Dipak wajgi | Rtm Nagpur university, Nagpur. (original) (raw)

Papers by Dipak wajgi

Research paper thumbnail of Clustering Based RSSI and AOA combination for Localization in Wireless Sensor Networks

International journal of communication networks and distributed systems, 2024

Research paper thumbnail of Communication in IoT Devices

Internet of things, Dec 7, 2023

Research paper thumbnail of Internet of Everything: Applications

Internet of things, Dec 7, 2023

Research paper thumbnail of Reconstruction of Gene Regulatory Network using Modified Ant-based Algorithm

International Journal of Engineering and Advanced Technology, 2020

Healthcare is a major area of research since few years. Ample amount of biological data getting a... more Healthcare is a major area of research since few years. Ample amount of biological data getting accumulated daily due to advancement in technologies. Microarray is such technology which captures expressions of thousands of genes at a time. Interactions occur among genes are represented in terms of special networkeknown as Gene Regulatory Network (GRN). It is constructed from Differentially Expressing Genes(DEFs). GRN is a graphical representation containing genes as nodes and regulatory interactions among them as edges. It helps in tracking pathways where usual gene interaction changes leading to malfunctioning of cells and results in illness. Also, now a day’s people are diagnosed with new diseases like dengue, swine flu, Nipah, Corona virus infection for which exact molecular pathways are yet to be invented through GRN. Therefore, in this paper, a nature inspired algorithm is used for reconstruction of GRN using differentially expressing genes.

Research paper thumbnail of A Clustering-Based 3D Localization in Wireless Sensor Networks Using RSSI and AoA

Research paper thumbnail of Correction: Localization in wireless sensor networks and wireless multimedia sensor networks using clustering techniques

Multimedia Tools and Applications

The affiliation of the second author (Jitendra V. Tembhurne) was incorrect in the original public... more The affiliation of the second author (Jitendra V. Tembhurne) was incorrect in the original publication of this article. The original article has been corrected.

Research paper thumbnail of Content Extraction from Ancient Document Image

Content extraction from badly degraded ancient document is very challenging task due to the diffe... more Content extraction from badly degraded ancient document is very challenging task due to the different causes of degradation. Ancient documents are of great importance to us and accumulate a significant amount of human heritage over times. These ancient documents are in the degraded form containing vital and valuable information but the contents of the document not recognized easily. There are many causes of degradations such as environmental factors improper handling and the poor quality of the materials. In recent period, the rising interest in the historical document image analysis many researchers are attracting towards extraction of contents from historical document and preserve their contents for future generations. Numerous methods exist but they are not suitable for all types of degraded documents. The proposed method is simple, robust and based on the phase binarisation model. The proposed method is divided into Preprocessing, Post processing and extraction. The Preprocessin...

Research paper thumbnail of Localization in wireless sensor networks and wireless multimedia sensor networks using clustering techniques

Multimedia Tools and Applications

Research paper thumbnail of Imputation of Missing Gene Expressions for DNA Microarray Using Particle Swarm Optimization

Advances in Intelligent Systems and Computing, 2015

While capturing gene expressions using microarray technique missing values get generated in the d... more While capturing gene expressions using microarray technique missing values get generated in the data set. These missing values create negative impact on downstream analysis of DNA microarray. Therefore, it is necessary to estimate them before starting further analysis. Many algorithms are proposed for imputation of missing values which are based on statistical methods. They require complete gene expression data set which is created by replacing missing values by different methods like row averaging or column averaging and later missing expressions are imputed. This may affect efficiency of algorithms. In order to deal with problem of missing values, we have proposed new method based on Swarm Intelligence which is easy to implement and apply to any kind of dataset irrespective of amount of missing values in it. This method imputes missing gene expressions in microarray data set using Particle Swarm Optimization.

Research paper thumbnail of Malnutrition detection in infants using machine learning approach

AIP Conference Proceedings, 2022

Research paper thumbnail of Minutiae Cylindrical Code ( MCC ) for Fingerprint Matching-A Survey

In this paper, introduction minutiae cylindrical code (MCC) for fingerprint matching based on 3D ... more In this paper, introduction minutiae cylindrical code (MCC) for fingerprint matching based on 3D data structures called cylinders. In this digital era, lots of physical data have been transformed into the digital ones. A survey of minutiae cylindrical code (MCC) is done using various papers to find out the problem or drawback in various models, methods, algorithm. This paper aims to improve the fingerprint matching performance, by using Minutiae Cylinder-Code (MCC) algorithm. With the help of MATLAB tool false acceptance rate (FAR), false rejection rate (FRR), execution time, matching time, enrolment time is going to be improved.

