Universal Fuzzy Statistical Test for Pseudo Random Number Generators (UFST-PRNG)

Size: px
Start display at page:

Download "Universal Fuzzy Statistical Test for Pseudo Random Number Generators (UFST-PRNG)"

Transcription

1 Universal Fuzzy Statistical Test for Pseudo Random Number Generators (UFST-PRNG) Raad A. Muhajjar, Ph.D. ICCR Scholar, Dept. of Computer Science, Dr. S. Kazim Naqvi, Sr. System Analyst, Centre for IT,

2 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work 2

3 Basic Information Pseudorandom or random bit generator is a device or algorithm which outputs a sequence of statistically independent and unbiased binary digits. It also can be used to generate (uniformly distributed) random numbers [51]. Pseudorandom number generators are important in cryptographic applications. For real security, PRNG output must to be unpredictable for adversaries. Many protocols rely on the ability to have random looking numbers.

4 Basic Information Weak random values increase the chances for adversaries to break the system. Breaking the Netscape implementation of SSL [4] and predicting Java session-ids [5] are two well documented instances. Although the theory of random number generation is well researched, building a secure RNG in practice has proven to be quite difficult. As all operating systems provide RNGs, most cryptographic applications take their output quality to be good for granted. Unfortunately, this is not true. The basic weakness with seeds and keys can be effectively exploited by hackers/adversaries to break the system.

5 Basic Information To alleviate problem with PRNG sources, a new practical test A Universal Statistical Test for Pseudorandom Numbers (UFST-PRNG) for investigating the randomness of cryptographic RNGs has been proposed and implemented. This new practical test is based on statistical tests, the next-bit test theory, and fuzzy logic. The new proposed test has the property that, if the bit string passes the test, it will definitely pass the standard tests. In addition it will pass, yet another test dependent on the idea of predict next bit tests [8]. 5

6 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work Footer 6

7 Linux Operating System o Linux, Mac OS, FreeBSD and OpenBSD provide access to PRNGs through device nodes /dev/random and /dev/urandom. o The Linux pseudorandom number generator (LPRNG) is part of the kernel of all Linux distributions and the outputs of this generator is used for almost every security protocol. 7

8 Analysis of Linux PRNG First, a function was developed to capture the Linux PRNG state into a file. Then these random sequences were analyzed using standard statistical tests, NIST test suite, and a new universal test for bit strings. 8

9 Program segment for extracting seq. from LPRNG

10 Few Sequences generated from /dev/random

11 Results of The NIST Statistical Test Suite NIST Statistical Test P.Value Assessment Frequency SUCCESS Cusum-Forward SUCCESS Cusum-Reverse SUCCESS Runs SUCCESS Long Runs of Ones SUCCESS Block Frequency (m=128 ) SUCCESS Spectral DFT SUCCESS Overlapping Templates m= SUCCESS Non-Overlapping Templates (m= 9, B= ) SUCCESS Approximate Entropy m= SUCCESS Lempel Ziv Complexity SUCCESS Linear Complexity (M=368) SUCCESS Serial (m=5) SUCCESS SUCCESS Table 6.5 Result NIST statistical test suite on Sequence No.1 of Table

12 Result of Standard statistical Tests Run Test : The input to the Run test is the sequence No.1 ( Bi e i ) 2 Z= + ei i= 1 k (Gi ei ) 2 i= 1 e i k the result of Run test has been got as: Z=

13 Result of Standard statistical Tests Autocorrelation Test: sequence output from The test on the first /dev/random has been conducted. n d F = 2( A(d ) )/ n d 2 From equation above, when the value of d =10, the P-value for the Autocorrelation test has been got as: F=

14 Result of A New Universal Test for Bit Strings For Local non-random behavior : As shown in the below Table, it is possible to predict the last colored bits if the first colored bits are known. 14

15 15

16 16

17 Local non-random behavior 17

18 For Local non-random behavior The result shows that more than L+1 bits can be predicted using L-1 bits. Thus, there is some local non-randomness in the sequence No.1 generated by /dev/random and as such the test fails. 18

19 For overall non-random behavior The curve resulting from the number of predictable bits after them for sequence No.1 is compared to another curve resulting from De_bruijn sequence [4]. Both have been shown in the following Figure. 19

20 20

21 For overall non-random behavior It can be easily seen that the graph of Sequence No.1 is quite dissimilar to the required graph for Debruijn sequence. This means that the random sequence No.1 extracted from the /dev/random generator shows overall non-random behavior. 21

22 Summary for LPRNG The architecture of LPRNG /dev/random in Red Hat Enterprise Linux EL has been presented. To study the quality of randomness in the LPRNG, a number of sequences were generated 22

23 Summary for LPRNG The test using /dev/random function then NIST, standard statistical tests and A New Universal test for bit string were applied. It was found that 100% of the sequences generated from /dev/random generator passed the NIST test suite and standard statistical tests but 30% of these sequence failed to pass tests based on the next-bit theory. 23

24 Windows Operating System All Windows versions since Windows 95 have a Crypto API function CryptGenRandom for generating cryptographically secure random numbers. The PRNG of Windows 2000 & Windows XP were examined. The CryptGenRandom function was used to generate the random sequences from the Windows Pseudo Random Number Generator (WPRNG). 24

25 Analysis of Windows PRNG First, a function was developed to capture the Windows PRNG state into a file. Then these random sequences were analyzed using standard statistical tests, NIST test suite, and a new universal test for bit strings. 25

26 Program segment for extracting seq. from WPRNG

27 Few Seq. generated from WPRNG 27

28 Results of The NIST Stat. Test Suite 28

29 Result of Standard stat. Tests The Result of Run Test is : Z= The Result of Autocorrelation Test is : F=

30 A new universal test for bit strings 30

31 31

32 Local non-random behavior 32

33 Overall non-random behavior 33

34 Summary for WPRNG Study the quality of randomness in the WPRNG, a number of sequences have been generated using Crypto API function CryptGenRandom then applied NIST suite, a new universal test for bit strings and other standard statistical tests 34

35 Summary for WPRNG This work found that the random sequences generated by WPRNG are weaker than those generated by /dev/random. 55% of the random sequences generated using WPRNG failed to pass the NIST test suite and standards statistical tests. 72% of the sequences fail in tests based on the next-bit theory such as A new universal test for bit strings. 35

36 Thus.. In this paper, an extensive statistical analytic investigation for PRNGs of Linux and Windows OS was made. This enabled us to conclude that the random bit strings generated by LPRNG and WPRNG are weak. If a hacker is able to predict few-bits he can potentially recover the key, which can jeopardize the entire security.

