. An outstanding question is which types of branched molecules are responsible for strain hardening in extension. This question is explored here by use of polymerization and rheological models along with new data on the extensional flow behavior of the most highly branched members of the set. After reviewing all that is known about the effects of various branching structures in homogeneous polymers and comparing this with the structures predicted to be present in BMPs, it is concluded that in spite of their very low concentration, treelike molecules with branch-on-branch structure provide a large number of deeply buried inner segments that are essential for strain hardening in these polymers

  14. Branching structure and strain hardening of branched metallocene polyethylenes

    Energy Technology Data Exchange (ETDEWEB)

    Torres, Enrique; Li, Si-Wan; Costeux, Stéphane; Dealy, John M., E-mail: john.dealy@mcgill.ca [Department of Chemical Engineering, McGill University, Montreal, Quebec H3A 0C4 (Canada)

    2015-09-15

    There have been a number of studies of a series of branched metallocene polyethylenes (BMPs) made in a solution, continuous stirred tank reactor (CSTR) polymerization. The materials studied vary in branching level in a systematic way, and the most highly branched members of the series exhibit mild strain hardening. An outstanding question is which types of branched molecules are responsible for strain hardening in extension. This question is explored here by use of polymerization and rheological models along with new data on the extensional flow behavior of the most highly branched members of the set. After reviewing all that is known about the effects of various branching structures in homogeneous polymers and comparing this with the structures predicted to be present in BMPs, it is concluded that in spite of their very low concentration, treelike molecules with branch-on-branch structure provide a large number of deeply buried inner segments that are essential for strain hardening in these polymers.

  15. Nonlinear kinematic hardening under non-proportional loading

    International Nuclear Information System (INIS)

    Ottosen, N.S.

    1979-07-01

    Within the framework of conventional plasticity theory, it is first determined under which conditions Melan-Prager's and Ziegler's kinematic hardening rules result in identical material behaviour. Next, assuming initial isotropy and adopting the von Mises yield criterion, a nonlinear kinematic hardening function is proposed for prediction of metal behaviour. The model assumes that hardening at a specific stress point depends on the direction of the new incremental loading. Hereby a realistic response is obtained for general reversed loading, and a smooth behaviour is assured, even when loading deviates more and more from proportional loading and ultimately results in reversed loading. The predictions of the proposed model for non-proportional loading under plane stress conditions are compared with those of the classical linear kinematic model, the isotropic model and with published experimental data. Finally, the limitations of the proposaed model are discussed. (author)

  16. Fuzzy systems for process identification and control

    International Nuclear Information System (INIS)

    Gorrini, V.; Bersini, H.

    1994-01-01

    Various issues related to the automatic construction and on-line adaptation of fuzzy controllers are addressed. A Direct Adaptive Fuzzy Control (this is an adaptive control methodology requiring a minimal knowledge of the processes to be coupled with) derived in a way reminiscent of neurocontrol methods, is presented. A classical fuzzy controller and a fuzzy realization of a PID controller is discussed. These systems implement a highly non-linear control law, and provide to be quite robust, even in the case of noisy inputs. In order to identify dynamic processes of order superior to one, we introduce a more complex architecture, called Recurrent Fuzzy System, that use some fuzzy internal variables to perform an inferential chaining.I

  17. (Fuzzy) Ideals of BN-Algebras

    Science.gov (United States)

    Walendziak, Andrzej

    2015-01-01

    The notions of an ideal and a fuzzy ideal in BN-algebras are introduced. The properties and characterizations of them are investigated. The concepts of normal ideals and normal congruences of a BN-algebra are also studied, the properties of them are displayed, and a one-to-one correspondence between them is presented. Conditions for a fuzzy set to be a fuzzy ideal are given. The relationships between ideals and fuzzy ideals of a BN-algebra are established. The homomorphic properties of fuzzy ideals of a BN-algebra are provided. Finally, characterizations of Noetherian BN-algebras and Artinian BN-algebras via fuzzy ideals are obtained. PMID:26125050

  18. Analysis of inventory difference using fuzzy controllers

    International Nuclear Information System (INIS)

    Zardecki, A.

    1994-01-01

    The principal objectives of an accounting system for safeguarding nuclear materials are as follows: (a) to provide assurance that all material quantities are present in the correct amount; (b) to provide timely detection of material loss; and (c) to estimate the amount of any loss and its location. In fuzzy control, expert knowledge is encoded in the form of fuzzy rules, which describe recommended actions for different classes of situations represented by fuzzy sets. The concept of a fuzzy controller is applied to the forecasting problem in a time series, specifically, to forecasting and detecting anomalies in inventory differences. This paper reviews the basic notion underlying the fuzzy control systems and provides examples of application. The well-known material-unaccounted-for diffusion plant data of Jaech are analyzed using both feedforward neural networks and fuzzy controllers. By forming a deference between the forecasted and observed signals, an efficient method to detect small signals in background noise is implemented

  19. Fuzzy associative memories for instrument fault detection

    International Nuclear Information System (INIS)

    Heger, A.S.

    1996-01-01

    A fuzzy logic instrument fault detection scheme is developed for systems having two or three redundant sensors. In the fuzzy logic approach the deviation between each signal pairing is computed and classified into three fuzzy sets. A rule base is created allowing the human perception of the situation to be represented mathematically. Fuzzy associative memories are then applied. Finally, a defuzzification scheme is used to find the centroid location, and hence the signal status. Real-time analyses are carried out to evaluate the instantaneous signal status as well as the long-term results for the sensor set. Instantaneous signal validation results are used to compute a best estimate for the measured state variable. The long-term sensor validation method uses a frequency fuzzy variable to determine the signal condition over a specific period. To corroborate the methodology synthetic data representing various anomalies are analyzed with both the fuzzy logic technique and the parity space approach. (Author)

  20. Optical Generation of Fuzzy-Based Rules

    Science.gov (United States)

    Gur, Eran; Mendlovic, David; Zalevsky, Zeev

    2002-08-01

    In the last third of the 20th century, fuzzy logic has risen from a mathematical concept to an applicable approach in soft computing. Today, fuzzy logic is used in control systems for various applications, such as washing machines, train-brake systems, automobile automatic gear, and so forth. The approach of optical implementation of fuzzy inferencing was given by the authors in previous papers, giving an extra emphasis to applications with two dominant inputs. In this paper the authors introduce a real-time optical rule generator for the dual-input fuzzy-inference engine. The paper briefly goes over the dual-input optical implementation of fuzzy-logic inferencing. Then, the concept of constructing a set of rules from given data is discussed. Next, the authors show ways to implement this procedure optically. The discussion is accompanied by an example that illustrates the transformation from raw data into fuzzy set rules.

  1. Logika Fuzzy untuk Audit Sistem Informasi

    Directory of Open Access Journals (Sweden)

    Hari Setiabudi Husni

    2013-06-01

    Full Text Available The aim of this research is to study and introduce fuzzy logic into audit information system. Fuzzy logic is already adopted in other field of study. It helps decision process that incorporates subjective information and transforms it to scientific objective information which is more accepted. This research implements simulation scenario to see how fuzzy logic concept should be used in audit information process. The result shows that there is a possible concept of fuzzy logic that can be used for helping auditor in making objective decision in audit information system process. More researches needed to further explore the fuzzy logic concept such as creating the system of fuzzy logic and build application that can be used for daily information system audit process. 

