Delay optimization and energy balancing algorithm for improving network lifetime in fixed wireless sensor networks HV Chaitra, G Manjula, M Shabaz, AB Martinez-Valencia, KB Vikhyath, ... Physical Communication 58, 102038, 2023 | 30 | 2023 |
Intersection of AI and blockchain technology: Concerns and prospects KB Vikhyath, RK Sanjana, NV Vismitha The International Conference on Deep Learning, Big Data and Blockchain (Deep …, 2022 | 10 | 2022 |
Wireless Sensor Networks Security Issues and Challenges: A survey BSH Vikhyath K B International Journal of Engineering and Technology 7 (33), 2018 | 10 | 2018 |
Combined Osprey-Chimp Optimization for Cluster Based Routing in Wireless Sensor Networks: Improved DeepMaxout for Node Energy Prediction KB Vikhyath, NA Prasad Engineering, Technology & Applied Science Research 13 (6), 12314-12319, 2023 | 5 | 2023 |
Survey on Data Security with Intersection of AI and Blockchain KB Vikhyath, SS Kubsad, AG Sunidhi 2022 Fourth International Conference on Cognitive Computing and Information …, 2022 | 2 | 2022 |
Neural Network Based Atrial Fibrillation Classification KB Vikhyath, S Agrawal, VR Balery, S Tejeshwini 2023 International Conference on Network, Multimedia and Information …, 2023 | | 2023 |
Physical Communication AB Martinez-Valencia, KB Vikhyath, S Verma, JL Arias-Gonzáles | | 2023 |
The power control MAC using RIMA in Ad-Hoc Networks DKK Vikhyath K B , Chethan B K International Journal of Research in Engineering and Advanced Technology …, 2014 | | 2014 |
MAC Power Enhancement Using Overlapped Carrier Sense Multiple Access VKBDMS Chethan B.K International Journal of Research in Engineering & Advanced Technology 1 …, 2013 | | 2013 |
Upgrading The Network Throughput and Enhancing The Power Control by Receiver Initiated Multi Access Protocol in Ad-hoc Networks V K.B National Conference on Networking, Embedded and Wireless Systems, 2012 | | 2012 |
Time Stamped steganography for Authenticated Connection Establishment in Web Applications VKBDM Siddappa National Conference on Frontiers of Computer Science, 19-21, 2011 | | 2011 |
Authenticated Connection Establishment in Web Application Using Steganography VKBDM Siddappa National Conference on Evolutionary Trends in Information Technology, 2011 | | 2011 |
Authenticated Connection establishment in Web Applications using Steganography KB Vikhyath, M Siddappa | | |