Analytical Study of Neural Network Techniques: SOM, MLP and Classifier-A Survey

This paper focuses on the various neural network techniques including Multilayer perceptron (MLP) neural network, classifier and self-organizing maps (SOMs). Various aspects of neural network techniques are mentioned in this paper along with the advantages and drawbacks. The neural network models are trained with measured values of the field strength at arbitrary points. The back propagation training algorithm is used for the learning process in MLP. The mechanism of supervised and unsupervised learning are also specified.

[1]  Sharath Pankanti,et al.  Biometrics: Personal Identification in Networked Society , 2013 .

[2]  Xian Ke,et al.  Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.

[3]  John A. Flanagan,et al.  Self-organisation in Kohonen's SOM , 1996, Neural Networks.

[4]  Satnam Dlay,et al.  Biometric verification of computer users with probabilistic and cascade forward neural networks , 2000 .

[5]  Arun Ross,et al.  Toward reconstructing fingerprints from minutiae points , 2005, SPIE Defense + Commercial Sensing.

[6]  Daw-Tung Lin Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[7]  S. Salerno,et al.  USER AUTHENTICATION WITH NEURAL NETWORKS , 1999 .

[8]  G. Padmavathi,et al.  An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics , 2011 .

[9]  S.J. Elliott,et al.  Keystroke Dynamics Verification Using a Spontaneously Generated Password , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.

[10]  Lior Rokach,et al.  User Authentication Based on Representative Users , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[11]  T. Kohonen Analysis of a simple self-organizing process , 1982, Biological Cybernetics.

[12]  Mohammad S. Obaidat,et al.  Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..

[13]  S. S. Dlay,et al.  Performance of keystroke biometrics authentication system using artificial neural network (ANN) and distance classifier method , 2010, International Conference on Computer and Communication Engineering (ICCCE'10).