  2. On Algebraic Study of Type-2 Fuzzy Finite State Automata

    Directory of Open Access Journals (Sweden)

    Anupam K. Singh

    2017-08-01

    Full Text Available Theories of fuzzy sets and type-2 fuzzy sets are powerful mathematical tools for modeling various types of uncertainty. In this paper we introduce the concept of type-2 fuzzy finite state automata and discuss the algebraic study of type-2 fuzzy finite state automata, i.e., to introduce the concept of homomorphisms between two type-2 fuzzy finite state automata, to associate a type-2 fuzzy transformation semigroup with a type-2 fuzzy finite state automata. Finally, we discuss several product of type-2 fuzzy finite state automata and shown that these product is a categorical product.

  3. Fuzzy weakly preopen (preclosed) function in Kubiak-Sostak fuzzy topological spaces

    International Nuclear Information System (INIS)

    Zahran, A.M.; Abd-Allah, M. Azab.; Abd El-Rahman, Abd El-Nasser G.

    2009-01-01

    In this paper, we introduce and characterize fuzzy weakly preopen and fuzzy weakly preclosed functions between L-fuzzy topological spaces in Kubiak-Sostak sense and also study these functions in relation to some other types of already known functions.

  4. Combinational Reasoning of Quantitative Fuzzy Topological Relations for Simple Fuzzy Regions

    Science.gov (United States)

    Liu, Bo; Li, Dajun; Xia, Yuanping; Ruan, Jian; Xu, Lili; Wu, Huanyi

    2015-01-01

    In recent years, formalization and reasoning of topological relations have become a hot topic as a means to generate knowledge about the relations between spatial objects at the conceptual and geometrical levels. These mechanisms have been widely used in spatial data query, spatial data mining, evaluation of equivalence and similarity in a spatial scene, as well as for consistency assessment of the topological relations of multi-resolution spatial databases. The concept of computational fuzzy topological space is applied to simple fuzzy regions to efficiently and more accurately solve fuzzy topological relations. Thus, extending the existing research and improving upon the previous work, this paper presents a new method to describe fuzzy topological relations between simple spatial regions in Geographic Information Sciences (GIS) and Artificial Intelligence (AI). Firstly, we propose a new definition for simple fuzzy line segments and simple fuzzy regions based on the computational fuzzy topology. And then, based on the new definitions, we also propose a new combinational reasoning method to compute the topological relations between simple fuzzy regions, moreover, this study has discovered that there are (1) 23 different topological relations between a simple crisp region and a simple fuzzy region; (2) 152 different topological relations between two simple fuzzy regions. In the end, we have discussed some examples to demonstrate the validity of the new method, through comparisons with existing fuzzy models, we showed that the proposed method can compute more than the existing models, as it is more expressive than the existing fuzzy models. PMID:25775452

  5. Kinematic Hardening: Characterization, Modeling and Impact on Springback Prediction

    International Nuclear Information System (INIS)

    Alves, J. L.; Bouvier, S.; Jomaa, M.; Billardon, R.; Oliveira, M. C.; Menezes, L. F.

    2007-01-01

    The constitutive modeling of the materials' mechanical behavior, usually carried out using a phenomenological constitutive model, i.e., a yield criterion associated to the isotropic and kinematic hardening laws, is of paramount importance in the FEM simulation of the sheet metal forming processes, as well as in the springback prediction. Among others, the kinematic behavior of the yield surface plays an essential role, since it is indispensable to describe the Bauschinger effect, i.e., the materials' answer to the multiple tension-compression cycles to which material points are submitted during the forming process. Several laws are usually used to model and describe the kinematic hardening, namely: a) the Prager's law, which describes a linear evolution of the kinematic hardening with the plastic strain rate tensor b) the Frederick-Armstrong non-linear kinematic hardening, basically a non-linear law with saturation; and c) a more advanced physically-based law, similar to the previous one but sensitive to the strain path changes. In the present paper a mixed kinematic hardening law (linear + non-linear behavior) is proposed and its implementation into a static fully-implicit FE code is described. The material parameters identification for sheet metals using different strategies, and the classical Bauschinger loading tests (i.e. in-plane forward and reverse monotonic loading), are addressed, and their impact on springback prediction evaluated. Some numerical results concerning the springback prediction of the Numisheet'05 Benchmark no. 3 are briefly presented to emphasize the importance of a correct modeling and identification of the kinematic hardening behavior

  6. New Definition and Properties of Fuzzy Entropy

    Institute of Scientific and Technical Information of China (English)

    Qing Ming; Qin Yingbing

    2006-01-01

    Let X = (x1,x2 ,…,xn ) and F(X) be a fuzzy set on a universal set X. A new definition of fuzzy entropy about a fuzzy set A on F(X), e*, is defined based on the order relation "≤" on [0,1/2] n. It is proved that e* is a σ-entropy under an additional requirement. Besides, some entropy formulas are presented and related properties are discussed.

  7. Simulasi Kecepatan Kendaraan dengan Menggunakan Logika Fuzzy

    OpenAIRE

    Lukas, Samuel; Aribowo, Arnold; Tjia, Yogih Suharta

    2008-01-01

    Artificial intelligence has been implemented widely. Many of household products are designed based on artificial intellegence concept. One of them is fuzzy logic system. This paper describes on how a fuzzy logic system can also be implemented in controling the speed of a car in the road. The fuzzy inference system was designed according to Tsukamoto inferencing method and for the defuzzyfication method is used weighted average method. There are three inputs for the system. The are distance b...

  8. Simulasi Kecepatan Kendaraan Dengan Menggunakan Logika Fuzzy

    OpenAIRE

    Lukas, Samuel; Aribowo, Arnold; Tjia, Yogih Suharta

    2009-01-01

    Artificial intelligence has been implemented widely. Many of household products are designed based on artificial intellegence concept. One of them is fuzzy logic system. This paper describes on how a fuzzy logic system can also be implemented in controling the speed of a car in the road.  The fuzzy inference system was designed according to Tsukamoto inferencing method and for the defuzzyfication method is used weighted average method. There are three inputs for the system. The are distance b...

  9. Fuzzy multiple linear regression: A computational approach

    Science.gov (United States)

    Juang, C. H.; Huang, X. H.; Fleming, J. W.

    1992-01-01

    This paper presents a new computational approach for performing fuzzy regression. In contrast to Bardossy's approach, the new approach, while dealing with fuzzy variables, closely follows the conventional regression technique. In this approach, treatment of fuzzy input is more 'computational' than 'symbolic.' The following sections first outline the formulation of the new approach, then deal with the implementation and computational scheme, and this is followed by examples to illustrate the new procedure.

  10. Statistical convergence on intuitionistic fuzzy normed spaces

    International Nuclear Information System (INIS)

    Karakus, S.; Demirci, K.; Duman, O.

    2008-01-01

    Saadati and Park [Saadati R, Park JH, Chaos, Solitons and Fractals 2006;27:331-44] has recently introduced the notion of intuitionistic fuzzy normed space. In this paper, we study the concept of statistical convergence on intuitionistic fuzzy normed spaces. Then we give a useful characterization for statistically convergent sequences. Furthermore, we display an example such that our method of convergence is stronger than the usual convergence on intuitionistic fuzzy normed spaces

  11. Recent advances in fuzzy preference modelling

    International Nuclear Information System (INIS)

    Van de Walle, B.; De Baets, B.; Kerre, E.

