Keshav Prasad DahalUniversity of the West of Scotland | UWS · School of Computing
Keshav Prasad Dahal
PhD, MSc, SMIEEE
About
242
Publications
81,270
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,552
Citations
Introduction
Keshav Dahal a Professor in Intelligent Systems and the Leader of Artificial Intelligence, Visual Communication and Networks (AVCN) research centre at the University of the West of Scotland. He is also affiliated with Nanjing University of Information Science and Technology China and Chiang Mai University Thailand. He has an extensive experience in terms of research supervision and management of funded projects. His research expertise includes:
- Artificial Intelligence (AI) applied to Big Data, Scheduling and Logistics Problems
- Smart Decision Support Techniques and Intelligent Systems
- Trust/Security Modelling in Networks, Cloud and Distributed Systems
- Data Security and Privacy
Additional affiliations
January 2005 - present
August 2002 - November 2013
Publications
Publications (242)
Currently, many old universities in Thailand have been facing the occurrence of lecturer massive retirement. This leads to the large amount of newly Ph. D. graduate recruitment for taking immediate responsibilities to teach and conduct research without mentoring by senior staff as well as in new universities. Therefore, this paper aims to propose t...
Disasters instances have been increasing both in frequency and intensity causing the tragic loss of life and making life harder for the survivors. Disaster relief management plays a crucial role in enhancing the lifestyle of disaster victims by managing the disaster impacts. Disaster relief management is a process with many collaborative sectors wh...
An IoT‐based monitoring system remotely controls and manages intelligent environments. Due to wireless communication, deployed sensor nodes are more vulnerable to attacks. An intrusion detection system is an efficient mechanism to detect malicious traffic and prevent abnormal activities. This article suggests an intrusion detection framework for th...
Spatial-exploitation convolutional neural networks (CNNs) have
a simplified architecture compared to other CNN models. However, devices with limited computational resources could struggle with processing spatial-exploitation CNNs. To address this, we investigate two methods to optimise spatial-exploitation CNN models for time efficiency and classif...
Mobile banking plays a vital role in daily transactions and overall performance of any financial institutions. The objective of this study is to assess the utilization and effectiveness of mobile banking services provided by financial cooperative. Descriptive research design was applied by adopting a survey method to collect data. Out of 11 financi...
There are different methods of optimizing energy usage of sensor nodes for increasing the life time of wireless sensor network. The first node death time is considered to be the effective life time of any network. Therefore, our objective is to adopt such routing algorithms and node deployment policy so that no individual node dies sooner while oth...
Smartphone sensor-based pedestrian dead reckoning (PDR) systems provide a viable solution to the problem of localization in an infrastructure-less area. Step detection (SD) and step length estimation (SLE), being two fundamental operations of the PDR based localization technique, have drawn many researchers’ attention in the recent time. Most of th...
This paper examines the comparative effectiveness of three distinct Flipped Classroom (FC) teaching methods in the context of Power and Electrical (PE) engineering education: Traditional Flipped Classroom (TFC), Video-Assisted Teaching Methods (VAFC), and Virtual Reality Flipped Classroom (VRFC). The study incorporates valuable feedback from studen...
This paper presents a case study describing the design of SwageXR, an augmented reality (AR) application that gamifies a tubing assembly exercise. The aim of this paper is to contribute to the field of extended reality (XR) applications by providing a case study of a novel design process based on an existing framework by Gilardi et al. Design needs...
p> Smartphone sensor-based pedestrian dead reckoning (PDR) systems provide a viable solution to the problem of localization in an infrastructure-less area. Step detection (SD) and step length estimation (SLE), being two fundamental operations of the PDR based localization technique, have drawn many researchers’ attention in the recent time. Most of...
p> Smartphone sensor-based pedestrian dead reckoning (PDR) systems provide a viable solution to the problem of localization in an infrastructure-less area. Step detection (SD) and step length estimation (SLE), being two fundamental operations of the PDR based localization technique, have drawn many researchers’ attention in the recent time. Most of...
