Publications

2016
Kaliappan M, Mariappan E, Prakash VM, Paramasivan B. Load Balanced Clustering Technique in MANET using Genetic Algorithms. Defence Science Journal. 2016;66(3):251–258.
2015
Paramasivan B, Prakash VM, Kaliappan M. Development of a secure routing protocol using game theory model in mobile ad-hoc networks. Journal of Communications and Networks. 2015;17(1):75–83.
Prakash VM, Paramasivan B, Kaliappan M. Energy Efficient Dynamic Load Balanced Clustering Protocol using Memory Enhanced Genetic Scheme and Elitism based Immigrant Genetic Scheme for MANET. Journal of Pure and Applied Microbiology. 2015;9(Special Issue Nov. 2015):655–665.
Prakash VM, Paramasivan B. An individual node delay based efficient power aware routing protocol for wireless heterogeneous sensor networks. International Journal of Communication Networks and Information Security. 2015;7(1):50–59.
Prakash VM, Paramasivan B. Request – Response based power aware routing protocol for wireless heterogeneous sensor networks. International Journal of Multimedia and Ubiquitous Computing. 2015;10(7):59–74.
2014
Prakash VM, Paramasivan B. Geographic relay region based power aware routing for wireless sensor networks. Journal of Theoretical and Applied Information Technology. 2014;66(2):586–594.
2011
Prakash VM, Paramasivan B, Shobana JS. Performance Analysis of Beaconless Routing in Wireless Sensor Networks (WSNs) – Present and Future. CiiT International Journal of Wireless Communications. 2011;3(5):335–344.
Shobana JS, Paramasivan B, Prakash VM. A Survey on Congestion Control in Wireless Sensor Networks (WSN). CiiT International Journal of Wireless Communications. 2011;3(5):363–370.
Prakash VM, Shobana JS, Infant AP. Wipe Out Brute Force and Malware Based Victim Attacks Using One-Time Password and Grid-Clear-CAPTCHA (GCC) – Analytical Study. CiiT International Journal of Networking and Communication Engineering. 2011;3(3):177–182.
2010
Prakash VM, Shobana JS, Infant AP. Eliminating Vulnerable attacks Using One-Time Password and PassText – Analytical Study of Blended Schema. Universal Journal of Computer Science and Engineering Technology. 2010;1(2):133–140.