37 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work Footer 37

38 The Solution The above study and results on two most popular operating systems viz. Windows and Linux shows that the security in cryptographic applications can be compromised because of weaknesses in the PRNG algorithms of the OS loaded on the interacting machines. 38

39 The Solution There are two possible ways to deal with this issue; first; - change the PRNG algorithms in the OS systems; second; - develop a way which can bridge the requirements of producing quality random numbers on the existing machines and OS. 39

40 The Solution-UFST-PRNG Framework In this paper, I have proposed to implement the later solution for feasibility reasons. The proposed solution (UFST-PRNG Framework) requires that as soon as the OS generates a random sequence, it is captured and put it on rigorous standard statistical tests and tests based on next-bit theory for checking the quality of randomness. 40

41 The Solution-UFST-PRNG Framework Once the UFST-PRNG test determines that a sequence is weak, it is not forwarded to any application rather, the system will be requested to generate a new random sequence for consumption of the requesting application. 41

42 Requirement for implemental UFST-PRNG A test that can efficiently identity if a pseudorandom sequences is good or not for security purposes?

43 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work Footer 43

44 A Universal Fuzzy Statistical Test for Pseudorandom Number Generators (UFST-PRNG) To alleviate problem with PRNG sources, in this paper an attempt to design and implement a new practical test for bit string generators was made based on statistical tests, the next-bit test theory, and fuzzy logic. 44

45 The General Architecture of UFST-PRNG Test

46 The General Architecture of UFST-PRNG Test Fuzzification: The Fuzzification job is to transform the crisp valued inputs Z, F, and R into fuzzy sets depending on the trapezoidal membership functions 46

47 Three trapezoidal membershi p functions have been used as inputs

48 The General Architecture of UFST-PRNG Test

49 The General Architecture of UFST-PRNG Test Inference System : There are two steps to complete the work of Inference System in UFSTPRNG. They are as the following: Set of IF-THEN Apply the Minimum methods for Fire Rules 49

50 Inference System Set of IF-THEN: The behavior of system to be controlled is described in this component through a set of IF_THEN rules describing inputoutput relations in terms of fuzzy sets. Here Mamdani fuzzy rules was used, each rule is represented as: IF A IS Strong AND B IS Accepted AND C IS Weak THEN D IS Accepted 3 May

51 The General Architecture of UFST-PRNG Test

52 Inference System The inference rules in proposed test are 27 rules as shown in the following Table. 52

53 The General Architecture of UFST-PRNG Test Apply the Minimum methods for Fire Rules: The premises of all rules are compared to the crisp inputs to determine which rules apply to the current situation. This matching process involves determining the certainty that a rule applies (μ premise) which could be calculated by the Minimum methods as: μpremises= Min (μ (Z), μ (F), μ (R)) 3 May

54 The General Architecture of UFST-PRNG Test

55 The General Architecture of UFST-PRNG Test Defuzzification: The defuzzifire takes the output fuzzy sets from the inference system and transforms them into crisp values depending on the triangular membership functions and the centre of gravity method. It is given by: n μ C i i i = 1 Crisp Output = n μ i i=1 55

56 The General Architecture of UFST-PRNG Test Triangular membership functions as output of this system 3 May

57 The General Architecture of UFST-PRNG Test

58 UFST-PRNGs Summary To overcome the inherent problems of PRNGs, which hamper the Cryptographic security, the UFST-PRNG Framework and Test was proposed. The UFST-PRNG test is based on standard statistical tests, the next-bit test theory, and fuzzy logic. 58

59 UFST-PRNGs Summary 1. In this paper, I have demonstrated the use of UFSTPRNG on random sequences generated using Linux and Windows PRNGs respectively. 2. The test has a very useful property that if a random string passes UFST-PRNG, the string will also pass other standard statistical test and tests based on nextbit theory but the inverse may not be always true. 59

60 UFST-PRNGs Summary 1. In addition to test standard statistical properties the UFST-PRNG test also determines both local and overall non-random behaviors of the bit strings. Thus, UFST-PRNG may be used as a single unified test to check the quality of randomness of bit strings. 2. It can be applied to all the strings, from rather small to those containing large number of bits.

61 UFST-PRNGs Summary 1. The UFST-PRNG framework is a model, which uses UFST-PRNG to test the goodness of random bits generated by the PRNGs. 2. It can be equally effective in improving the security of any application which depends on random sequences from operating system. 61

62 UFST-PRNGs Summary 1. As the UFST-PRNG framework is able to solve the root problems related to weak random numbers it will definitely help in boosting the security in cryptographic applications. 62

63 Outline Basic Information Operating System PRNGs (Linux & Windows) The solution UFST-PRNG Limitations & Directions for Future Work Footer 63

64 Limitations & Directions for Future Work The UFST-PRNG framework needs to be made operational as software. All Client machines must support UFST-PRNG framework. In addition, the framework will add some processing overhead on the server as well as on client machines. The impact of UFST-PRNG on performance may further be studied. 64

65 Important References used in the Presentation Bruce Potter, Wireless Hotspots: Petri Dish of Wireless Security, Communications of the ACM June 2006, Vol. 49, No. 6, pp I. Goldberg and D. Wagner, Randomness and the Netscape browser, Dr Dobb s, Jan. 1996, pp P. Gutmann. Software generation of practically strong random numbers. In Proc. of 7th USENIX Security Symposium, An updated version appears in B. Sadeghiyah and J. Mohajeri, A new universal test for bit strings, Lecturer Notes in Computer Science, Springer ACISP "96, pp Raad A. Muhajjar, Rafat Parveen, Nupur Prakash, and S. Kazim Naqvi., A Universal Fuzzy Statistical Test for Bit Strings, Communicated in International Journal of Computation Intelligence and Applications (IJCIA). Ian S. Shaw, Fuzzy Control of Industrial Systems: Theory and Applications, Kluwer Academic Publishers; ISBN: , 1998.