Over the past few decades, there has been a massive growth in the volume of biological data. In such datasets, the influence of dimensionality bias or existence of repetitive, noisy, and irrelevant genes has become a severe barrier in classifying gene expression data. Therefore, to reduce the impact of noisy genes and precisely identify gene patter...
This paper presents deployment of the network, data generation, sample labeling, feature extraction, an intrusion detection method, and a performance reliability evaluation model. The evaluation model analyzes the performance and hardware dependability of intrusion detection methods, and it computes the performance reliability of related methods us...
Advancement in the Internet of Things (IoT) and cloud computing has escalated the number of connected edge devices in a smart city environment. Having billions more devices has contributed to security concerns, and an attack-proof authentication mechanism is the need of the hour to sustain the IoT environment. Securing all devices could be a huge t...
Breast cancer is one of the leading causes of death among women worldwide. Many methods have been proposed for automatic breast cancer diagnosis. One popular technique utilizes a classification-based association called Association Classification (AC). However, most AC algorithms suffer from considerable numbers of generated rules. In addition, irre...
An IoT-based monitoring system remotely controls and manages intelligent environments. Deployed sensors communicate themselves and transmit data over wireless communication. A sensor node (insider or outsider) is in the communication range, which can send data to other nodes. Due to such nature, it is more vulnerable to intrusions or attacks. Tradi...
In a disaster scenario, relief items distribution is required as early as possible for the disaster victims to reduce the associated risks. For the distribution tasks, an effective and efficient relief items distribution model to generated relief items distribution schedules is essential to minimise the impact of disaster to the disaster victims. H...
In smart cities, relief items distribution is a complex task due to the factors such as incomplete information, unpredictable exact demand, lack of resources, and causality levels, to name a few. With the development of Internet of Things (IoT) technologies, dynamic data update provides the scope of distribution schedule to adopt changes with updat...
A mobile ad-hoc network is a small and temporary network. This network has a different working principle and structure than wired networks. A source node transfers data to the destination node through intermediate nodes. Due to mobility of node, this network is more vulnerable to routing attacks. Many security mechanisms protect the network from in...
Keywords: Remote heart rate detection, Video-based heart rate detection
Abstract:
Video-based remote heart rate detection is a promising technology that can offer convenient and low-cost heart rate monitoring within, but not limited to, the clinical environment, especially when attaching electrodes or pulse oximeters on a person is not possible o...
The use of low-cost sensors in IoT over high-cost devices has been considered less expensive. However, these low-cost sensors have their own limitations such as the accuracy, quality, and reliability of the data collected. Fog computing offers solutions to those limitations; nevertheless, owning to its intrinsic distributed architecture, it faces c...
Mobile ad-hoc network is a dynamic wireless network that transfers information through neighbor nodes with a temporary configuration. Due to its dynamic nature, it is exposed to attacks and intrusions. Routing disruption attack is the main problem of this network where intermediate nodes act maliciously. An encryption-based security mechanism is a...
Trade-off between energy conservation and efficiency is one of the most important issues in designing Wireless Sensor Network (WSN) based applications. Network life time is primarily determined by the life time of battery. Recently, energy harvesting techniques that will recharge the battery in different non-conventional ways are being investigated...
COVID-19 pandemic has taught us how to continue with the day-to-day activities interacting and working from remote locations. In this paper, we have highlighted the positive approach necessary to complete a project with success under this constraint by interacting regularly with the relevant stakeholders keeping focus on the final project deliverab...
The
received signal strength
(RSS) based
Wi-Fi
fingerprint technique is not only a cost-effective means for indoor positioning but also provides reliable positioning accuracy in the indoor settings. Thus, such positioning technique has drawn many researchers’ attention to address its several limitations like degraded
positioning accuracy
due...
The Ethereum blockchain allows, through software called smart contract, to automate the contract execution between multiple parties without requiring a trusted middle party. However, smart contracts are vulnerable to attacks. Tools and programming practices are available to support the development of secure smart contracts. These approaches are eff...
The Ethereum blockchain allows, through software called smart contract, to automate the contract execution between multiple parties without requiring a trusted middle party. However, smart contracts are vulnerable to attacks. Tools and programming practices are available to support the development of secure smart contracts. These approaches are eff...
