Joydip Dhar

Joydip Dhar
ABV-Indian Institute of Information Technology and Management Gwalior | IIITM · Mathematical Modeling and Simulation Laboratory

Professor at ABV-IIITM Gwalior, Ph.D (Indian Institute of Technology Kanpur)

About

240
Publications
76,705
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,993
Citations
Introduction
Dr. Joydip Dhar is presently working as Professor in the area of Applied Sciences at ABV-Indian Institute of Information Technology and Management, Gwalior. Dr. Dhar has done his Ph. D from IIT, Kanpur in 1997 and has been associated with the teaching profession and research for the past 26 years and has also published about 195 paper in International journals. He has guided 20 Ph.D. thesis, 150+ M.Tech theses, 6 pursuing Ph.D. Delivered more than 55 invited lectures. Co-authored of two books.
Additional affiliations
February 2019 - present
ABV-Indian Institute of Information Technology and Management Gwalior
Position
  • Professor
November 2006 - January 2019
ABV-Indian Institute of Information Technology and Management Gwalior
Position
  • Professor (Assistant)
August 1996 - November 2006
Beant College of Engineering and Technology, Gurdaspur
Position
  • Professor (Assistant)
Education
July 1991 - August 1996
Indian Institute of Technology Kanpur
Field of study
  • Applied Mathematics
August 1988 - June 1990
Visva Bharati University
Field of study
  • Mathematics

Publications

Publications (240)
Article
Full-text available
The machine learning model and AI solution help to train and deploy the cloud-based system which will help to analyze the machine learning model after all the analysis is stored all the data and the prediction model are in a cloud-based system with the help of API framework. In the research machine learning and Artificial networks help to do the an...
Article
Full-text available
Water is an essential element for life on the planet Earth, which comes on the Earth naturally through precipitation. Continuous increase in human population has diminished the open land water sources and increased surface water pollution as well as atmospheric pollution. The increasing human population and the presence of atmospheric pollutants af...
Preprint
Medical image segmentation is vital to the area of medical imaging because it enables professionals to more accurately examine and understand the information offered by different imaging modalities. The technique of splitting a medical image into various segments or regions of interest is known as medical image segmentation. The segmented images th...
Article
Full-text available
Deep learning has become ubiquitous in the field of computer vision for tasks such as image classification and segmentation. A Computer-Aided Diagnostic (CAD) system for lung cancer detection and diagnosis works by identifying lung nodules and characterizing the same. Transfer learning allows for pre-trained weights to be ported from one model to a...
Article
Full-text available
In the modern era, plant pest is a significant problem. Many options are available, including chemical remedies and ones based on natural enemies. In this work, we discuss the dynamics of infected pests on plants. We have suggested that Belington-DeAngeli functional responses in pests cause infection spread. Because natural enemies are disappearing...
Article
In this paper, an SIRS epidemic model using Grunwald–Letnikov fractional-order derivative is formulated with the help of a nonlinear system of fractional differential equations to analyze the effects of fear in the population during the outbreak of deadly infectious diseases. The criteria for the spread or extinction of the disease are derived and...
Article
Full-text available
Signal processing is a vast applied area of research, and It is applicable in engineering, medicine, war, and many more fields. Many signal processing methods are already available like Fourier transform, fractional Fourier transforms, and many more. In this work, we defined a generalized Fourier transform and proposed a new technique for signal de...
Article
Software reliability is one of the standard critical inherent characteristics of software systems. The testing coverage function (TCF) is a significant parameter for identifying the completeness and effectiveness of software testing. It is defined as the proportion of the code that has been tested up to time t. To capture the dynamic behavior of th...
Article
This paper introduces a deterministic fractional-order epidemic model (FOEM) for studying the transmission dynamics of the human immunodeficiency virus (HIV) and acquired immunodeficiency syndrome (AIDS). The model highlights the substantial role of unaware and undetected HIV-infected individuals in spreading the disease. Control strategies, such a...
