Biblio

Found 104 results

Filters: Keyword is Fuzzy logic  [Clear All Filters]
2023-07-28
Dubchak, Lesia, Vasylkiv, Nadiia, Turchenko, Iryna, Komar, Myroslav, Nadvynychna, Tetiana, Volner, Rudolf.  2022.  Access Distribution to the Evaluation System Based on Fuzzy Logic. 2022 12th International Conference on Advanced Computer Information Technologies (ACIT). :564—567.
In order to control users’ access to the information system, it is necessary to develop a security system that can work in real time and easily reconfigure. This problem can be solved using a fuzzy logic. In this paper the authors propose a fuzzy distribution system for access to the student assessment system, which takes into account the level of user access, identifier and the risk of attack during the request. This approach allows process fuzzy or incomplete information about the user and implement a sufficient level of confidential information protection.
2023-01-05
Kayouh, Nabil, Dkhissi, Btissam.  2022.  A decision support system for evaluating the logistical risks in Supply chains based on RPN factors and multi criteria decision making approach. 2022 14th International Colloquium of Logistics and Supply Chain Management (LOGISTIQUA). :1—6.
Logistics risk assessment in the supply chain is considered as one of the important topics that has attracted the attention of researchers in recent years; Companies that struggle to manage their logistical risks by not putting in place resilient strategies to mitigate them, may suffer from significant financial losses; The automotive industry is a vital sector for the Moroccan economy, the year 2020, the added-value of the automotive industry in Morocco is higher than that of the fertilizer (Fathi, n.d.) [1], This sector is considered the first exporter of the country. Our study will focuses on the assessment of the pure logistical risks in the moroccan automotive industry. Our main objective for this study is to assess the logistical risks which will allow us to put in place proactive and predictive resilient strategies for their mitigation.
2023-07-28
Abu-Khadrah, Ahmed.  2022.  An Efficient Fuzzy Logic Modelling of TiN Coating Thickness. 2022 International Conference on Business Analytics for Technology and Security (ICBATS). :1—5.
In this paper, fuzzy logic was implemented as a proposed approach for modelling of Thickness as an output response of thin film layer in Titanium Nitrite (TiN). The layer was deposited using Physical Vapor Deposition (PVD) process that uses a sputtering technique to coat insert cutting tools with TiN. Central cubic design (CCD) was used for designing the optimal points of the experiment. In order to develop the fuzzy rules, the experimental data that collected by PVD was used. Triangular membership functions (Trimf) were used to develop the fuzzy prediction model. Residual error (e) and prediction accuracy (A) were used for validating the result of the proposed fuzzy model. The result of the developed fuzzy model with triangular membership function revealed that the average residual error of 0.2 is low and acceptable. Furthermore, the model obtained high prediction accuracy with 90.04%. The result revealed that the rule-based model of fuzzy logic could be an efficient approach to predict coatings layer thickness in the TiN.
Rajderkar, Vedashree.P., Chandrakar, Vinod K.  2022.  Enhancement of Power System Security by Fuzzy based Unified Power Flow Controller. 2022 2nd International Conference on Intelligent Technologies (CONIT). :1—4.
The paper presents the design of fuzzy logic controller based unified power flow controller (UPFC) to improve power system security performance during steady state as well as fault conditions. Fuzzy interference has been design with two inputs Vref and Vm for the shunt voltage source Converter and two inputs for Series Id, Idref, Iq, Iqref at the series voltage source converter location. The coordination of shunt and series VSC has been achieved by using fuzzy logic controller (FLC). The comparative performance of PI based UPFC and fuzzy based UPFC under abnormal condition has been validated in MATLB domain. The combination of fuzzy with a UPFC is tested on multi machine system in MATLAB domain. The results shows that the power system security enhancement as well as oscillations damping.
2022-12-09
M, Gayathri, Gomathy, C..  2022.  Fuzzy based Trusted Communication in Vehicular Ad hoc Network. 2022 2nd International Conference on Intelligent Technologies (CONIT). :1—4.
Vehicular Ad hoc Network (VANET) is an emerging technology that is used to provide communication between vehicle users. VANET provides communication between one vehicle node to another vehicle node, vehicle to the roadside unit, vehicle to pedestrian, and even vehicle to rail users. Communication between nodes should be very secure and confidential, Since VANET communicates through wireless mode, a malicious node may enter inside the communication zone to hack, inject false messages, and interrupt the communication. A strong protocol is necessary to detect malicious nodes and authenticate the VANET user to protect them from malicious attacks. In this paper, a fuzzy-based trust authentication scheme is used to detect malicious nodes with the Mamdani fuzzy Inference system. The parameter estimation, rules have been framed using MATLAB Mamdani Fuzzy Inference system to select a genuine node for data transmission.
2023-07-31
Abdaoui, Abderrazak, Erbad, Aiman, Al-Ali, Abdulla Khalid, Mohamed, Amr, Guizani, Mohsen.  2022.  Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things. IEEE Internet of Things Journal. 9:9987—9998.
The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are more dependent on smart systems. Considering that packets are exchanged between the end user and the sensing devices, it is then important to ensure the security, privacy, and integrity of the transmitted data by designing a secure and a lightweight authentication protocol for IoT systems. In this article, in order to improve the authentication and the encryption in IoT systems, we present a novel method of authentication and encryption based on elliptic curve cryptography (ECC) using random numbers generated by fuzzy logic. We evaluate our novel key generation method by using standard randomness tests, such as: frequency test, frequency test with mono block, run test, discrete Fourier transform (DFT) test, and advanced DFT test. Our results show superior performance compared to existing ECC based on shift registers. In addition, we apply some attack algorithms, such as Pollard’s \textbackslashrho and Baby-step Giant-step, to evaluate the vulnerability of the proposed scheme.
