ABSTRACT

In the past two chapters, we discussed identification and authentication systems that use varioussoft computing techniques. We studied the different features that can be extracted from data and the various techniques that are applied to make real life applications that perform well under any circumstances. All of the experiments that we have performed throughout this book gave good results, and we have been able to prove the effectiveness of these systems under most conditions. We supported our statements by describing real life applications that use such systems and are performing highly well.