Soumya Mukherjee, Pinaki Pratim Acharjya
Intelligent transportation System (ITS) is an emerging area for attaining greater road safety, traffic efficiency and environmental friendliness in transport system nowadays. Vehicular Ad-hoc network (VANET) is a special type of mobile ad-hoc network used to attain the above goals. VANET deals with communication between vehicles on the move and between vehicles on road with the stationary signal on roads. An architectural framework is therefore required for the implementation of such network. An efficient communication mode is also needed to be followed for transmission of messages. This paper deals with a study on two aspects concerning architecture of VANET and the communication modes they follow.
The focus of this paper is to present the notion of fuzzy feebly boundary through the complement function ℭ. Further we develop the concept by fuzzy feebly closure. A comparative study of three fuzzy feebly boundaries in different aspects are also established. Mathematics Subject Classification: 54A40,3E72.
Abhishek Singh, Rajiv Singh, Akash Tiwari, Dharmesh Kumar
The objective of this paper is to develop a Simulation Model to evaluate the performance of Mesh Network for following input parameters, Network Size Load, Number of clock cycles, Routing strategy, Buffer Through the simulation we will observe that How throughput at various loads is affected by Routing strategy Buffer size, How the Mean and Max Delay is affected by Varying load conditions, Buffer size, How the cell dropped at each stage is affected by Routing strategies Buffer size.
D. Deepika and R. Deepa
Spam is defined as the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages. The E-mail addresses are collected by spammer from chat rooms, websites, and newsgroups and sold to other spammer. In order to filter the messages and separate the genuine messages from the junk mail, the spam filters are preferred. But, the existing filters generally perform well when dealing with clumsy spams. It has suspicious duplicate content with keywords or sent from an identical notorious server. So, it cannot able to efficiently match the incoming e-mail with huge database. The main contribution of this paper is the proposal of three main techniques. One is Structure Abstraction Generation (SAG) to generate E-Mail Abstraction Plot (E-MAP) using HTML content in e-mail. Next, innovative tree structure Sp trees is used to store large amount of e-mail abstraction of reported spams. Finally, a design of complete spam detection system cosdes with an efficient near-duplicate matching scheme and progressive update scheme. The progressive update scheme enables the system to keep most up-to-date information for near-duplicate detection. The spam detection result of each incoming e-mail can be determined by near-duplicate similarity matching process. A reputation mechanism also used to withstand from intentional attacks. By integrating the above techniques the application is developed efficiently using Visual Studio .NET 2008 as frontend and SQL Server 2005 as a backend. The code used behind the work is C#, .NET.
Shivam Singh, Kavita Agarwal, Jameel Ahmad
The object-oriented databases are considered better than the relational and other databases because it provides the better and easy approaches to deal with complex data, complex relationship existing among such data and applications which deal with large data. But the available data in data sources are often inaccurate and imprecise. To solve this problem, fuzzy logic has been used to extend the object- oriented databases. The purpose of introducing fuzzy logic in object oriented databases is to enhance its capabilities to represent and manipulate uncertain and imprecise data. This paper provides an overview of fuzzy object-oriented database and how it represents and manipulates the fuzzy data.
Bhaskar V. Patil and Milind J. Joshi
A computer virus is software intentionally written to copy itself without the computer owner’s permission and then perform some other action on any system where it resides. Now days, viruses are being written for almost every computing platform. Anti-virus protection is, or should be, an integral part of any Information Systems operation, be it personal or professional. There are number of computer virus are created and these computer virus are affected in day today life. The large number of Anti-virus software available in the market and some are being launched, each one of them offers new features for detecting and eradicating viruses and malware. People frequently change their Anti-virus software according to their liking and needs without evaluating the performance and capabilities of the various Anti-virus software available. This research paper highlights the popular antivirus software in different types of users with types of antivirus software in selected Districts. This paper also highlights the uses of freeware or licensed antivirus software with user types.