Article
Full-text available
Detection and segmentation of candidate lung nodules from diagnostic images are vital steps in any image processing-based Computer-Aided Diagnostic (CAD) system for lung cancer. Computed Tomography (CT) is a commonly used modality for lung cancer screening due to the tissue contrast and anatomical resolution. This work aims to investigate the effec...
Article
The seasonal temperature variations strongly affect anthrax disease in the herbivores population in wildlife. This article presents a grass-herbivores model incorporating anthrax disease in herbivores taking grass growth rate, grass death rate, and anthrax transmission rate among herbivores temperature-dependent parameters. The positivity, boundedn...
Preprint
Full-text available
Extremists are increasingly using social media to recruit and radicalize other users and increase their money. Terrorists can use popular social networks accounts and perform their activities in a hidden way. So, it is crucial to create a fruitful mechanism for controlling the spread of misinformation. Otherwise, a large number of people can mislea...
Preprint
Full-text available
This article investigates a tri-trophic food chain model with the epidemic at the bottom level (prey) and gestation delays for the next two levels( the intermediate predator and top predator). The steady states' positivity, boundedness, existence, and stability have been analyzed. The study of Hopf bifurcation has been carried out for different ste...
Article
Full-text available
It is well known that water-borne diseases occur seasonally and are strongly associated with the temperature. In this paper, a non-autonomous mathematical model for water-borne disease is proposed and analyzed. Three temperature-dependent parameters are included in the proposed model, related to the growth rate and death rate of pathogen in aquatic...
Preprint
Full-text available
The Plant Pest problem is a crucial area of investigation for the present time. Myriad chemical solutions are available to solve this issue, but due to their toxic outcomes, the Natural enemy of pests is come across to be a better solution. This article proposes a fractional calculus approach to a plant pest mature and immature Natural enemy model....
Article
Full-text available
The grey-wolf optimizer (GWO) is a comparatively recent and competent algorithm in Swarm Intelligence (SI) to solve numerical and real-world optimization problems. However, the biggest challenge is the quick stabilization of its search agents to the local optima. Therefore, to bring effectiveness in the global search, it is imperative to relocate t...
Conference Paper
The objective of the paper is to present a mathematical model that reflects the deleterious effect of illegal logging on forest biomass. In the model formulation, it is considered that the nutrients present in the soil helps to grow forestry biomass and on the other side, the forestry biomass is subjected to harvesting as a consequence of efforts a...
Article
An intrusion detection system (IDS) is considered critical for detecting threats, intrusions, and unauthorized access. IDS monitors massive network traffic that includes irrelevant and extravagant features that profoundly impact the system’s efficiency and slow down the classification process for accurate decisions. Its effectiveness is tested over...
Chapter
The software industry is working hard to keep up with these rapid changes by devising methods to increase the pace of their work without compromising software quality and reliability. Various factors, such as the testing environment, testing strategy, and resource allocation, can influence the optimal release time. The choice of whether or not to r...
Article
Full-text available
Lung Segmentation is one of the pre-processing steps for lung cancer diagnosis. Segmentation of lung contour is challenging when the nodules are attached to the surrounding tissues of the lung, such as juxta-pleural boundary or vasculature. This paper proposes a lung parenchyma segmentation framework based on multiple image frames with novel approa...
Article
Full-text available
Due to overexploitation of renewable resources, we have observed that some species are already extinct. So, the time demands conservation, reproduction and optimal utilization of these resources and the study of such problems. In this paper, a delayed stage-structured self-dependent two compartment (compartment-I contains immature fishes and compar...
Article
Any software system, however securely written or precise the code is, is always susceptible to failure. These factors, such as the number of errors in the program or the mean-time for software failure, measure the program’s reliability. In order to meet more customer needs, current OSS products must be reliable. To measure these parameters, like th...
Article
Any software system, however securely written or precise the code is, is always susceptible to failure. These factors, such as the number of errors in the program or the mean-time for software failure, measure the program’s reliability. In order to meet more customer needs, current OSS products must be reliable. To measure these parameters, like th...
Article
Full-text available
Seasonal variability strongly affects the animal population in wildlife. It becomes essential to model seasonality in eco-epidemic dynamics to know the effect of system parameters in a periodic environment. This article presents a set of non-autonomous differential equations with time-varying disease transmission rates among prey and predators, the...