Existing navigation services provide route options based on a single metric without considering user's preference. This results in the planned route not meeting the actual needs of users. In this paper, a personalized route planning algorithm is proposed, which can provide users with a route that meets their requirements. Based on the multiple prop...
Wi-Fi fingerprint systems provide cost-effective and reliable solution for indoor positioning. However, such systems incur high calibration cost in the training phase and high searching overhead in the positioning phase. Moreover, huge storage requirement for the radio map of a large-scale fingerprint system is another major issue. Several solution...
In today’s business environment, choosing the required business intelligence (BI) tools are important to support SMEs recovery. The COVID-19 pandemic has changed businesses to focus on better digitization, not only in their day-to-day business activities, but also in effective use of BI tools for decision making that account for the changes in the...
COVID-19 pandemic has taught us how to continue with the day-to-day activities interacting and working from remote locations. In this paper, we have highlighted the positive approach necessary to complete a project with success under this constraint by interacting regularly with the relevant stake-holders keeping focus on the final project delivera...
Location-aware recommendation is considered as one of human behavior cognitive analyses in the world of human-machine-environment system. The development of 5G technology and ubiquitous mobile devices has led to the emergence of a new online platform, location-based social networks (LBSNs), which allows users to share their locations. The essential...
In modern network infrastructure, Distributed Denial of Service (DDoS) attacks are considered as severe network security threats. For conventional network security tools it is extremely difficult to distinguish between the higher traffic volume of a DDoS attack and large number of legitimate users accessing a targeted network service or a resource....
Ad hoc network is a temporary self-organizing and infrastructure less network. So, it is mostly applied in the military field and disaster relief. Due to wireless communication and self-organizing property ad hoc network is more vulnerable to several intrusions or attacks than the traditional system. Blackhole attack is an important routing disrupt...
The massive growth of data in the network leads to attacks or intrusions. An intrusion detection system detects intrusions from high volume datasets but increases complexities. A network generates a large number of unlabeled data that is free from labeling costs. Unsupervised feature selection handles these data and reduces computational complexiti...
Ethereum is blockchain-based platform which enables the development and deployment of smart contracts. Smart contracts are computer programs that provide automation for the governance of decentralized autonomous organizations (DAO). However, while the Blockchain technology is secure, smart contracts are only as secure as the programmers has designe...
Ethereum is blockchain-based platform which enables the development and deployment of smart contracts. Smart contracts are computer programs that provide automation for the governance of decentralized autonomous organizations (DAO). However, while the Blockchain technology is secure, smart contracts are only as secure as the programmers has designe...
Free-form surfaces are defined with NURBS (non-uniform rational basis spline) for most computer-aided engineering (CAE) applications. The NURBS method requires the definition of parameters such as weights, knot vectors and degree of the curves which make the configuration of the surface computationally expensive and complex. When the control points...
In this paper, we explore the use of machine learning technique for wormhole attack detection in ad hoc network. This work has categorized into three major tasks. One of our tasks is a simulation of wormhole attack in an ad hoc network environment with multiple wormhole tunnels. A next task is the characterization of packet attributes that lead to...
Energy prediction plays a vital role in designing an efficient power management system for any environmentally powered Wireless Sensor Networks (WSNs). Most of the Moving Average (MA)-based energy prediction methods depend on past energy readings of the concerned node to predict its future energy availability. However, in case of RF powered WSNs th...
The exponential growth of network size leads to increase attacks and intrusions. Detection of these attacks from the network has turned into a noteworthy issue of security. An intrusion detection system is an important approach to achieves high detection rate. A high dimensional dataset increase complexities of detection systems. In this paper, we...
The Internet-of-Things (IoT) has formed a whole new layer of the world built on internet, reaching every connected devices, actuators and sensors. Many organizations utilize IoT data streams for research and development purposes. To make value out of these data streams, the data handling party must ensure the privacy of the individuals. The most co...
Distributed Denial of Service (DDoS) is one of the most rampant attacks in the modern Internet of Things (IoT) network infrastructures. Security plays a very vital role for an ever-growing heterogeneous network of IoT nodes, which are directly connected to each other. Due to the preliminary stage of Software Defined Networking (SDN), in the IoT net...