    1996-01-01

    Preference structures are well-known mathematical concepts having numerous applications in a variety of disciplines, such as economics, sociology and psychology. The generalization of preference structures to the fuzzy case has received considerable attention over the past years. Fuzzy preference structures allow a decision maker to express degrees of preference instead of the rigid classical yes-or-no preference assignment. This paper reports on the recent insights gained into the existence, construction and characterization of these fuzzy preference structures

  12. Fuzzy Law and the Boundaries of Secularism

    Directory of Open Access Journals (Sweden)

    W Menski

    2010-12-01

    Full Text Available The author delivered a speech at a Religare Conference. Showing his distaste for fuzzy law, he argues that "moderate secularism" is not merely another fuzzy concept, but it is "super-fuzzy", and that lawyers claiming to love certainty "have a tendency to sit in judgment over matters and even pre-judge things they know little about, including legal pluralism" leading to much irritation.

  13. The application and processing of paints hardened by electron beams

    International Nuclear Information System (INIS)

    Anon.

    1984-01-01

    Electron beam hardening is a process for changing liquid surface coatings of different thicknesses by irradiation with electrons of high energy into solid, hard, elastic films. In contrast to the UV process, one can harden pigmented paints with electron beams. An electron accelerator, which remits free electrons is used as the energy source for starting the chemical reaction in the coating material. In order to irradiate flat parts, which were coated with liquid paint by rolling, pouring or spraying, equally with electrons, one must produce an 'electron curtain', similar to that in a paint pouring machine. (orig./PW) [de

  14. Why semiconductors must be hardened when used in space

    International Nuclear Information System (INIS)

    Winokur, P.S.

    2000-01-01

    The natural space radiation environment presents a great challenge to present and future satellite systems with significant assets in space. Defining requirements for such systems demands knowledge about the space radiation environment and its effects on electronics and optoelectronics technologies, as well as suitable risk assessment of the uncertainties involved. For mission of high radiation levels, radiation-hardened integrated circuits will be required to preform critical mission functions. The most successful systems in space will be those that are best able to blend standard commercial electronics with custom radiation-hardened electronics in a mix that is suitable for the system of interest

  15. Influence of anisotropic hardening on longitudinal welding strains and stresses

    International Nuclear Information System (INIS)

    Gatovskij, K.M.; Revutskij, M.N.

    1981-01-01

    The algorithm and program for estimation of longitudinal welding strains and stresses with account of hardening and Bauschinger effect, which expand the possibilities of more complete description of stress change during thermodeformation welding cycles at bead surfacing on plate made of the 06Kh18N9T steel and AMg61 alloy. It is shown that for metals, deformation curves which are characterized by considerable yield moduli (Esub(T)/E>=0.05) hardening effect is considerable and its account leads to the decrease of stress level in the heataffected zone (down to 20%) [ru

  16. Radiation Hardened 10BASE-T Ethernet Physical Layer (PHY)

    Science.gov (United States)

    Lin, Michael R. (Inventor); Petrick, David J. (Inventor); Ballou, Kevin M. (Inventor); Espinosa, Daniel C. (Inventor); James, Edward F. (Inventor); Kliesner, Matthew A. (Inventor)

    2017-01-01

    Embodiments may provide a radiation hardened 10BASE-T Ethernet interface circuit suitable for space flight and in compliance with the IEEE 802.3 standard for Ethernet. The various embodiments may provide a 10BASE-T Ethernet interface circuit, comprising a field programmable gate array (FPGA), a transmitter circuit connected to the FPGA, a receiver circuit connected to the FPGA, and a transformer connected to the transmitter circuit and the receiver circuit. In the various embodiments, the FPGA, transmitter circuit, receiver circuit, and transformer may be radiation hardened.

  17. Aspect-oriented security hardening of UML design models

    CERN Document Server

    Mouheb, Djedjiga; Pourzandi, Makan; Wang, Lingyu; Nouh, Mariam; Ziarati, Raha; Alhadidi, Dima; Talhi, Chamseddine; Lima, Vitor

    2015-01-01

    This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security hardening aspects on UML diagrams. In addition, a weaving framework, with the underlying theoretical foundations, has been designed for the systematic injection of security aspects into UML models. The

  18. Work hardening and plastic equation of state of tantalum

    International Nuclear Information System (INIS)

    Gypen, L.A.; Aernoudt, E.; Deruyttere, A.

    1983-01-01

    The influence of cold deformation on the thermal and athermal components of the flow stress of tantalum was investigated. Up to high deformation levels the strain hardening is due only to the development of internal stress fields; the effective stress remains almost constant. The athermal strain hardening of tantalum is parabolic at low deformation levels (epsilon < 0.5) and linear at high deformation levels, as for other bcc metals. Hart's plastic equation of state is shown to be valid for tantalum at room temperature in the whole deformation range investigated (from epsilon = 0.005 to epsilon = 2.8). (author)

  19. Microstructure and properties of cast iron after laser surface hardening

    Directory of Open Access Journals (Sweden)

    Stanislav

    2013-12-01

    Full Text Available Laser surface hardening of cast iron is not trivial due to the material’s heterogeneity and coarse-grained microstructure, particularly in massive castings. Despite that, hardening of heavy moulds for automotive industry is in high demand. The present paper summarises the findings collected over several years of study of materials structure and surface properties. Phase transformations in the vicinity of graphite are described using examples from production of body parts in automotive industry. The description relates to formation of martensite and carbide-based phases, which leads to hardness values above 65 HRC and to excellent abrasion resistance.

  20. Numerical simulations of progressive hardening by using ABAQUS FEA software

    Directory of Open Access Journals (Sweden)

    Domański Tomasz

    2018-01-01

    Full Text Available The paper concerns numerical simulations of progressive hardening include phase transformations in solid state of steel. Abaqus FEA software is used for numerical analysis of temperature field and phase transformations. Numerical subroutines, written in fortran programming language are used in computer simulations where models of the distribution of movable heat source, kinetics of phase transformations in solid state as well as thermal and structural strain are implemented. Model for evaluation of fractions of phases and their kinetics is based on continuous heating diagram and continuous cooling diagram. The numerical analysis of thermal fields, phase fractions and strain associated progressive hardening of elements made of steel were done.

  1. Exploration of a radiation hardening stabilized voltage power supply

    International Nuclear Information System (INIS)

    Xie Zeyuan; Xu Xianguo

    2014-01-01

    This paper mainly introduces the design method of radiation hardening stabilized voltage power supply that makes use of commercial radiation resistant electronic devices and the test results of radiation performance of the power supply and devices are presented in detail. The experiment results show that the hardened power supply can normally work until 1000 Gy (Si) total dose and 1 × 10 14 n/cm 2 neutron radiation, and it doesn't latchup at about 1 × l0 9 Gy (Si)/s gamma transient dose rate. (authors)

  2. Effect of aluminizing on hardenability of steel (S45C)

    Science.gov (United States)

    Prayitno, D.; Sugiarto, R.

    2018-01-01

    The objective of research is to know the effect of aluminizing on hardenability of steel (S45C). The research methodologies were as follows. The Steels (S45C) were machined into the Jominy test samples. Next the samples were preheating at 700 ° C for 30 minutes and then the samples were dipped into the molten of aluminium for 3 minutes as a hot dip aluminizng method. The aluminium molten was 700 ° C. Then the samples were cooled into room temperatures. Finally the samples were into the jominy tested. The results show that the aluminizing (include the preheating process) increases the hardenability of steel (S45C).