66 THANKS 66

67 Questions? 67

Security of Pseudo-Random Number Generators With Input

Security of Pseudo-Random Number Generators With Input Security of Pseudo-Random Number Generators With Input Damien Vergnaud École normale supérieure INRIA PSL wr0ng April, 30th 2017 (with Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault & Daniel Wichs)

More information

Cryptanalysis of the Windows Random Number Generator

Cryptanalysis of the Windows Random Number Generator Cryptanalysis of the Windows Random Number Generator Masaryk University in Brno Faculty of Informatics Jan Krhovják Presentation based on paper: Cryptanalysis of the Random Number Generator of the Windows

More information

CSC 482/582: Computer Security. Applying Cryptography

CSC 482/582: Computer Security. Applying Cryptography Applying Cryptography Topics 1. Applications of Randomness 2. Defining and Evaluating Randomness 3. Pseudo-Random Number Generators (PRNGs) 4. Cryptographically Secure PRNGs (CSPRNGs) 5. Attacks on PRNGs

More information

Attack on Sun s MIDP Reference Implementation of SSL

Attack on Sun s MIDP Reference Implementation of SSL Attack on Sun s MIDP Reference Implementation of SSL Kent Inge Simonsen, Vebjørn Moen, and Kjell Jørgen Hole Department of Informatics, University of Bergen Pb. 7800, N-5020 Bergen, Norway {kentis,moen,kjell.hole}@ii.uib.no

More information

Random number generation

Random number generation Cryptographic Protocols (EIT ICT MSc) Dr. Levente Buttyán associate professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

Topics. Key Generation. Applying Cryptography

Topics. Key Generation. Applying Cryptography Applying Cryptography Topics 1. Key Generation 2. Randomness and Information Theory 3. PRNGs 4. Entropy Gathering 5. Key Storage 6. Cryptographic APIs Key Generation Goal: generate difficult to guess keys

More information

FUZZY LOGIC TECHNIQUES. on random processes. In such situations, fuzzy logic exhibits immense potential for

FUZZY LOGIC TECHNIQUES. on random processes. In such situations, fuzzy logic exhibits immense potential for FUZZY LOGIC TECHNIQUES 4.1: BASIC CONCEPT Problems in the real world are quite often very complex due to the element of uncertainty. Although probability theory has been an age old and effective tool to

More information

CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS

CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS 4.1. INTRODUCTION This chapter includes implementation and testing of the student s academic performance evaluation to achieve the objective(s)

More information

CSC 580 Cryptography and Computer Security

CSC 580 Cryptography and Computer Security CSC 580 Cryptography and Computer Security Random Bit Generators (Sections 8.1-8.3) February 20, 2018 Overview Today: HW 4 solution discussion Pseudorandom generation - concepts and simple techniques Reminder:

More information

Introduction to Fuzzy Logic and Fuzzy Systems Adel Nadjaran Toosi

Introduction to Fuzzy Logic and Fuzzy Systems Adel Nadjaran Toosi Introduction to Fuzzy Logic and Fuzzy Systems Adel Nadjaran Toosi Fuzzy Slide 1 Objectives What Is Fuzzy Logic? Fuzzy sets Membership function Differences between Fuzzy and Probability? Fuzzy Inference.

More information

Cuttingedge crypto graphy

Cuttingedge crypto graphy The latest cryptographic solutions from Linux on the System z platform BY PETER SPERA Cuttingedge crypto graphy Can Linux* for the IBM* System z* platform meet the cryptographic needs of today s enterprise

More information

/dev/random and Your FIPS Validation Can Be Friends

/dev/random and Your FIPS Validation Can Be Friends /dev/random and Your FIPS 140-2 Validation Can Be Friends Yes, Really Valerie Fenwick Manager, Solaris Cryptographic Technologies team Oracle May 19, 2016 Photo by CGP Grey, http://www.cgpgrey.com/ Creative

More information

A Secured Key Generation Scheme Using Enhanced Entropy

A Secured Key Generation Scheme Using Enhanced Entropy 236 A Secured Key Generation Scheme Using Enhanced Entropy M.S. Irfan Ahmed Asst. Professor, VLB Engineering College, Coimbatore E.R. Naganathan Reader, Computer Science Department Alagappa University,

More information

Randomness in Cryptography

Randomness in Cryptography Randomness in Cryptography JKU Linz 2007 Randomness in Cryptography 1 Randomness? Randomness in Cryptography 2 The need for randomness Contents 1 Introduction The need for randomness Formal denitions,

More information

ARTIFICIAL INTELLIGENCE. Uncertainty: fuzzy systems

ARTIFICIAL INTELLIGENCE. Uncertainty: fuzzy systems INFOB2KI 2017-2018 Utrecht University The Netherlands ARTIFICIAL INTELLIGENCE Uncertainty: fuzzy systems Lecturer: Silja Renooij These slides are part of the INFOB2KI Course Notes available from www.cs.uu.nl/docs/vakken/b2ki/schema.html

