2021
DOI: 10.32604/cmc.2021.018017
|View full text |Cite
|
Sign up to set email alerts
|

Neutrosophic Rule-Based Identity Verification System Based on Handwritten Dynamic Signature Analysis

Abstract: Identity verification using authenticity evaluation of handwritten signatures is an important issue. There have been several approaches for the verification of signatures using dynamics of the signing process. Most of these approaches extract only global characteristics. With the aim of capturing both dynamic global and local features, this paper introduces a novel model for verifying handwritten dynamic signatures using neutrosophic rule-based verification system (NRVS) and Genetic NRVS (GNRVS) models. The ne… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 47 publications
0
2
0
Order By: Relevance
“…Decision-making rules tailored to the needs of the visually impaired have been established. These messages are sent through any Internet-of-Things device in order to let a visually impaired person move about safely [14,15]. Figure 2 depicts the suggested framework's architecture.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Decision-making rules tailored to the needs of the visually impaired have been established. These messages are sent through any Internet-of-Things device in order to let a visually impaired person move about safely [14,15]. Figure 2 depicts the suggested framework's architecture.…”
Section: Methodsmentioning
confidence: 99%
“…Neutrosophic logic research in several disciplines is advancing rapidly [13][14][15][16]. A generalization of fuzzy logic called neutrosophic logic was introduced by Smarandache [17].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…This timestamp is not affected after an abort, and so may be utilized for transaction ordering. For simplicity reasons, we will utilize identifiers to arrange transactions and will assume that they have such a timestamp [33]. During the validation phase of transaction T i , the technique verifies that T i does not interact with any other committed transactions or currently validating transactions.…”
Section: Step 1: Transaction Readingmentioning
confidence: 99%
“…2. The mathematical operations on two trapezoidal neutrosophic numbers Γƒ = 〈( π‘Žπ‘Ž 1 , π‘Žπ‘Ž 2 , π‘Žπ‘Ž 3 , π‘Žπ‘Ž 4 ); 𝛼𝛼 Γƒ , πœƒπœƒ Γƒ , 𝛽𝛽 Γƒ βŒͺ and 𝐡𝐡 οΏ½ = 〈( 𝑏𝑏 1 , 𝑏𝑏 2 , 𝑏𝑏 3 , 𝑏𝑏 4 ); 𝛼𝛼 𝐡𝐡 οΏ½ , πœƒπœƒ 𝐡𝐡 οΏ½ , 𝛽𝛽 𝐡𝐡 οΏ½ βŒͺ are as follows [27][28][29][30]:…”
Section: A Neutrosophic Logicmentioning
confidence: 99%