  3. Structure of hardened alloys of Sr-Rh system

    International Nuclear Information System (INIS)

    Dobromyslov, A.V.; Taluth, N.I.

    1997-01-01

    Methods of X-ray diffraction analysis, optical metallography, transmission electron microscopy and hardness measurement were applied to study the structure of hardened zirconium-rhodium system alloys with rhodium contents up to 4.5 at.%. It is shown that in hardening alloys with rhodium concentration lower 2.2 at.% the eutectoid decomposition takes place and bainite-like structure is formed. A metastable ω-phase is formed in alloys with rhodium concentration equal to 2.65 at.% and above. The formation of ω-phase suppresses the process of eutectoid decomposition

  4. Changes in hardness of magnesium alloys due to precipitation hardening

    Directory of Open Access Journals (Sweden)

    Tatiana Oršulová

    2018-04-01

    Full Text Available This paper deals with the evaluation of changes in hardness of magnesium alloys during precipitation hardening that are nowadays widely used in different fields of industry. It focuses exactly on AZ31, AZ61 and AZ91 alloys. Observing material hardness changes serves as an effective tool for determining precipitation hardening parameters, such as temperature and time. Brinell hardness measurement was chosen based on experimental needs. There was also necessary to make chemical composition analysis and to observe the microstructures of tested materials. The obtained results are presented and discussed in this paper.

  5. Thermal stress ratcheting analysis of a time-hardening structure

    International Nuclear Information System (INIS)

    Hada, Kazuhiko

    1999-01-01

    Thermal stress ratcheting and shakedown is analyzed for a time-hardening structure: the yield stress increases as time goes on under exposure to neutron irradiation or thermal aging. New three modes of ratcheting and shakedown are identified as transition to other deformation modes. Stress regimes and thermal ratchet strains are formulated as a function of time-increasing yield stress. Moreover, a new model of trouble occurrence frequency as a modification to a bath-tube curve is proposed for calculating a time period of a thermal cycle. Application of the proposed formulation tells us a benefit of taking into account the time hardening due to neutron irradiation. (author)

  6. Integrating Fuzzy AHP and Fuzzy ARAS for evaluating financial performance

    OpenAIRE

    Abdolhamid Safaei Ghadikolaei; Saber Khalili Esbouei

    2014-01-01

    Multi Criteria Decision Making (MCDM) is an advanced field of Operation Research; recently MCDM methods are efficient and common tools for performance evaluation in many areas such as finance and economy. The aim of this study is to show one of applications of mathematics in real word. This study with considering value based measures and accounting based measures simultaneously, provided a hybrid approach of MCDM methods in fuzzy environment for financial performance evaluation of automotive ...

  7. Word Similarity From Dictionaries: Inferring Fuzzy Measures From Fuzzy Graphs

    Directory of Open Access Journals (Sweden)

    Torra

    2008-01-01

    Full Text Available The computation of similarities between words is a basic element of information retrieval systems, when retrieval is not solely based on word matching. In this work we consider a measure between words based on dictionaries. This is achieved assuming that a dictionary is formalized as a fuzzy graph. We show that the approach permits to compute measures not only for pairs of words but for sets of them.

  8. Fuzzy logic control for camera tracking system

    Science.gov (United States)

    Lea, Robert N.; Fritz, R. H.; Giarratano, J.; Jani, Yashvant

    1992-01-01

    A concept utilizing fuzzy theory has been developed for a camera tracking system to provide support for proximity operations and traffic management around the Space Station Freedom. Fuzzy sets and fuzzy logic based reasoning are used in a control system which utilizes images from a camera and generates required pan and tilt commands to track and maintain a moving target in the camera's field of view. This control system can be implemented on a fuzzy chip to provide an intelligent sensor for autonomous operations. Capabilities of the control system can be expanded to include approach, handover to other sensors, caution and warning messages.

  9. Fuzzy sets, rough sets, multisets and clustering

    CERN Document Server

    Dahlbom, Anders; Narukawa, Yasuo

    2017-01-01

    This book is dedicated to Prof. Sadaaki Miyamoto and presents cutting-edge papers in some of the areas in which he contributed. Bringing together contributions by leading researchers in the field, it concretely addresses clustering, multisets, rough sets and fuzzy sets, as well as their applications in areas such as decision-making. The book is divided in four parts, the first of which focuses on clustering and classification. The second part puts the spotlight on multisets, bags, fuzzy bags and other fuzzy extensions, while the third deals with rough sets. Rounding out the coverage, the last part explores fuzzy sets and decision-making.

  10. Equipment Selection by using Fuzzy TOPSIS Method

    Science.gov (United States)

    Yavuz, Mahmut

    2016-10-01

    In this study, Fuzzy TOPSIS method was performed for the selection of open pit truck and the optimal solution of the problem was investigated. Data from Turkish Coal Enterprises was used in the application of the method. This paper explains the Fuzzy TOPSIS approaches with group decision-making application in an open pit coal mine in Turkey. An algorithm of the multi-person multi-criteria decision making with fuzzy set approach was applied an equipment selection problem. It was found that Fuzzy TOPSIS with a group decision making is a method that may help decision-makers in solving different decision-making problems in mining.

  11. A computationally efficient fuzzy control s

    Directory of Open Access Journals (Sweden)

    Abdel Badie Sharkawy

    2013-12-01

    Full Text Available This paper develops a decentralized fuzzy control scheme for MIMO nonlinear second order systems with application to robot manipulators via a combination of genetic algorithms (GAs and fuzzy systems. The controller for each degree of freedom (DOF consists of a feedforward fuzzy torque computing system and a feedback fuzzy PD system. The feedforward fuzzy system is trained and optimized off-line using GAs, whereas not only the parameters but also the structure of the fuzzy system is optimized. The feedback fuzzy PD system, on the other hand, is used to keep the closed-loop stable. The rule base consists of only four rules per each DOF. Furthermore, the fuzzy feedback system is decentralized and simplified leading to a computationally efficient control scheme. The proposed control scheme has the following advantages: (1 it needs no exact dynamics of the system and the computation is time-saving because of the simple structure of the fuzzy systems and (2 the controller is robust against various parameters and payload uncertainties. The computational complexity of the proposed control scheme has been analyzed and compared with previous works. Computer simulations show that this controller is effective in achieving the control goals.

  12. Fuzzy logic control and optimization system

    Science.gov (United States)

    Lou, Xinsheng [West Hartford, CT

    2012-04-17

    A control system (300) for optimizing a power plant includes a chemical loop having an input for receiving an input signal (369) and an output for outputting an output signal (367), and a hierarchical fuzzy control system (400) operably connected to the chemical loop. The hierarchical fuzzy control system (400) includes a plurality of fuzzy controllers (330). The hierarchical fuzzy control system (400) receives the output signal (367), optimizes the input signal (369) based on the received output signal (367), and outputs an optimized input signal (369) to the input of the chemical loop to control a process of the chemical loop in an optimized manner.

