Govindaswamy Kalpana

  • Citations Per Year
Learn More
Due to the broadcasting nature of radio transmission, the most fundamental task in MANETs is the broadcast operation. All the current routing protocols depend upon the easier form of broadcasting called flooding which can result in high broadcast redundancy and packet collisions. In this paper, we propose to develop a reliable broadcasting algorithm which(More)
271 Abstract— Wireless sensor networks consist of large number of nodes often battery operated, which have ad hoc topology and variable traffic rates. The medium access control (MAC) protocol designed for the network must be stable and should consume less energy. This paper presents a novel hybrid MAC protocol that uses the information of clusters to divide(More)
Emails and social communication is the newest and easiest way of data communication. Although Electronic communications are facile in nature, it is equally easy to attack these services with an intention of fraud and trickery motivation. The cyberpunks use emails to obtain valuable credentials which could be used in many ways. A simple looking mail can(More)
Gossiping is the well-organized approach for information dissemination in Mobile Adhoc Network (MANET). In Gossiping approach, the node forwards packets with the probability known as retransmission probability. This probability must be chosen appropriately and effectively which is a challenging task. In this paper, we propose a fuzzy logic technique for(More)
OPEN ACCESS This open-access article is distributed under the terms of the Creative Commons Attribution Non-Commercial License (CC BY-NC) (http://, which permits reuse, distribution and reproduction of the article, provided that the original work is properly cited and the reuse is restricted to noncommercial(More)
In the present computer era of cloud computing and its security issues pertaining identification and restricting malicious users or unknown users is considered to be critical as they tend to hack or attack cloud tenant's bilinear data. The proposed work protects data pertaining seller, retailer and carrier from attacker by classifying various cloud users.(More)
Cloud was visualized as the authentic elucidation for rising storage space and service expenditure for Information Technology Applications. Outsourcing the data to cloud storage servers ease the client accountability by facilitating stumpy cost, secure, locality independent platforms and scalable resources. With the proliferation of cloud technologies,(More)
  • 1