Login / Signup
An application of fuzzy algorithms in a computer access security system.
Bassam Hussien
Robert McLaren
Saleh Bleha
Published in:
Pattern Recognit. Lett. (1989)
Keyphrases
</>
access control
data structure
computational cost
fuzzy logic
neural network
orders of magnitude
significant improvement
computer systems
machine learning algorithms
fuzzy clustering