  13. Fuzzy logic control of nuclear power plant

    International Nuclear Information System (INIS)

    Yao Liangzhong; Guo Renjun; Ma Changwen

    1996-01-01

    The main advantage of the fuzzy logic control is that the method does not require a detailed mathematical model of the object to be controlled. In this paper, the shortcomings and limitations of the model-based method in nuclear power plant control were presented, the theory of the fuzzy logic control was briefly introduced, and the applications of the fuzzy logic control technology in nuclear power plant controls were surveyed. Finally, the problems to be solved by using the fuzzy logic control in nuclear power plants were discussed

  14. Fuzzy neural network theory and application

    CERN Document Server

    Liu, Puyin

    2004-01-01

    This book systematically synthesizes research achievements in the field of fuzzy neural networks in recent years. It also provides a comprehensive presentation of the developments in fuzzy neural networks, with regard to theory as well as their application to system modeling and image restoration. Special emphasis is placed on the fundamental concepts and architecture analysis of fuzzy neural networks. The book is unique in treating all kinds of fuzzy neural networks and their learning algorithms and universal approximations, and employing simulation examples which are carefully designed to he

  15. Fuzzy set classifier for waste classification tracking

    International Nuclear Information System (INIS)

    Gavel, D.T.

    1992-01-01

    We have developed an expert system based on fuzzy logic theory to fuse the data from multiple sensors and make classification decisions for objects in a waste reprocessing stream. Fuzzy set theory has been applied in decision and control applications with some success, particularly by the Japanese. We have found that the fuzzy logic system is rather easy to design and train, a feature that can cut development costs considerably. With proper training, the classification accuracy is quite high. We performed several tests sorting radioactive test samples using a gamma spectrometer to compare fuzzy logic to more conventional sorting schemes

  16. Application of fuzzy logic control in industry

    International Nuclear Information System (INIS)

    Van der Wal, A.J.

    1994-01-01

    An overview is given of the various ways fuzzy logic can be used to improve industrial control. The application of fuzzy logic in control is illustrated by two case studies. The first example shows how fuzzy logic, incorporated in the hardware of an industrial controller, helps to finetune a PID controller, without the operator having any a priori knowledge of the system to be controlled. The second example is from process industry. Here, fuzzy logic supervisory control is implemented in software and enhances the operation of a sintering oven through a subtle combination of priority management and deviation-controlled timing

  17. Fuzzy control of small servo motors

    Science.gov (United States)

    Maor, Ron; Jani, Yashvant

    1993-01-01

    To explore the benefits of fuzzy logic and understand the differences between the classical control methods and fuzzy control methods, the Togai InfraLogic applications engineering staff developed and implemented a motor control system for small servo motors. The motor assembly for testing the fuzzy and conventional controllers consist of servo motor RA13M and an encoder with a range of 4096 counts. An interface card was designed and fabricated to interface the motor assembly and encoder to an IBM PC. The fuzzy logic based motor controller was developed using the TILShell and Fuzzy C Development System on an IBM PC. A Proportional-Derivative (PD) type conventional controller was also developed and implemented in the IBM PC to compare the performance with the fuzzy controller. Test cases were defined to include step inputs of 90 and 180 degrees rotation, sine and square wave profiles in 5 to 20 hertz frequency range, as well as ramp inputs. In this paper we describe our approach to develop a fuzzy as well as PH controller, provide details of hardware set-up and test cases, and discuss the performance results. In comparison, the fuzzy logic based controller handles the non-linearities of the motor assembly very well and provides excellent control over a broad range of parameters. Fuzzy technology, as indicated by our results, possesses inherent adaptive features.

  18. Fuzzy fractals, chaos, and noise

    Energy Technology Data Exchange (ETDEWEB)

    Zardecki, A.

    1997-05-01

    To distinguish between chaotic and noisy processes, the authors analyze one- and two-dimensional chaotic mappings, supplemented by the additive noise terms. The predictive power of a fuzzy rule-based system allows one to distinguish ergodic and chaotic time series: in an ergodic series the likelihood of finding large numbers is small compared to the likelihood of finding them in a chaotic series. In the case of two dimensions, they consider the fractal fuzzy sets whose {alpha}-cuts are fractals, arising in the context of a quadratic mapping in the extended complex plane. In an example provided by the Julia set, the concept of Hausdorff dimension enables one to decide in favor of chaotic or noisy evolution.

  19. Stability analysis of polynomial fuzzy models via polynomial fuzzy Lyapunov functions

    OpenAIRE

    Bernal Reza, Miguel Ángel; Sala, Antonio; JAADARI, ABDELHAFIDH; Guerra, Thierry-Marie

    2011-01-01

    In this paper, the stability of continuous-time polynomial fuzzy models by means of a polynomial generalization of fuzzy Lyapunov functions is studied. Fuzzy Lyapunov functions have been fruitfully used in the literature for local analysis of Takagi-Sugeno models, a particular class of the polynomial fuzzy ones. Based on a recent Taylor-series approach which allows a polynomial fuzzy model to exactly represent a nonlinear model in a compact set of the state space, it is shown that a refinemen...

  20. Fuzzy Control of Robotic Arm

    Science.gov (United States)

    Lin, Kyaw Kyaw; Soe, Aung Kyaw; Thu, Theint Theint

    2008-10-01

    This research work investigates a Self-Tuning Proportional Derivative (PD) type Fuzzy Logic Controller (STPDFLC) for a two link robot system. The proposed scheme adjusts on-line the output Scaling Factor (SF) by fuzzy rules according to the current trend of the robot. The rule base for tuning the output scaling factor is defined on the error (e) and change in error (de). The scheme is also based on the fact that the controller always tries to manipulate the process input. The rules are in the familiar if-then format. All membership functions for controller inputs (e and de) and controller output (UN) are defined on the common interval [-1,1]; whereas the membership functions for the gain updating factor (α) is defined on [0,1]. There are various methods to calculate the crisp output of the system. Center of Gravity (COG) method is used in this application due to better results it gives. Performances of the proposed STPDFLC are compared with those of their corresponding PD-type conventional Fuzzy Logic Controller (PDFLC). The proposed scheme shows a remarkably improved performance over its conventional counterpart especially under parameters variation (payload). The two-link results of analysis are simulated. These simulation results are illustrated by using MATLAB® programming.

  1. ANALYSIS OF FUZZY QUEUES: PARAMETRIC PROGRAMMING APPROACH BASED ON RANDOMNESS - FUZZINESS CONSISTENCY PRINCIPLE

    Directory of Open Access Journals (Sweden)

    Dhruba Das

    2015-04-01

    Full Text Available In this article, based on Zadeh’s extension principle we have apply the parametric programming approach to construct the membership functions of the performance measures when the interarrival time and the service time are fuzzy numbers based on the Baruah’s Randomness- Fuzziness Consistency Principle. The Randomness-Fuzziness Consistency Principle leads to defining a normal law of fuzziness using two different laws of randomness. In this article, two fuzzy queues FM/M/1 and M/FM/1 has been studied and constructed their membership functions of the system characteristics based on the aforesaid principle. The former represents a queue with fuzzy exponential arrivals and exponential service rate while the latter represents a queue with exponential arrival rate and fuzzy exponential service rate.

  2. Disorientations and work-hardening behaviour during severe plastic deformation

    DEFF Research Database (Denmark)

    Pantleon, Wolfgang

    2012-01-01

    Orientation differences develop during plastic deformation even in grains of originally uniform orientation. The evolution of these disorientations is modelled by dislocation dynamics taking into account different storage mechanisms. The predicted average disorientation angles across different ty...... pressure torsion, but also rationalizes the work-hardening behaviour at large plastic strains as well as a saturation of the flow stress....