2023-07-28
Bhande, Sapana A, Chandrakar, V. K..  2022.  Fuzzy Logic based Static Synchronous Series Compensator (SSSC) to enhance Power System Security. 2022 IEEE IAS Global Conference on Emerging Technologies (GlobConET). :667—672.
In today's power market, it's vital to keep electrical energy affordable to the vast majority of people while maintaining the highest degree of dependability. Due to which, the transmission network must operate beyond transfer limitations, generating congestion on transmission lines. These transmission line difficulties can be alleviated with the use of reactive power adjustment based on FACTS devices. Using a fuzzy tuned Static Synchronous Series Compensator [SSSC], this research proposes a novel method for calculating the effective damping oscillation control signals. The performance of the SSSC is compared to that of fuzzy logic-based controllers using PI controllers. According to the simulation results, the SSSC with fuzzy logic control effectively improves power flow under disrupted conditions
Reddy, V. Nagi, Gayathri, T., Nyamathulla, S K, Shaik, Nazma Sultana.  2022.  Fuzzy Logic Based WSN with High Packet Success Rate and Security. 2022 IEEE International Conference on Current Development in Engineering and Technology (CCET). :1—5.
Considering the evidence that conditions accept a considerable place in each of the structures, owing to limited assets available at each sensor center, it is a difficult problem. Vitality safety is the primary concern in many of the implementations in remote sensor hubs. This is critical as the improvement in the lifetime of the device depends primarily on restricting the usage of vitality in sensor hubs. The rationing and modification of the usage of vitality are of the most serious value in this context. In a remote sensor arrangement, the fundamental test is to schedule measurements for the least use of vitality. These classification frameworks are used to frame the classes in the structure and help efficiently use the strength that burdens out the lifespan of the network. Besides, the degree of the center was taken into account in this work considering the measurement of cluster span as an improvement to the existing methods. The crucial piece of leeway of this suggested approach on affair clustering using fuzzy logic is which can increase the lifespan of the system by reducing the problem area problem word.
Khunchai, Seree, Kruekaew, Adool, Getvongsa, Natthapong.  2022.  A Fuzzy Logic-Based System of Abnormal Behavior Detection Using PoseNet for Smart Security System. 2022 37th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC). :912—915.
This paper aims to contribute towards creating ambient abnormal behavior detection for smart security system from real-time human pose estimation using fuzzy-based systems. Human poses from keypoint detected by pose estimation model are transformed to as angle positions of the axis between human bodies joints comparing to reference point in the axis x to deal with problem of the position change occurred when an individual move in the image. Also, the article attempts to resolve the problem of the ambiguity interpreting the poses with triangular fuzzy logic-based system that determines the detected individual behavior and compares to the poses previously learnt, trained, and recorded by the system. The experiment reveals that the accuracy of the system ranges between 90.75% (maximum) and 84% (minimum). This means that if the accuracy of the system at 85%. The system can be applied to guide future research for designing automatic visual human behavior detection systems.
2023-07-21
Benfriha, Sihem, Labraoui, Nabila.  2022.  Insiders Detection in the Uncertain IoD using Fuzzy Logic. 2022 International Arab Conference on Information Technology (ACIT). :1—6.
Unmanned aerial vehicles (UAVs) and various network entities deployed on the ground can communicate with each other over the Internet of Drones (IoD), a network architecture designed expressly to allow communications between heterogenous entities. Drone technology has a wide range of uses, including on-demand package delivery, traffic and wild life surveillance, inspection of infrastructure and search, rescue and agriculture. However, IoD systems are vulnerable to numerous attacks, The main goal is to develop an all-encompassing security model that can be used to analyze security concerns in various UAV-based systems. With exceptional flexibility and increasing efficiency, trust management is a promising alternative to traditional detection methods. In a heterogeneous environment, it is also compatible with other security mechanisms. In this article, we present a fuzzy logic as an Insider Detection technique which calculate sensor data trust and assessing node behavior. To build confidence throughout the entire IoD, our proposal divides trust into two parts: Data trust and Node trust. This is in contrast to earlier models. Experimental results show that our solution is effective in terms of False positive ratio and Average of end-to-end delay.
2023-05-12
Wang, Pengbiao, Ren, Xuemei, Wang, Dengyun.  2022.  Nonlinear cyber-physical system security control under false data injection attack. 2022 41st Chinese Control Conference (CCC). :4311–4316.
We investigate the fuzzy adaptive compensation control problem for nonlinear cyber-physical system with false data injection attack over digital communication links. The fuzzy logic system is first introduced to approximate uncertain nonlinear functions. And the time-varying sliding mode surface is designed. Secondly, for the actual require-ment of data transmission, three uniform quantizers are designed to quantify system state and sliding mode surface and control input signal, respectively. Then, the adaptive fuzzy laws are designed, which can effectively compensate for FDI attack and the quantization errors. Furthermore, the system stability and the reachability of sliding surface are strictly guaranteed by using adaptive fuzzy laws. Finally, we use an example to verify the effectiveness of the method.
ISSN: 1934-1768
2023-07-28
Hasan, Darwito, Haryadi Amran, Sudarsono, Amang.  2022.  Environmental Condition Monitoring and Decision Making System Using Fuzzy Logic Method. 2022 International Electronics Symposium (IES). :267—271.

