Keshav Dahal
YOU?
Author Swipe
View article: Composite Vulnerabilities and Hybrid Threats for Smart Sensors and Field Busses in Building Automation: A Review
Composite Vulnerabilities and Hybrid Threats for Smart Sensors and Field Busses in Building Automation: A Review Open
In the IT sector, the relevance of looking at security from many different angles and the inclusion of different areas is already known and understood. This approach is much less pronounced in the area of cyber physical systems and not pre…
View article: Composite Vulnerabilities and Hybrid Threats for Smart Sensors and Field Busses in Building Automation: A Review
Composite Vulnerabilities and Hybrid Threats for Smart Sensors and Field Busses in Building Automation: A Review Open
In the IT sector, the relevance of looking at security from many different angles and the inclusion of different areas is already known and understood. This approach is much less pronounced in the area of cyber physical systems and not pre…
View article: Communicating Risks with Interactive Visualisations and Reflective Tasks
Communicating Risks with Interactive Visualisations and Reflective Tasks Open
Static graphs of statistics are established visual aids in risk communication and decision support. Interactive information visualisations (InfoVis) and reflective tasks are supposed to enhance active processing, but the evidence is scarce…
View article: 5G Positioning: A Comprehensive State-of-the-art Review with Taxonomy and Future Trends
5G Positioning: A Comprehensive State-of-the-art Review with Taxonomy and Future Trends Open
View article: Quantitative Market Situation Embeddings: Utilizing Doc2Vec Strategies for Stock Data
Quantitative Market Situation Embeddings: Utilizing Doc2Vec Strategies for Stock Data Open
We introduce Quantitative Market Situation Embeddings (QMSEs), a pioneering artificial intelligence (AI)-driven methodology for encoding distinct temporal segments of stock markets into high-dimensional contextual embeddings exclusively le…
View article: Adapting Speech Models for Stock Price Prediction
Adapting Speech Models for Stock Price Prediction Open
Large language models (LLMs) have demonstrated remarkable success in the field of natural language processing (NLP). Despite their origins in NLP, these algorithms possess the theoretical capability to process any data type represented in …
View article: Towards Machine Learning Based Text Categorization in the Financial Domain
Towards Machine Learning Based Text Categorization in the Financial Domain Open
Despite the widespread research on text categorization in various Natural Language Processing (NLP) domains, there exists a noticeable void concerning its application to financial data. This study addresses this gap by employing pre-traine…
View article: Collaborative Framework with Shared Responsibility for Relief Management in Disaster Scenarios
Collaborative Framework with Shared Responsibility for Relief Management in Disaster Scenarios Open
Disasters instances have been increasing both in frequency and intensity causing the tragic loss of life and making life harder for the survivors. Disaster relief management plays a crucial role in enhancing the lifestyle of disaster victi…
View article: Optimisation of Spatial-Exploitation CNN Models Through Hyperparameter-Tuning and Human-In-The-Loop Combination
Optimisation of Spatial-Exploitation CNN Models Through Hyperparameter-Tuning and Human-In-The-Loop Combination Open
Spatial-exploitation convolutional neural networks (CNNs) have a simplified architecture compared to other CNN models. However, devices with limited computational resources could struggle with processing spatial-exploitation CNNs. To addre…
View article: Assessing the Effectiveness of Mobile Banking Services Offered by Co-operatives in Nepal
Assessing the Effectiveness of Mobile Banking Services Offered by Co-operatives in Nepal Open
Mobile banking plays a vital role in daily transactions and overall performance of any financial institutions. The objective of this study is to assess the utilization and effectiveness of mobile banking services provided by financial coop…
View article: Ridesharing in Rail-Freight Transport and Use of Digital Aggregator: Prospects and Difficulties - A Developer's Perspective
Ridesharing in Rail-Freight Transport and Use of Digital Aggregator: Prospects and Difficulties - A Developer's Perspective Open
The adoption of ridesharing principles, inspired by the Uber model, in road transport has presented a promising perspective for cost and time reduction. Particularly within the expanding urban transport networks, this concept has significa…
View article: Traditional, Video and Extended Reality (XR) Assisted Flipped Classroom Teaching Methods: An Approach and Comparison
Traditional, Video and Extended Reality (XR) Assisted Flipped Classroom Teaching Methods: An Approach and Comparison Open
This paper examines the comparative effectiveness of three distinct Flipped Classroom (FC) teaching methods in the context of Power and Electrical (PE) engineering education: Traditional Flipped Classroom (TFC), Video-Assisted Teaching Met…
View article: Integration of Extended Reality (XR) in Non-Native Undergraduate Programmes
Integration of Extended Reality (XR) in Non-Native Undergraduate Programmes Open
This paper presents the use of XR technologies in teaching CAD. Immersive experience generated by XR technologies have traditionally found a quicker uptake in visualization industry especially in arts, entertainment and gaming. Current und…
View article: SwageXR: Designing Gamified AR Applications for Industrial Training
SwageXR: Designing Gamified AR Applications for Industrial Training Open
This paper presents a case study describing the design of SwageXR, an augmented reality (AR) application that gamifies a tubing assembly exercise. The aim of this paper is to contribute to the field of extended reality (XR) applications by…
