In this paper, we will discuss prediction methods to restrict the spread of the disease by tracking contact individuals via mobile application to individuals infected with the COVID-19 virus. We will track individuals using bluetooth technology and then we will save information in the central database when they are in touch. Monitoring cases and avoiding the infected person help with social distance. We also propose that sensors used by people to obtain blood oxygen saturation level and their body temperature will be used besides bluetooth monitoring. The estimation of the frequency of the disease is based on the data entered by the patient and also on the data gathered from the users who entered the program on the state of the disease. In this study, we will also propose the best way to restrict the spread of COVID-19 by using methods of artificial intelligence to predict the disease in Jordan using Tensorflow.
In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers -message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.
In this paper will discuss and examine message transmission from the attacker process within the scope of Delay Tolerance Networks (DTNs). DTNs are a new area of research that can be developed in networking. Delay-tolerant networks are those networks that may not have a complete path between networks end-to-end via direct links and may be under development for a long time. As part of the improvement, we will compare a survey of DTN routing protocols with a real region area, and then taking into account the possibilities of detecting the presence of areas of weakness that lead to penetration, which will occur in the nodes while on the move. In this study, we will use the ONE simulator to track messages within nodes.
Wireless LANs widespread use is attributable to a combination of factors, including simple construction, employee convenience, connection selection convenience, and the ability to support continual movement from residences to large corporate networks. For organizations, however, the availability of wireless LAN means an increased danger of cyberattacks and challenges, according to IT professionals and security specialists. In this paper examines many of the security concerns and vulnerabilities associated with the IEEE 802.11 Wireless LAN encryption standard, as well as typical cyber threats and attacks affecting wireless LAN systems in homes and organizations, and provide general guidance and suggestions for home and business users.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.