Research paper thumbnail of Load Balancing Algorithms in Wireless Sensor Network : A Survey

In this paper, we examine the proposed load balancing algorithms for wireless sensor networks. Lo... more In this paper, we examine the proposed load balancing algorithms for wireless sensor networks. Load balancing can be used to extend the lifetime of a sensor network by reducing energy consumption. Load balancing using clustering can also increase network scalability. Wireless sensor network with the nodes with different energy levels can prolong the network lifetime of the network and also its reliability. We discuss the improvement to be made for future proposed load balancing schemes. This paper should provide the reader with the basis for research in load balancing schemes for wireless sensor networks.

Research paper thumbnail of A Clustering Based Approach to Provide Security to Wireless Sensor Network

2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 2018

In past few years the wireless sensor network has been able to attract a lot of research related ... more In past few years the wireless sensor network has been able to attract a lot of research related to ubiquitous computing and networking such as communication, network formation, enhancing battery life, security, etc. Amongst these, this paper's focus is on one of the key concern to any data centric network i.e. security. Security plays a vital role when it comes to wireless sensor network. A malicious node can affect the network in various forms eventually disrupting the working of entire network. The paper proposes a cluster based approach to prevent a malicious node from entering a wireless sensor network. The simulation of the proposed security system helped in understanding how clustering can be useful in securing the sensor network from malicious node as early as deployment of cluster heads.

Research paper thumbnail of Energy Aware Approach for Path Finding in Wireless Sensors Network

Now a day's people make use of sensors in order to have a distant communication without any ... more Now a day's people make use of sensors in order to have a distant communication without any intervention and to avoid the use of wires so that our communication will be mobile, but these sensors suffers a problem of battery drainage. There are various Energy Efficient Protocols for WSN that are being created which aspire to successfully deliver the data packets from sensor node (source) to the Base Station. These protocols have certain parameters like distance to identify the route. These protocols have a considerable amount of energy to find the minimum distance. Our aim is to formulate a protocol which has a target to calculate an efficient path at the same time save the energy of sensors in order to enhance the lifetime of network. This paper proposed an Optimum Path and Energy Aware Sensor Routing Protocol

Research paper thumbnail of An Image Forgery Detection using SIFT-PCA

International Journal of Engineering Research and

Digital Images plays an important role for transferring the information and are widely used in al... more Digital Images plays an important role for transferring the information and are widely used in all areas of day-today life. Although, with the development of modern technologies, multiple software's are developed. This leads to the forgery of digital images. Copy-move Image Forgery Detection is one of the forensic techniques in which selected area of an image is get copied and then moved onto the other portion of the image. In this research, the main aim is to detect the forged region from the image. A method is proposed to detect the copymove forgery in an image, by comparing extracted key points. The SIFT (Scale Invariant Feature Transform) algorithm is used for extracting the invariant features from an image and then extract blocks by using PCA.

Research paper thumbnail of An Energy Saving Approach in Wireless Sensor Network

Wireless sensor networks consist of small battery powered devices with limited energy resources. ... more Wireless sensor networks consist of small battery powered devices with limited energy resources. Generally nodes are deployed in an area where human being cannot reach, therefore the small sensor nodes are usually not accessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. In most of the existing protocol cluster head sends data directly to base station which dissipates a lot of energy, so in this paper an energy efficient approach is proposed which use the heterogeneous network of sensor nodes and multi hope approach for data transmission Keywords-Cluster Head, Energy Consumption, MATLAB, Network Lifetime, Wireless Sensor Network.