  3. Preparation of Dispersion-Hardened Copper by Internal Oxidation

    DEFF Research Database (Denmark)

    Brøndsted, Povl; Sørensen, Ole Toft

    1978-01-01

    Internal oxidation experiments in CO2/CO atmospheres on Cu-Al alloys for preparation of dispersion-hardened Cu are described. The oxygen pressures of the atmospheres used in the experiments were controlled with a solid electrolyte oxygen cell based on ZrO2 (CaO). The particle size distributions o...

  4. Influence of alloying and secondary annealing on anneal hardening ...

    Indian Academy of Sciences (India)

    Unknown

    Influence of alloying and secondary annealing on anneal hardening effect at sintered copper alloys. SVETLANA NESTOROVIC. Technical Faculty Bor, University of Belgrade, Bor, Yugoslavia. MS received 11 February 2004; revised 29 October 2004. Abstract. This paper reports results of investigation carried out on sintered ...

  5. Influence of degree of deformation in rolling on anneal hardening ...

    Indian Academy of Sciences (India)

    Unknown

    Influence of degree of deformation in rolling on anneal hardening effect of a cast copper alloy. SVETLANA NESTOROVIC*, DESIMIR MARKOVIC and LJUBICA IVANIC. Technical Faculty Bor, University of Belgrade, Belgrade, Yugoslavia. MS received 15 May 2003. Abstract. This paper reports results of investigations carried ...

  6. Fatigue Hardening and Nucleation of Persistent Slip Bands in Copper

    DEFF Research Database (Denmark)

    Pedersen, Ole Bøcker; Winter, A. T.

    1982-01-01

    A study of fatigue hardening in single crystals of pure copper shows that, before saturation, stress-strain loops can display workhardening rates of about a third of the elastic shear modulus. These rates exceed tensile workhardening rates by roughly two orders of magnitude. This suggests that th...

  7. A unified theoretical and experimental study of anisotropic hardening

    International Nuclear Information System (INIS)

    Boehler, J.P.; Raclin, J.

    1981-01-01

    The purpose of this work is to develop a consistent formulation of the constitutive relations regarding anisotropic hardening materials. Attention is focused on the appearance and the evolution of mechanical anisotropies during irreversible processes, such as plastic forming and inelastic deformation of structures. The representation theorems for anisotropic tensor functions constitute a theoretical basis, allowing to reduce arbitrariness and to obtain a unified formulation of anisotropic hardening. In this approach, a general three-dimensional constitutive law is developed for prestrained initially orthotropic materials. Introduction of the plastic behavior results in the general forms of both the flow-law and the yield criterion. The developed theory is then specialized for the case of plane stress and different modes of anisotropic hardening are analyzed. A new generalization of the Von Mises criterion is proposed, in considering a homogeneous form of order two in stress and employing the simplest combinations of the basic invariants entering the general form of the yield condition. The proposed criterion involves specific terms accounting for the initial anisotropy, the deformation induced anisotropy and correlative terms between initial and induced anisotropy. The effects of prestrainings result in both isotropic and anisotropic hardening. An adequate experimental program, consisting of uniaxial tensile tests on oriented specimens of prestrained sheet-metal, was performed, in order to determine the specific form and the evolution of the anisotropic failure criterion for soft-steel subjected to different irreversible prestrainings. (orig.)

  8. Epoxy modified bitumen : Chemical hardening and its interpretation

    NARCIS (Netherlands)

    Apostolidis, P.; Pipintakos, G.; van de Ven, M.F.C.; Liu, X.; Erkens, Sandra; Scarpas, Athanasios

    2018-01-01

    Epoxy modified bitumen (EMB) is a promising technology for long lasting paving materials ensuring higher resistance to rutting, oxygen- and moisture-induced damage. In this paper, an analysis of the chemical reactions that take place during the chemical hardening process (curing) of epoxy modified

  9. New Stainless Steel Alloys for Low Temperature Surface Hardening?

    DEFF Research Database (Denmark)

    Christiansen, Thomas Lundin; Dahl, Kristian Vinter; Somers, Marcel A. J.

    2015-01-01

    The present contribution showcases the possibility for developing new surface hardenable stainless steels containing strong nitride/carbide forming elements (SNCFE). Nitriding of the commercial alloys, austenitic A286, and ferritic AISI 409 illustrates the beneficial effect of having SNCFE presen...

  10. The shrinkage of hardening cement paste and mortar

    NARCIS (Netherlands)

    Haas, de G.D.; Kreijger, P.C.; Niël, E.M.M.G.; Slagter, J.C.; Stein, H.N.; Theissing, E.M.; Wallendael, van M.

    1975-01-01

    This paper is an abstract from the report of the commission B10: "The influence of the shrinkage of cement on the shrink-age of concrete", of the Netherlands Committee for Concrete Research. Measurements of pulse velocity, volume shrinkage and heat of hydration on hardening portland cement support

  11. Hardening digital systems with distributed functionality: robust networks

    Science.gov (United States)

    Vaskova, Anna; Portela-Garcia, Marta; Garcia-Valderas, Mario; López-Ongil, Celia; Portilla, Jorge; Valverde, Juan; de la Torre, Eduardo; Riesgo, Teresa

    2013-05-01

    Collaborative hardening and hardware redundancy are nowadays the most interesting solutions in terms of fault tolerance achieved and low extra cost imposed to the project budget. Thanks to the powerful and cheap digital devices that are available in the market, extra processing capabilities can be used for redundant tasks, not only in early data processing (sensed data) but also in routing and interfacing1

  12. BUSFET - A Novel Radiation-Hardened SOI Transistor

    International Nuclear Information System (INIS)

    Dodd, P.E.; Draper, B.L.; Schwank, J.R.; Shaneyfelt, M.R.

    1999-01-01

    A partially-depleted SOI transistor structure has been designed that does not require the use of specially-processed hardened buried oxides for total-dose hardness and maintains the intrinsic SEU and dose rate hardness advantages of SOI technology

  13. Surface Induction Hardening of Axi-Symmetric Bodies

    Czech Academy of Sciences Publication Activity Database

    Barglik, J.; Doležel, Ivo; Škopek, M.; Ulrych, B.

    2001-01-01

    Roč. 1, č. 1 (2001), s. 11-16 ISSN 1335-8243 R&D Projects: GA ČR GA102/01/0184 Grant - others:-(PL) 7T08603716 Keywords : induction heating * induction hardening * numerical solution Subject RIV: JA - Electronics ; Optoelectronics, Electrical Engineering

  14. Coefficient of work-hardening in stage-IV

    CSIR Research Space (South Africa)

    Nabarro, FRN

    1994-04-15

    Full Text Available The theory of work hardening in stage IV depends on the relation between the relative misorientation Psi of neighbouring subgrains and the plastic strain gamma (Psi = B gamma exp). The value of the constant B is suggested to be better related...

