Friday, November 10, 2006

“Slimmer” Security Mobile Agent for user authentication in an 802.11 WLAN network environment.

IEEE Proceedings of the 2003 International Conference on Informatics, Cybernetcs and Systems. December 14-16, 2003. I-Shou University, Kaohsiung, Taiwan. ROC


Abstract
The each time increasing “Parking lot” attacks to 802.11 WLAN based wireless networks, are evidence of the security backbones vulnerability. On the other hand, 802.15 Bluetooth networks have more security engineering support because they have been better sponsored. This is the reason why Bluetooth is a wireless transmission standard more reliable than 802.11 WLAN. Despite the fact that the strength of WLAN (802.11) cannot be compared with that of PAN (802.15 Bluetooth) networks, for they were created for different purposes, in both cases security is an important factor and it is on this that I will prove my ability to find an optimum solution. This document proposes an algorithm to guide network security engineers to make an optimum implementation of a security mobile agent for authentication of 802.11 wireless
networks called “Slimmer”.

Keywords: Mobile Agents, WLAN, Mobile
Computing, 802.11, Security

Download PDF

Tuesday, February 21, 2006

Neurofuzzy Face Recognition

Now the deal is to make a classifier that implements Fuzzy Logic, FL, and Artificial Neural Networks, ANN.
First, I'll be performing a state of the art of the best classifier for Face Recognition, FR
Second, I'll be performing a state of the art of the most widely used classifier for FR
Third, I'll be developing a FL classifier for FR
Fourth, I'll be developing an ANN classifier for FR
Fifth, I'll be developing a Neurofuzzy (FL-ANN) classifier for FR

Sounds very hard. Actually I'm reviewing more than 80 papers on this regarding.
Results will be expected soon.

Review of all Face Recognition Methods

Gabor-KLT for Face Recognition

These are the gabor filters used

These are the results for Gabor-KLT

DDWT-KLT for Face Recognition

This is the Daubechies Discrete Wavelete Transform - Karhunen-Loeve Transform method for face recognition.
This is the result of apply a DDWT to a face image


These are the scaling functions and the horizontal, vertical, and diagonal detail functions.



These are the results obtained

Hough-KLT Face Recognition

This is the Hough-KLT method. And its results.