Ad hoc networks are characterized by ease of setup, low costs, and frequent use in the corporate world. They ensure safety to the user and maintain the confidentiality of the information circulated. They also allow the user to address the cases of communication failure in areas subject to destruction of communication infrastructure. The proposed protocols in the ad hoc networks often build only one path to achieve communication between the nodes, due to the restrictions of battery run out and the movement of the nodes. This connection is often subject to a failure within a certain range. Thus, multiple alternate paths in ad hoc networks use a solution to failing node communications. In addition, when looking at the situation where interference is widespread, each path is preferably somewhat distant from the others. In this paper, we present a simple processing by building multipath routing that do not overlap at the level of an ad hoc network zone, which is achieved through dividing the zone. The evaluation performed by using Network Simulator (ns-allinone-3.20) showed that the proposed ad hoc network connection is more efficient than the connection with the traditional methods of constructing multipath routings.
As smartphones incorporate location data, there is a growing concern about location privacy as smartphone technologies advance. Using a remote server, the mobile applications are able to capture the current location coordinates at any time and store them. The client awards authorization to an outsider. The outsider can gain admittance to area information on the worker by JSON Web Token (JWT). Protection is giving cover to clients, access control, and secure information stockpiling. Encryption guarantees the security of the location area on the remote server using the Rivest Shamir Adleman (RSA) algorithm. This paper introduced two utilizations of cell phones (tokens, and location). The principal application can give area inf
... Show MoreIn this paper, we characterize the percolation condition for a continuum secondary cognitive radio network under the SINR model. We show that the well-established condition for continuum percolation does not hold true in the SINR regime. Thus, we find the condition under which a cognitive radio network percolates. We argue that due to the SINR requirements of the secondaries along with the interference tolerance of the primaries, not all the deployed secondary nodes necessarily contribute towards the percolation process- even though they might participate in the communication process. We model the invisibility of such nodes using the concept of Poisson thinning, both in the presence and absence of primaries. Invisibility occurs due to nodes
... Show MoreBusiness organizations have faced many challenges in recent times, most important of which is information technology, because it is widely spread and easy to use. Its use has led to an increase in the amount of data that business organizations deal with an unprecedented manner. The amount of data available through the internet is a problem that many parties seek to find solutions for. Why is it available there in this huge amount randomly? Many expectations have revealed that in 2017, there will be devices connected to the internet estimated at three times the population of the Earth, and in 2015 more than one and a half billion gigabytes of data was transferred every minute globally. Thus, the so-called data mining emerged as a
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreThe development of wireless sensor networks (WSNs) in the underwater environment leads to underwater WSN (UWSN). It has severe impact over the research field due to its extensive and real-time applications. However effective execution of underwater WSNs undergoes several problems. The main concern in the UWSN is sensor nodes’ energy depletion issue. Energy saving and maintaining quality of service (QoS) becomes highly essential for UWASN because of necessity of QoS application and confined sensor nodes (SNs). To overcome this problem, numerous prevailing methods like adaptive data forwarding techniques, QoS-based congestion control approaches, and various methods have been devised with maximum throughput and minimum network lifesp
... Show MoreGetting knowledge from raw data has delivered beneficial information in several domains. The prevalent utilizing of social media produced extraordinary quantities of social information. Simply, social media delivers an available podium for employers for sharing information. Data Mining has ability to present applicable designs that can be useful for employers, commercial, and customers. Data of social media are strident, massive, formless, and dynamic in the natural case, so modern encounters grow. Investigation methods of data mining utilized via social networks is the purpose of the study, accepting investigation plans on the basis of criteria, and by selecting a number of papers to serve as the foundation for this arti
... Show MoreThe interesting new sources of data for official statistics are cell phone data. Electronic media has defined the way of research human behavior rapidly over the last decade. As data storage and sensing technology progressed, electronic records now cover a diverse variety of human activities from localized data (phone) to open source contributions on Wikipedia and the Open Area Map. Electronic records now encompass the numerous fields of activity. The ad hoc vehicle network is a research community-based wireless technology for the implementation of intelligent transport applications. It is necessary to estimate migration flows and predict future trends to understand the causes and effects of migration and to enforce policies t
... Show MoreThe current research aims to determine the extent of the impact of the strategic direction to the business process reengineering, in the Office of the Ministry of Oil To reach that goal was a sample of community research study consisted (50) members of the senior leadership represent the problem in organization researched in the ambiguity of the strategic direction of knowledge of the compatibility of the strategic direction with Business Process Reengineering and used questionnaire, interview and observation to obtain the information needed to search was addressing data by the statistical system spss percentage and the arithmetic mean, standard deviation and coefficient of variation .
... Show More