Heutzutage ändern sich unsere Technologien jeden Tag. Das Internet ist eines der besten Beispiele dafür. Wir alle sind auf das Internet angewiesen, um Daten auszutauschen, zu speichern, zu unterhalten, Geschäfte zu machen, zu lernen und viele andere Dinge. Aber wir alle wollen diese Dinge mit Sicherheit. Wann immer das Wort Sicherheit fällt, kommen uns drei Wörter in den Sinn: Authentifizierung, Integrität und Vertraulichkeit. Authentifizierung ist die Gewissheit, dass keine andere als die authentifizierte Person auf die Daten zugreifen kann. Integrität wiederum bedeutet, dass der...
Heutzutage ändern sich unsere Technologien jeden Tag. Das Internet ist eines der besten Beispiele dafür. Wir alle sind auf das Internet angewiesen, ...
Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, storage, entertainment, business, learning and many other purposes. But all we want these things with security. Whenever this word security comes, three words come in our mind i.e. authentication, integrity and confidentiality. Authentication is assurance that no one other than authenticated person can access the data. Integrity on the other end, is the assurance that receiver receives the same copy that the sender sends. It should not be like...
Today, our technologies are changing every day. Internet is one of the best examples for it. We all are very much dependent on internet for sharing, s...
Aujourd'hui, nos technologies évoluent tous les jours. Internet en est l'un des meilleurs exemples. Nous sommes tous très dépendants d'Internet pour le partage, le stockage, le divertissement, les affaires, l'apprentissage et bien d'autres choses encore. Mais nous voulons tous que ces choses soient sécurisées. Chaque fois que le mot sécurité est prononcé, trois mots nous viennent à l'esprit, à savoir : authentification, intégrité et confidentialité. L'authentification est l'assurance que personne d'autre que la personne authentifiée ne peut accéder aux données. L'intégrité,...
Aujourd'hui, nos technologies évoluent tous les jours. Internet en est l'un des meilleurs exemples. Nous sommes tous très dépendants d'Internet pou...
In Vehicular Ad Hoc Networks (VANETs), vehicles communicate through Vehicle-to-Vehicle (V to V) and Vehicle-to-Roadside Unit (V to RSU) channels, posing challenges for wide deployment. A key issue is designing delay minimization algorithms to handle path disruptions due to vehicle mobility. This dissertation proposes a scheme focusing on reducing delays for high-velocity vehicles, minimizing collision risks. It utilizes low-velocity vehicles to share road status and velocity information, reducing overall traffic in dynamic VANETs. The AODV routing protocol is employed for flooded request and...
In Vehicular Ad Hoc Networks (VANETs), vehicles communicate through Vehicle-to-Vehicle (V to V) and Vehicle-to-Roadside Unit (V to RSU) channels, posi...
Association rule mining techniques are important part of data mining to derive relationship between attributes of large databases. Association related rule mining have evolved huge interest among researchers as many challenging problems can be solved using them. Numerous algorithms have been discovered for deriving association rules effectively. It has been evaluated that not all algorithms can give similar results in all scenarios, so decoding these merits becomes important. In thisassociation rule mining algorithms were analyzed ,Comparison of these algorithms were experimentally performed...
Association rule mining techniques are important part of data mining to derive relationship between attributes of large databases. Association related...