A comparative study of Level II fuzzy sets and Type II fuzzy sets
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 4
Abstract
This paper reviews and compares theories of level II fuzzy sets and type II fuzzy sets. Two approaches for the usefulness of level II fuzzy sets are reviewed one is in database modeling while other is in GIS. Type II fuzzy sets under set theoretic view seem to be closely related to level II fuzzy sets, but linguistically they deal with different types of variables in database modeling.
Authors and Affiliations
GANDHI SUPRIYA KANHAIYA , DR. S. B. NIMSE.
An efficient technique for maximization of network lifetime & minimization of delay for the performance enhancement of WSN
The Main emphasis of this paper is to analyze and assess the performance of various techniques in the effort to determine the maximum lifetime of the nodes & minimization of delay. This paper,mainly concentrate...
Positioning of mobile station using Received signal strength and Time of arrival
Positioning of users or Mobile Station (MS) in cellular systems becomes an interesting topic since the related number of applications for the location information is growing rapidly. Deploying such applications wou...
SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY
Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providi...
AN AGENT BASED APPROACH TOWARDS BUILDING A CO-OPERATIVE VEHICULAR NETWORK
Co-operative intelligent vehicular network is the current proliferation in the transport infrastructure as a result of never ending quest in automotive inventions. The potentiality of connected vehicular networks a...
Resultant Variant Cryptography by using Morphological Transformation Domain for Google Maps
Visual Cryptography is a cryptographic technique which can hide the visual data (images, pictures, text etc.) and which can be decrypted without a computer but in a tedious way. The best-known techniques that visua...