More information

Information Security CS526

Information Security CS526 Information CS 526 Topic 3 Ciphers and Cipher : Stream Ciphers, Block Ciphers, Perfect Secrecy, and IND-CPA 1 Announcements HW1 is out, due on Sept 10 Start early, late policy is 3 total late days for

More information

Fuzzy Networks for Complex Systems. Alexander Gegov University of Portsmouth, UK

Fuzzy Networks for Complex Systems. Alexander Gegov University of Portsmouth, UK Fuzzy Networks for Complex Systems Alexander Gegov University of Portsmouth, UK alexander.gegov@port.ac.uk Presentation Outline Introduction Types of Fuzzy Systems Formal Models for Fuzzy Networks Basic

More information

Speed regulation in fan rotation using fuzzy inference system

Speed regulation in fan rotation using fuzzy inference system 58 Scientific Journal of Maritime Research 29 (2015) 58-63 Faculty of Maritime Studies Rijeka, 2015 Multidisciplinary SCIENTIFIC JOURNAL OF MARITIME RESEARCH Multidisciplinarni znanstveni časopis POMORSTVO

More information

The Design and Analysis of a True Random Number Generator in a Field Programmable Gate Array. By Paul Kohlbrenner November 20, 2003

The Design and Analysis of a True Random Number Generator in a Field Programmable Gate Array. By Paul Kohlbrenner November 20, 2003 The Design and Analysis of a True Random Number Generator in a Field Programmable Gate Array By Paul Kohlbrenner November 20, 2003 Presentation Organization 1. Thesis goal 2. The need for random bits in

More information

Information Security CS526

Information Security CS526 Information Security CS 526 Topic 3 Cryptography: One-time Pad, Information Theoretic Security, and Stream CIphers 1 Announcements HW1 is out, due on Sept 11 Start early, late policy is 3 total late days

More information

Lotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said

Lotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said FUZZY LOGIC Fuzzy Logic Lotfi Zadeh (professor at UC Berkeley) wrote his original paper on fuzzy set theory. In various occasions, this is what he said Fuzzy logic is a means of presenting problems to

More information

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector Acronyms 3DES AES AH ANSI CBC CESG CFB CMAC CRT DoS DEA DES DoS DSA DSS ECB ECC ECDSA ESP FIPS IAB IETF IP IPsec ISO ITU ITU-T Triple DES Advanced Encryption Standard Authentication Header American National

More information

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017 CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Outline Random number generation Properties of random numbers Linear Congruential

More information

Advanced Inference in Fuzzy Systems by Rule Base Compression

Advanced Inference in Fuzzy Systems by Rule Base Compression Mathware & Soft Computing 14 (2007), 201-216 Advanced Inference in Fuzzy Systems by Rule Base Compression A. Gegov 1 and N. Gobalakrishnan 2 1,2 University of Portsmouth, School of Computing, Buckingham

More information

Pseudo-random number generators

Pseudo-random number generators Pseudo-random number generators -- Definition and motivation -- Classification of attacks -- Examples: DSA PRNG and Yarrow-160 (c) Levente Buttyán (buttyan@crysys.hu) Definitions a random number is a number

More information

ANALYTICAL STRUCTURES FOR FUZZY PID CONTROLLERS AND APPLICATIONS

ANALYTICAL STRUCTURES FOR FUZZY PID CONTROLLERS AND APPLICATIONS International Journal of Electrical Engineering and Technology (IJEET), ISSN 0976 6545(Print) ISSN 0976 6553(Online), Volume 1 Number 1, May - June (2010), pp. 01-17 IAEME, http://www.iaeme.com/ijeet.html

More information

ECE571: Advanced Microprocessor Design Final Project Spring Officially Due: Friday, 4 May 2018 (Last day of Classes)

ECE571: Advanced Microprocessor Design Final Project Spring Officially Due: Friday, 4 May 2018 (Last day of Classes) Overview: ECE571: Advanced Microprocessor Design Final Project Spring 2018 Officially Due: Friday, 4 May 2018 (Last day of Classes) Design a project that explores the power, energy, and/or performance

More information

Fuzzy Based Decision System for Gate Limiter of Hydro Power Plant

Fuzzy Based Decision System for Gate Limiter of Hydro Power Plant International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 5, Number 2 (2012), pp. 157-166 International Research Publication House http://www.irphouse.com Fuzzy Based Decision

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3, Issue 2, July- September (2012), pp. 157-166 IAEME: www.iaeme.com/ijcet.html Journal

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK MORE RANDOMNESS OF IMPROVED RC4 (IRC4) THAN ORIGINAL RC4 HEMANTA DEY 1, DR. UTTAM

More information

CHAPTER 5 FUZZY LOGIC CONTROL

CHAPTER 5 FUZZY LOGIC CONTROL 64 CHAPTER 5 FUZZY LOGIC CONTROL 5.1 Introduction Fuzzy logic is a soft computing tool for embedding structured human knowledge into workable algorithms. The idea of fuzzy logic was introduced by Dr. Lofti

More information

Parallel Implementation of the NIST Statistical Test Suite

Parallel Implementation of the NIST Statistical Test Suite Parallel Implementation of the NIST Statistical Test Suite Alin Suciu, Iszabela Nagy, Kinga Marton, Ioana Pinca Computer Science Department Technical University of Cluj-Napoca Cluj-Napoca, Romania Alin.Suciu@cs.utcluj.ro,

More information

FUZZY INFERENCE SYSTEM AND PREDICTION

FUZZY INFERENCE SYSTEM AND PREDICTION JOURNAL OF TRANSLOGISTICS 2015 193 Libor ŽÁK David VALIŠ FUZZY INFERENCE SYSTEM AND PREDICTION Keywords: fuzzy sets, fuzzy logic, fuzzy inference system, prediction implementation, employees ABSTRACT This