Currently, air pollution is still a problem that requires special attention, especially in big cities. Air pollution can come from motor vehicle fumes, factory smoke or other particles. To overcome these problems, a system is made that can monitor environmental conditions in order to know the good and bad of air quality in an environment and is expected to be a solution to reduce air pollution that occurs. The system created will utilize the Wireless Sensor Network (WSN) combined with Waspmote Smart Environment PRO, so that later data will be obtained in the form of temperature, humidity, CO levels and CO2 levels. From the sensor data that has been processed on Waspmote, it will then be used as input for data processing using a fuzzy algorithm. The classification obtained from sensor data processing using fuzzy to monitor environmental conditions there are 5 classifications, namely Very Good, Good, Average, Bad and Dangerous. Later the data that has been collected will be distributed to Meshlium as a gateway and will be stored in the database. The process of sending information between one party to another needs to pay attention to the confidentiality of data and information. The final result of the implementation of this research is that the system is able to classify values using fuzzy algorithms and is able to secure text data that will be sent to the database via Meshlium, and is able to display data sent to the website in real time.

2023-07-21
Muhammad Nabi, Masooma, Shah, Munam Ali.  2022.  A Fuzzy Approach to Trust Management in Fog Computing. 2022 24th International Multitopic Conference (INMIC). :1—6.