Article
The pandemic being a health issue at its core is a multifaceted crisis encompassing both economic and epidemic factors in a twisted tale of challenges. In counteraction, we have proposed a combined epidemic-economic model that analyses system dynamics arising in the presence of an infectious disease (SARS-2-COVID-19 in our case). Dynamical analysis...
Article
Dynamic target searching is one of the most practical and realistic problems within a multi-agent system. It requires an effective and efficient cooperation strategy to address the challenges of real-world robotic applications. Mostly, centralized cooperation-based strategy proves to be less effective and inefficient in terms of search time, flexib...
Article
A software project managers can execute well-prepared research tasks to utilize associated cost-effectively testing resources using software reliability growth models (SRGMs). Over the last four decades, several SRGMs are introduced to estimate reliability growth and applicable particular to software development research. So far, it seems that very...
Chapter
To stay competitive in the industry, software companies are constantly adding new features and upgrading their software. In the last few years, open source software (OSS) has gained a lot of attention because it is free and easy to use. Closed source commercial projects follow a somewhat different protocol than open source projects. The frequency o...
Article
The software project manager must plan and conduct testing activities economically and efficiently. Due to the constraints, such as limited testing resources, delivery time, and cost, it isn’t easy to conclude. The software reliability growth models (SRGMs) based on testing-effort, help the project manager in the decision process. Therefore, we rec...
Article
Full-text available
In the recommendation systems (RSs), it is imperative to incorporate the hidden contextual meaning of users' provided ratings in the similarity computation. To draw such contextual meanings, existing models use the fixed categorization of accessible ratings. However, due to the excessive variation in similarly co-rated item pairs, they produce ambi...
Article
Most of the vector-borne diseases show a clear dependence on seasonal variation, including climate change. In this paper, we proposed a nonautonomous mathematical model consisting of a periodic system of nonlinear differential equations. In the proposed model, the realistic functional forms for the different temperature-dependent parameters are con...
Conference Paper
Software development life cycle is the process of development where the testing phase can utilize by software debuggers to detect and correct the faults. Several metrics are used to access software quality, where reliability is one of the most critical metrics. Various research and experiments are conducting for software reliability assessment to f...
Article
Controlling the mosquito population is a big challenge for humans. In this paper, we have studied the effects of impulsive control strategies on the spread of mosquito-borne diseases considering the latent period. Therefore, we proposed and analyzed a mosquito-borne disease model governed by a system of impulsive delay differential equations. The p...
Article
The decreasing tiger population in the world ecosystem is a threat to nature conservation. Canine distemper virus (CDV) is a deadly virus found in the tiger worldwide, one of the vital causes of their extinction. This paper figure outs the influence of CDV on tiger populations. We have developed and studied a delayed eco-epidemiological tiger-dog/w...
Article
The fault reduction factor (FRF) is a significant parameter for controlling the software reliability growth. It is the ratio of net fault correction to the number of failures encountered. In literature, many factors affect the behaviour of FRF, namely fault dependency, debugging time-lag, human learning behaviour and imperfect debugging. Besides th...
Article
Full-text available
In this work, an eco-epidemic predator–prey model with media-induced response function for the interaction of humans with adulterated food is developed and studied. The human population is divided into two main compartments, namely, susceptible and infected. This system has three equilibria; trivial, disease-free and endemic. The trivial equilibriu...
Chapter
Accurate detection and segmentation of lung structures play a vital role in computer based lung cancer detection and diagnosis. Lung segmentation is challenging when the nodules are attached to the pleural walls of the lung boundary. This paper presents a novel methodology on detecting the lung structures to include the juxta-pleural nodules by cal...
Chapter
This paper discusses the functionality of port scanning techniques used for accessing the IP addresses of vulnerable hosts present in the network. These techniques usually perform for network monitoring and troubleshooting purposes. On the other hand, the attackers use this utility to find the vulnerabilities in the network, gain unauthorized acces...