Research paper thumbnail of Thoracic Image Analysis Using Deep Learning

Computational Intelligence and Healthcare Informatics

Research paper thumbnail of Imputation of Missing Gene Expressions from Microarray Dataset:A Review

International Journal of Computer Trends and Technology

Research paper thumbnail of Methods used for Identification of Differentially Expressing Genes (DEGs) from Microarray Gene Dataset: A Review

International Journal of Biotech Trends and Technology

Genes contain blue print of living organism. Malfunctioning occurred in cellular life is indicate... more Genes contain blue print of living organism. Malfunctioning occurred in cellular life is indicated by proteins which are responsible for behavior of genes. Fixed set of genes decides behavior and functioning of cells. They guide the cells what to do and when to do. To analyze the insight of biological activities, analysis of gene expressions is necessary. Advanced technology like microarray plays an important role in gene analysis as it captures expressions of thousands of genes under different conditions simultaneously. Out of thousands of genes, very few behave differently which are called as Differentially Expressing Genes (DEGs). Identifying these most significant genes is a crucial task in molecular biology and is a major area of research for bioinformaticians because DEGs are the major source of disease prediction. They help in planning therapeutic strategies for a disease through Gene Regulatory Network (GRN) constructed from them. GRN is a graphical representation containing genes as nodes and regulatory interactions among them as edges. GRN helps to know change over occurred among genes which involved in cause of genetic diseases as well as to analyze their response to different stress conditions through microarray expressions. In this paper we have discussed many methods proposed by researchers for identifying differentially expressing genes based upon changes in their expressions patterns.

Research paper thumbnail of Load Balancing Based Approach To Improve Lifetime Of Wireless Sensor Network

International Journal of Wireless & Mobile Networks, 2012

In wireless sensor network, clustering is used as an effective technique to achieve scalability, ... more In wireless sensor network, clustering is used as an effective technique to achieve scalability, selforganization, power saving, channel access, routing etc.[3]. Lifetime of sensor nodes determines the lifetime of the network and is crucial for the sensing capability.[2]. Clustering is the key technique used to extend the lifetime of a sensor network. Clustering can be used for load balancing to extend the lifetime of a sensor network by reducing energy consumption. Load balancing using clustering can also increase network scalability. Wireless sensor network with the nodes with different energy levels can prolong the network lifetime of the network and also its reliability. In this paper we propose a clustering technique which will balance the load among the cluster by using some backup nodes. The backup high energy and high processing power nodes replace the cluster head after the cluster reaches to its threshold limit. This approach will increase the network lifetime and will provide high throughput.

Research paper thumbnail of Clustering Based RSSI and AOA combination for Localization in Wireless Sensor Networks

International journal of communication networks and distributed systems, 2024

Research paper thumbnail of Communication in IoT Devices

Internet of things, Dec 7, 2023

Research paper thumbnail of Internet of Everything: Applications

Internet of things, Dec 7, 2023

Research paper thumbnail of Reconstruction of Gene Regulatory Network using Modified Ant-based Algorithm

International Journal of Engineering and Advanced Technology, 2020

Healthcare is a major area of research since few years. Ample amount of biological data getting a... more Healthcare is a major area of research since few years. Ample amount of biological data getting accumulated daily due to advancement in technologies. Microarray is such technology which captures expressions of thousands of genes at a time. Interactions occur among genes are represented in terms of special networkeknown as Gene Regulatory Network (GRN). It is constructed from Differentially Expressing Genes(DEFs). GRN is a graphical representation containing genes as nodes and regulatory interactions among them as edges. It helps in tracking pathways where usual gene interaction changes leading to malfunctioning of cells and results in illness. Also, now a day’s people are diagnosed with new diseases like dengue, swine flu, Nipah, Corona virus infection for which exact molecular pathways are yet to be invented through GRN. Therefore, in this paper, a nature inspired algorithm is used for reconstruction of GRN using differentially expressing genes.

Research paper thumbnail of A Clustering-Based 3D Localization in Wireless Sensor Networks Using RSSI and AoA

Research paper thumbnail of Correction: Localization in wireless sensor networks and wireless multimedia sensor networks using clustering techniques

Multimedia Tools and Applications

The affiliation of the second author (Jitendra V. Tembhurne) was incorrect in the original public... more The affiliation of the second author (Jitendra V. Tembhurne) was incorrect in the original publication of this article. The original article has been corrected.

