Current Issue ( Vol. : 7, Issue: 3, July-September 2019)   


Title: GAME WITH FUZZY PAYOFFS AND CRISP GAME
Author: Arti Chouksey and Dr. Sonal Bharti
Keyword: Fuzzy set, bi-matrix, membership function, cooperative game
Page No: 17-22
DOI: 10.30876/JOHR.7.3.2019.17-22
Abstract: In this paper we consider a bi-matrix game with fuzzy payoffs. To compare a fuzzy numbers, some different ordering operators can be used. We define Nash equilibrium in fuzzy game using the ordering op erator. The game with crisp payoffs is associated with the original game. Here, crisp payoffs are the operator’s value on a fuzzy payoff. We propose the following statement: if the ordering operator is linear, then the game with payoffs has same Nash equilibrium strategy profile as the crisp game. We present an algorithm for constructing a Nash equilibrium in a bi-matrix game with fuzzy payoffs and we are using this fact. We use such ordering operators, and construct the Nash equilibrium in examples of bi-matrix games. Key Word: Fuzzy set, bi-matrix, membership function, cooperative game Download PDF


Title: A REVIEW ON NEED, IMPORTANCE AND PREVENTIVE MEASURES FOR INFORMATION SECURITY IN WIRELESS NETWORKS
Author: Nikita Bahaley
Keyword: Information security, data security, security, network, authentication, information tampering, confidentiality, integrity, availability
Page No: 23-29
Abstract: This paper provides a study on the fact that how important is to maintain the privacy, authenticity of data while it goes through network or stored on the server along with some measures that should b e taken to prevent it from malicious use. In today’s era whatever may be the age group of people in the society, everybody uses electronic devices and internet for sending personal/official data or files, for educational purpose, for doing bank transactions, downloading data from the internet etc. so it is very crucial to keep the information safe from unauthorized access that is sent, received, downloaded i.e. goes through internet or stored on some server. The basic security requirement of any network is its confidentiality, integrity and authentication. Whether it is a physical layer or application layer or any layer; the information must be secured at all the levels while it goes from source to destination as well as during its storage in wired as well as wireless networks. Download PDF