Hardik Gohel

ORCID: 0000-0002-1671-6543
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Hydrological Forecasting Using AI
  • COVID-19 diagnosis using AI
  • SARS-CoV-2 detection and testing
  • SARS-CoV-2 and COVID-19 Research
  • Geophysical and Geoelectrical Methods
  • Groundwater flow and contamination studies
  • EEG and Brain-Computer Interfaces
  • Spam and Phishing Detection
  • Web Application Security Vulnerabilities
  • Big Data and Digital Economy
  • Advanced X-ray and CT Imaging
  • IoT-based Smart Home Systems
  • Artificial Intelligence in Healthcare and Education
  • Blockchain Technology Applications and Security
  • Anomaly Detection Techniques and Applications
  • Nuclear and radioactivity studies
  • Micro and Nano Robotics
  • Data Visualization and Analytics
  • Fire Detection and Safety Systems
  • Internet of Things and AI
  • Biosensors and Analytical Detection
  • Physical Unclonable Functions (PUFs) and Hardware Security

University of Houston - Victoria
2020-2025

University of Houston
2023-2025

Florida International University
2017-2019

Raritan Bay Medical Center
2017

Gujarat Technological University
2016

Nuclear infrastructure systems play an important role in national security. The functions and missions of nuclear are vital to government, businesses, society citizen's lives. It is crucial design for scalability, reliability robustness. To do this, we can use machine learning, which a state the art technology used various fields ranging from voice recognition, Internet Things (IoT) device management autonomous vehicles. In this paper, propose develop learning algorithm perform predictive...

10.1016/j.net.2019.12.029 article EN cc-by-nc-nd Nuclear Engineering and Technology 2020-01-03

In everyday life, electricity is necessary, and proper use critical. To strengthen home control, the existing systems have been examined over years. However, PMAS method’s error ratio higher does not allow for a remote monitoring system. Therefore, this study proposes smart control system (SMACS) household appliances. The application’s significance to monitor appliances’ usage using hardware Internet of Things (IoT) methods. prototype proposed designed developed considering Arduino UNO,...

10.1155/2021/6544649 article EN cc-by Wireless Communications and Mobile Computing 2021-01-01

People's health is adversely affected by environmental changes and poor nutritional habits, emphasizing the importance of awareness. The healthcare system encounters significant challenges, including data insufficiency, threats, errors, delays. To address these issues advance medical care, we propose a secure prediction method, prioritizing patient privacy transmission efficiency. Quantum-inspired heuristic algorithm combined with Kril Herd Optimization (QKHO) introduced for prediction,...

10.1109/jbhi.2023.3304326 article EN IEEE Journal of Biomedical and Health Informatics 2023-08-11

Australia faces a dryness disaster whose impact may be mitigated by rainfall prediction. Being an incredibly challenging task, yet accurate prediction of plays enormous role in policy making, decision making and organizing sustainable water resource systems. The ability to accurately predict patterns empowers civilizations. Though short-term predictions are provided meteorological systems, long-term is has lot factors that lead uncertainty. Historically, various researchers have experimented...

10.1038/s41598-021-95735-8 article EN cc-by Scientific Reports 2021-09-06

The emergence of new SARS-CoV-2 variants made the COVID-19 infection pandemic and/or endemic more severe and life-threatening due to ease transmission, rapid infection, high mortality, capacity neutralize therapeutic ability developed vaccines. These consequences raise questions on established management strategies based nano-assisted approaches, including diagnostics, therapeutics, efficient trapping virus eradication through stimuli-assisted masks filters composed nanosystems. Considering...

10.3389/fnano.2021.700888 article EN cc-by Frontiers in Nanotechnology 2021-06-17

Abstract The growing cognizance of spectrum scarcity has become a more significant concern in wireless radio communications. Due to the exponential growth data transmission intelligent sensor networks, energy detection promising solution for resolving shortages. Primary user emulation attack (PUEA) been identified as vector cognitive (CR) domain's physical layer. In comparison, CR is method increase efficiency by allowing unlicensed secondary users (SUs) access licensed frequency bands...

