Satellite quantum communication protocol regardless of the weather M Mastriani, SS Iyengar, L Kumar Optical and Quantum Electronics 53 (4), 181, 2021 | 24 | 2021 |
Bidirectional teleportation for underwater quantum communications M Mastriani, SS Iyengar, KJ Latesh Kumar Quantum Information Processing 20 (1), 22, 2021 | 18 | 2021 |
Implementing Network File System Protocol for Highly Available Clustered Applications on Network Attached Storage L KJ IEEE, 7, 2013 | 12 | 2013 |
Boundary-based fake face anomaly detection in videos using recurrent neural networks Y Hariprasad, KJ Latesh Kumar, L Suraj, SS Iyengar Proceedings of SAI Intelligent Systems Conference, 155-169, 2022 | 6 | 2022 |
Hybrid synchronous discrete distance time model for traffic signal optimization SK Sahana, K Kumar Computational Intelligence in Data Mining-Volume 1: Proceedings of the …, 2015 | 6 | 2015 |
Novel approach: Deduplication for backup systems using data block size KJ Latesh Kumar, R Lawrance Computational Intelligence in Data Mining-Volume 1: Proceedings of the …, 2015 | 5 | 2015 |
Analysis of five techniques for the internal representation of a digital image inside a quantum processor SS Iyengar, LKJ Kumar, M Mastriani arXiv preprint arXiv:2008.01081, 2020 | 3 | 2020 |
Recent trends in computer networks and distributed systems security GM Pérez, SM Thampi, R Ko, L Shu Proceedings of the Second International Conference on Security in Computer …, 2014 | 3 | 2014 |
Hardware routed quantum key distribution networks A Singal, SS Iyengar, L Kumar, AM Madni IET Quantum Communication 3 (2), 127-138, 2022 | 2 | 2022 |
Quantum Computing Environments SS Iyengar, M Mastriani, KJL Kumar Springer, 2022 | 2 | 2022 |
Analysis of five techniques for the internal representation of a digital image inside a quantum processor M Mastriani, SS Iyengar, L Kumar SN Computer Science 2 (6), 450, 2021 | 2 | 2021 |
NGEN Firewall Security Augmentation using Brooks-Iyengar and Random Forest Classfier method: by Predicting Cyber Threats from: Darkweb/Deepweb Data LK KJ, HU Leena International Journal of Next-Generation Computing 11 (1), 2020 | 2 | 2020 |
Perception of paddy farmers about minimum support price in Karnataka. S Sahana, K Kumar, R Patil, MC Vivek | 1 | 2021 |
Securing Storage Appliances via UNIX based Kerberos Authentication L KJ International Journal of Computer Applications (0975 – 8887) 65 (1), 4, 2013 | 1 | 2013 |
Novel Approach: Clustered Cache Parallel NFS and Implementing Across Wide Area Network: Disaster Recovery Centers LKKJR Lawrance Proc. of Int. Conf. on Advances in Communication, Network, and Computing, CNC, 0 | 1 | |
AI-ML Analytics: A Comprehensive Investigation on Sentimental Analysis for Social Media Forensics Textual Data Y Hariprasad, S Lokesh, NT Sharathkumar, LK KJ, C Miller, ... Science and Information Conference, 923-935, 2023 | | 2023 |
Resource Specific Security Implementation in Network and Cloud System. LK KJ, HU Leena International Journal of Next-Generation Computing 12 (4), 2021 | | 2021 |
Analysis of five techniques for the internal representation of a digital image inside a quantum processor S Sitharama Iyengar, LKJ Kumar, M Mastriani arXiv e-prints, arXiv: 2008.01081, 2020 | | 2020 |
Bidirectional teleportation for underwater quantum communications SS Iyengar, KJ Kumar, M Mastriani arXiv preprint arXiv:2009.04241, 2020 | | 2020 |
Bidirectional teleportation for underwater quantum communications S Sitharama Iyengar, KJ Latesh Kumar, M Mastriani arXiv e-prints, arXiv: 2009.04241, 2020 | | 2020 |