More information

NEW CLASS OF PSEUDORANDOM D-SEQUENCES TO GENERATE CRYPTOGRAPHIC KEYS B. Prashanth Reddy Oklahoma State University, Stillwater

NEW CLASS OF PSEUDORANDOM D-SEQUENCES TO GENERATE CRYPTOGRAPHIC KEYS B. Prashanth Reddy Oklahoma State University, Stillwater NEW CLASS OF PSEUDORANDOM D-SEQUENCES TO GENERATE CRYPTOGRAPHIC KEYS B. Prashanth Reddy Oklahoma State University, Stillwater Abstract This article proposes the use of pseudorandom decimal sequences that

More information

Lecture notes. Com Page 1

Lecture notes. Com Page 1 Lecture notes Com Page 1 Contents Lectures 1. Introduction to Computational Intelligence 2. Traditional computation 2.1. Sorting algorithms 2.2. Graph search algorithms 3. Supervised neural computation

More information

Fuzzy Logic Controller

Fuzzy Logic Controller Fuzzy Logic Controller Debasis Samanta IIT Kharagpur dsamanta@iitkgp.ac.in 23.01.2016 Debasis Samanta (IIT Kharagpur) Soft Computing Applications 23.01.2016 1 / 34 Applications of Fuzzy Logic Debasis Samanta

More information

Identification of Vehicle Class and Speed for Mixed Sensor Technology using Fuzzy- Neural & Genetic Algorithm : A Design Approach

Identification of Vehicle Class and Speed for Mixed Sensor Technology using Fuzzy- Neural & Genetic Algorithm : A Design Approach Identification of Vehicle Class and Speed for Mixed Sensor Technology using Fuzzy- Neural & Genetic Algorithm : A Design Approach Prashant Sharma, Research Scholar, GHRCE, Nagpur, India, Dr. Preeti Bajaj,

More information

Why Fuzzy Fuzzy Logic and Sets Fuzzy Reasoning. DKS - Module 7. Why fuzzy thinking?

Why Fuzzy Fuzzy Logic and Sets Fuzzy Reasoning. DKS - Module 7. Why fuzzy thinking? Fuzzy Systems Overview: Literature: Why Fuzzy Fuzzy Logic and Sets Fuzzy Reasoning chapter 4 DKS - Module 7 1 Why fuzzy thinking? Experts rely on common sense to solve problems Representation of vague,

More information

FUZZY INFERENCE SYSTEMS

FUZZY INFERENCE SYSTEMS CHAPTER-IV FUZZY INFERENCE SYSTEMS Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can

More information

The Travelling Salesman Problem. in Fuzzy Membership Functions 1. Abstract

The Travelling Salesman Problem. in Fuzzy Membership Functions 1. Abstract Chapter 7 The Travelling Salesman Problem in Fuzzy Membership Functions 1 Abstract In this chapter, the fuzzification of travelling salesman problem in the way of trapezoidal fuzzy membership functions

More information

Introduction 3 Fuzzy Inference. Aleksandar Rakić Contents

Introduction 3 Fuzzy Inference. Aleksandar Rakić Contents Beograd ETF Fuzzy logic Introduction 3 Fuzzy Inference Aleksandar Rakić rakic@etf.rs Contents Mamdani Fuzzy Inference Fuzzification of the input variables Rule evaluation Aggregation of rules output Defuzzification

More information

Ending the Entropy Drought

Ending the Entropy Drought White Paper: Ending the Entropy Drought February 2018 All questions and enquiries regarding this white paper should be directed to: John Lister Director of Cyber Security jlister@cognitiocorp.com February

More information

Pseudorandom Number Generation

Pseudorandom Number Generation Pseudorandom Number Generation Thanks once again to A. Joseph, D. Tygar, U. Vazirani, and D. Wagner at the University of California, Berkeley 1 What Can Go Wrong? An example: This generates a 16 byte (128

More information

CHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER

CHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER 60 CHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER 4.1 INTRODUCTION Problems in the real world quite often turn out to be complex owing to an element of uncertainty either in the parameters

More information

FUZZY INFERENCE. Siti Zaiton Mohd Hashim, PhD

FUZZY INFERENCE. Siti Zaiton Mohd Hashim, PhD FUZZY INFERENCE Siti Zaiton Mohd Hashim, PhD Fuzzy Inference Introduction Mamdani-style inference Sugeno-style inference Building a fuzzy expert system 9/29/20 2 Introduction Fuzzy inference is the process

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM

UNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM ADVISORY ICSA-10-019-01 ZIGBEE PSEUDORANDOM NUMBER GENERATOR VULNERABILITY January 19, 2010 OVERVIEW On January 09, 2010, a security researcher published an attack on a ChipCon (CC) implementation of ZigBee

More information

What is all the Fuzz about?

What is all the Fuzz about? What is all the Fuzz about? Fuzzy Systems CPSC 433 Christian Jacob Dept. of Computer Science Dept. of Biochemistry & Molecular Biology University of Calgary Fuzzy Systems in Knowledge Engineering Fuzzy

More information

Comparative Analysis of SLA-LFSR with Traditional Pseudo Random Number Generators

Comparative Analysis of SLA-LFSR with Traditional Pseudo Random Number Generators International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017), pp. 1461-1470 Research India Publications http://www.ripublication.com Comparative Analysis of SLA-LFSR

More information

FUZZY SYSTEMS: Basics using MATLAB Fuzzy Toolbox. Heikki N. Koivo

FUZZY SYSTEMS: Basics using MATLAB Fuzzy Toolbox. Heikki N. Koivo FUZZY SYSTEMS: Basics using MATLAB Fuzzy Toolbox By Heikki N. Koivo 200 2.. Fuzzy sets Membership functions Fuzzy set Universal discourse U set of elements, {u}. Fuzzy set F in universal discourse U: Membership