The Internet of Things (IoT) technology has revolutionized the world where anything is smartly connected and is accessible. The IoT makes use of cloud computing for processing and storing huge amounts of data. In some way, the concept of fog computing has emerged between cloud and IoT devices to address the issue of latency. When a fog node exchanges data for completing a particular task, there are many security and privacy risks. For example, offloading data to a rogue fog node might result in an illegal gathering or modification of users' private data. In this paper, we rely on trust to detect and detach bad fog nodes. We use a Mamdani fuzzy method and we consider a hospital scenario with many fog servers. The aim is to identify the malicious fog node. Metrics such as latency and distance are used in evaluating the trustworthiness of each fog server. The main contribution of this study is identifying how fuzzy logic configuration could alter the trust value of fog nodes. The experimental results show that our method detects the bad fog device and establishes its trustworthiness in the given scenario.

2023-07-28
De La Croix, Ntivuguruzwa Jean, Islamy, Chaidir Chalaf, Ahmad, Tohari.  2022.  Secret Message Protection using Fuzzy Logic and Difference Expansion in Digital Images. 2022 IEEE Nigeria 4th International Conference on Disruptive Technologies for Sustainable Development (NIGERCON). :1—5.

Secrete message protection has become a focal point of the network security domain due to the problems of violating the network use policies and unauthorized access of the public network. These problems have led to data protection techniques such as cryptography, and steganography. Cryptography consists of encrypting secrete message to a ciphertext format and steganography consists of concealing the secrete message in codes that make up a digital file, such as an image, audio, and video. Steganography, which is different from cryptography, ensures hiding a secret message for secure transmission over the public network. This paper presents a steganographic approach using digital images for data hiding that aims to providing higher performance by combining fuzzy logic type I to pre-process the cover image and difference expansion techniques. The previous methods have used the original cover image to embed the secrete message. This paper provides a new method that first identifies the edges of a cover image and then proceeds with a difference expansion to embed the secrete message. The experimental results of this work identified an improvement of 10% of the existing method based on increased payload capacity and the visibility of the stego image.

Ksibi, Sondes, JAIDI, Faouzi, BOUHOULA, Adel.  2022.  A User-Centric Fuzzy AHP-based Method for Medical Devices Security Assessment. 2022 15th International Conference on Security of Information and Networks (SIN). :01—07.

One of the most challenging issues facing Internet of Medical Things (IoMT) cyber defense is the complexity of their ecosystem coupled with the development of cyber-attacks. Medical equipments lack built-in security and are increasingly becoming connected. Moving beyond traditional security solutions becomes a necessity to protect patients and organizations. In order to effectively deal with the security risks of networked medical devices in such a complex and heterogeneous system, we need to measure security risks and prioritize mitigation actions. In this context, we propose a Fuzzy AHP-based method to assess security attributes of connected medical devices and compare different device models against a selected profile with regards to the user requirements. The proposal aims to empower user security awareness to make well-educated decisions.

