RECENT SCHOLAR PUBLICATIONS
- Blockchain based security protocol for device to device secure communication in internet of things networksP Chandrakar, R Bagga, Y Kumar, SK Dwivedi, R AminSecurity and Privacy 6 (1), e267 2023
- Enhancing time synchronization for home automation systemsK Mehta, Y Kumar, A AayushiECS Transactions 107 (1), 6197 2022
- Cluster Head Selection Protocol with Improved the Lifetime of WSNY KumarNeuroQuantology 20 (10), 1718 2022
- Design of Secure Elastic Timer Protocol in IoT-Comparative AnalysisK Mehta, Y KumarREVISTA GEINTEC-GESTAO INOVACAO E TECNOLOGIAS 11 (4), 1778-1791 2021
- Neonatal deaths in infants born weighing≥ 2500 g in low and middle-income countriesS Saleem, F Naqvi, EM McClure, KJ Nowak, SS Tikmani, AL Garces, ...Reproductive Health 17, 1-14 2020
- Implementation of efficient clock synchronization using elastic timer technique in IoTK Mehta, Y KumarAdvances in Mathematics: Scientific Journal 9 (6), 4025-4030 2020
- Cryptographic algorithms for secure internet of thingsK Mehta, Y Kumar, HS SidhuInt. J. Control Autom 13 (4), 1010-1018 2020
- Find the user visiting throughout Google Map and cluster based on most frequent visiting region using k means algorithmEYK Taruna SehgalINTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 7 (3), 729-734 2019
- Spatial data mining using k means algorithm and find users having common interest using genetic algorithmEYK Taruna SehgalINTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH 7 (3), 722-728 2019
- The project to understand and research preterm pregnancy outcomes and stillbirths in South Asia (PURPOSe): a protocol of a prospective, cohort study of causes of mortalityEM McClure, S Saleem, SS Goudar, S Dhaded, G Guruprasad, Y Kumar, ...Reproductive health 15, 45-53 2018
- PROTOCOL Open AccessEM McClure, S Saleem, SS Goudar, S Dhaded, G Guruprasad, Y Kumar, ... 2018
- Gesture and Joystick Controlled Multipurpose Automated WheelchairMR Sathuluri, S Bathulla, A Azeem, YP KumarIndian Journal of Science and Technology 2017
- AI based Hybrid Ensemble Technique for Network SecurityI Bala, Y KumarInternational Conference on Advancements in Engineering and Technology 2016 2016
- A Novel Approach to Analyze the Sentiment with Conjunctive WordsT Khan, Y KumarInternational Research Journal of Engineering and Technology (IRJET) 3 (7) 2016
- AI based Hybrid Ensemble Technique for Network SecurityY KumarInternational Journal of Computer Applications 975, 8887 2016
- Comparative Analysis of Parallel AES Algorithm with Pipelined AES AlgorithmT Bala, Y KumarInternational Journal of Computer Science Trends and Technology (IJCST) 3 (6 2015
- Identify Promising Classifiers for Each Type of Attack ClassI Bala, Y KumarFourth International Conference on Advances in Computer Science and 2015
- Asymmetric Algorithms and Symmetric Algorithms: A ReviewT Bala, Y KumarInternational Conference on Advancements in Engineering and Technology 2015
- Combinational feature selection approach for network intrusion detection systemT Garg, Y Kumar2014 International Conference on Parallel, Distributed and Grid Computing, 82-87 2014
- Feature Selection For Intrusion Detection Systems Using data mining techniquesYogesh Kumar, Krishan Kumar, Gulshan KumarLAP LAMBERT Academic Publishing 2014