Article
This paper is mainly concerned with an investigation of a non-linear plant pest model with stage structured pest population and introduction of impulsive infected pest population and chemical pesticides as the control parameters. Several mathematical models have been introduced in the literature to gain insight of plant-pest natural enemy model, ho...
Article
Full-text available
The network traffic in the intrusion detection system (IDS) has unpredictable behaviour due to the high computational power. The complexity of the system increases; thus, it is required to investigate the enormous number of features. However, the features that are inappropriate and (or) have some noisy data severely affect the performance of the ID...
Article
Full-text available
Integrated Pest Management technique is used to formulate a mathematical model by using biological and chemical control impulsively. The uniform boundedness and the existence of pest extinction and nontrivial equilibrium points is discussed. Further, local stability of pest extinction equilibrium point is studied and it has been derived that if T≤T...
Article
Full-text available
The data sparsity is an acute challenge in most of the collaborative filterings (CFs) as their performance is affected by the known ratings of target users. Recently, active learning has become a prevalent and straight forward approach to cope with the data sparsity. In this approach, the newly entered users are requested to rate certain items whil...
Article
Seasonal change is likely to increase water borne disease incidence worldwide according to environmental conditions. Mathematical models need to represents this seasonality to be able to make more realistic predictions about spread and control of water-borne epidemic. In this paper, we present a mathematical model to understand the transmission dyn...
Article
Full-text available
Lung nodule segmentation is an essential step in any CAD system for lung cancer detection and diagnosis. Traditional approaches for image segmentation are mainly morphology based or intensity based. Motion-based segmentation techniques tend to use the temporal information along with the morphology and intensity information to perform segmentation o...
Article
This paper deals with the amalgamated basic IS-LM business cycle model with Kaldor’s growth model to form an augmented model. Pertaining to substantial evidence, IS-LM model in paradigm with a specific economic extension (Kaldor-Kalecki Business cycle model in our case) provides an adept explanation of a developing but strong economy like that of o...
Preprint
kNN is a very effective Instance based learning method, and it is easy to implement. Due to heterogeneous nature of data, noises from different possible sources are also widespread in nature especially in case of large-scale databases. For noise elimination and effect of pseudo neighbours, in this paper, we propose a new learning algorithm which pe...
Article
The network traffic in the intrusion detection system (IDS) has unpredictable behaviour due to the high computational power. The complexity of the system increases; thus, it is required to investigate the enormous number of features. However, the features that are inappropriate and (or) have some noisy data severely affect the performance of the ID...
Article
Rumors are spreading all over the network drastically, affecting millions of people in a minuscule instance. This malicious news can be a cause of panic, social unrest, political imbalance, and slow economic growth of the country. Epidemiological modeling is a valuable tool to describe not only the dynamics of rumor on a social network but also ana...
Chapter
Software system functionality is more crucial, severe, and complex, so we need to predict and quantify the reliability of software in an efficient manner in a random field environment (RFE). But very few researchers consider the RFE in previously proposed software reliability growth models (SRGMs) with fault correction and detection process. In thi...
Article
Learning to communicate is considered an essential task to develop a general AI. While recent literature in language evolution has studied emergent language through discrete or continuous message symbols, there has been little work in the emergence of writing systems in artificial agents. In this paper, we present a referential game setup with two...
Article
Research on linear and nonlinear IS-LM models has been resonating under synonymous perspectives, confined to bifurcations and intangible relations to economic work systems. Trifle discussion exists on how choice of linear/nonlinear models affects policy making and almost no elaboration on framing an economic system within a linear and nonlinear str...
Chapter
Full-text available
Image based Lung cancer diagnosis offers an effective and non-intrusive method for identification and diagnosis of lung cancer in a patient. This is done by segmentation of lung nodules from radiological images obtained from patients. This paper proposes a framework to segment nodule lesions in images. The novelty of the proposed framework is that...
Conference Paper
Full-text available
Brain-Computer Interface (BCI) serves as the pathway of communication between the brain and any other external entity. It’s an emerging field and has its applications in various industries including bio-medicines. The Electroencephalographs (EEG) or brainwaves are captured and analysed using NeuroSky Mind-wave mobile headset to yield Attention, Med...