More information

TOOL WEAR CONDITION MONITORING IN TAPPING PROCESS BY FUZZY LOGIC

TOOL WEAR CONDITION MONITORING IN TAPPING PROCESS BY FUZZY LOGIC TOOL WEAR CONDITION MONITORING IN TAPPING PROCESS BY FUZZY LOGIC Ratchapon Masakasin, Department of Industrial Engineering, Faculty of Engineering, Kasetsart University, Bangkok 10900 E-mail: masakasin.r@gmail.com

More information

Lecture 5 Fuzzy expert systems: Fuzzy inference Mamdani fuzzy inference Sugeno fuzzy inference Case study Summary

Lecture 5 Fuzzy expert systems: Fuzzy inference Mamdani fuzzy inference Sugeno fuzzy inference Case study Summary Lecture 5 Fuzzy expert systems: Fuzzy inference Mamdani fuzzy inference Sugeno fuzzy inference Case study Summary Negnevitsky, Pearson Education, 25 Fuzzy inference The most commonly used fuzzy inference

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 ISSN 0976 6464(Print)

More information

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel.

Research Statement. Yehuda Lindell. Dept. of Computer Science Bar-Ilan University, Israel. Research Statement Yehuda Lindell Dept. of Computer Science Bar-Ilan University, Israel. lindell@cs.biu.ac.il www.cs.biu.ac.il/ lindell July 11, 2005 The main focus of my research is the theoretical foundations

More information

fuzzylite a fuzzy logic control library in C++

fuzzylite a fuzzy logic control library in C++ fuzzylite a fuzzy logic control library in C++ Juan Rada-Vilela jcrada@fuzzylite.com Abstract Fuzzy Logic Controllers (FLCs) are software components found nowadays within well-known home appliances such

More information

Deciphering Data Fusion Rule by using Adaptive Neuro-Fuzzy Inference System

Deciphering Data Fusion Rule by using Adaptive Neuro-Fuzzy Inference System Deciphering Data Fusion Rule by using Adaptive Neuro-Fuzzy Inference System Ramachandran, A. Professor, Dept. of Electronics and Instrumentation Engineering, MSRIT, Bangalore, and Research Scholar, VTU.

More information

Lecture 4: Hashes and Message Digests,

Lecture 4: Hashes and Message Digests, T-79.159 Cryptography and Data Security Lecture 4: Hashes and Message Digests Helsinki University of Technology mjos@tcs.hut.fi 1 Cryptographic hash functions Maps a message M (a bit string of arbitrary

More information

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications

Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications Recurrent Neural Network Models for improved (Pseudo) Random Number Generation in computer security applications D.A. Karras 1 and V. Zorkadis 2 1 University of Piraeus, Dept. of Business Administration,

More information

S. Sreenivasan Research Scholar, School of Advanced Sciences, VIT University, Chennai Campus, Vandalur-Kelambakkam Road, Chennai, Tamil Nadu, India

S. Sreenivasan Research Scholar, School of Advanced Sciences, VIT University, Chennai Campus, Vandalur-Kelambakkam Road, Chennai, Tamil Nadu, India International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 10, October 2018, pp. 1322 1330, Article ID: IJCIET_09_10_132 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=10

More information

Fuzzy Reasoning. Outline

Fuzzy Reasoning. Outline Fuzzy Reasoning Outline Introduction Bivalent & Multivalent Logics Fundamental fuzzy concepts Fuzzification Defuzzification Fuzzy Expert System Neuro-fuzzy System Introduction Fuzzy concept first introduced

More information

Performance Testing: A Comparative Study and Analysis of Web Service Testing Tools

Performance Testing: A Comparative Study and Analysis of Web Service Testing Tools Performance Testing: A Comparative Study and Analysis of Web Service Testing Tools Dr.V.Asha 1, Divyabindu M C 2, Asha V 3 1,2,3 Department of Master of Computer Applications, New Horizon College of Engineering,

More information

UNIVERSITY OF CALGARY. Analysis of Linux Random Number Generator in Virtualized Environment. Rashmi Kumari A THESIS

UNIVERSITY OF CALGARY. Analysis of Linux Random Number Generator in Virtualized Environment. Rashmi Kumari A THESIS UNIVERSITY OF CALGARY Analysis of Linux Random Number Generator in Virtualized Environment by Rashmi Kumari A THESIS SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS

More information

Random-Number Generation

Random-Number Generation Random-Number Generation Overview Desired properties of a good generator Linear-congruential generators Tausworthe generators Survey of random number generators Seed selection Myths about random number

More information

SOLUTION: 1. First define the temperature range, e.g. [0 0,40 0 ].

SOLUTION: 1. First define the temperature range, e.g. [0 0,40 0 ]. 2. 2. USING MATLAB Fuzzy Toolbox GUI PROBLEM 2.1. Let the room temperature T be a fuzzy variable. Characterize it with three different (fuzzy) temperatures: cold,warm, hot. SOLUTION: 1. First define the

More information

Chapter 7 Fuzzy Logic Controller

Chapter 7 Fuzzy Logic Controller Chapter 7 Fuzzy Logic Controller 7.1 Objective The objective of this section is to present the output of the system considered with a fuzzy logic controller to tune the firing angle of the SCRs present

More information

Cyber Security Applied Cryptography. Dr Chris Willcocks

Cyber Security Applied Cryptography. Dr Chris Willcocks Cyber Security Applied Cryptography Dr Chris Willcocks Introduction 1. Content in this lecture will be examinable 2. This is a single lecture on applied cryptography for computer security. there is an

