Blog

digital-identity

Digital Identity in Network Security

Having an identity and expressing it have been of that importance from the early time.Digital identity related mechanisms are the core of modern systems, networks, and applications security. In an increasingly borderless and digital world, privacy and security cannot be ensured through the construction of walls around sensitive information. Identity is…

An Introduction of VANET

VANET is a type of MANET, which is a group of mobile, wireless nodes which cooperatively and spontaneously form an IP-based network. This network is independent of any fixedinfrastructure or centralized administration. A node communicates directly with nodes within its wireless communication range. Nodes that are part of the MANET,…

Asynchronous Transfer Mode (ATM)

Various network applications are requiring increasingly higher bandwidth and generating a heterogeneous mix of network traffic. Existing networks cannot provide the transport facilities to efficiently support a diversity of traffic with various service requirements. ATM was designed to be potentially capable of supporting heterogeneous traffic (e.g., voice, video, data) in…
Grid Computing

What is Grid Computing

Grid Computing is a technology to support the sharing and coordinate the use of diverse resources in dynamic Virtual Objects (VOs). That is the creation, from geographically and organizationally distributed components of virtual computing systems. Grid computing is integrated to deliver desired QoS [1]. Grid computing was first developed to…

Fuzzy C Mean Clustering Algorithm With Steps

This algorithm works by assigning membership to each data point corresponding to each cluster center on the basis of the distance between the cluster center and the data point. The more the data is near to the cluster center more is its membership towards the particular cluster center. Clearly, the…

K-Means Clustering Algorithm with Steps

k-means is one of the simplest unsupervised learning algorithms that solve the well-known clustering problem. The procedure follows a simple and easy way to classify a given data set through a certain number of clusters. The main idea is to define k centers, one for each cluster. These centers should…

What is Clustering ?– Applications, Advantages and Limitations

Clustering is the undertaking of separating the populace or information that focuses on various gatherings with the end goal that information focuses on similar gatherings are more like other information focuses on a similar gathering than those in different gatherings. In basic words, the point is to isolate bunches with…
RSS
Follow by Email
Pinterest
LinkedIn
Instagram
Telegram