2023-09-20
Dhalaria, Meghna, Gandotra, Ekta.  2022.  Android Malware Risk Evaluation Using Fuzzy Logic. 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC). :341—345.
The static and dynamic malware analysis are used by industrialists and academics to understand malware capabilities and threat level. The antimalware industries calculate malware threat levels using different techniques which involve human involvement and a large number of resources and analysts. As malware complexity, velocity and volume increase, it becomes impossible to allocate so many resources. Due to this reason, it is projected that the number of malware apps will continue to rise, and that more devices will be targeted in order to commit various sorts of cybercrime. It is therefore necessary to develop techniques that can calculate the damage or threat posed by malware automatically as soon as it is identified. In this way, early warnings about zero-day (unknown) malware can assist in allocating resources for carrying out a close analysis of it as soon as it is identified. In this paper, a fuzzy modelling approach is described for calculating the potential risk of malicious programs through static malware analysis.
2023-07-31
Islamy, Chaidir Chalaf, Ahmad, Tohari, Ijtihadie, Royyana Muslim.  2022.  Secret Image Sharing and Steganography based on Fuzzy Logic and Prediction Error. 2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT). :137—142.
Transmitting data through the internet may have severe security risks due to illegal access done by attackers. Some methods have been introduced to overcome this issue, such as cryptography and steganography. Nevertheless, some problems still arise, such as the quality of the stego data. Specifically, it happens if the stego is shared with some users. In this research, a shared-secret mechanism is combined with steganography. For this purpose, the fuzzy logic edge detection and Prediction Error (PE) methods are utilized to hide private data. The secret sharing process is carried out after data embedding in the cover image. This sharing mechanism is performed on image pixels that have been converted to PE values. Various Peak Signal to Noise Ratio (PSNR) values are obtained from the experiment. It is found that the number of participants and the threshold do not significantly affect the image quality of the shares.
2022-09-16
Mukeshimana, C., Kupriyanov, M. S..  2021.  Adaptive Neuro-fuzzy System (ANFIS) of Information Interaction in Industrial Internet of Things Networks Taking into Account Load Balancing. 2021 II International Conference on Neural Networks and Neurotechnologies (NeuroNT). :43—46.
The main aim of the Internet of things is to improve the safety of the device through inter-Device communication (IDC). Various applications are emerging in Internet of things. Various aspects of Internet of things differ from Internet of things, especially the nodes have more velocity which causes the topology to change rapidly. The requirement of researches in the concept of Internet of things increases rapidly because Internet of things face many challenges on the security, protocols and technology. Despite the fact that the problem of organizing the interaction of IIoT devices has already attracted a lot of attention from many researchers, current research on routing in IIoT cannot effectively solve the problem of data exchange in a self-adaptive and self-organized way, because the number of connected devices is quite large. In this article, an adaptive neuro-fuzzy clustering algorithm is presented for the uniform distribution of load between interacting nodes. We synthesized fuzzy logic and neural network to balance the choice of the optimal number of cluster heads and uniform load distribution between sensors. Comparison is made with other load balancing methods in such wireless sensor networks.
Kozlov, Aleksandr, Noga, Nikolai.  2021.  Applying the Methods of Regression Analysis and Fuzzy Logic for Assessing the Information Security Risk of Complex Systems. 2021 14th International Conference Management of large-scale system development (MLSD). :1—5.
The proposed method allows us to determine the predicted value of the complex systems information security risk and its confidence interval using regression analysis and fuzzy logic in terms of the risk dependence on various factors: the value of resources, the level of threats, potential damage, the level of costs for creating and operating the system, the information resources control level.
Simankov, Vladimir S., Buchatskiy, Pavel Yu., Shopin, Andrey V., Teploukhov, Semen V., Buchatskaya, Victoria V..  2021.  An Approach to Identifying the Type of Uncertainty of Initial Information Based on the Theory of Fuzzy Logic. 2021 XXIV International Conference on Soft Computing and Measurements (SCM). :150—153.
The article discusses an approach to identifying the uncertainty of initial information based on the theory of fuzzy logic. A system of criteria for initial information is proposed, calculated on the basis of the input sample, and characterizing the measure of uncertainty present in the system. The basic requirements for the choice of membership functions of the fuzzy inference system are indicated and the final integrated output membership function is obtained, which describes the type of uncertainty of the initial information.
2021-12-21
Mishra, Srinivas, Pradhan, Sateesh Kumar, Rath, Subhendu Kumar.  2021.  Detection of Zero-Day Attacks in Network IDS through High Performance Soft Computing. 2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS). :1199–1204.
