Keyur Patel

ORCID: 0000-0002-0970-9118
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IPv6, Mobility, Handover, Networks, Security
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Mobile Agent-Based Network Management
  • Distributed and Parallel Computing Systems
  • Network Packet Processing and Optimization
  • Interconnection Networks and Systems
  • Advanced Optical Network Technologies
  • Advanced Data Storage Technologies
  • Wireless Networks and Protocols
  • Service-Oriented Architecture and Web Services
  • Algorithms and Data Compression
  • Network Security and Intrusion Detection
  • Cloud Computing and Resource Management
  • Mobile Ad Hoc Networks
  • Power Systems and Technologies
  • Adaptive Control of Nonlinear Systems
  • Smart Grid Security and Resilience
  • Caching and Content Delivery
  • VLSI and Analog Circuit Testing
  • Advanced Authentication Protocols Security
  • Distributed systems and fault tolerance
  • Advanced Malware Detection Techniques
  • Wireless Communication Networks Research
  • Software System Performance and Reliability

Institute of Electrical and Electronics Engineers
2024

Nexteer Automotive (United States)
2016-2024

Nirma University
2014-2023

Raksha Shakti University
2023

Georgia Southern University
2019

Marwadi University
2019

Institute of Infrastructure Technology Research and Management
2017-2018

Cisco Systems (United States)
2004-2015

Cognizant (India)
2015

With the advancements in machine and deep learning algorithms, envision of various critical real-life applications computer vision becomes possible. One is facial sentiment analysis. Deep has made expression recognition most trending research fields area. Recently, learning-based FER models have suffered from technological issues like under-fitting or over-fitting. It due to either insufficient training data. Motivated above facts, this paper presents a systematic comprehensive survey on...

10.1109/access.2020.2993803 article EN cc-by IEEE Access 2020-01-01

In the present era, social media platforms such as Facebook, WhatsApp, Twitter, and Telegram are significant sources of information distribution, people believe it without knowing their origin genuineness. Social has fascinated worldwide in spreading fake news due to its easy availability, cost-effectiveness, ease sharing. Fake can be generated mislead community for personal or commercial gains. It also used other benefits defaming eminent personalities, amendment government policies, etc....

10.1109/access.2022.3159651 article EN cc-by IEEE Access 2022-01-01

Objectives: Masking and re-keying are two major countermeasures against the Power Side Channel Analysis attacks. Re-keying has either secret sharing overhead or needs to be used in synchronization. The Advanced Encryption System (AES) been modified proposed scheme uses without need for random synchronized communication. research a AES validated its effectiveness with AES. Methods: This study proposes modifying then implementing it as software encryption using Python. As modified, should also...

10.17485/ijst/v18i1.2012 article EN Indian Journal of Science and Technology 2025-01-22

As the technology is growing rapidly, development of systems and software are becoming more complex. For this reason, security web applications become vulnerable. In last two decades, use internet application hacking activities on top glance. The organizations having biggest challenge that how to secure their from rapidly increasing cyber threats because organization can't compromise sensitive information. Vulnerability Assessment Penetration Testing techniques may help find loopholes....

10.1109/icoei.2019.8862767 article EN 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) 2019-04-01

In the recent years UAV (Unmanned Aerial Vehicles) having quad-copter helicopter i.e. configuration have been receiving increasing attention amongst global researchers due to its wide-range of applications such as surveillance in military, civilian and disaster management applications. This paper presents our investigations on modeling, simulation, altitude model validation comparison some popular control schemes. Quad-copter consists two pairs counter rotating rotors situated at ends a...

10.1109/iciinfs.2014.7036590 article EN 2014-12-01

An organization’s success depends on its employees, and an employee’s performance decides whether the organization is successful. Employee enhances productivity output of organizations, i.e., employee paves way for success. Hence, analyzing giving ratings to employees essential companies nowadays. It evident that different people have skill sets behavior, so data should be gathered from all parts life. This paper aims provide rating based various factors. First, we compare AI-based...

10.3390/math10193714 article EN cc-by Mathematics 2022-10-10

The Internet of Things (IoT) has revolutionized the way how pervasive computing devices communicate and disseminate information over global network. A plethora user data is collected logged daily into cloud-based servers. Such can be analyzed by IoT infrastructure to capture users' behaviors (e.g. location, tagging smart home occupancy). This brings a new set security challenges, specifically anonymity. Existing access control authentication technologies failed support They relied on...

10.1109/rfid.2019.8719256 article EN 2019-04-01

This paper presents a scalable mechanism, fast routing table recovery (FRTR), for detecting and correcting route inconsistencies between neighboring BGP routers. The large size of today's global makes the conventional periodic update approach, used by most protocols, infeasible. FRTR lets routers periodically exchange Bloom filter digests their state. digest exchanges not only enable detection potential during normal operations, but also speed up after session reset. achieves low bandwidth...

10.1109/dsn.2004.1311916 article EN 2004-01-01

10.14445/22312803/ijctt-v72i5p103 article EN International Journal of Computer Trends and Technology 2024-05-30
Coming Soon ...