View article: Magneto-optical properties of water and saltwater in presence of a magnetic field
Magneto-optical properties of water and saltwater in presence of a magnetic field Open
The magneto-optical (transmittance, absorbance, and reflectance) characteristics of water and saltwater in the presence of a magnetic field (0T to 0.880T) are investigated in this study. The authors studies Raman spectra shift and a magnet…
View article: IRT-SD-SLE: An Improved Real-time Step Detection and Step Length Estimation using Smartphone Accelerometer
IRT-SD-SLE: An Improved Real-time Step Detection and Step Length Estimation using Smartphone Accelerometer Open
Smartphone sensor-based pedestrian dead reckoning (PDR) systems provide a viable solution to the problem of localization in an infrastructure-less area. Step detection (SD) and step length estimation (SLE), being two fundamental operation…
View article: IRT-SD-SLE: An Improved Real-time Step Detection and Step Length Estimation using Smartphone Accelerometer
IRT-SD-SLE: An Improved Real-time Step Detection and Step Length Estimation using Smartphone Accelerometer Open
Smartphone sensor-based pedestrian dead reckoning (PDR) systems provide a viable solution to the problem of localization in an infrastructure-less area. Step detection (SD) and step length estimation (SLE), being two fundamental operation…
View article: Theoretical Foundations for Entrepreneurship Development Program
Theoretical Foundations for Entrepreneurship Development Program Open
Entrepreneurship development is a process of converting an ordinary individual into an entrepreneur. The objective of this study is to examine theories of entrepreneurship development in order to gain a deeper understanding of the developm…
View article: An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks
An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks Open
View article: AI/ML driven intrusion detection framework for IoT-enabled cold storage monitoring system
AI/ML driven intrusion detection framework for IoT-enabled cold storage monitoring system Open
An IoT-based monitoring system remotely controls and manages intelligent environments. Deployed sensors communicate themselves and transmit data over wireless communication. A sensor node (insider or outsider) is in the communication range…
View article: A Novel Weighted Fusion Based Efficient Clustering for Improved Wi-Fi Fingerprint Indoor Positioning
A Novel Weighted Fusion Based Efficient Clustering for Improved Wi-Fi Fingerprint Indoor Positioning Open
The received signal strength (RSS) based Wi-Fi fingerprint technique is not only a cost-effective means for indoor positioning but also provides reliable positioning accuracy in the indoor settings. Thus, such positioning technique has dra…
View article: Incorporating Extended Reality Technology for Delivering Computer Aided Design and Visualisation Modules
Incorporating Extended Reality Technology for Delivering Computer Aided Design and Visualisation Modules Open
The basic requirement in curriculum design is to review and constructively align programme modules with stateof-the art and trends in the subject area. Extended reality (XR), an umbrella term for emerging technologies such as augmented rea…
View article: Blockchain-Based Secure Authentication with Improved Performance for Fog Computing
Blockchain-Based Secure Authentication with Improved Performance for Fog Computing Open
Advancement in the Internet of Things (IoT) and cloud computing has escalated the number of connected edge devices in a smart city environment. Having billions more devices has contributed to security concerns, and an attack-proof authenti…
View article: Hybrid PSO feature selection-based association classification approach for breast cancer detection
Hybrid PSO feature selection-based association classification approach for breast cancer detection Open
View article: A multi-objective evolutionary optimisation model for heterogeneous vehicles routing and relief items scheduling in humanitarian crises
A multi-objective evolutionary optimisation model for heterogeneous vehicles routing and relief items scheduling in humanitarian crises Open
In a disaster scenario, relief items distribution is required as early as possible for the disaster victims to reduce the associated risks. For the distribution tasks, an effective and efficient relief items distribution model to generated…
View article: Dynamic Relief Items Distribution Model with Sliding Time Window in the Post-Disaster Environment
Dynamic Relief Items Distribution Model with Sliding Time Window in the Post-Disaster Environment Open
In smart cities, relief items distribution is a complex task due to the factors such as incomplete information, unpredictable exact demand, lack of resources, and causality levels, to name a few. With the development of Internet of Things …
View article: A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network
A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network Open
View article: A comparative study of common steps in video-based remote heart rate detection methods
A comparative study of common steps in video-based remote heart rate detection methods Open
Video-based remote heart rate detection is a promising technology that can offer convenient and low-cost heart rate monitoring within, but not limited to, the clinical environment, especially when attaching electrodes or pulse oximeters on…
View article: Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain
Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain Open
The use of low-cost sensors in IoT over high-cost devices has been considered less expensive. However, these low-cost sensors have their own limitations such as the accuracy, quality, and reliability of the data collected. Fog computing of…
View article: An enhanced detection system against routing attacks in mobile ad-hoc network
An enhanced detection system against routing attacks in mobile ad-hoc network Open