In recent past, the number of electric vehicles (EVs) have increased significantly due to their various advantages to environment. With the proper charging and discharging of EVs with vehicle-to-grid (V2G), electrical system can get controllable storage/generations and at the same time, EV owners can earn profits. This paper presents a novel dispat...
Life in modern society becomes easier due to the rapid growth of different technologies like real-time analytic, ubiquitous wireless communication, commodity sensors, machine learning and embedded systems. Nowadays, there seems to be a need to merge these technologies in the form of Internet of Things (IoT) so that smart systems can be achieved. On...
Blockchain technology as a foundation for distributed ledger offers an innovative platform for transparent and efficient transaction in Reverse Auction Bidding process in a supply chain for procuring carriers. This research work provides background and motivation for the use of Blockchain in such domains. A supply chain model is realized by deployi...
Identity management (IdM) is a method used to determine user identities. The centralized aspect of IdM introduces a serious concern with the growing value of personal information, as well as with the General Data Protection Regulation (GDPR). The problem with currently-deployed systems and their dominating approach, with identity providers (IdP) an...
Salient object detection (SOD) has been attracting a lot of interest, and recently many computational models have been developed. Here, the authors formulate a SOD model, in which saliency map is computed as a combination of the colour, its distribution‐based saliency and orientation saliency. Similar to traditional SODs, the proposed method is bas...
Pelton turbines have been used for harvesting clean energy from water jet for over 100 years. The wide range of their applicability and the robustness with minimal onsite monitoring and carbon free energy production makes them one of the most desired hydro turbines for renewable energy production. Pelton turbine buckets are subject to complex turbu...
Healthcare is a field that is rapidly developing in technology and services. A recent development in this area is remote monitoring of patients which has many advantages in a fast aging world population with increasing health complications. With relatively simple applications to monitor patients inside hospital rooms, the technology has developed t...
In the last decade, e-commerce has been grown
rapidly and become a familiar tool of shopping for many people.
However, some people still have concerns while making online
purchases due to its uncertain attributes. In fact, there are many
online consumers have suffered from monetary loose problem
due to some reasons which the lack of the trust in e-...
This paper deals with design, simulation and experimental analysis of a compact, Coplanar Waveguide (CPW) fed T-shaped reconfigurable antenna with frequency diversity. The antenna mainly comprises of four strips placed in T-shape fed by coplanar waveguide feed which operates at 5.8GHz. The reconfigurability in frequency is achieved by connecting fo...
Localization of sensor nodes is one of the important issues in wireless sensor networks (WSNs). The location of a node can be used as the location of the occurrence of an event. Error handling and scalability are key research issues that need to be taken care of while estimating the efficiency of any localization algorithm. In this paper, we propos...
Modelling and Analysis of RF Energy Harvesting Systems for Optimal Energy Consumption
The Internet-of-Things (IoT) produces and transmits enormous amounts of data. Extracting valuable information from this enormous volume of data has become an important consideration for businesses and research. However, extracting information from this data without providing privacy protection puts individuals at risk. Data has to be sanitized befo...
Providing location recommendations has become an essential feature for location-based social networks (LBSNs) because it helps users explore new places and makes LBSNs more prevalent to users. Existing studies mostly focus on introducing new features that affect users' check-in behaviours in LBSNs. Despite the difference in the type of the features...
Effective trust management can enhance nodes' cooperation in selecting trustworthy and optimal paths between the source and destination nodes in mobile ad hoc networks (MANETs). It allows the wireless nodes (WNs) in a MANET environment to deal with uncertainty about the future actions of other participants. The main challenges in MANETs are time-va...
In recent years, research on location predictions by mining trajectories of users has attracted a lot of attentions. Ex- isting studies on this topic mostly focus on individual movements, considering the trajectories as solo movements. However, a user usually does not visit locations just for the personal interest. The preference of a travel group...
Cough detection has recently been identified as of paramount importance to fully exploit the potential of telemedicine in respiratory conditions and release some of the economic burden of respiratory care in national health systems. Current audio-based cough detection systems are either uncomfortable or not suitable for continuous patient monitorin...