Dilip Kumar Yadav

Orcid: 0000-0002-1334-7500

According to our database1, Dilip Kumar Yadav authored at least 28 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fuzzy Logic Based Energy Efficient Simultaneous Wireless Information and Power Transfer for Wireless Sensor Networks.
Wirel. Pers. Commun., May, 2024

A generalized approach to construct node probability table for Bayesian belief network using fuzzy logic.
J. Supercomput., January, 2024

2023
Improved African Buffalo Optimization-Based Energy Efficient Clustering Wireless Sensor Networks using Metaheuristic Routing Technique.
Wirel. Pers. Commun., June, 2023

Contrast enhancement of region of interest of backlit image for surveillance systems based on multi-illumination fusion.
Image Vis. Comput., 2023

2022
FAHP based software reliability allocation concerning operational profile.
Int. J. Syst. Assur. Eng. Manag., 2022

Multiple feature-based contrast enhancement of ROI of backlit images.
Mach. Vis. Appl., 2022

2020
Terminal reliability analysis of multistage interconnection networks.
Int. J. Syst. Assur. Eng. Manag., 2020

A Survey on Secure Cloud-Based E-Health Systems.
EAI Endorsed Trans. Pervasive Health Technol., 2020

Cloud-based Secure TeleMedicine Information System using Crypto-Biometric Techniques.
EAI Endorsed Trans. Pervasive Health Technol., 2020

Personal characters to bits mapping using Dot Pattern Character Encoding Scheme (DPCES).
J. King Saud Univ. Comput. Inf. Sci., 2020

A modified approach to data hiding in Microsoft Word documents by change-tracking technique.
J. King Saud Univ. Comput. Inf. Sci., 2020

Enhancement of Region of Interest from a Single Backlit Image with Multiple Features.
Proceedings of the Computer Vision and Image Processing - 5th International Conference, 2020

2019
Design and reliability analysis of fault-tolerant shuffle exchange gamma logical neighborhood interconnection network.
J. Supercomput., 2019

A novel information hiding scheme based on social networking site viewers' public comments.
J. Inf. Secur. Appl., 2019

2018
A fuzzy logic based approach for decision making.
J. Intell. Fuzzy Syst., 2018

Performance Analysis of RSA and Elliptic Curve Cryptography.
Int. J. Netw. Secur., 2018

2017
Early software reliability analysis using reliability relevant software metrics.
Int. J. Syst. Assur. Eng. Manag., 2017

An accelerating PSO algorithm based test data generator for data-flow dependencies using dominance concepts.
Int. J. Syst. Assur. Eng. Manag., 2017

Software defects estimation using metrics of early phases of software development life cycle.
Int. J. Syst. Assur. Eng. Manag., 2017

A minesweeper game-based steganography scheme.
J. Inf. Secur. Appl., 2017

A novel approach to automate test data generation for data flow testing based on hybrid adaptive PSO-GA algorithm.
Int. J. Adv. Intell. Paradigms, 2017

2015
A method for generating membership function from numerical data.
J. Intell. Fuzzy Syst., 2015

A fuzzy logic based approach for phase-wise software defects prediction using software metrics.
Inf. Softw. Technol., 2015

Developing Membership Functions and Fuzzy Rules from Numerical Data for Decision Making.
Proceedings of the 2015 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (IFSA-EUSFLAT-15), 2015

2014
A Fuzzy Logic Approach for Multistage Defects Density Analysis of Software.
Proceedings of Fourth International Conference on Soft Computing for Problem Solving, 2014

2013
A Multistage Model for Defect Prediction of Software Development Life Cycle Using Fuzzy Logic.
Proceedings of the Third International Conference on Soft Computing for Problem Solving, 2013

Network Security Using ECC with Biometric.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

A Novel Approach to Text Steganography Using Font Size of Invisible Space Characters in Microsoft Word Document.
Proceedings of the Intelligent Computing, 2013


  Loading...