scispace - formally typeset
Search or ask a question
JournalISSN: 0976-0091

ICTACT Journal on Communication Technology 

ICT Academy
About: ICTACT Journal on Communication Technology is an academic journal. The journal publishes majorly in the area(s): Wireless sensor network & Wireless network. It has an ISSN identifier of 0976-0091. It is also open access. Over the lifetime, 265 publications have been published receiving 609 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: Experimentation carried out using the developed wireless air pollution monitoring system under different physical conditions show that the system collects reliable source of real time fine - grain pollution data.
Abstract: Air pollution has significant influence on the concentration of constituents in the atmosphere leading to effects like global warming and acid rains. To avoid such adverse imbalances in the nature, an air pollution monitoring system is utmost important. This paper attempts to develop an effective solution for pollution monitoring using wireless sensor networks (WSN) on a real time basis namely real time wireless air pollution monitoring system. Commercially available discrete gas sensors for sensing concentration of gases l ike CO 2 , NO 2, CO and O 2 are calibrated using appropriate calibration technologies. These pre - calibrated gas sensors are then integrated with the wireless sensor motes for field deployment at the campus and the Hyderabad city using multi hop data aggregatio n algorithm. A light weight middleware and a web interface to view the live pollution data in the form of numbers and charts from the test beds was developed and made available from anywhere on the internet. Other parameters like temperature and humidity w ere also sensed along with gas concentrations to enable data analysis through data fusion techniques. Experimentation carried out using the developed wireless air pollution monitoring system under different physical conditions show that the system collects reliable source of real time fine - grain pollution data.

43 citations

Journal ArticleDOI
TL;DR: This work suggests that, in a small buffer regime, a simple Drop Tail queue management serves to enhance stability and appears preferable to the much studied RED scheme.
Abstract: There are many factors that are important in the design of queue management schemes for routers in the Internet: for example, queuing delay, link utilization, packet loss, energy consumption and the impact of router buffer size. By considering a fluid model for the congestion avoidance phase of Additive Increase Multiplicative Decrease (AIMD) TCP, in a small buffer regime, we argue that stability should also be a desirable feature for network performance. The queue management schemes we study are Drop Tail and Random Early Detection (RED). For Drop Tail, the analytical arguments are based on local stability and bifurcation theory. As the buffer size acts as a bifurcation parameter, variations in it can readily lead to the emergence of limit cycles. We then present NS2 simulations to study the effect of changing buffer size on queue dynamics, utilization, window size and packet loss for three different flow scenarios. The simulations corroborate the analysis which highlights that performance is coupled with the notion of stability. Our work suggests that, in a small buffer regime, a simple Drop Tail queue management serves to enhance stability and appears preferable to the much studied RED scheme.

27 citations

Journal ArticleDOI
TL;DR: The basic operations, advantages and limitations of the modified LEACH algorithms are compared to identify the research issues to be solved and to give the suggestions for the future proposed routing algorithms of wireless networks based on LEACH routing algorithm.
Abstract: Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is the first hierarchical cluster based routing protocol successfully used in the Wireless Sensor Networks (WSN). In this paper, various enhancements used in the original LEACH protocol are examined. The basic operations, advantages and limitations of the modified LEACH algorithms are compared to identify the research issues to be solved and to give the suggestions for the future proposed routing algorithms of wireless networks based on LEACH routing algorithm.

25 citations

Journal ArticleDOI
TL;DR: The effectiveness of the proposed work is explores and identifies the use of different learning algorithms for classifying spam messages from e-mail, and a comparative analysis among the algorithms has also been presented.
Abstract: E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing amount of electronic business and financial transactions directly contribute to the increase in e-mail-based threats. Email spam is one of the major problems of the today's Internet, bringing financial damage to companies and annoying individual users. Spam emails are invading users without their consent and filling their mail boxes. They consume more network capacity as well as time in checking and deleting spam mails. The vast majority of Internet users are outspoken in their disdain for spam, although enough of them respond to commercial offers that spam remains a viable source of income to spammers. While most of the users want to do right think to avoid and get rid of spam, they need clear and simple guidelines on how to behave. In spite of all the measures taken to eliminate spam, they are not yet eradicated. Also when the counter measures are over sensitive, even legitimate emails will be eliminated. Among the approaches developed to stop spam, filtering is the one of the most important technique. Many researches in spam filtering have been centered on the more sophisticated classifier-related issues. In recent days, Machine learning for spam classification is an important research issue. The effectiveness of the proposed work is explores and identifies the use of different learning algorithms for classifying spam messages from e-mail. A comparative analysis among the algorithms has also been presented.

24 citations

Journal ArticleDOI
TL;DR: This paper study the android architecture; analyze the existing threats and security weaknesses; identify various exploit mitigation techniques to mitigate known vulnerabilities; and give strategic direction to make android operating system more secure.
Abstract: Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

19 citations

Network Information
Related Journals (5)
Wireless Personal Communications
11.6K papers, 120.3K citations
83% related
International Journal of Computer Applications
26.6K papers, 157.4K citations
81% related
Computers & Electrical Engineering
5.2K papers, 82.1K citations
81% related
Aeu-international Journal of Electronics and Communications
4.4K papers, 64.5K citations
79% related
International Journal of Communication Systems
4.1K papers, 40.5K citations
79% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20217
201912
201834
201732
20166
201529