Pimal Khanpara

ORCID: 0000-0003-1932-9917
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • IoT and Edge/Fog Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • Blockchain Technology Applications and Security
  • Energy Efficient Wireless Sensor Networks
  • Stock Market Forecasting Methods
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Digital and Cyber Forensics
  • IoT-based Smart Home Systems
  • Digital Transformation in Industry
  • Online Learning and Analytics
  • Context-Aware Activity Recognition Systems
  • Vehicle License Plate Recognition
  • Financial Markets and Investment Strategies
  • Advanced Steganography and Watermarking Techniques
  • Autonomous Vehicle Technology and Safety
  • Energy Load and Power Forecasting
  • Innovations in Concrete and Construction Materials
  • Neuroscience, Education and Cognitive Function
  • Cooperative Communication and Network Coding
  • Additive Manufacturing and 3D Printing Technologies
  • Caching and Content Delivery
  • Recommender Systems and Techniques

Nirma University
2010-2024

Abstract In recent years, the Internet of Things (IoT) has become very popular as it numerous applications in industrial and research domain. Moreover, features IoT systems play a crucial role development smart cities. It enables cities their subsystems to monitor, control, manage heterogeneous devices remotely by extracting communicating real‐time data. However, automated are vulnerable many security threats like tempered protocols, device hijacking, unauthorized access. Motivated...

10.1002/spy2.269 article EN Security and Privacy 2022-09-30

Abstract The widespread use of networked, intelligent, and adaptable devices in various domains, such as smart cities home automation, climate control, manufacturing logistics, healthcare, education, agriculture, has been hastened by recent developments hardware software technologies. In all these application the concept Internet Things helps to achieve process automation decrease labor costs. While IoT an established domain for quite a while, it seen lot advances challenges different...

10.1002/spy2.306 article EN Security and Privacy 2023-03-05

The detection of seat belts is an essential aspect vehicle safety. It crucial in providing protection the event accident. Seat belt devices are installed into many automobiles, although they may be easily manipulated or disregarded. As a result, existing approaches and algorithms for insufficient. Using various external methods algorithms, it required to determine if fastened not. This paper proposes approach identify fastness using concepts image processing deep learning. Our proposed can...

10.12694/scpe.v23i4.2027 article EN Scalable Computing Practice and Experience 2022-12-24

In a country like India, resolution of any major issue or conflict primarily lies in the hands government. Given that India is one world's largest democracies, voting system most essential phases, considering its limitations. The mostly based on centralized system. As result, there are many chances risks vote tampering, security, transparencies, DoS attacks and more. Due to these problems, population world, not fully trusting motive overcome abovementioned loopholes provide nation better...

10.1109/icces54183.2022.9835721 article EN 2022 7th International Conference on Communication and Electronics Systems (ICCES) 2022-06-22

For measuring the size of economies, stock price prediction is becoming a popular and engrossing research issue in financial academic sectors. estimating forecasting amount exchange share, no substantial set norms are followed. Although various evolutionary technologies, such as fundamental time, technical series analysis, statistical aid forecast process exist, none these methods have been shown to be reliable precise tool for society predict share market or scales. A comparison contrast...

10.1109/icces54183.2022.9835876 article EN 2022 7th International Conference on Communication and Electronics Systems (ICCES) 2022-06-22

With proper knowledge of any company's stock and insight, one can gain large profits sitting at home. The market a company is time-series data price prediction the fields where many researchers have gathered interest to predict prices or trends future using historical technical indicators with high accuracy. A Simple Moving Average very useful in predicting direction gives good assumption about price. model stock's will increase trader's profits. This research proposed novel by utilizing...

10.1109/icssit55814.2023.10060936 article EN 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT) 2023-01-23

A great influence is imposed on our society as a result of the demographic shift toward elderly population. This research study devises novel strategies to help population maintain their independence and avoid social exclusion. Information communication technologies provide number options assist older individuals live longer, be healthier, independently. Ambient Assisted Living (AAL) discipline that studies cutting-edge medical rehabilitative technology can people with disabilities. There...

10.1109/i-smac55078.2022.9987375 article EN 2022 Sixth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) 2022-11-10

The widespread use of networked, intelligent, and adaptable devices in various domains, such as smart cities home automation, climate control, manufacturing logistics, healthcare, education, agriculture, has been hastened by recent developments hardware software technologies. In all these application the concept Internet Things ( helps to achieve process automation decrease labor costs. One subdomain is IoT Forensics which involves Digital concerning devices, networks, or clouds. this...

10.22541/au.170663498.83592067/v1 preprint EN Authorea (Authorea) 2024-01-30

This study investigates the relationship between Big Five personality traits, major identity, self-esteem, and academic outcomes in education. It uses clustering techniques to examine impact of these factors on students’ performance. The research reveals unique patterns when considering identity formation, self-esteem. findings highlight importance understanding attainment trajectories. popular methods like K-means, DBSCAN, Hierarchical reveal latent clusters provide profiles with different...

10.12694/scpe.v25i6.3278 article EN Scalable Computing Practice and Experience 2024-10-01

Computational intelligence is used to create artificially intelligent systems with the ability learn, adapt, and solve problems. Learners’ computational abilities can be improved help of Cognitive Neuroscience techniques. refers a learner based on complex operations brain in four relevant dimensions: Visual (V), Aural (A), Kinematic (K), Reading/Writing (R/W). Our proposed framework consists electroencephalogram (EEG) data acquisition, signal extraction, EEG categorization assess students’...

10.12694/scpe.v25i6.3277 article EN Scalable Computing Practice and Experience 2024-10-01

With the rapid rise of online content, Recommender Systems are becoming increasingly important in reducing information overload. Because technology worth recommendation system, new studies on subject have been published a regular basis. The major difficulty recommender systems is to create suitable user/item models using user activities as well other data. Graph neural network techniques lately become widely employed because most data fundamentally graph architecture, and Neural Network has...

10.1109/icces54183.2022.9835990 article EN 2022 7th International Conference on Communication and Electronics Systems (ICCES) 2022-06-22

Ad hoc networks are temporary networks, created mainly for applications that infrastructure-less. Such and network nodes demand special characteristics like mobile having dynamic topology, wireless medium, heterogeneous deployment environment, reactive or proactive routing depending on the nature of which includes parameters such as node placement, mobility model, number participants in network, patterns mobility, etc. Due to these nodes, process is quite challenging ad especially when high....

10.12694/scpe.v24i1.2052 article EN Scalable Computing Practice and Experience 2023-04-19

Number of vehicles on the road is increasing day by and as a result, problems caused these are also increasing. Hence, to overcome related safety, Vehicular Ad-hoc Network (VANET) being used which plays major role in solving safety issues. VANET network created transmit data using road-side entities vehicles. To make transmission secure storing such that every user can have access it secured way, use Blockchain preferred. distributed ledger technology fulfill this requirement. There many...

10.1109/ic3sis54991.2022.9885673 article EN 2022 International Conference on Computing, Communication, Security and Intelligent Systems (IC3SIS) 2022-06-23
Coming Soon ...