JECET : Journal of Environmental Science, Computer Science and Engineering & Technology. E-ISSN : 2278-179X

      JECET : Journal of Environmental Science, Computer Science and Engineering & Technology

Research Papers in Comp Science

Usages of Selected Antivirus Software in Different Categories of Users in selected Districts

Bhaskar V. Patil and Milind J. Joshi

A computer virus is software intentionally written to copy itself without the computer owner’s permission and then perform some other action on any system where it resides. Now days, viruses are being written for almost every computing platform. Anti-virus protection is, or should be, an integral part of any Information Systems operation, be it personal or professional. There are number of computer virus are created and these computer virus are affected in day today life. The large number of Anti-virus software available in the market and some are being launched, each one of them offers new features for detecting and eradicating viruses and malware. People frequently change their Anti-virus software according to their liking and needs without evaluating the performance and capabilities of the various Anti-virus software available. This research paper highlights the popular antivirus software in different types of users with types of antivirus software in selected Districts. This paper also highlights the uses of freeware or licensed antivirus software with user types. 

An Overview of Fuzzy Object-Oriented Database

Shivam Singh, Kavita Agarwal, Jameel Ahmad

The object-oriented databases are considered better than the relational and other databases because it provides the better and easy approaches to deal with complex data, complex relationship existing among such data and applications which deal with large data. But the available data in data sources are often inaccurate and imprecise. To solve this problem, fuzzy logic has been used to extend the object- oriented databases. The purpose of introducing fuzzy logic in object oriented databases is to enhance its capabilities to represent and manipulate uncertain and imprecise data. This paper provides an overview of fuzzy object-oriented database and how it represents and manipulates the fuzzy data.

E-Mail Spam Detection System Using Near Duplicate Matching

D. Deepika and R. Deepa

Spam is defined as the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. The E-mail addresses are collected by spammer from chat rooms, websites, and newsgroups and sold to other spammer. In order to filter the messages and separate the genuine messages from the junk mail, the spam filters are preferred. But, the existing filters generally perform well when dealing with clumsy spams. It has suspicious duplicate content with keywords or sent from an identical notorious server. So, it cannot able to efficiently match the incoming e-mail with huge database. The main contribution of this paper is the proposal of three main techniques. One is Structure Abstraction Generation (SAG) to generate E-Mail Abstraction Plot (E-MAP) using HTML content in e-mail. Next, innovative tree structure Sp trees is used to store large amount of e-mail abstraction of reported spams. Finally, a design of complete spam detection system cosdes with an efficient near-duplicate matching scheme and progressive update scheme. The progressive update scheme enables the system to keep most up-to-date information for near-duplicate detection. The spam detection result of each incoming e-mail can be determined by near-duplicate similarity matching process. A reputation mechanism also used to withstand from intentional attacks. By integrating the above techniques the application is developed efficiently using Visual Studio .NET 2008 as frontend and SQL Server 2005 as a backend. The code used behind the work is C#, .NET.

Performance Evaluation of Mesh Networks Under Different Routing Approach

Abhishek Singh, Rajiv Singh, Akash Tiwari, Dharmesh Kumar

The objective of this paper is to develop a Simulation Model to evaluate the performance of Mesh Network for following input parameters, Network Size Load, Number of clock cycles, Routing strategy, Buffer Through the simulation we will observe that How throughput at various loads is affected by Routing strategy Buffer size, How the Mean and Max Delay is affected by Varying load conditions, Buffer size, How the cell dropped at each stage is affected by Routing strategies Buffer size.

Generalized Fuzzy Feebly-Boundary by the Complement Function C

K.Bageerathi, T.Thangam

The focus of this paper is to present the notion of fuzzy feebly boundary through the complement function â„­. Further we develop the concept by fuzzy feebly closure. A comparative study of three fuzzy feebly boundaries in different aspects are also established. Mathematics Subject Classification: 54A40,3E72.

A Study on VANET Architectures and Communication Modes

Soumya Mukherjee, Pinaki Pratim Acharjya

Intelligent transportation System (ITS) is an emerging area for attaining greater road safety, traffic efficiency and environmental friendliness in transport system nowadays. Vehicular Ad-hoc network (VANET) is a special type of mobile ad-hoc network used to attain the above goals. VANET deals with communication between vehicles on the move and between vehicles on road with the stationary signal on roads. An architectural framework is therefore required for the implementation of such network. An efficient communication mode is also needed to be followed for transmission of messages. This paper deals with a study on two aspects concerning architecture of VANET and the communication modes they follow.

Journal Indexing


International Scientific Indexing (ISI).




Social Links

Facebook

Share