  15. Multiaxial ratcheting with advanced kinematic and directional distortional hardening rules

    Czech Academy of Sciences Publication Activity Database

    Feigenbaum, H. P.; Dugdale, J.; Dafalias, Y.F.; Kourousis, K. I.; Plešek, Jiří

    2012-01-01

    Roč. 49, č. 22 (2012), s. 3063-3076 ISSN 0020-7683 R&D Projects: GA MŠk(CZ) ME10024 Institutional research plan: CEZ:AV0Z20760514 Keywords : plasticity * directional distortional hardening * thermodynamics Subject RIV: JJ - Other Materials Impact factor: 1.871, year: 2012 http://www.sciencedirect.com/science/article/pii/S0020768312002612

  16. Surface modification on PMMA : PVDF polyblend: hardening under ...

    Indian Academy of Sciences (India)

    Unknown

    Keywords. Polyblend; surface modification; microhardness; hardening; plasticization; segmental mobility. 1. Introduction. Polymeric materials have a specific feature of stability towards various aggressive chemical environments, which depends on a multiplicity of factors like structure and nature of the polymers and chemical ...

  17. Role of work hardening characteristics of matrix alloys in the ...

    Indian Academy of Sciences (India)

    Unknown

    with increasing prismatic punching of dislocations in the order 7075, 2014, 7010, 2024, 6061 and commercial purity aluminium leading to increased strength increments is noted. Keywords. Metal matrix composites; strengthening; work hardening rate; dislocation density. 1. Introduction. While in continuous fibre composites, ...

  18. Process for hardening synthetic resins by ionizing radiation

    International Nuclear Information System (INIS)

    Hesse, W.; Ritz, J.

    1975-01-01

    Synthetic resins containing hydroxy groups and polymerizable carbon-carbon bonds are reacted with diketenes to yield aceto ester derivatives, which when reacted with metal compounds to form chelates, and mixed with copolymerizable monomers, are capable of being hardened by unusually low radiation doses to form coatings and articles with superior properties. (E.C.B.)

  19. Simulation of Hamming Coding and Decoding for Microcontroller Radiation Hardening

    OpenAIRE

    Rehab I. Abdul Rahman; Mazhar B. Tayel

    2015-01-01

    This paper presents a method of hardening the 8051 micro-controller, able to assure reliable operation in the presence of bit flips caused by radiation. Aiming at avoiding such faults in the 8051 micro-controller, Hamming code protection was used in its SRAM memory and registers. A VHDL code has been used for this hamming code protection.

  20. Effect of hardening methods of moulding sands with water glass on structure of bonding bridges

    Directory of Open Access Journals (Sweden)

    M. Stachowicz

    2010-07-01

    Full Text Available Research on influence of hardening methods on structure of bonding bridges in moulding sands with sodium water glass is presented.Moulding sands with addition of 2.5 % of binder with molar module 2.0 were hardened with CO2 and dried in traditional way or hardenedwith microwaves. It was proved that the hardening method affects structure of bonding bridges, correlating with properties of the hardened moulding sands. It was found that strength of the moulding sands hardened with microwaves for 4 min is very close to that measured after traditional drying at 110 °C for 120 min. So, application of microwave hardening ensures significant shortening of the process time to the value comparable with CO2 hardening but guaranteeing over 10-fold increase of mechanical properties. Analysis of SEM images of hardened moulding sands permitted explaining differences in quality parameters of moulding sands by connecting them with structure of the created bonding bridges.

  1. Models for cooperative games with fuzzy relations among the agents fuzzy communication, proximity relation and fuzzy permission

    CERN Document Server

    Jiménez-Losada, Andrés

    2017-01-01

    This book offers a comprehensive introduction to cooperative game theory and a practice-oriented reference guide to new models and tools for studying bilateral fuzzy relations among several agents or players. It introduces the reader to several fuzzy models, each of which is first analyzed in the context of classical games (crisp games) and subsequently in the context of fuzzy games. Special emphasis is given to the value of Shapley, which is presented for the first time in the context of fuzzy games. Students and researchers will find here a self-contained reference guide to cooperative fuzzy games, characterized by a wealth of examples, descriptions of a wide range of possible situations, step-by-step explanations of the basic mathematical concepts involved, and easy-to-follow information on axioms and properties.

  2. Fuzzy production planning models for an unreliable production system with fuzzy production rate and stochastic/fuzzy demand rate

    Directory of Open Access Journals (Sweden)

    K. A. Halim

    2011-01-01

    Full Text Available In this article, we consider a single-unit unreliable production system which produces a single item. During a production run, the production process may shift from the in-control state to the out-of-control state at any random time when it produces some defective items. The defective item production rate is assumed to be imprecise and is characterized by a trapezoidal fuzzy number. The production rate is proportional to the demand rate where the proportionality constant is taken to be a fuzzy number. Two production planning models are developed on the basis of fuzzy and stochastic demand patterns. The expected cost per unit time in the fuzzy sense is derived in each model and defuzzified by using the graded mean integration representation method. Numerical examples are provided to illustrate the optimal results of the proposed fuzzy models.

  3. Fuzzy Logic and Arithmetical Hierarchy III

    Czech Academy of Sciences Publication Activity Database

    Hájek, Petr

    2001-01-01

    Roč. 68, č. 1 (2001), s. 129-142 ISSN 0039-3215 R&D Projects: GA AV ČR IAA1030004 Institutional research plan: AV0Z1030915 Keywords : fuzzy logic * basic fuzzy logic * Lukasiewicz logic * Godel logic * product logic * arithmetical hierarchy Subject RIV: BA - General Mathematics

  4. Fuzziness and randomness in an optimization framework

    International Nuclear Information System (INIS)

    Luhandjula, M.K.

    1994-03-01

    This paper presents a semi-infinite approach for linear programming in the presence of fuzzy random variable coefficients. As a byproduct a way for dealing with optimization problems including both fuzzy and random data is obtained. Numerical examples are provided for the sake of illustration. (author). 13 refs

  5. Contraction theorems in fuzzy metric space

    International Nuclear Information System (INIS)

    Farnoosh, R.; Aghajani, A.; Azhdari, P.

    2009-01-01

    In this paper, the results on fuzzy contractive mapping proposed by Dorel Mihet will be proved for B-contraction and C-contraction in the case of George and Veeramani fuzzy metric space. The existence of fixed point with weaker conditions will be proved; that is, instead of the convergence of subsequence, p-convergence of subsequence is used.

  6. FINDING STANDARD DEVIATION OF A FUZZY NUMBER

    OpenAIRE

    Fokrul Alom Mazarbhuiya

    2017-01-01

    Two probability laws can be root of a possibility law. Considering two probability densities over two disjoint ranges, we can define the fuzzy standard deviation of a fuzzy variable with the help of the standard deviation two random variables in two disjoint spaces.

  7. Fuzzy Treatment of Candidate Outliers in Measurements

    Directory of Open Access Journals (Sweden)

    Giampaolo E. D'Errico

    2012-01-01

    Full Text Available Robustness against the possible occurrence of outlying observations is critical to the performance of a measurement process. Open questions relevant to statistical testing for candidate outliers are reviewed. A novel fuzzy logic approach is developed and exemplified in a metrology context. A simulation procedure is presented and discussed by comparing fuzzy versus probabilistic models.

  8. A physical analogy to fuzzy clustering

    DEFF Research Database (Denmark)

    Jantzen, Jan

    2004-01-01

    This tutorial paper provides an interpretation of the membership assignment in the fuzzy clustering algorithm fuzzy c-means. The membership of a data point to several clusters is shown to be analogous to the gravitational forces between bodies of mass. This provides an alternative way to explain...

