Keshav Dahal

ORCID: 0000-0003-1789-893X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Electric Power System Optimization
  • Power System Reliability and Maintenance
  • Network Security and Intrusion Detection
  • Mobile Ad Hoc Networks
  • Scheduling and Optimization Algorithms
  • Vehicle Routing Optimization Methods
  • Scheduling and Timetabling Solutions
  • Fuzzy Logic and Control Systems
  • Access Control and Trust
  • Data Mining Algorithms and Applications
  • Opportunistic and Delay-Tolerant Networks
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • IoT and Edge/Fog Computing
  • Rough Sets and Fuzzy Logic
  • Optimal Power Flow Distribution
  • Indoor and Outdoor Localization Technologies
  • Spam and Phishing Detection
  • Metaheuristic Optimization Algorithms Research
  • Energy Efficient Wireless Sensor Networks
  • Energy Load and Power Forecasting
  • Data Management and Algorithms
  • Privacy-Preserving Technologies in Data
  • Neural Networks and Applications
  • Software Testing and Debugging Techniques

University of the West of Scotland
2016-2025

Tribhuvan University
2023

University of Bradford
2007-2019

Nanjing University of Information Science and Technology
2017-2019

Universidad de Cantabria
2019

Chulalongkorn University
2019

National Institute of Technology Warangal
2017

Chiang Mai University
2014

Universidad de Málaga
2007

Systems Research Institute
2007

Healthcare is a field that rapidly developing in technology and services. A recent development this area remote monitoring of patients which has many advantages fast aging world population with increasing health complications. With relatively simple applications to monitor inside hospital rooms, the developed extent patient can be allowed normal daily activities at home while still being monitored use modern communication sensor technologies. Sensors for essential vital signs such as...

10.1007/s12652-017-0598-x article EN cc-by Journal of Ambient Intelligence and Humanized Computing 2017-10-26

The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). distributed establish connections to form MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed literature as mechanism filter out while searching for packet delivery route. However, building model that adopts recommendations by other network challenging problem due risk dishonest like bad-mouthing,...

10.1109/tmc.2014.2374154 article EN IEEE Transactions on Mobile Computing 2014-12-09

Abstract Cancer grade classification is a challenging task identified from the cell structure of healthy and abnormal tissues. The partitioner learns about malignant through grading plans treatment strategy accordingly. A major portion researchers used DL models for classification. However, behavior hidden type, it unknown which features contribute to accuracy how are chosen grading. To address issue study proposes Grade Differentiation Integrated
 Model (GradeDiff-IM) classify...

10.1088/2057-1976/ada8ae article EN Biomedical Physics & Engineering Express 2025-01-10

A portfolio optimisation problem involves allocation of investment to a number different assets maximize yield and minimize risk in given period. The selected not only collectively contribute its but also interactively define as usually measured by variance. In this paper we apply various techniques multiobjective genetic algorithms solve optimization with some realistic constraints, namely cardinality floor constraints round-lot constraints. experimented are Vector Evaluated Genetic...

10.1109/cec.2007.4424514 article EN 2007-09-01

Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces serious concern with the growing value personal information, as well General Data Protection Regulation (GDPR). problem currently-deployed systems and their dominating approach, identity providers (IdP) single-point services, that third party in charge maintaining controlling data. main challenge manage data securely lies trusting humans institutes who are responsible for entire...

10.3390/app9152953 article EN cc-by Applied Sciences 2019-07-24

Classification Data Mining (DM) Techniques can be a very useful tool in detecting and identifying e-banking phishing websites. In this paper, we present novel approach to overcome the difficulty complexity predicting website. We proposed an intelligent resilient effective model that is based on using association classification algorithms. These algorithms were used characterize identify all factors rules order classify website relationship correlate them with each other. implemented six...

10.1109/itng.2010.117 article EN 2010-01-01

In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as severe security threats. For conventional tools it is extremely difficult to distinguish between the higher traffic volume a DDoS attack and large number legitimate users accessing targeted service or resource. Although these have been widely studied, there few works which collect analyse truly representative characteristics traffic. The current research mostly focuses on detection mitigation...

10.3390/su13031522 article EN Sustainability 2021-02-01

The use of low-cost sensors in IoT over high-cost devices has been considered less expensive. However, these have their own limitations such as the accuracy, quality, and reliability data collected. Fog computing offers solutions to those limitations; nevertheless, owning its intrinsic distributed architecture, it faces challenges form security fog devices, secure authentication privacy. Blockchain technology utilised offer for systems. This paper proposes an system that utilises...

10.3390/s22103956 article EN cc-by Sensors 2022-05-23

Static graphs of statistics are established visual aids in risk communication and decision support. Interactive information visualisations (InfoVis) reflective tasks supposed to enhance active processing, but the evidence is scarce mixed. This mixed-methods research investigated effectiveness user experience InfoVis context mammography screening. In a web-based experiment prospective invitees screening program (N = 338; aged 30-49) tried pre-tested decision-aid with either as text, static...

10.47368/ejhc.2025.102 article EN cc-by European Journal of Health Communication 2025-01-16

Phishing Websites are forged Web pages that created by malicious people to mimic of real and it attempts defraud their personal information. Detecting identifying is really a complex dynamic problem involving many factors criteria, because the subjective considerations ambiguities involved in detection, Fuzzy Logic model can be an effective tool assessing phishing than any other traditional since offers more natural way dealing with quality rather exact values. In this paper, we present...

10.1109/ictta.2008.4530019 article EN 2008-04-01

Job Scheduling on Computational Grids is gaining importance due to the need for efficient large-scale Grid-enabled applications. Among different optimization techniques addressed problem, Genetic Algorithm (GA) a popular class of solution methods. As GAs are high level algorithms, specific algorithms can be designed by choosing genetic operators as well evolutionary strategies. In this paper we focus Struggle and their tuning scheduling independent jobs in computational grids. Our results...

10.1109/cisim.2008.54 article EN 2008-06-01

Convergence of the two technologies- Internet and sensing networks creates a paradigm, Things (IoT) which allows direct machine-to-machine(M2M) communication. The IoT has transformed human-to-human human-to-machine communication to machine-to-machine It encompasses huge number heterogeneous smart devices that collaborates each other achieve different application goals like cities, connected cars, etc. Though Radio Frequency Identification (RFID), wireless, mobile sensor technologies make...

10.1145/3109761.3109768 article EN 2017-10-17
Coming Soon ...