The aim of the study is to increase the effectiveness of automated face recognition to authenticate identity, considering features of change of the face parameters over time. The improvement of the recognition accuracy, as well as consideration of the features of temporal changes in a human face can be based on the methodology of artificial neural networks. Hybrid neural networks, combining the advantages of classical neural networks and fuzzy logic systems, allow using the network learnability along with the explanation of the findings. The structural scheme of intelligent system for identification based on artificial neural networks is proposed in this work. It realizes the principles of digital information processing and identity recognition taking into account the forecast of key characteristics' changes over time (e.g., due to aging). The structural scheme has a three-tier architecture and implements preliminary processing, recognition and identification of images obtained as a result of monitoring. On the basis of expert knowledge, the fuzzy base of products is designed. It allows assessing possible changes in key characteristics, used to authenticate identity based on the image. To take this possibility into consideration, a neuro-fuzzy network of ANFIS type was used, which implements the algorithm of Tagaki-Sugeno. The conducted experiments showed high efficiency of the developed neural network and a low value of learning errors, which allows recommending this approach for practical implementation. Application of the developed system of fuzzy production rules that allow predicting changes in individuals over time, will improve the recognition accuracy, reduce the number of authentication failures and improve the efficiency of information processing and decision-making in applications, such as authentication of bank customers, users of mobile applications, or in video monitoring systems of sensitive sites.
Б а с р е д а к т о р ы х. ғ. д., проф., ҚР ҰҒА академигі М. Ж. Жұрынов Р е д а к ц и я а л қ а с ы:Ресей) Абишев М.Е. проф., корр.-мүшесі (Қазақстан) Аврамов К.В. проф. (Украина) Аппель Юрген проф. (Германия) Баймуқанов Д.А. проф., корр.-мүшесі (Қазақстан) Байтулин И.О. проф., академик (Қазақстан) Банас Иозеф проф. (Польша) Берсимбаев Р.И. проф., академик (Қазақстан) Велесько С. проф. (Германия) Велихов Е.П. проф., РҒА академигі (Ресей) Гашимзаде Ф. проф., академик (Әзірбайжан) Гончарук В.В. проф., академик (Украина) Давлетов А.Е. проф., корр.-мүшесі (Қазақстан) Джрбашян Р.Т. проф., академик (Армения) Қалимолдаев М.Н. проф., академик (Қазақстан), бас ред. орынбасары Лаверов Н.П. проф., академик РАН (Россия) Лупашку Ф. проф., корр.-мүшесі (Молдова) Мохд Хасан Селамат проф. (Малайзия) Мырхалықов Ж.У. проф., академик (Қазақстан) Новак Изабелла проф. (Польша) Огарь Н.П. проф., корр.-мүшесі (Қазақстан) Полещук О.Х. проф. (Ресей) Поняев А.И. проф. (Ресей) Сагиян А.С. проф., академик (Армения) Сатубалдин С.С. проф., академик (Қазақстан) Таткеева Г.Г. проф., корр.-мүшесі (Қазақстан) Умбетаев И. проф., академик (Қазақстан) Хрипунов Г.С. проф. (Украина) Юлдашбаев Ю.А. проф., РҒА корр-мүшесі (Ресей) Якубова М.М. проф., академик (Тәжікстан) «Қазақстан Республикасы Ұлттық ғылым академиясының Хабаршысы».
The article herein presents the method and algorithms for forming the feature space for the base of intellectualized system knowledge for the support system in the cyber threats and anomalies tasks. The system being elaborated might be used both autonomously by cyber threat services analysts and jointly with information protection complex systems. It is shown, that advised algorithms allow supplementing dynamically the knowledge base upon appearing the new threats, which permits to cut the time of their recognition and analysis, in particular, for cases of hard-to-explain features and reduce the false responses in threat recognizing systems, anomalies and attacks at informatization objects. It is stated herein, that collectively with the outcomes of previous authors investigations, the offered algorithms of forming the feature space for identifying cyber threats within decisions making support system are more effective. It is reached at the expense of the fact, that, comparing to existing decisions, the described decisions in the article, allow separate considering the task of threat recognition in the frame of the known classes, and if necessary supplementing feature space for the new threat types. It is demonstrated, that new threats features often initially are not identified within the frame of existing base of threat classes knowledge in the decision support system. As well the methods and advised algorithms allow fulfilling the time-efficient cyber threats classification for a definite informatization object.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.