Research paper thumbnail of Content Extraction from Ancient Document Image

Content extraction from badly degraded ancient document is very challenging task due to the diffe... more Content extraction from badly degraded ancient document is very challenging task due to the different causes of degradation. Ancient documents are of great importance to us and accumulate a significant amount of human heritage over times. These ancient documents are in the degraded form containing vital and valuable information but the contents of the document not recognized easily. There are many causes of degradations such as environmental factors improper handling and the poor quality of the materials. In recent period, the rising interest in the historical document image analysis many researchers are attracting towards extraction of contents from historical document and preserve their contents for future generations. Numerous methods exist but they are not suitable for all types of degraded documents. The proposed method is simple, robust and based on the phase binarisation model. The proposed method is divided into Preprocessing, Post processing and extraction. The Preprocessin...

Research paper thumbnail of Localization in wireless sensor networks and wireless multimedia sensor networks using clustering techniques

Multimedia Tools and Applications

Research paper thumbnail of Imputation of Missing Gene Expressions for DNA Microarray Using Particle Swarm Optimization

Advances in Intelligent Systems and Computing, 2015

While capturing gene expressions using microarray technique missing values get generated in the d... more While capturing gene expressions using microarray technique missing values get generated in the data set. These missing values create negative impact on downstream analysis of DNA microarray. Therefore, it is necessary to estimate them before starting further analysis. Many algorithms are proposed for imputation of missing values which are based on statistical methods. They require complete gene expression data set which is created by replacing missing values by different methods like row averaging or column averaging and later missing expressions are imputed. This may affect efficiency of algorithms. In order to deal with problem of missing values, we have proposed new method based on Swarm Intelligence which is easy to implement and apply to any kind of dataset irrespective of amount of missing values in it. This method imputes missing gene expressions in microarray data set using Particle Swarm Optimization.

Research paper thumbnail of Malnutrition detection in infants using machine learning approach

AIP Conference Proceedings, 2022

Research paper thumbnail of Minutiae Cylindrical Code ( MCC ) for Fingerprint Matching-A Survey

In this paper, introduction minutiae cylindrical code (MCC) for fingerprint matching based on 3D ... more In this paper, introduction minutiae cylindrical code (MCC) for fingerprint matching based on 3D data structures called cylinders. In this digital era, lots of physical data have been transformed into the digital ones. A survey of minutiae cylindrical code (MCC) is done using various papers to find out the problem or drawback in various models, methods, algorithm. This paper aims to improve the fingerprint matching performance, by using Minutiae Cylinder-Code (MCC) algorithm. With the help of MATLAB tool false acceptance rate (FAR), false rejection rate (FRR), execution time, matching time, enrolment time is going to be improved.

Research paper thumbnail of Load Balancing Algorithms in Wireless Sensor Network : A Survey

In this paper, we examine the proposed load balancing algorithms for wireless sensor networks. Lo... more In this paper, we examine the proposed load balancing algorithms for wireless sensor networks. Load balancing can be used to extend the lifetime of a sensor network by reducing energy consumption. Load balancing using clustering can also increase network scalability. Wireless sensor network with the nodes with different energy levels can prolong the network lifetime of the network and also its reliability. We discuss the improvement to be made for future proposed load balancing schemes. This paper should provide the reader with the basis for research in load balancing schemes for wireless sensor networks.

Research paper thumbnail of A Clustering Based Approach to Provide Security to Wireless Sensor Network

2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 2018

In past few years the wireless sensor network has been able to attract a lot of research related ... more In past few years the wireless sensor network has been able to attract a lot of research related to ubiquitous computing and networking such as communication, network formation, enhancing battery life, security, etc. Amongst these, this paper's focus is on one of the key concern to any data centric network i.e. security. Security plays a vital role when it comes to wireless sensor network. A malicious node can affect the network in various forms eventually disrupting the working of entire network. The paper proposes a cluster based approach to prevent a malicious node from entering a wireless sensor network. The simulation of the proposed security system helped in understanding how clustering can be useful in securing the sensor network from malicious node as early as deployment of cluster heads.