  9. Mathematical Fuzzy Logic - State of Art 2001

    Czech Academy of Sciences Publication Activity Database

    Hájek, Petr

    2003-01-01

    Roč. 24, - (2003), s. 71-89 ISSN 0103-9059. [WOLLIC'2001. Brasília, 31.07.2001-03.08.2001] R&D Projects: GA MŠk LN00A056 Keywords : fuzzy logic * many valued logic * basic fuzzy logic BL Subject RIV: BA - General Mathematics http://www.mat.unb.br/~matcont/24_4.pdf

  10. On the Power of Fuzzy Markup Language

    CERN Document Server

    Loia, Vincenzo; Lee, Chang-Shing; Wang, Mei-Hui

    2013-01-01

    One of the most successful methodology that arose from the worldwide diffusion of Fuzzy Logic is Fuzzy Control. After the first attempts dated in the seventies, this methodology has been widely exploited for controlling many industrial components and systems. At the same time, and very independently from Fuzzy Logic or Fuzzy Control, the birth of the Web has impacted upon almost all aspects of computing discipline. Evolution of Web, Web 2.0 and Web 3.0 has been making scenarios of ubiquitous computing much more feasible;  consequently information technology has been thoroughly integrated into everyday objects and activities. What happens when Fuzzy Logic meets Web technology? Interesting results might come out, as you will discover in this book. Fuzzy Mark-up Language is a son of this synergistic view, where some technological issues of Web are re-interpreted taking into account the transparent notion of Fuzzy Control, as discussed here.  The concept of a Fuzzy Control that is conceived and modeled in terms...

  11. Modeling Research Project Risks with Fuzzy Maps

    Science.gov (United States)

    Bodea, Constanta Nicoleta; Dascalu, Mariana Iuliana

    2009-01-01

    The authors propose a risks evaluation model for research projects. The model is based on fuzzy inference. The knowledge base for fuzzy process is built with a causal and cognitive map of risks. The map was especially developed for research projects, taken into account their typical lifecycle. The model was applied to an e-testing research…

  12. Homeopathic drug selection using Intuitionistic fuzzy sets.

    Science.gov (United States)

    Kharal, Athar

    2009-01-01

    Using intuitionistic fuzzy set theory, Sanchez's approach to medical diagnosis has been applied to the problem of selection of single remedy from homeopathic repertorization. Two types of Intuitionistic Fuzzy Relations (IFRs) and three types of selection indices are discussed. I also propose a new repertory exploiting the benefits of soft-intelligence.

  13. Parallel fuzzy connected image segmentation on GPU

    OpenAIRE

    Zhuge, Ying; Cao, Yong; Udupa, Jayaram K.; Miller, Robert W.

    2011-01-01

    Purpose: Image segmentation techniques using fuzzy connectedness (FC) principles have shown their effectiveness in segmenting a variety of objects in several large applications. However, one challenge in these algorithms has been their excessive computational requirements when processing large image datasets. Nowadays, commodity graphics hardware provides a highly parallel computing environment. In this paper, the authors present a parallel fuzzy connected image segmentation algorithm impleme...

  14. Fuzzy torus via q-Parafermion

    International Nuclear Information System (INIS)

    Aizawa, N; Chakrabarti, R

    2007-01-01

    We note that the recently introduced fuzzy torus can be regarded as a q-deformed parafermion. Based on this picture, classification of the Hermitian representations of the fuzzy torus is carried out. The result involves Fock-type representations and new finite-dimensional representations for q being a root of unity as well as already known finite-dimensional ones

  15. Bounded Rationality of Generalized Abstract Fuzzy Economies

    Directory of Open Access Journals (Sweden)

    Lei Wang

    2014-01-01

    Full Text Available By using a nonlinear scalarization technique, the bounded rationality model M for generalized abstract fuzzy economies in finite continuous spaces is established. Furthermore, by using the model M, some new theorems for structural stability and robustness to (λ,ϵ-equilibria of generalized abstract fuzzy economies are proved.

  16. Uzawa method for fuzzy linear system

    OpenAIRE

    Ke Wang

    2013-01-01

    An Uzawa method is presented for solving fuzzy linear systems whose coefficient matrix is crisp and the right-hand side column is arbitrary fuzzy number vector. The explicit iterative scheme is given. The convergence is analyzed with convergence theorems and the optimal parameter is obtained. Numerical examples are given to illustrate the procedure and show the effectiveness and efficiency of the method.

  17. OCCUPATIONAL ASTHMA CAUSED BY A HARDENER CONTAINING AN ALIPHATIC AND A CYCLOALIPHATIC DIAMINE

    NARCIS (Netherlands)

    ALEVA, RM; AALBERS, R; KOETER, GH; DEMONCHY, JGR

    An otherwise healthy 44-yr-old man experienced a serious attack of bronchial obstruction after working with resins and hardeners, releasing fumes of a mixture of an aliphatic and a cycloaliphatic diamine hardener. Eight hours after deliberate challenge with the hardener a large increase of airway

  18. Fuzzy GML Modeling Based on Vague Soft Sets

    Directory of Open Access Journals (Sweden)

    Bo Wei

    2017-01-01

    Full Text Available The Open Geospatial Consortium (OGC Geography Markup Language (GML explicitly represents geographical spatial knowledge in text mode. All kinds of fuzzy problems will inevitably be encountered in spatial knowledge expression. Especially for those expressions in text mode, this fuzziness will be broader. Describing and representing fuzziness in GML seems necessary. Three kinds of fuzziness in GML can be found: element fuzziness, chain fuzziness, and attribute fuzziness. Both element fuzziness and chain fuzziness belong to the reflection of the fuzziness between GML elements and, then, the representation of chain fuzziness can be replaced by the representation of element fuzziness in GML. On the basis of vague soft set theory, two kinds of modeling, vague soft set GML Document Type Definition (DTD modeling and vague soft set GML schema modeling, are proposed for fuzzy modeling in GML DTD and GML schema, respectively. Five elements or pairs, associated with vague soft sets, are introduced. Then, the DTDs and the schemas of the five elements are correspondingly designed and presented according to their different chains and different fuzzy data types. While the introduction of the five elements or pairs is the basis of vague soft set GML modeling, the corresponding DTD and schema modifications are key for implementation of modeling. The establishment of vague soft set GML enables GML to represent fuzziness and solves the problem of lack of fuzzy information expression in GML.

  19. A NEW APPROACH ON SHORTEST PATH IN FUZZY ENVIRONMENT

    OpenAIRE

    A. Nagoorgani; A. Mumtaj Begam

    2010-01-01

    This paper introduces a new type of fuzzy shortest path network problem using triangular fuzzy number. To find the smallest edge by the fuzzy distance using graded mean integration representation of generalized fuzzy number for every node. Thus the optimum shortest path for the given problem is obtained.

  20. Solution of a System of Linear Equations with Fuzzy Numbers

    Czech Academy of Sciences Publication Activity Database

    Horčík, Rostislav

    2008-01-01

    Roč. 159, č. 14 (2008), s. 1788-1810 ISSN 0165-0114 R&D Projects: GA AV ČR KJB100300502 Institutional research plan: CEZ:AV0Z10300504 Keywords : fuzzy number * fuzzy interval * interval analysis * fuzzy arithmetic * fuzzy class theory * united solution set Subject RIV: BA - General Mathematics Impact factor: 1.833, year: 2008