Assistant Professsor , MNNIT Allahabad
Verified email at - Homepage
Cited by
Cited by
A review paper on ad hoc network security
K Singh, RS Yadav, A Ranvijay
International journal of computer science and security 1 (1), 52, 2007
Fault tolerance in real time distributed system
A Kumar, RS Yadav, AJ Ranvijay
International Journal on Computer Science and Engineering 3 (2), 933-939, 2011
Software cost estimation using environmental adaptation method
T Singh, R Singh, KK Mishra
Procedia computer science 143, 325-332, 2018
Fast and memory efficient approach for mapping NGS reads to a reference genome
S Kumar, S Agarwal, Ranvijay
Journal of bioinformatics and computational biology 17 (02), 1950008, 2019
A state-of-art approach to misbehaviour detection and revocation in VANET: survey
D Singh, Ranvijay, RS Yadav
International Journal of Ad Hoc and Ubiquitous Computing 28 (2), 77-93, 2018
NWCA: A new weighted clustering algorithm to form stable cluster in VANET
D Singh, RS Yadav
Proceedings of the second international conference on information and …, 2016
A variant of EAM to uncover community structure in complex networks
T Singh, KK Mishra, Ranvijay
International Journal of Bio-Inspired Computation 16 (2), 102-110, 2020
Multiobjective environmental adaptation method for solving environmental/economic dispatch problem
T Singh, KK Mishra
Evolutionary Intelligence 12 (2), 305-319, 2019
A Preemption Control Approach For Energy Aware Fault Tolerant Real Time System
S Agrawal, RS Yadav
International Journal of Recent Trends in Engineering, 2009
Lip reading techniques: A survey
S Agrawal, VR Omprakash
2016 2nd International Conference on Applied and Theoretical Computing and …, 2016
Improve real-time packet scheduling algorithm with security constraint
S Singh
2014 Annual IEEE India Conference (INDICON), 1-6, 2014
Essential secret image sharing approach with same size of meaningful shares
M Yadav, R Singh
Multimedia Tools and Applications 81 (16), 22677-22694, 2022
A preemption control technique for system energy minimization of weakly hard real-time systems
S Agrawal, R Shankar Yadav
Software Engineering, Artificial Intelligence, Networking and Parallel …, 2008
Checkpointing based fault tolerance patterns for systems with arbitrary deadlines
S Agrawal, RS Yadav, N Das
15th International Conference on Advanced Computing and Communications …, 2007
Extractive Text Summarization Using Recent Approaches: A Survey.
AK Yadav, AK Maurya, RS Yadav
Ingénierie des Systèmes d'Information 26 (1), 2021
Cheating Prevention and Detection Technique in Visual Secret Sharing.
M Yadav
Ingénierie des Systèmes d'Information 25 (4), 2020
Cryptanalysis on digital image watermarking based on feature extraction and visual cryptography
N Shashni, M Yadav
Progress in Advanced Computing and Intelligent Engineering, 425-435, 2019
Ranvijay," Collusion attacks in XOR-based RG-VSS”
M Yadav
International Journal of Innovative Technology and Exploring Engineering, 2019
WBFQC: A new approach for compressing next-generation sequencing data splitting into homogeneous streams
S Kumar, S Agarwal, Ranvijay
Journal of Bioinformatics and Computational Biology 16 (05), 1850018, 2018
Gender classification of blog authors: With feature engineering and deep learning using lstm networks
VP Dwivedi, DK Singh, S Jha
2017 Ninth International Conference on Advanced Computing (ICoAC), 142-148, 2017
The system can't perform the operation now. Try again later.
Articles 1–20