Article
Full-text available
In this paper, a non-linear mathematical model is proposed with the thought of treatment to depict the spread of infectious illness and assessed with three contamination stages. We talk about the dynamical behaviour and analytical study of the framework for the mathematical model which shows that it has two non-negative equilibrium points i.e., dis...
Article
The cardiac system, also known as heart, is a significant part of the human body. Its gentle sound accompanies us throughout our lives, but if this sound gets corrupted or blocked by an abnormality, it is challenging for a human being to survive. In this way, the study of heart sounds and related abnormalities have a significant place in the area o...
Article
During this analysis, as per natural control approach in pest management, a plant-pest dynamics with biological control is proposed, here assuming that the pest and natural enemy are having different levels of gestation delay and harvesting rate of pests by natural enemy follows Holling type-III response function. Boundedness and positivity of the...
Preprint
Full-text available
Robotics has proved to be an indispensable tool in many industrial as well as social applications, such as warehouse automation, manufacturing, disaster robotics, etc. In most of these scenarios, damage to the agent while accomplishing mission-critical tasks can result in failure. To enable robotic adaptation in such situations, the agent needs to...
Preprint
Full-text available
Learning to communicate is considered an essential task to develop a general AI. While recent literature in language evolution has studied emergent language through discrete or continuous message symbols, there has been little work in the emergence of writing systems in artificial agents. In this paper, we present a referential game setup with two...
Article
In multi-server environment, many authentication algorithms have been proposed. Most of the algorithms are based on registration of client and server on the single control server. Recently Gupta and Dhar (Wirel Pers Commun 87(1):225–244, 2016) proposed an authentication scheme, in which client and server belong to different control servers. Accordi...
Article
Full-text available
Most of the traditional Recommendation Systems (RSs) focus on recommending only the popular items as they deal with a single objective precision/popularity. However, focusing on the diversity of the items in the recommendation list is also equally important to improve its relevance to the user, i.e., it is required to view RSs as a multi-objective...
Article
The internet has emerged as a part of life for modern generations. We use social networks to interact with others instantly and make ourselves up to date. A bunch of information and misinformation propagate quickly through social networks. It is necessary to detect the correctness of the information and create a mechanism to control rumor; otherwis...
Preprint
In this study, a three species plant-pest-natural enemy compart-mental model incorporating gestation delays for both pests and natural enemies in a polluted environment is proposed. The boundedness and positivity properties of the model are established. Equilibria and their stability analysis are carried out for all possible steady states. The exis...
Article
Full-text available
For providing strong mutual authentication in a multi-server environment many algorithms have been proposed. Most of the algorithms provide mutual authentication between client and multiple servers by using single control server for registration. In this paper, we consider a scenario, in which client and server belong to the different control serve...
Article
Full-text available
In this paper, a pest-natural enemy dynamics with maturation delay for pest species is proposed. Here pest is categorized into two stages, namely, immature and mature and the natural enemy only harvest mature pest population with Holling-type-II interaction. The boundedness and positivity of the solution of the system are presented. The asymptotic...
Article
Full-text available
The biological control is an alternate of chemical control as well as other pest control methods. In the present study, we propose a stage-structured food chain dynamics of plant-pest-natural enemies with gestation delays for both pests and natural enemies. The positivity and boundedness properties of the system are proved. The existence criteria o...
Article
Full-text available
In the present study, a three species plant-pest-natural enemy model is proposed incorporating gestation delay for pests and natural enemies. The boundedness and positivity of the model are studied and analyzed. Equilibria and their stability analysis are carried out for all possible steady states. The existence of Hopf bifurcation in the system is...
Article
The aim of the present paper, how the people behave towards the offer of two products in two different patches. In this work, an innovation diffusion model with six-compartments for two different patches is proposed. There is a delay in the adoption of product-1 in patch-2 and delay of adoption of product-2 in patch-1. The entire population in both...
Chapter
Essential genes of an organism are those genes that are required for the growth to a fertile adult and is pivotal for the survival of an organism. In this study, a new computational approach based on machine learning method is designed which can constructively project essential genes by integration of homologous, gene intrinsic, and network topolog...