10.1002/eng2.12672 article EN cc-by Engineering Reports 2023-05-08

Student attendance system is used to measure student participation in a classroom. Before pandemic was taken manually like sheets or registers. But when the hit, everything online, so even classes. The count very important problem that administrator needs be more careful about taking during online classes as there are many chances of proxy happening. So, we came up with this proposed "Student using QR code" This paper proposes an based on code-based system. students need scan class according...

10.1109/icaic57335.2023.10044175 article EN 2023-02-07

Millions of lives could be saved annually if liver tumours detected early with computed tomography. But it's a huge strain for radiologists to read hundreds or even tens these CT scans. Therefore, developing an autonomous, rapid, and reliable method reading, detecting, assessing scans is important. However, extracting the region from bottleneck any approach. This paper introduces three-part automatic process. Initial processing includes noise suppression image enhancement. Optimized...

10.1177/1088467x241301660 article EN other-oa Intelligent Data Analysis 2025-02-05

The monitoring of groundwater levels hexavalent chromium is a vital task for the US Department Energy's (DOE) remediation efforts at Hanford Site, decommissioned nuclear production facility operated by Office Environmental Management. While previous methods have shown promise accurately modeling contaminants concern DOE sites, some contaminants, such as chromium, remain challenge to model due high variability and frequency data collection. Recent Machine Learning (ML) techniques...

10.1109/icaic57335.2023.10044126 article EN 2023-02-07

Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools extract significant information.Methods: The comprises extracting the audio from video, splitting it into chunks by size of pauses, transcribing using Google's speech recognition. transcribed text is tokenised create a summary, sentence word frequencies are calculated, most relevant sentences selected. summary quality assessed ROUGE criteria,...

10.1109/icaic60265.2024.10433799 article EN 2024-02-07

Change detection (CD) is the process of detecting changes from multi-temporal satellite images that have undergone spatial due to natural phenomena and/or human-induced activities. Mango a major fruit crop in India, but mango crops remains challenging task because reason many perennial similar reflectance profiles. Therefore, potent change technique required for different applications such as rate deforestation, urban developments, damage evaluation, and resource monitoring. Compared annual...

10.1109/access.2022.3194000 article EN cc-by IEEE Access 2022-01-01

The modern web application processes a huge amount of data to deliver customized services the users, lack security makes this becomes victim cyberattacks. injection attacks line SQLI and XSS are that commonly take place. firewall is implemented in various layers OSI model provide for assets. Each layer uses different techniques provides functionality prevent attack. One important designs Application firewall, which also known as WAF, used examine external request, protocols such XSS....

10.1109/csnt57126.2023.10134743 article EN 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) 2023-04-08

In this letter, we demonstrate that a multiple-input deep neural network architecture can be used for the solution of one-dimensional (1-D) second-order boundary value problem. We investigate 1-D Poisson equation, while using sinc- and cosine-type functions to emulate typically found electromagnetic field distributions. Network architecture, modeling derivative, condition criteria are implemented, test cases validation. For considered problems, obtain -80 dB error convergence in 8.2 s,...

10.1109/lawp.2019.2933181 article EN IEEE Antennas and Wireless Propagation Letters 2019-08-05

The U. S. Department of Energy's Office Environmental Management handles one the world's most significant groundwater and soil remediation efforts. Hanford Site in Washington State contains several decommissioned nuclear production reactors, laboratories, chemical reprocessing plants, which are source various contaminants concern reservoirs. While previous research has yielded insight into behavior at Site, plumes that contain carcinogens such as hexavalent chromium can be challenging to...

10.1109/icaic57335.2023.10044121 article EN 2023-02-07

Rapid changes and new consequential attacks to IT infrastructure are precipitously on the rise requiring need for systems that designed enhance network security. The potential vulnerability of is ousted by these making ethical hackers aware impending their networks. Conducting a forensic analysis security ability collect analyze data find out evidence could lead specific break in intrusion detection. Wireshark protocol analyzer tool helps hacker reveal loop-holes cyber at user level. In this...

10.1109/csnt51715.2021.9509647 article EN 2021-06-18
Coming Soon ...