Keshav P. Dahal

Orcid: 0000-0003-1789-893X

Affiliations:
  • Nanjing University of Science and Technology, China
  • University of the West of Scotland, Paisley, UK
  • University of Bradford, UK (former)


According to our database1, Keshav P. Dahal authored at least 124 papers between 1997 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Optimum Node Deployment Policy (ONDP) for WSN: Trade-off Between Maximization of Area Coverage and Lifetime.
Wirel. Pers. Commun., November, 2023

A Novel Weighted Fusion Based Efficient Clustering for Improved Wi-Fi Fingerprint Indoor Positioning.
IEEE Trans. Wirel. Commun., July, 2023

Hybrid PSO feature selection-based association classification approach for breast cancer detection.
Neural Comput. Appl., March, 2023

An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks.
Eng. Appl. Artif. Intell., March, 2023

A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network.
Appl. Intell., March, 2023

Traditional, Video and Extended Reality (XR) Assisted Flipped Classroom Teaching Methods: An Approach and Comparison.
Proceedings of the 15th International Conference on Software, 2023

Integration of Extended Reality (XR) in Non-Native Undergraduate Programmes.
Proceedings of the 15th International Conference on Software, 2023

Ridesharing in Rail-Freight Transport and Use of Digital Aggregator: Prospects and Difficulties - A Developer's Perspective.
Proceedings of the 15th International Conference on Software, 2023

2022
Adaptive Cross-Layer Routing Protocol for Optimizing Energy Harvesting Time in WSN.
Wirel. Pers. Commun., 2022

An enhanced detection system against routing attacks in mobile ad-hoc network.
Wirel. Networks, 2022

A Dynamic and Scalable User-Centric Route Planning Algorithm Based on Polychromatic Sets Theory.
IEEE Trans. Intell. Transp. Syst., 2022

Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain.
Sensors, 2022

Blockchain-Based Secure Authentication with Improved Performance for Fog Computing.
Sensors, 2022

A comparative study of common steps in video-based remote heart rate detection methods.
Expert Syst. Appl., 2022

Incorporating Extended Reality Technology for Delivering Computer Aided Design and Visualisation Modules.
Proceedings of the 14th International Conference on Software, 2022

2021
A Partition-Based Partial Personalized Model for Points-of-Interest Recommendations.
IEEE Trans. Comput. Soc. Syst., 2021

An efficient clustering with robust outlier mitigation for Wi-Fi fingerprint based indoor positioning.
Appl. Soft Comput., 2021

Applicability of the Software Security Code Metrics for Ethereum Smart Contract.
Proceedings of the International Conference on Deep Learning, 2021

Successful Project Completion During the COVID-19 Pandemic - A Lesson Learnt.
Proceedings of the Business Information Systems Workshops, 2021

2020
X-BAND : Expiration Band for Anonymizing Varied Data Streams.
IEEE Internet Things J., 2020

Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN.
Future Gener. Comput. Syst., 2020

Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection.
Comput. Secur., 2020

An efficient feature selection based Bayesian and Rough set approach for intrusion detection.
Appl. Soft Comput., 2020

Characterizing the Cost of Introducing Secure Programming Patterns and Practices in Ethereum.
Proceedings of the Trends and Innovations in Information Systems and Technologies, 2020

2019
Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN.
IEEE Syst. J., 2019

M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes.
IEEE Syst. J., 2019

A Multi-Node Energy Prediction Approach Combined with Optimum Prediction Interval for RF Powered WSNs.
Sensors, 2019

Remote patient monitoring: a comprehensive study.
J. Ambient Intell. Humaniz. Comput., 2019

ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications.
IET Networks, 2019

Salient object detection via reciprocal function filter.
IET Image Process., 2019

Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN.
Proceedings of the 13th International Conference on Software, 2019

A three-step scheduling based on geographic information system for workforce-planning problem.
Proceedings of the 13th International Conference on Software, 2019

Partitioning based incremental marginalization algorithm for anonymizing missing data streams.
Proceedings of the 13th International Conference on Software, 2019

A Supply Chain Model with Blockchain-Enabled Reverse Auction Bidding Process for Transparency and Efficiency.
Proceedings of the 13th International Conference on Software, 2019

A Burst and Congestion-Aware Routing Metric for RPL Protocol in IoT Network.
Proceedings of the 13th International Conference on Software, 2019

Lifetime and Buffer-Size Optimization for RF Powered Wireless Sensor Networks.
Proceedings of the 8th International Conference on Sensor Networks, 2019

Wormhole attack detection in ad hoc network using machine learning technique.
Proceedings of the 10th International Conference on Computing, 2019

2018
Symbolic Reasoning for Hearthstone.
IEEE Trans. Games, 2018

A multidimensional trust evaluation model for MANETs.
J. Netw. Comput. Appl., 2018

