Security in virtual private network T Sharma, R Yadav International Journal of Innovations & Advancement in Computer Science 4 …, 2015 | 15 | 2015 |
Improved association mining algorithm for large dataset T Arora, R Yadav IJCEM International Journal of Computational Engineering & Management 13, 2011 | 10 | 2011 |
Cryptography on Android Message Applications–A Review RKY Nishika IJCSE, 2013 | 9* | 2013 |
OPTIMIZED MODEL FOR SOFTWARE EFFORT ESTIMATION USING COCOMO-2 METRICS WITH FUZZY LOGIC. RK Yadav, S Niranjan International Journal of Advanced Research in Computer Science 8 (7), 2017 | 8 | 2017 |
A New Approach to Automated Summarization based on Fuzzy Clustering and Particle Swarm Optimization RK Yadav, S Singh International Journal of Computer Applications 148 (1), 2016 | 8 | 2016 |
Software Effort Estimation Using Fuzzy Logic: A Review RK Yadav, DS Niranjan International Journal of Engineering Research & Technology 2 (5), 1337-1384, 2013 | 5 | 2013 |
A fuzzy improved association mining approach to estimate software quality S Rana, RK Yadav International Journal of Computer Science and Mobile Computing, 2013 | 3 | 2013 |
A fuzzy based approach for effective data replication in peer-to-peer networks A Rani, RK Yadav International journal of advanced research in computer and communication …, 2013 | 3 | 2013 |
A Lookup Table Based Secure Cryptographic SMS Communication on Android Environment RKY Nishika | 2 | 2013 |
Encryption and Decryption for Secure Communication C Rohilla, RK Yadav, S Singh, BG PDMCE | 1 | |
Project Effort Estimation using COCOMO-2 Metrics with Fuzzy Logic RK Yadav, S Niranjan Indian Journal of Science and Technology 10 (29), 2017 | | 2017 |
A Review of Wormhole Detection Using HMM Approach H Deswal, R Yadav | | 2013 |
Wormhole Detection Using Hidden Markov Model Approach H Deswal, RK Yadav | | 2013 |
Fuzzy Set in Business Process Management as Reference Model MY Kumar, MS Yadav, R Yadav Global Journal of Computer Science and Technology, 2010 | | 2010 |