Login / Signup

An application of fuzzy algorithms in a computer access security system.

Bassam HussienRobert McLarenSaleh Bleha
Published in: Pattern Recognit. Lett. (1989)
Keyphrases
  • access control
  • data structure
  • computational cost
  • fuzzy logic
  • neural network
  • orders of magnitude
  • significant improvement
  • computer systems
  • machine learning algorithms
  • fuzzy clustering