default search action
Ashok Kumar Yadav
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Ashok Kumar Yadav, Rajesh Mehta, Vinit Kumar, Nageswara Rao Medikondu:
An optimized boosting framework for skin lesion segmentation and classification. Multim. Tools Appl. 83(18): 53875-53896 (2024) - [j13]Ashok Kumar Yadav, Rajesh Mehta, Vinit Kumar, Nageswara Rao Medikondu:
Correction to: An optimized boosting framework for skin lesion segmentation and classification. Multim. Tools Appl. 83(18): 53897 (2024) - [j12]Ashok Kumar Yadav, Karan Singh, Pramod Kumar Srivastava:
Probabilistic estimation of comprehensive utility based on user preference and network condition for network selection in future in HetNet. J. Supercomput. 80(3): 4378-4400 (2024) - 2023
- [j11]Aditi Vashistha, Sunil Kumar, Seema Kirar, Nikhil Sharma, Bhanuranjan Das, Uttam Chand Banerjee, Sandip V. Pawar, Rajnish Kumar, Ashok Kumar Yadav:
Synthesis, biological evaluation and in silico studies of 2-aminoquinolines and 1-aminoisoquinolines as antimicrobial agents. Comput. Biol. Chem. 102: 107807 (2023) - [j10]Ashok Kumar Yadav, Karan Singh, Ali H. Amin, Laila M. Almutairi, Theyab R. Alsenani, Ali Ahmadian:
A comparative study on consensus mechanism with security threats and future scopes: Blockchain. Comput. Commun. 201: 102-115 (2023) - [j9]Jitender Tanwar, Sanjay Kumar Sharma, Mandeep Mittal, Ashok Kumar Yadav:
Classification of Web Services for Efficient Performability. Int. J. Perform. Eng. 19(10): 654 (2023) - [j8]Sachin Allwadhi, Kamaldeep Joshi, Ashok Kumar Yadav, Rainu Nandal, Prince Allawadhi, Gargi Khurana, Deepika Kumari:
Image Steganography Using Optimized Twin Attention-Based Convolutional Capsule Network. Int. J. Pattern Recognit. Artif. Intell. 37(16): 2354026:1-2354026:34 (2023) - [j7]Ashok Kumar Yadav, Karan Singh, Pramod Kumar Srivastava, Purnendu Shekhar Pandey:
I-MEREC-T: Improved MEREC-TOPSIS scheme for optimal network selection in 5G heterogeneous network for IoT. Internet Things 22: 100748 (2023) - [j6]Sachin Allwadhi, Kamaldeep Joshi, Ashok Kumar Yadav, Rainu Nandal:
A new data hiding model based on adaptive keyed Huffman multi-layer midpoint folding and optimized deep wavelet histogram modification strategy. Multim. Tools Appl. 82(30): 47189-47214 (2023) - [j5]Shashank Awasthi, Pramod Kumar Srivastava, Naresh Kumar, Rudra Pratap Ojha, Ashok Kumar Yadav:
A Study of the Dissemination of Malware and the Enhancement of the Lifespan of Rechargeable Wireless Sensor Networks: An Epidemiological Approach. SN Comput. Sci. 4(6): 851 (2023) - 2022
- [j4]Ashok Kumar Yadav, Bhanu Sharma, Akash Kumar Bhagat, Harshal Shah, C. R. Manjunath, Aishwary Awasthi:
Edge Computing in Centralized Data Server Deployment for Network Qos and Latency Improvement for Virtualization Environment. Int. J. Commun. Networks Inf. Secur. 14(3): 214-225 (2022) - 2021
- [j3]Ashok Kumar Yadav, Karan Singh, Ali Ahmadian, Senthilkumar Mohan, Syed Bilal Hussain Shah, Waleed S. Alnumay:
EMMM: Energy-efficient mobility management model for context-aware transactions over mobile communication. Sustain. Comput. Informatics Syst. 30: 100499 (2021) - 2020
- [j2]Rajesh Mehta, Keshav Gupta, Ashok Kumar Yadav:
An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain. Multim. Tools Appl. 79(25-26): 18657-18678 (2020)
2010 – 2019
- 2016
- [j1]Ashok Kumar Yadav, Rajesh Mehta, Raj Kumar, Virendra P. Vishwakarma:
Lagrangian twin support vector regression and genetic algorithm based robust grayscale image watermarking. Multim. Tools Appl. 75(15): 9371-9394 (2016) - 2015
- [c1]Ashok Kumar Yadav, Rajesh Mehta, Raj Kumar:
Gray scale image watermarking using fuzzy entropy and Lagrangian twin SVR in DCT domain. IC3 2015: 19-24
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint