The project to understand and research preterm pregnancy outcomes and stillbirths in South Asia (PURPOSe): a protocol of a prospective, cohort study of causes of mortality … EM McClure, S Saleem, SS Goudar, S Dhaded, G Guruprasad, Y Kumar, ... Reproductive health 15, 45-53, 2018 | 38 | 2018 |
Feature Selection Approach for Intrusion Detection System YK Krishan Kumar, Gulshan Kumar International Journal of Advanced Trends in Computer Science and Engineering …, 2013 | 29* | 2013 |
Asymmetric Algorithms and Symmetric Algorithms: A Review T Bala, Y Kumar International Conference on Advancements in Engineering and Technology …, 2015 | 21 | 2015 |
Implementation of efficient clock synchronization using elastic timer technique in IoT K Mehta, Y Kumar Advances in Mathematics: Scientific Journal 9 (6), 4025-4030, 2020 | 19 | 2020 |
Neonatal deaths in infants born weighing≥ 2500 g in low and middle-income countries S Saleem, F Naqvi, EM McClure, KJ Nowak, SS Tikmani, AL Garces, ... Reproductive Health 17, 1-14, 2020 | 18 | 2020 |
Combinational feature selection approach for network intrusion detection system T Garg, Y Kumar 2014 International Conference on Parallel, Distributed and Grid Computing, 82-87, 2014 | 16 | 2014 |
Evaluating the effectiveness of pubertal preparedness program in terms of knowledge and attitude regarding pubertal changes among pre-adolescent girls M Rani, P Sheoran, Y Kumar, N Singh Journal of family & reproductive health 10 (3), 122, 2016 | 15 | 2016 |
Enhancing time synchronization for home automation systems K Mehta, Y Kumar, A Aayushi ECS Transactions 107 (1), 6197, 2022 | 10 | 2022 |
Knowledge and attitude regarding pubertal changes among pre-adolescent boys: An interventional study in rural area in India P Sheoran, M Rani, Y Kumar, N Singh J Nurs Care 5 (5), 2167-1168.1000370, 2016 | 8 | 2016 |
Blockchain based security protocol for device to device secure communication in internet of things networks P Chandrakar, R Bagga, Y Kumar, SK Dwivedi, R Amin Security and Privacy 6 (1), e267, 2023 | 6 | 2023 |
A review on information flow in intrusion detection system Y Kumar, S Dhawan International Journal of Computational Engineering and Management 15 (1), 91-96, 2012 | 6 | 2012 |
Integration of cloud computing in BCI: A review Y Kumar, J Kumar, P Sheoran Biomedical Signal Processing and Control 87, 105548, 2024 | 5 | 2024 |
The Efficient Managemnet of Renewable Energy Resources for Vanet-Cloud Communication N Kapoor, Y Kumar Nature-Inspired Computing Applications in Advanced Communication Networks …, 2020 | 4 | 2020 |
AI based Hybrid Ensemble Technique for Network Security Y Kumar International Journal of Computer Applications 975, 8887, 2016 | 4 | 2016 |
Cryptographic algorithms for secure internet of things K Mehta, Y Kumar, HS Sidhu Int. J. Control Autom 13 (4), 1010-1018, 2020 | 3 | 2020 |
Performance Analysis of Hybrid routing protocol Y Kumar, A Malik 2021 2nd International Conference on Intelligent Engineering and Management …, 2021 | 2 | 2021 |
A Novel Approach to Analyze the Sentiment with Conjunctive Words T Khan, Y Kumar International Research Journal of Engineering and Technology (IRJET) 3 (7), 2016 | 2 | 2016 |
Auto-Scaling Framework for Enhancing the Quality of Service in the Mobile Cloud Environments. Y Kumar, J Kumar, P Sheoran Computers, Materials & Continua 75 (3), 2023 | 1 | 2023 |
Common fixed point theorems in complex valued metric space satisfying (EA) and (CLR)-Property J Kumar, Y Kumar Int. J. of Sc. Research Eng. and Tec.(IJSRET) 7 (2), 397-402, 2013 | 1 | 2013 |
On building intelligence for securing communication between the Tags and the Mobile Devices JKR Sastry, N Venkatram, YP Kumar, NR Babu International Journal Of Mobile and Adhoc Network-IFRSA 3 (3), 297-302, 0 | 1 | |