The ever-evolving computers has its implications on the data and information and the threats that they are exposed to. With the exponential growth of internet, the chances of data breach are highly likely as unauthorized and ill minded users find new ways to get access to the data that they can use for their plans. Most of the systems today have well designed measures that examine the information for any abnormal behavior (Zero Day Attacks) compared to what has been seen and experienced over the years. These checks are done based on a predefined identity (signature) of information. This is being termed as Intrusion Detection Systems (IDS). The concept of IDS revolves around validation of data and/or information and detecting unauthorized access attempts with an intention of manipulating data. High Performance Soft Computing (HPSC) aims to internalize cumulative adoption of traditional and modern attempts to breach data security and expose it to high scale damage and altercations. Our effort in this paper is to emphasize on the multifaceted tactic and rationalize important functionalities of IDS available at the disposal of HPSC.
2022-09-16
Bolshakov, Alexander, Zhila, Anastasia.  2021.  Fuzzy Logic Data Protection Management. 2021 28th Conference of Open Innovations Association (FRUCT). :35—40.
This article discusses the problem of information security management in computer systems and describes the process of developing an algorithm that allows to determine measures to protect personal data. The organizational and technical measures formulated by the FSTEC are used as measures.
2022-03-23
Islam, Al Amin, Taher, Kazi Abu.  2021.  A Novel Authentication Mechanism for Securing Underwater Wireless Sensors from Sybil Attack. 2021 5th International Conference on Electrical Engineering and Information Communication Technology (ICEEICT). :1—6.
Underwater Wireless Sensor Networks (UWSN) has vast application areas. Due to the unprotected nature, underwater security is a prime concern. UWSN becomes vulnerable to different attacks due to malicious nodes. Sybil attack is one of the major attacks in UWSN. Most of the proposed security methods are based on encryption and decryption which consumes resources of the sensor nodes. In this paper, a simple authentication mechanism is proposed for securing the UWSN from the Sybil attack. As the nodes have very less computation power and energy resources so this work is not followed any kind of encryption and decryption technique. An authentication process is designed in such a way that node engaged in communication authenticate neighboring nodes by node ID and the data stored in the cluster head. This work is also addressed sensor node compromisation issue through Hierarchical Fuzzy System (HFS) based trust management model. The trust management model has been simulated in Xfuzzy-3.5. After the simulation conducted, the proposed trust management mechanism depicts significant performance on detecting compromised nodes.
2022-09-09
Mostafa, Abdelrahman Ibrahim, Rashed, Abdelrahman Mostafa, Alsherif, Yasmin Ashraf, Enien, Yomna Nagah, Kaoud, Menatalla, Mohib, Ahmed.  2021.  Supply Chain Risk Assessment Using Fuzzy Logic. 2021 3rd Novel Intelligent and Leading Emerging Sciences Conference (NILES). :246—251.
Business's strength arises from the strength of its supply chain. Therefore, a proper supply chain management is vital for business continuity. One of the most challenging parts of SCM is the contract negotiation, and one main aspect of the negotiation is to know the risk associated with each range of quantity agreed on. Currently Managers assess the quantity to be supplied based on a binary way of either full or 0 supply, This paper aims to assess the corresponding quantities risks of the suppliers on a multilayer basis. The proposed approach uses fuzzy logic as an artificial intelligence tool that would develop the verbal terms of managers into numbers to be dealt with. A company that produces fresh frozen vegetables and fruits in Egypt who faces the problem of getting the required quantities from the suppliers with a fulfilment rate of 33% was chosen to apply the proposed model. The model allowed the managers to have full view of risk in their supply chain effectively and decide their needed capacity as well as the negotiation terms with both suppliers and customers. Future work should be the use of more data in the fuzzy database and implement the proposed methodology in an another industry.
2021-12-20
Hasan, Md. Mahmudul, Jahan, Mosarrat, Kabir, Shaily, Wagner, Christian.  2021.  A Fuzzy Logic-Based Trust Estimation in Edge-Enabled Vehicular Ad Hoc Networks. 2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE). :1–8.

Trust estimation of vehicles is vital for the correct functioning of Vehicular Ad Hoc Networks (VANETs) as it enhances their security by identifying reliable vehicles. However, accurate trust estimation still remains distant as existing works do not consider all malicious features of vehicles, such as dropping or delaying packets, altering content, and injecting false information. Moreover, data consistency of messages is not guaranteed here as they pass through multiple paths and can easily be altered by malicious relay vehicles. This leads to difficulty in measuring the effect of content tampering in trust calculation. Further, unreliable wireless communication of VANETs and unpredictable vehicle behavior may introduce uncertainty in the trust estimation and hence its accuracy. In this view, we put forward three trust factors - captured by fuzzy sets to adequately model malicious properties of a vehicle and apply a fuzzy logic-based algorithm to estimate its trust. We also introduce a parameter to evaluate the impact of content modification in trust calculation. Experimental results reveal that the proposed scheme detects malicious vehicles with high precision and recall and makes decisions with higher accuracy compared to the state-of-the-art.