•Journal•ISSN: 0976-0091
ICTACT Journal on Communication Technology
ICT Academy
About: ICTACT Journal on Communication Technology is an academic journal. The journal publishes majorly in the area(s): Wireless sensor network & Wireless network. It has an ISSN identifier of 0976-0091. It is also open access. Over the lifetime, 265 publications have been published receiving 609 citations.
Papers
More filters
••
TL;DR: Experimentation carried out using the developed wireless air pollution monitoring system under different physical conditions show that the system collects reliable source of real time fine - grain pollution data.
Abstract: Air pollution has
significant influence on the concentration of
constituents in the atmosphere leading to effects like global warming
and acid rains. To avoid such adverse imbalances in the nature, an
air pollution monitoring system is utmost important. This paper
attempts
to develop an effective solution for pollution monitoring
using wireless sensor networks (WSN) on a real time basis namely
real time wireless air pollution monitoring system. Commercially
available discrete gas sensors for sensing concentration of gases l
ike
CO
2
, NO
2,
CO and O
2
are calibrated using appropriate calibration
technologies. These pre
-
calibrated gas sensors are then integrated
with the wireless sensor motes for field deployment at the campus and
the Hyderabad city using multi hop data aggregatio
n algorithm. A
light weight middleware and a web interface to view the live pollution
data in the form of numbers and charts from the test beds was
developed and made available from anywhere on the internet. Other
parameters like temperature and humidity w
ere also sensed along
with gas concentrations to enable data analysis through data fusion
techniques. Experimentation carried out using the developed wireless
air pollution monitoring system under different physical conditions
show that the system collects
reliable source of real time fine
-
grain
pollution data.
43 citations
••
TL;DR: This work suggests that, in a small buffer regime, a simple Drop Tail queue management serves to enhance stability and appears preferable to the much studied RED scheme.
Abstract: There are many factors that are important in the design of queue management schemes for routers in the Internet: for example, queuing delay, link utilization, packet loss, energy consumption and the impact of router buffer size. By considering a fluid model for the congestion avoidance phase of Additive Increase Multiplicative Decrease (AIMD) TCP, in a small buffer regime, we argue that stability should also be a desirable feature for network performance. The queue management schemes we study are Drop Tail and Random Early Detection (RED). For Drop Tail, the analytical arguments are based on local stability and bifurcation theory. As the buffer size acts as a bifurcation parameter, variations in it can readily lead to the emergence of limit cycles. We then present NS2 simulations to study the effect of changing buffer size on queue dynamics, utilization, window size and packet loss for three different flow scenarios. The simulations corroborate the analysis which highlights that performance is coupled with the notion of stability. Our work suggests that, in a small buffer regime, a simple Drop Tail queue management serves to enhance stability and appears preferable to the much studied RED scheme.
27 citations
••
TL;DR: The basic operations, advantages and limitations of the modified LEACH algorithms are compared to identify the research issues to be solved and to give the suggestions for the future proposed routing algorithms of wireless networks based on LEACH routing algorithm.
Abstract: Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is the first hierarchical cluster based routing protocol successfully used in the Wireless Sensor Networks (WSN). In this paper, various enhancements used in the original LEACH protocol are examined. The basic operations, advantages and limitations of the modified LEACH algorithms are compared to identify the research issues to be solved and to give the suggestions for the future proposed routing algorithms of wireless networks based on LEACH routing algorithm.
25 citations
••
TL;DR: The effectiveness of the proposed work is explores and identifies the use of different learning algorithms for classifying spam messages from e-mail, and a comparative analysis among the algorithms has also been presented.
Abstract: E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing amount of electronic business and financial transactions directly contribute to the increase in e-mail-based threats. Email spam is one of the major problems of the today's Internet, bringing financial damage to companies and annoying individual users. Spam emails are invading users without their consent and filling their mail boxes. They consume more network capacity as well as time in checking and deleting spam mails. The vast majority of Internet users are outspoken in their disdain for spam, although enough of them respond to commercial offers that spam remains a viable source of income to spammers. While most of the users want to do right think to avoid and get rid of spam, they need clear and simple guidelines on how to behave. In spite of all the measures taken to eliminate spam, they are not yet eradicated. Also when the counter measures are over sensitive, even legitimate emails will be eliminated. Among the approaches developed to stop spam, filtering is the one of the most important technique. Many researches in spam filtering have been centered on the more sophisticated classifier-related issues. In recent days, Machine learning for spam classification is an important research issue. The effectiveness of the proposed work is explores and identifies the use of different learning algorithms for classifying spam messages from e-mail. A comparative analysis among the algorithms has also been presented.
24 citations
••
TL;DR: This paper study the android architecture; analyze the existing threats and security weaknesses; identify various exploit mitigation techniques to mitigate known vulnerabilities; and give strategic direction to make android operating system more secure.
Abstract: Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.
19 citations