PRE-IDEALS AND NEW TOPOLOGIES USING FUZZY SETS
Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 5
Abstract
A fuzzy ideal on a set X is a non empty collection of subsets of X with heredity property which is also closed under arbitrary union and finite intersections. In this paper, we introduce a weak form of fuzzy ideals namely fuzzy pre-ideals and a way to obtain new fuzzy topologies is presented in this paper. Furthermore some interesting results for fuzzy ideals are generalized to fuzzy pre-ideal.
Authors and Affiliations
M. MARY VICTORIA FLORENCE , Dr. R. Alagar
AUTOMATIC WEB SERVICE SELECTION BY OPTIMIZING COST OF COMPOSITION IN SLAKY COMPOSER USING ASSIGNMENT MINIMIZATION APPROACH
Web service composition is a means of building enterprises virtually by knitting relevant web services on the fly. Automatic web service composition is done dynamically at runtime. Extensive research has been done in the...
A REMOTE LOGIN AUTHENTICATION SCHEME WITH SMART CARDS BASED ON UNIT SPHERE
On the basis of the fact that points on a unit sphere are easy to compute but hard to derive, this paper presents a remote login authentication scheme with smart card based on unit sphere. The proposed scheme is simple,...
Different Views of Software Agent Paradigm
Agent modelling in software engineering is a relatively young area, and there are, as yet, no standard methodologies, development tools, or software architectures. Although our work is emphasized on to represent the agen...
CENTRALIZED RELIABILITY INDEX TECHNIQUE FOR CONGESTION CONTROL IN WIRELESS SENSOR NETWORKS
The Wireless Sensor Network consist lot of tiny sensor nodes in which sensor nodes (WSN) send data to sink node. The Wireless Sensor Networks are used in climate change impact, water cycle management, vehicle traffic mon...
VARIABLE RATE STEGANOGRAPH Y IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
In this paper three image steganography methods with variable rate of embedding are proposed. In the first method, called two neighbor method the two neighboring pixels such as upper and left are exploited to take embedd...