More information

MODELING FOR RESIDUAL STRESS, SURFACE ROUGHNESS AND TOOL WEAR USING AN ADAPTIVE NEURO FUZZY INFERENCE SYSTEM

MODELING FOR RESIDUAL STRESS, SURFACE ROUGHNESS AND TOOL WEAR USING AN ADAPTIVE NEURO FUZZY INFERENCE SYSTEM CHAPTER-7 MODELING FOR RESIDUAL STRESS, SURFACE ROUGHNESS AND TOOL WEAR USING AN ADAPTIVE NEURO FUZZY INFERENCE SYSTEM 7.1 Introduction To improve the overall efficiency of turning, it is necessary to

More information

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor

More information

Efficient and Sustainable Self-healing Protocols for Unattended Wireless Sensor Networks

Efficient and Sustainable Self-healing Protocols for Unattended Wireless Sensor Networks Efficient and Sustainable Self-healing Protocols for Unattended Wireless Sensor Networks Juan Chen 1, Hongli Zhang 1, Binxing Fang 1,3, Xiaojiang Du 2, Haining Yu 1, Xiangzhan Yu 1 1 Research Center of

More information

An Investigation of the FreeBSD r RNG Bugfix

An Investigation of the FreeBSD r RNG Bugfix Manuscript. First posted online October 3, 2016. An Investigation of the FreeBSD r278907 RNG Bugfix Wilson Lian Hovav Shacham Stefan Savage Abstract Operating systems and applications rely on random number

More information

What is the Q in QRNG?

What is the Q in QRNG? What is the Q in QRNG? V1.2 October 2017 Table of Content 1. What is the Q in QRNG?... 3 2. What is a random number?... 3 3. Generating random numbers... 4 3.1 Types of random number generator... 4 3.2

More information

Fuzzy Expert Systems Lecture 8 (Fuzzy Systems)

Fuzzy Expert Systems Lecture 8 (Fuzzy Systems) Fuzzy Expert Systems Lecture 8 (Fuzzy Systems) Soft Computing is an emerging approach to computing which parallels the remarkable ability of the human mind to reason and learn in an environment of uncertainty

More information

CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC

CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC CHAPTER 6 SOLUTION TO NETWORK TRAFFIC PROBLEM IN MIGRATING PARALLEL CRAWLERS USING FUZZY LOGIC 6.1 Introduction The properties of the Internet that make web crawling challenging are its large amount of

More information

Simultaneous Perturbation Stochastic Approximation Algorithm Combined with Neural Network and Fuzzy Simulation

Simultaneous Perturbation Stochastic Approximation Algorithm Combined with Neural Network and Fuzzy Simulation .--- Simultaneous Perturbation Stochastic Approximation Algorithm Combined with Neural Networ and Fuzzy Simulation Abstract - - - - Keywords: Many optimization problems contain fuzzy information. Possibility

More information

Live Demo: A New Hardware- Based Approach to Secure the Internet of Things

Live Demo: A New Hardware- Based Approach to Secure the Internet of Things SESSION ID: CCS-W04 Live Demo: A New Hardware- Based Approach to Secure the Internet of Things Cesare Garlati Chief Security Strategist prpl Foundation @CesareGarlati Securing the Internet of (broken)

More information

FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS SENSOR NETWORKS

FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS SENSOR NETWORKS 3 st July 23. Vol. 53 No.3 25-23 JATIT & LLS. All rights reserved. ISSN: 992-8645 www.jatit.org E-ISSN: 87-395 FUZZY LOGIC APPROACH TO IMPROVING STABLE ELECTION PROTOCOL FOR CLUSTERED HETEROGENEOUS WIRELESS

More information

Application of a Fuzzy Inference System to Measure Maintainability of Object-Oriented Software

Application of a Fuzzy Inference System to Measure Maintainability of Object-Oriented Software Application of a Fuzzy Inference System to Measure Maintainability of Object-Oriented Software Nasib Singh Gill and Meenakshi Sharma Department of Computer Science & Applications Maharshi Dayanand University,

More information

Outlines. Fuzzy Membership Function Design Using Information Theory Measures and Genetic Algorithms. Outlines

Outlines. Fuzzy Membership Function Design Using Information Theory Measures and Genetic Algorithms. Outlines Fuzzy Membership Function Design Using Information Theory Measures and Genetic Algorithms Outlines Introduction Problem Statement Proposed Approach Results Conclusion 2 Outlines Introduction Problem Statement

More information

Figure 2-1: Membership Functions for the Set of All Numbers (N = Negative, P = Positive, L = Large, M = Medium, S = Small)

Figure 2-1: Membership Functions for the Set of All Numbers (N = Negative, P = Positive, L = Large, M = Medium, S = Small) Fuzzy Sets and Pattern Recognition Copyright 1998 R. Benjamin Knapp Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that

More information

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS CONSTRUCTION AND EVALUATION OF MESHES BASED ON SHORTEST PATH TREE VS. STEINER TREE FOR MULTICAST ROUTING IN MOBILE AD HOC NETWORKS 1 JAMES SIMS, 2 NATARAJAN MEGHANATHAN 1 Undergrad Student, Department

More information

CS 241 Honors Nothing is Ever Random

CS 241 Honors Nothing is Ever Random CS 241 Honors Nothing is Ever Random Kevin Hong University of Illinois Urbana-Champaign Feburary 13, 2018 Kevin Hong (UIUC) Randomness and Entropy Feburary 13, 2018 1 / 11 Kevin Hong (UIUC) Randomness

More information

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL))

Crypto-systems all around us ATM machines Remote logins using SSH Web browsers (https invokes Secure Socket Layer (SSL)) Introduction (Mihir Bellare Text/Notes: http://cseweb.ucsd.edu/users/mihir/cse207/) Cryptography provides: Data Privacy Data Integrity and Authenticity Crypto-systems all around us ATM machines Remote

More information

A Comparison of Data Encryption Algorithms with the Proposed Algorithm: Wireless Security

A Comparison of Data Encryption Algorithms with the Proposed Algorithm: Wireless Security A Comparison of Data Encryption Algorithms with the Proposed Algorithm: Wireless Security Shadi R. Masadeh, Shadi Aljawarneh, Nedal Turab Faculty of Information Technology Isra University P.O. Box 22,