Research paper thumbnail of Energy Aware Approach for Path Finding in Wireless Sensors Network

Now a day's people make use of sensors in order to have a distant communication without any ... more Now a day's people make use of sensors in order to have a distant communication without any intervention and to avoid the use of wires so that our communication will be mobile, but these sensors suffers a problem of battery drainage. There are various Energy Efficient Protocols for WSN that are being created which aspire to successfully deliver the data packets from sensor node (source) to the Base Station. These protocols have certain parameters like distance to identify the route. These protocols have a considerable amount of energy to find the minimum distance. Our aim is to formulate a protocol which has a target to calculate an efficient path at the same time save the energy of sensors in order to enhance the lifetime of network. This paper proposed an Optimum Path and Energy Aware Sensor Routing Protocol

Research paper thumbnail of An Image Forgery Detection using SIFT-PCA

International Journal of Engineering Research and

Digital Images plays an important role for transferring the information and are widely used in al... more Digital Images plays an important role for transferring the information and are widely used in all areas of day-today life. Although, with the development of modern technologies, multiple software's are developed. This leads to the forgery of digital images. Copy-move Image Forgery Detection is one of the forensic techniques in which selected area of an image is get copied and then moved onto the other portion of the image. In this research, the main aim is to detect the forged region from the image. A method is proposed to detect the copymove forgery in an image, by comparing extracted key points. The SIFT (Scale Invariant Feature Transform) algorithm is used for extracting the invariant features from an image and then extract blocks by using PCA.

Research paper thumbnail of An Energy Saving Approach in Wireless Sensor Network

Wireless sensor networks consist of small battery powered devices with limited energy resources. ... more Wireless sensor networks consist of small battery powered devices with limited energy resources. Generally nodes are deployed in an area where human being cannot reach, therefore the small sensor nodes are usually not accessible to the user, and thus replacement of the energy source is not feasible. Hence, energy efficiency is a key design issue that needs to be enhanced in order to improve the life span of the network. In most of the existing protocol cluster head sends data directly to base station which dissipates a lot of energy, so in this paper an energy efficient approach is proposed which use the heterogeneous network of sensor nodes and multi hope approach for data transmission Keywords-Cluster Head, Energy Consumption, MATLAB, Network Lifetime, Wireless Sensor Network.

Research paper thumbnail of Thoracic Image Analysis Using Deep Learning

Computational Intelligence and Healthcare Informatics

Research paper thumbnail of Imputation of Missing Gene Expressions from Microarray Dataset:A Review

International Journal of Computer Trends and Technology

Research paper thumbnail of Methods used for Identification of Differentially Expressing Genes (DEGs) from Microarray Gene Dataset: A Review

International Journal of Biotech Trends and Technology

Genes contain blue print of living organism. Malfunctioning occurred in cellular life is indicate... more Genes contain blue print of living organism. Malfunctioning occurred in cellular life is indicated by proteins which are responsible for behavior of genes. Fixed set of genes decides behavior and functioning of cells. They guide the cells what to do and when to do. To analyze the insight of biological activities, analysis of gene expressions is necessary. Advanced technology like microarray plays an important role in gene analysis as it captures expressions of thousands of genes under different conditions simultaneously. Out of thousands of genes, very few behave differently which are called as Differentially Expressing Genes (DEGs). Identifying these most significant genes is a crucial task in molecular biology and is a major area of research for bioinformaticians because DEGs are the major source of disease prediction. They help in planning therapeutic strategies for a disease through Gene Regulatory Network (GRN) constructed from them. GRN is a graphical representation containing genes as nodes and regulatory interactions among them as edges. GRN helps to know change over occurred among genes which involved in cause of genetic diseases as well as to analyze their response to different stress conditions through microarray expressions. In this paper we have discussed many methods proposed by researchers for identifying differentially expressing genes based upon changes in their expressions patterns.

Research paper thumbnail of Load Balancing Based Approach To Improve Lifetime Of Wireless Sensor Network

International Journal of Wireless & Mobile Networks, 2012

In wireless sensor network, clustering is used as an effective technique to achieve scalability, ... more In wireless sensor network, clustering is used as an effective technique to achieve scalability, selforganization, power saving, channel access, routing etc.[3]. Lifetime of sensor nodes determines the lifetime of the network and is crucial for the sensing capability.[2]. Clustering is the key technique used to extend the lifetime of a sensor network. Clustering can be used for load balancing to extend the lifetime of a sensor network by reducing energy consumption. Load balancing using clustering can also increase network scalability. Wireless sensor network with the nodes with different energy levels can prolong the network lifetime of the network and also its reliability. In this paper we propose a clustering technique which will balance the load among the cluster by using some backup nodes. The backup high energy and high processing power nodes replace the cluster head after the cluster reaches to its threshold limit. This approach will increase the network lifetime and will provide high throughput.