Vipin Tyagi

ORCID: 0000-0003-4994-3686
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Image Retrieval and Classification Techniques
  • Advanced Image and Video Retrieval Techniques
  • Digital Media Forensic Detection
  • Medical Image Segmentation Techniques
  • Video Analysis and Summarization
  • Image and Signal Denoising Methods
  • Big Data and Business Intelligence
  • Advanced Steganography and Watermarking Techniques
  • Organ Donation and Transplantation
  • Image Processing Techniques and Applications
  • Renal and Vascular Pathologies
  • Advanced Image Fusion Techniques
  • Cloud Computing and Resource Management
  • Advanced Wireless Communication Technologies
  • Advanced Wireless Communication Techniques
  • IoT-based Smart Home Systems
  • Wireless Communication Networks Research
  • Pediatric Urology and Nephrology Studies
  • Urological Disorders and Treatments
  • Image Processing and 3D Reconstruction
  • Traffic control and management
  • Cooperative Communication and Network Coding
  • Traffic Prediction and Management Techniques
  • IoT and Edge/Fog Computing
  • Renal Transplantation Outcomes and Treatments

Jaypee University of Engineering and Technology
2015-2024

Sir Ganga Ram Hospital
2014-2024

Shobhit University
2022-2023

All India Institute of Medical Sciences Jodhpur
2023

Shell (Netherlands)
2022

Luton and Dunstable Hospital
2021-2022

Centre for Development of Telematics
2011-2020

University College of Medical Sciences
2013-2020

Guru Teg Bahadur Hospital
2013-2020

University of Delhi
2013-2020

10.1007/s10796-014-9527-0 article EN Information Systems Frontiers 2014-07-26

10.1016/j.jisa.2020.102481 article EN Journal of Information Security and Applications 2020-03-12

10.1016/j.compeleceng.2014.11.009 article EN Computers & Electrical Engineering 2014-12-06

10.1007/s11045-015-0319-6 article EN Multidimensional Systems and Signal Processing 2015-02-20

Abstract Image manipulation has become an easy task due to the availability of user-friendly multimedia tools. The images can be manipulated in several ways. splicing is one such image methods which two or more are merged obtain a single composite image. These misused cheat others. This paper proposes deep learning-based method detect images. First, input preprocessed using technique called ‘Noiseprint’ get noise residual by suppressing content. Second, popular ResNet-50 network used as...

10.1088/1742-6596/1714/1/012038 article EN Journal of Physics Conference Series 2021-01-01

The paper discusses numerical prediction of erosion wear trends in centrifugal pump casing pumping dilute slurries. geometry is considered two-dimensional. Discrete Phase Model (DPM) FLUENT 6.1® utilized to obtain slurry flow field through the employing two-way coupling. Standard k — ε model used for turbulence. Effect several operational parameters viz. rate, speed (RPM), particle diameter and various conditions tongue curvature, slope discharge pipe width studied. Qualitative described...

10.1260/1757-482x.3.4.225 article EN The Journal of Computational Multiphase Flows 2011-12-01

Involvement of agrochemicals have been suggested in the development chronic kidney disease unknown etiology (CKDu). The association between CKDu and blood level organochlorine pesticides (OCPs) patients has examined present study.All recruited study subjects (n = 300) were divided three groups, namely, healthy control 100), with known (CKDk) 100). Blood OCP levels all groups analyzed by gas chromatography.Increased OCPs, namely α-HCH, aldrin, β-endosulfan, observed as compared to CKD...

10.1186/s12199-017-0660-5 article EN cc-by Environmental Health and Preventive Medicine 2017-05-26

10.1016/j.cviu.2016.04.010 article EN Computer Vision and Image Understanding 2016-05-01

This digital watermarking protocol is basically applied to preserve the rights for both parties involving in E-commerce i.e. buyer and seller. Principal component analysis used reduce correlation coefficient. uses wavelet transform with principal integrates techniques public key cryptosystem proving ownership of content. In this paper a watermark image that baby inserted into selected high frequency sub-bands discrete transformed. Then we have transformation selecting blocks. The process...

10.17485/ijst/2015/v8i35/47258 article EN Indian Journal of Science and Technology 2016-01-08

Image restoration is the operation of taking a degraded image and estimating clean image. Degradation in an occurs primarily due to blur noise. Restoration attempts reconstruct or recover that has been by using apriori knowledge degradation phenomenon. Thus techniques are oriented toward modeling applying inverse process order original This paper starts with basic model degradation/restoration proceeds towards enlisting commonly occurring blurs noises. Thereafter, it reviews some spatial...

10.1080/09747338.2013.10876113 article EN IETE Journal of Education 2013-07-01

Nowadays Intrusion Detection System (IDS) which is increasingly a key element of system security used to identify the malicious activities in computer or network.There are different approaches being employed intrusion detection systems, but unluckily each technique so far not entirely ideal.The prediction process may produce false alarms many anomaly based systems.With concept fuzzy logic, alarm rate establishing intrusive can be reduced.A set efficient rules define normal and abnormal...

10.5121/ijdps.2013.4204 article EN International Journal of Distributed and Parallel systems 2013-03-31
Coming Soon ...