<i>K</i>-VARP: <i>K</i>-anonymity for varied data streams via partitioning.
Inf. Sci., 2018

Personalized location prediction for group travellers from spatial-temporal trajectories.
Future Gener. Comput. Syst., 2018

The RPL Load Balancing in IoT Network with Burst Traffic Scenarios.
Proceedings of the 12th International Conference on Software, 2018

Multi-Dimensional E-commerce Trust Evaluation Method.
Proceedings of the 12th International Conference on Software, 2018

A Fuzzy-based Throughput Prediction For Wireless Communication Systems.
Proceedings of the 2018 Innovations in Intelligent Systems and Applications, 2018

Priority-Index Based Multi-Priority Relief Logistics Scheduling with Greedy Heuristic Search.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2018

Remote Heart Rate Extraction Using Microsoft KinectTM v2.0.
Proceedings of the 10th International Conference on Bioinformatics and Biomedical Technology, 2018

Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

APPR: Additive Personalized Point-of-Interest Recommendation.
Proceedings of the IEEE Global Communications Conference, 2018

2017
STEM learning concept with fuzzy inference for organic rice farming knowledge acquisition.
Proceedings of the 11th International Conference on Software, 2017

A CPW fed antenna with semicircular patch on triangle for wideband wireless applications.
Proceedings of the 11th International Conference on Software, 2017

Computational fluid dynamics based performance evaluation of louvered fin radiator.
Proceedings of the 11th International Conference on Software, 2017

Malicious Insider Threats in Tactical MANET: The Performace Analysis of DSR Routing Protocol.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Internet of things (IoT): a survey on architecture, enabling technologies, applications and challenges.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

Dual-mode round-robin greedy search with fair factor algorithm for relief logistics scheduling.
Proceedings of the 4th International Conference on Information and Communication Technologies for Disaster Management, 2017

Social factors for data sparsity problem of trust models in MANETs.
Proceedings of the 2017 International Conference on Computing, 2017

Impact of beacon coverage on clustering strategies for fingerprinting localization system.
Proceedings of the 2017 International Conference on Computing, 2017

2016
Hearthstone deck-construction with a utility system.
Proceedings of the 10th International Conference on Software, 2016

Route scheduling for HSSP using adaptive genetic algorithm with constructive scheduling technique.
Proceedings of the 10th International Conference on Software, 2016

Cognitive radio engine learning adaptation.
Proceedings of the 10th International Conference on Software, 2016

Toward Anonymizing IoT Data Streams via Partitioning.
Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2016

Effect of importance sampling on robust segmentation of audio-cough events in noisy environments.
Proceedings of the 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2016

2015
Recommendation Based Trust Model with an Effective Defence Scheme for MANETs.
IEEE Trans. Mob. Comput., 2015

Guest editorial.
Int. J. Intell. Comput. Cybern., 2015

Modelling generator maintenance scheduling costs in deregulated power markets.
Eur. J. Oper. Res., 2015

ROI image retrieval based on multiple features of mean shift and expectation-maximisation.
Digit. Signal Process., 2015

GA-based learning for rule identification in fuzzy neural networks.
Appl. Soft Comput., 2015

On the study of wireless signal noise for designing network infrastructure of knowledge management systems.
Proceedings of the 9th International Conference on Software, 2015

Serious game to motivate the knowledge sharing among knowledge technicians in machinery relocation of foreign direct investment.
Proceedings of the 9th International Conference on Software, 2015

Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

Knowledge Management on Asset Management for End of Life Products.
Proceedings of the Product Lifecycle Management in the Era of Internet of Things, 2015

2014
Friendship Based Trust Model to Secure Routing Protocols in Mobile Ad Hoc Networks.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014

2013
Fuzzy association rule mining approaches for enhancing prediction performance.
Expert Syst. Appl., 2013

An adaptive ensemble classifier for mining concept drifting data streams.
Expert Syst. Appl., 2013

A real-time dynamic optimal guidance scheme using a general regression neural network.
Eng. Appl. Artif. Intell., 2013

Decision support for coordinated road traffic control actions.
Decis. Support Syst., 2013

Metrics for Computing Trust in a Multi-Agent Environment
CoRR, 2013

Unraveling the Evolution of Defectors in Online Business Games
CoRR, 2013

Evolution of Cooperation in an Incentive Based Business Game Environment
CoRR, 2013

Enhancing Dynamic Recommender Selection Using Multiple Rules for Trust and Reputation Models in MANETs.
Proceedings of the 25th IEEE International Conference on Tools with Artificial Intelligence, 2013

2012
An empirical study of hyperheuristics for managing very large sets of low level heuristics.
J. Oper. Res. Soc., 2012

Decision Theoretic Assessment Model for Online Business Games.
Int. J. Next Gener. Comput., 2012

2011
Distributed BitTable Multi-Agent Association Rules Mining Algorithm.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2011

