Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jagdish B. Helonde is active.

Publication


Featured researches published by Jagdish B. Helonde.


International Journal of Computer Applications | 2010

EDCAM: Early Detection Congestion Avoidance Mechanism

Jagdish B. Helonde; Vijay M. Wadhai; Vivek Deshpande; Shiv Sutar

Wireless sensor network (WSN) has emerged as a promising technology thanks to the recent advances in electronics, networking, and information technologies. The data which flows through the wireless sensor network has great impact on the link load. The handling this data against the congestion, its reliability, and loss recovery is very tough task. In this paper we propose the scheme to detect and overcome the congestion (EDCAM). The main feature of proposed algorithm is early detection of the congestion. Rather to take the corrective action, here we prevent to happening the congestion.


world congress on information and communication technologies | 2012

Congestion control in Wireless Sensor Networks by using Differed Reporting Rate

Vivek S. Deshpande; PratibhaP. Chavan; Vijay M. Wadhai; Jagdish B. Helonde

In Wireless Sensor Networks (WSNs), there are one or more sinks or base stations and many sensor nodes distributed over wide area. Sensor nodes have restricted power. When a particular event is occurred, these sensor nodes can transmit large volume of data towards the sink. It can result in buffer overflow at the nodes. It causes packet drops and also network throughput decreases. In WSNs, congestion may lead to energy waste due to a large number of retransmissions and packet drops. Hence it shortens the lifetime of sensor nodes. So, congestion in WSNs needs to be controlled to decrease the waste of energy and also to increase the lifetime of sensor nodes. Proposed congestion control mechanisms will improve network throughput, packet delivery ratio and packet loss. Many network aspects such as reporting rate, node density, packet size etc. can affect congestion. Congestion can be controlled by using Differed Reporting Rate (DRR) algorithm.


international conference on computing communication control and automation | 2015

Seamless Mobility with Interference Free Reliable Communication in WBAN

Vijay M. Birari; Jagdish B. Helonde; Vijay M. Wadhai

This paper describes seamless mobility management in mobile Wireless Body Area Network (WBAN) for patient monitoring system. Nowadays super specialty hospitals are generally equipped with more electronic medical devices which results in high level of electromagnetic interference that lead to failure of medical monitoring device. In order to overcome these issues, seamless mobility and interference free reliable communication technique is adopted for patient monitoring in mobile WBAN. A Demodulate and Forward XOR Network Coding Scheme is used to generate an efficient network code to increase the reliability during communication. Also an efficient random partial coloring technique is used to increase spatial reuse and increase the energy efficiency. In order to increase the reliability without any overhead in the network route quality identifier (RQI) and next hop identifier (NHI) is estimated to determine the quality of the link.


wireless telecommunications symposium | 2012

Energy characterization in the wireless sensor networks

Vivek S. Deshpande; Jagdish B. Helonde; Vijay M. Wadhai

In wireless sensor networks, the type of data gets generated may vary depends on the importance and priority. As deployment sizes and data rates grow, congestion becomes a major problem in these networks. The congestion, results in arbitrary dropping of data packets that reduce the overall network throughput. This also leads to energy awareness in the network. In this paper, the various parameters, which help us to avoid and control the energy consumption in the wireless sensor network is discussed. The parameters considered in this paper are reporting rate as packets per seconds and packet size.


Archive | 2018

Novel Threshold Formulation for Energy Detection Method to Efficient Spectrum Sensing in Cognitive Radio

Rohini S. Kale; Vijay M. Wadhai; Jagdish B. Helonde

Cognitive radio (CR) is an upcoming technology in wireless communications. Available spectrum used by licensed user is called as primary user (PU). Unused licensed spectrum is called spectrum hole. CR i.e., unlicensed user is called as secondary user (SU). The important task to the CR is to efficiently use the available spectrum without disturbing PU. The success of CR depends on spectrum sensing efficiency. In energy detection method, we have compared the energy of the samples with threshold (denoted as \( \lambda \)). If the sample energy is greater than the threshold, we say the signal is present; otherwise, the signal is absent. This method does not require any prior information of the signal, so energy detection is a popular sensing method due to its simplicity. Through this paper, we would like to propose a novel threshold formulation for energy detection method to efficient spectrum sensing in cognitive radio. Proposed formulation avoids Q inverse function; also, this formulation is independent of number of samples. With rigorous analysis of the proposed formulation for different SNRs, it gives better results compared to other systems.


Archive | 2018

Optimization of Handoff Latency Using Efficient Spectrum Sensing for CR System

Rohini S. Kale; Jagdish B. Helonde

Cognitive radio (CR) is a new technology in wireless communications. Presently, we are facing spectrum scarcity problem. CR gives solution to spectrum scarcity problem. The idea behind cognitive radio is the utilization of unused frequency bands of primary or licensed users (PU) by secondary or unlicensed users (SU). This unused frequency band is called white spaces or spectrum hole. This scenario needs the demand of cognitive radio. Spectrum sensing is the main task in CR. Proposed system has used energy detection method for spectrum sensing by using new threshold formulations. Novel algorithm for optimized handoff decision using fuzzy logic and artificial neural network and proactive strategy is used for channel allocation. The proposed system saves the power and optimized handoff delay.