More information

MTAT Applied Cryptography

MTAT Applied Cryptography MTAT.07.017 Applied Cryptography Introduction, Randomness, One-Time Pad, Stream Ciphers University of Tartu Spring 2014 1 / 31 Who am I Arnis Paršovs MSc in Cyber Security Tallinn University of Technology,

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2

More information

PLC IMPLEMENTATION OF A FUZZY SYSTEM

PLC IMPLEMENTATION OF A FUZZY SYSTEM The 6 th edition of the Interdisciplinarity in Engineering International Conference Petru Maior University of Tîrgu Mureş, Romania, 202 PLC IMPLEMENTATION OF A FUZZY SYSTEM Adrian-Vasile DUKA # # Department

More information

Kernel level AES Acceleration using GPUs

Kernel level AES Acceleration using GPUs Kernel level AES Acceleration using GPUs TABLE OF CONTENTS 1 PROBLEM DEFINITION 1 2 MOTIVATIONS.................................................1 3 OBJECTIVE.....................................................2

More information

Network Security. Random Number Generation. Chapter 6. Network Security (WS 2003): 06 Random Number Generation 1 Dr.-Ing G.

Network Security. Random Number Generation. Chapter 6. Network Security (WS 2003): 06 Random Number Generation 1 Dr.-Ing G. Network Security Chapter 6 Random Number Generation Network Security (WS 2003): 06 Random Number Generation 1 Tasks of Key Management (1) Generation: It is crucial to security, that keys are generated

More information

Fuzzy time series forecasting of wheat production

Fuzzy time series forecasting of wheat production Fuzzy time series forecasting of wheat production Narendra kumar Sr. lecturer: Computer Science, Galgotia college of engineering & Technology Sachin Ahuja Lecturer : IT Dept. Krishna Institute of Engineering

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 3, March-2016 1060 An Efficient Energy Aware ZRP-Fuzzy Clustering Protocol for WSN Osama A. Awad, Mariam Rushdi Abstract- Clustering

More information

SP Reviewing The Standard. Stephan Müller atsec information security GmbH

SP Reviewing The Standard. Stephan Müller atsec information security GmbH SP800-90 Reviewing The Standard Stephan Müller atsec information security GmbH Email: smueller@atsec.com 13 ICMC 2013, September 24-26, Gaithersburg, MD 13 Agenda Practical aspects of implementing SP800-90A

More information

Extended Diffie-Hellman Technique to Generate Multiple Shared Keys at a Time with Reduced KEOs and its Polynomial Time Complexity

Extended Diffie-Hellman Technique to Generate Multiple Shared Keys at a Time with Reduced KEOs and its Polynomial Time Complexity ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 Extended Diffie-Hellman Technique to Generate Multiple Shared Keys at a Time with Reduced KEOs and its Polynomial Time Complexity 26 Nistala V.E.S. Murthy

More information

Fuzzy-Genetic Approach to Optimize Machining Process Parameters of AWJM

Fuzzy-Genetic Approach to Optimize Machining Process Parameters of AWJM A Project Presentation on Fuzzy-Genetic Approach to Optimize Machining Process Parameters of AWJM By Mahesh Todkar M.Tech. II (ME093119) Guide Dr. N. Venkaiah Contents Introduction to AWJM Literature Review

More information

Using Fuzzy Logic to Improve Cache Replacement Decisions

Using Fuzzy Logic to Improve Cache Replacement Decisions 182 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.3A, March 26 Using Fuzzy Logic to Improve Cache Replacement Decisions Mojtaba Sabeghi1, and Mohammad Hossein Yaghmaee2,

More information

COSC 6397 Big Data Analytics. Fuzzy Clustering. Some slides based on a lecture by Prof. Shishir Shah. Edgar Gabriel Spring 2015.

COSC 6397 Big Data Analytics. Fuzzy Clustering. Some slides based on a lecture by Prof. Shishir Shah. Edgar Gabriel Spring 2015. COSC 6397 Big Data Analytics Fuzzy Clustering Some slides based on a lecture by Prof. Shishir Shah Edgar Gabriel Spring 215 Clustering Clustering is a technique for finding similarity groups in data, called

More information

Fuzzy rule-based decision making model for classification of aquaculture farms

Fuzzy rule-based decision making model for classification of aquaculture farms Chapter 6 Fuzzy rule-based decision making model for classification of aquaculture farms This chapter presents the fundamentals of fuzzy logic, and development, implementation and validation of a fuzzy

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

Using the IEEE Frame Check Sequence as a Pseudo Random Number for Packet Sampling in Wireless Networks

Using the IEEE Frame Check Sequence as a Pseudo Random Number for Packet Sampling in Wireless Networks Using the IEEE 802.11 Frame Check Sequence as a Pseudo Random Number for Packet Sampling in Wireless Networks Scott Raynel WAND Network Research Group University of Waikato New Zealand Email: smr26@cs.waikato.ac.nz

More information

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee 1 and Tae Ho Cho 2 1, 2 College of Information and Communication Engineering,

More information

Dinner for Two, Reprise

Dinner for Two, Reprise Fuzzy Logic Toolbox Dinner for Two, Reprise In this section we provide the same two-input, one-output, three-rule tipping problem that you saw in the introduction, only in more detail. The basic structure

More information

In the Name of God. Lecture 17: ANFIS Adaptive Network-Based Fuzzy Inference System

In the Name of God. Lecture 17: ANFIS Adaptive Network-Based Fuzzy Inference System In the Name of God Lecture 17: ANFIS Adaptive Network-Based Fuzzy Inference System Outline ANFIS Architecture Hybrid Learning Algorithm Learning Methods that Cross-Fertilize ANFIS and RBFN ANFIS as a universal

More information