2010
Acquaintance-based trust model for the evolution of cooperation in business games.
Serv. Oriented Comput. Appl., 2010

Intelligent phishing detection system for e-banking using fuzzy data mining.
Expert Syst. Appl., 2010

Automatic Test Cases Generation from Software Specifications.
e Informatica Softw. Eng. J., 2010

Review on the Advancements of DNA Cryptography
CoRR, 2010

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies.
Cogn. Comput., 2010

Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks.
Proceedings of the Eighth Annual Conference on Privacy, Security and Trust, 2010

Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

Multi-agent system for early prediction of urinary bladder inflammation disease.
Proceedings of the 10th International Conference on Intelligent Systems Design and Applications, 2010

Fuzzy Multiple Support Associative Classification Approach for Prediction.
Proceedings of the Artificial Intelligence and Soft Computing, 2010

Diversification of Fuzzy Association Rules to improve prediction accuracy.
Proceedings of the FUZZ-IEEE 2010, 2010

2009
Evolution of Cooperativeness in a Business Game Relying on Acquaintance Based Trustworthiness Assessment.
Proceedings of the 2009 IEEE Conference on Commerce and Enterprise Computing, 2009

Modelling Intelligent Phishing Detection System for E-banking Using Fuzzy Data Mining.
Proceedings of the 2009 International Conference on CyberWorlds, 2009

A GA(TS) Hybrid Algorithm for Scheduling in Computational Grids.
Proceedings of the Hybrid Artificial Intelligence Systems, 4th International Conference, 2009

Binary Exponential Back Off for Tabu Tenure in Hyperheuristics.
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2009

An intelligent multi-agent approach for road traffic management systems.
Proceedings of the IEEE International Conference on Control Applications, 2009

2008
Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy Logic.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Improving Metaheuristic Performance by Evolving a Variable Fitness Function.
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2008

Tuning Struggle Strategy in Genetic Algorithms for Scheduling in Computational Grids.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

Scheduling in Multiprocessor System Using Genetic Algorithms.
Proceedings of the 7th International Conference on Computer Information Systems and Industrial Management Applications, 2008

2007
Evolutionary Generator Maintenance Scheduling in Power Systems.
Proceedings of the Evolutionary Scheduling, 2007

Intelligent Learning Algorithms for Active Vibration Control.
IEEE Trans. Syst. Man Cybern. Part C, 2007

Evolutionary hybrid approaches for generation scheduling in power systems.
Eur. J. Oper. Res., 2007

Evolution of Fitness Functions to Improve Heuristic Performance.
Proceedings of the Learning and Intelligent Optimization, Second International Conference, 2007

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks.
Proceedings of the Seventh International Conference on Intelligent Systems Design and Applications, 2007

Test Data Generation from UML State Machine Diagrams using GAs.
Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), 2007

Exact/Heuristic Hybrids Using rVNS and Hyperheuristics for Workforce Scheduling.
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2007

Intelligent Traffic Control Decision Support System.
Proceedings of the Applications of Evolutinary Computing, 2007

Portfolio optimization using multi-obj ective genetic algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

Dynamic adjustment of age distribution in Human Resource Management by genetic algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2007

2006
The Trade Off Between Diversity and Quality for Multi-objective Workforce Scheduling.
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2006

2005
Comparative performance of intelligent identification and control algorithms for a flexible beam vibration.
Proceedings of the ICINCO 2005, 2005

A case study of process facility optimization using discrete event simulation and genetic algorithm.
Proceedings of the Genetic and Evolutionary Computation Conference, 2005

Loan Risk Analyzer based on Fuzzy Logic.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
An evolutionary generation scheduling in an open electricity market.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

Impact of Algorithm Design in Implementing Real-Time Active Control Systems.
Proceedings of the Applied Computing, Second Asian Applied Computing Conference, 2004

2003
A Port System Simulation Facility With An Optimization Capability.
Int. J. Comput. Intell. Appl., 2003

Developing GA-based hybrid approaches for a real-world mixed-integer scheduling problem.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003

2001
A case study of scheduling storage tanks using a hybrid genetic algorithm.
IEEE Trans. Evol. Comput., 2001

2000
GA/SA-based hybrid techniques for the scheduling of generator maintenance in power systems.
Proceedings of the 2000 Congress on Evolutionary Computation, 2000

1999
Generator maintenance scheduling using a genetic algorithm with a fuzzy evaluation function.
Fuzzy Sets Syst., 1999

A GA-based technique for the scheduling of storage tanks.
Proceedings of the 1999 Congress on Evolutionary Computation, 1999

1997
Generational and Steady-State Genetic Algorithms for Generator Maintenance Scheduling Problems.
Proceedings of the International Conference on Artificial Neural Nets and Genetic Algorithms, 1997


  Loading...