International Journal of Engineering Research and | 2017

Outer Race Bearing Fault Identification of Induction Motor based on Nonlinear Signal Detection and Time Frequency Representation

Saket Yeolekar; Jagdish B. Helonde; G. N. Mulay

Paper presents outer race bearing fault detection system in an induction motor based on nonlinear decomposition and Time frequency representation. Overall life of any machine is based on its timely identification of fault scenario and the appropriate corrective action taken for it. The paper referrers to timely identification of bearing fault behavior of an induction motor using stator current analysis. It is the combination of regular stator current, noise and required component of faulty bearing signature. The fault signature is carried out by comparing a set of two bearings mainly healthy and faulty bearing on the same machine. Testing is carried out for obtaining dataset of currents for healthy and faulty bearing operated for different load conditions. This detection is inscrutable as change in the obtained current wave is very small for different energy levels as well as frequency. Separating noise pattern and fault pattern is critical. Using Hilbert Vibration Decomposition (HVD) method Current wave is decomposed into number of mono components keeping phase information intact. For accelerating further process of identification, time information of decomposed components should be unchanged. Smoothed Pseudo Wigner-Ville distribution (SPWVD) with reassignment is applied to decomposed components for localizing fault zone in current wave. As a next step, feature extraction is followed by localization of fault part. At last training is obtained for the features extracted from the wave and for this process, Support Vector Machine (SVM) classifier is used for training dataset. In testing phase the system gives binary output i.e. faulty or non-faulty bearing. The result analysis shows that the proposed method can detect bearing fault correctly. Performance analysis of proposed method demonstrates accuracy rate of as high as 95%. Keywords—Induction motor, stator current signature, Hilbert Vibration Decomposition (HVD), Smoothed Pseudo Wigner-Ville distribution (SPWVD), Support vector Machine (SVM)


international conference on pervasive computing | 2015

Performance analysis of PUE attacker on Dynamic Spectrum access in cognitive radio

Pooja K. Niranjane; Vijay M. Wadhai; Seema H. Rajput; Jagdish B. Helonde

Spectrum inefficiency is the major problem in the wireless technology. To negotiate this problem the technology called cognitive radio is introduced which is based on software defined radio (SDR). It additionally senses the environment with the help of secondary user to utilize the licensed band when primary user is not accessing the spectrum. Security and privacy are immeasurable challenges in all types of wired and wireless networks. These challenges are of even greater importance in CR networks. The unique characteristic of these networks and the application purposes, they serve make them attractive target for intrusions and other attacks. Primary user emulation attack is one of the major security threats in spectrum sensing. To shrink this we have distinguished various defense techniques which can conflict the PUE attacks.


international conference on pervasive computing | 2015

A novel approach to secure cognitive radio network using dynamic quiet period scheduling for detection of control channel jamming attack

Seema H. Rajput; Vijay M. Wadhai; Jagdish B. Helonde

Cognitive radio is an emerging technology in the area of wireless communication. IEEE 802.22 WRAN is a first newly established standard for cognitive radio to provide broadband internet access in rural areas. While considering this, security of cognitive radio network is the major concern. For the coordination of network function, common control channel facilitates exchange of control messages. Because of its importance, this channel could be a key goal of jamming attacks. This paper proposes countermeasure to control channel jamming attack. In 802.22 WRAN system quiet period frame exists in every superframe. During this quite period frame spectrum sensing is carried out for primary user detection. Through this paper, we would like to introduce the similar kind of concept using dynamic quite period scheduling for the detection of control channel jamming attack. Detailed simulation results prove the effectiveness of our method.


wireless and optical communications networks | 2012

Dependency analysis of energy in wireless sensor networks

Vivek S. Deshpande; Jagdish B. Helonde; Vijay M. Wadhai

Wireless sensor network, now-a-days become more and more popular because of its application domains. The data generated by each node will not be same. The different types of data will give different performance output of wireless sensor networks. There is different Quality of Service parameters must be taken into account. In this paper, we consider the Node density and topology as a metrics for testing the performance. Every parameter is tested against the delivery of the data and the associated energy required for it. We discussed how node density and topology will affect on the energy consumption of every node as well as on average energy consumption of the network. There are different issues regarding the throughput, packet delivery ratio, delay as far as the wireless sensor network is concern. These issues will be visualizing from energy point of perspectives. The results discussed in this paper may lead to new researcher the correct path and excel their research work accordingly.

Collaboration


Dive into the Jagdish B. Helonde's collaboration.

Top Co-Authors

Avatar

Rohini S. Kale

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

G. N. Mulay

Maharashtra Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Vijay M. Birari

Rashtrasant Tukadoji Maharaj Nagpur University

View shared research outputs
Top Co-Authors

Avatar

R. S. Kale Sandikar

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge