default search action
Keshav P. Dahal
Person information
- affiliation: Nanjing University of Science and Technology, China
- affiliation: University of the West of Scotland, Paisley, UK
- affiliation (former): University of Bradford, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Luke Beveridge, Keshav P. Dahal:
Optimisation of spatial-exploitation CNN models through hyperparameter-tuning and human-in-the-loop combination. Int. J. Artif. Intell. Soft Comput. 8(2): 147-158 (2024) - [j48]Mahendra Prasad, Pankaj Pal, Sachin Tripathi, Keshav P. Dahal:
AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system. Secur. Priv. 7(5) (2024) - [i5]Bhupesh Kumar Mishra, Keshav P. Dahal:
Collaborative Framework with Shared Responsibility for Relief Management in Disaster Scenarios. CoRR abs/2406.10572 (2024) - 2023
- [j47]Mahendra Prasad, Sachin Tripathi, Keshav P. Dahal:
A probability estimation-based feature reduction and Bayesian rough set approach for intrusion detection in mobile ad-hoc network. Appl. Intell. 53(6): 7169-7185 (2023) - [j46]Mahendra Prasad, Sachin Tripathi, Keshav P. Dahal:
An intelligent intrusion detection and performance reliability evaluation mechanism in mobile ad-hoc networks. Eng. Appl. Artif. Intell. 119: 105760 (2023) - [j45]Bilal Sowan, Mohammed Eshtay, Keshav P. Dahal, Hazem Qattous, Li Zhang:
Hybrid PSO feature selection-based association classification approach for breast cancer detection. Neural Comput. Appl. 35(7): 5291-5317 (2023) - [j44]Pampa Sadhukhan, Keshav P. Dahal, Pradip K. Das:
A Novel Weighted Fusion Based Efficient Clustering for Improved Wi-Fi Fingerprint Indoor Positioning. IEEE Trans. Wirel. Commun. 22(7): 4461-4474 (2023) - [j43]Subrata Dutta, Arindam Giri, Debasis Giri, Sarmistha Neogy, Keshav P. Dahal, Wenbing Chen:
Optimum Node Deployment Policy (ONDP) for WSN: Trade-off Between Maximization of Area Coverage and Lifetime. Wirel. Pers. Commun. 133(2): 1055-1080 (2023) - [c72]Md. Shakil Ahmed, Ravi Chandra Koirala, Keshav P. Dahal, Andrii Prokhorchenko:
Ridesharing in Rail-Freight Transport and Use of Digital Aggregator: Prospects and Difficulties - A Developer's Perspective. SKIMA 2023: 279-284 - [c71]Balaji Aresh, Parag Vichare, Keshav P. Dahal, Tony Leslie, Marco Gilardi, Alyona Lovska, Glib Vatulia:
Integration of Extended Reality (XR) in Non-Native Undergraduate Programmes. SKIMA 2023: 285-292 - [c70]Parag Vichare, Sushil Paudel, Bishal Rimal, Sujan Adhikari, Violetta Panchenko, Rameshwar Rijal, Keshav P. Dahal:
Traditional, Video and Extended Reality (XR) Assisted Flipped Classroom Teaching Methods: An Approach and Comparison. SKIMA 2023: 298-305 - 2022
- [j42]Lakmini P. Malasinghe, Stamos Katsigiannis, Keshav P. Dahal, Naeem Ramzan:
A comparative study of common steps in video-based remote heart rate detection methods. Expert Syst. Appl. 207: 117867 (2022) - [j41]Otuekong Umoren, Raman Singh, Zeeshan Pervez, Keshav P. Dahal:
Securing Fog Computing with a Decentralised User Authentication Approach Based on Blockchain. Sensors 22(10): 3956 (2022) - [j40]Otuekong Umoren, Raman Singh, Shahid Awan, Zeeshan Pervez, Keshav P. Dahal:
Blockchain-Based Secure Authentication with Improved Performance for Fog Computing. Sensors 22(22): 8969 (2022) - [j39]Peisong Li, Xinheng Wang, Honghao Gao, Xiaolong Xu, Muddesar Iqbal, Keshav P. Dahal:
A Dynamic and Scalable User-Centric Route Planning Algorithm Based on Polychromatic Sets Theory. IEEE Trans. Intell. Transp. Syst. 23(3): 2762-2772 (2022) - [j38]Mahendra Prasad, Sachin Tripathi, Keshav P. Dahal:
An enhanced detection system against routing attacks in mobile ad-hoc network. Wirel. Networks 28(4): 1411-1428 (2022) - [j37]Arindam Giri, Subrata Dutta, Sarmistha Neogy, Bikrant Koirala, Keshav P. Dahal:
Adaptive Cross-Layer Routing Protocol for Optimizing Energy Harvesting Time in WSN. Wirel. Pers. Commun. 122(1): 825-843 (2022) - [c69]Parag Vichare, Michele Cano, Keshav P. Dahal, Tomasz A. Siewierski, Marco Gilardi:
Incorporating Extended Reality Technology for Delivering Computer Aided Design and Visualisation Modules. SKIMA 2022: 114-119 - 2021
- [j36]Pampa Sadhukhan, Supriya Gain, Keshav P. Dahal, Samiran Chattopadhyay, Nilkantha Garain, Xinheng Wang:
An efficient clustering with robust outlier mitigation for Wi-Fi fingerprint based indoor positioning. Appl. Soft Comput. 109: 107549 (2021) - [j35]Elahe Naserian, Xinheng Wang, Keshav P. Dahal, José M. Alcaraz-Calero, Honghao Gao:
A Partition-Based Partial Personalized Model for Points-of-Interest Recommendations. IEEE Trans. Comput. Soc. Syst. 8(5): 1223-1237 (2021) - [c68]Md. Shakil Ahmed, Marco Gilardi, Keshav P. Dahal, Dave Finch:
Successful Project Completion During the COVID-19 Pandemic - A Lesson Learnt. BIS (Workshops) 2021: 79-85 - [c67]Aboua Ange Kevin N'Da, Santiago Matalonga, Keshav P. Dahal:
Applicability of the Software Security Code Metrics for Ethereum Smart Contract. Deep-BDB 2021: 106-119 - 2020
- [j34]Mahendra Prasad, Sachin Tripathi, Keshav P. Dahal:
An efficient feature selection based Bayesian and Rough set approach for intrusion detection. Appl. Soft Comput. 87: 105980 (2020) - [j33]Mahendra Prasad, Sachin Tripathi, Keshav P. Dahal:
Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection. Comput. Secur. 99: 102062 (2020) - [j32]Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal, Ali Kashif Bashir, Rao Mumtaz, Jonathan González:
Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Future Gener. Comput. Syst. 111: 763-779 (2020) - [j31]Ankhbayar Otgonbayar, Zeeshan Pervez, Keshav P. Dahal:
X-BAND : Expiration Band for Anonymizing Varied Data Streams. IEEE Internet Things J. 7(2): 1438-1450 (2020) - [c66]Aboua Ange Kevin N'Da, Santiago Matalonga, Keshav P. Dahal:
Characterizing the Cost of Introducing Secure Programming Patterns and Practices in Ethereum. WorldCIST (2) 2020: 25-34
2010 – 2019
- 2019
- [j30]Wenbing Chen, Keshav P. Dahal, Shuxian Huang:
Salient object detection via reciprocal function filter. IET Image Process. 13(10): 1616-1624 (2019) - [j29]Tanmoy Maitra, Mohammad S. Obaidat, Debasis Giri, Subrata Dutta, Keshav P. Dahal:
ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications. IET Networks 8(5): 289-298 (2019) - [j28]Lakmini P. Malasinghe, Naeem Ramzan, Keshav P. Dahal:
Remote patient monitoring: a comprehensive study. J. Ambient Intell. Humaniz. Comput. 10(1): 57-76 (2019) - [j27]Bikrant Koirala, Keshav P. Dahal, Paul Keir, Wenbing Chen:
A Multi-Node Energy Prediction Approach Combined with Optimum Prediction Interval for RF Powered WSNs. Sensors 19(24): 5551 (2019) - [j26]Subrata Dutta, Mohammad S. Obaidat, Keshav P. Dahal, Debasis Giri, Sarmistha Neogy:
M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes. IEEE Syst. J. 13(1): 215-225 (2019) - [j25]Subrata Dutta, Mohammad S. Obaidat, Keshav P. Dahal, Debasis Giri, Sarmistha Neogy:
Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN. IEEE Syst. J. 13(1): 289-300 (2019) - [c65]Mahendra Prasad, Sachin Tripathi, Keshav P. Dahal:
Wormhole attack detection in ad hoc network using machine learning technique. ICCCNT 2019: 1-7 - [c64]Bikrant Koirala, Keshav P. Dahal:
Lifetime and Buffer-Size Optimization for RF Powered Wireless Sensor Networks. SENSORNETS 2019: 102-107 - [c63]Hussien Saleh Altwassi, Zeeshan Pervez, Keshav P. Dahal:
A Burst and Congestion-Aware Routing Metric for RPL Protocol in IoT Network. SKIMA 2019: 1-6 - [c62]Ravi Chandra Koirala, Keshav P. Dahal, Santiago Matalonga, Rameshwar Rijal:
A Supply Chain Model with Blockchain-Enabled Reverse Auction Bidding Process for Transparency and Efficiency. SKIMA 2019: 1-6 - [c61]Ankhbayar Otgonbayar, Zeeshan Pervez, Keshav P. Dahal:
Partitioning based incremental marginalization algorithm for anonymizing missing data streams. SKIMA 2019: 1-7 - [c60]Thepparit Sinthamrongruk, Keshav P. Dahal, Xinheng Wang, Muddesar Iqbal:
A three-step scheduling based on geographic information system for workforce-planning problem. SKIMA 2019: 1-7 - [c59]Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal:
Snort Based Collaborative Intrusion Detection System Using Blockchain in SDN. SKIMA 2019: 1-8 - 2018
- [j24]Elahe Naserian, Xinheng Wang, Keshav P. Dahal, Zhi Wang, Zaijian Wang:
Personalized location prediction for group travellers from spatial-temporal trajectories. Future Gener. Comput. Syst. 83: 278-292 (2018) - [j23]Ankhbayar Otgonbayar, Zeeshan Pervez, Keshav P. Dahal, Steve Eager:
K-VARP: K-anonymity for varied data streams via partitioning. Inf. Sci. 467: 238-255 (2018) - [j22]Antesar M. Shabut, M. Shamim Kaiser, Keshav P. Dahal, Wenbing Chen:
A multidimensional trust evaluation model for MANETs. J. Netw. Comput. Appl. 123: 32-41 (2018) - [j21]Andreas Stiegler, Keshav P. Dahal, Johannes Maucher, Daniel Jack Livingstone:
Symbolic Reasoning for Hearthstone. IEEE Trans. Games 10(2): 113-127 (2018) - [c58]Elahe Naserianhanzaei, Xinheng Wang, Keshav P. Dahal:
APPR: Additive Personalized Point-of-Interest Recommendation. GLOBECOM 2018: 1-7 - [c57]Raja Majid Ali Ujjan, Zeeshan Pervez, Keshav P. Dahal:
Suspicious Traffic Detection in SDN with Collaborative Techniques of Snort and Deep Neural Networks. HPCC/SmartCity/DSS 2018: 915-920 - [c56]Lakmini P. Malasinghe, Stamos Katsigiannis, Naeem Ramzan, Keshav P. Dahal:
Remote Heart Rate Extraction Using Microsoft KinectTM v2.0. ICBBT 2018: 1-6 - [c55]Bhupesh Kumar Mishra, Tek Narayan Adhikari, Keshav P. Dahal, Zeeshan Pervez:
Priority-Index Based Multi-Priority Relief Logistics Scheduling with Greedy Heuristic Search. ICT-DM 2018: 1-8 - [c54]Martins Olaleye, Keshav P. Dahal, Zeeshan Pervez:
A Fuzzy-based Throughput Prediction For Wireless Communication Systems. INISTA 2018: 1-7 - [c53]Nasser Alsharif, Keshav P. Dahal, Zeeshan Pervez, Pradorn Sureephong:
Multi-Dimensional E-commerce Trust Evaluation Method. SKIMA 2018: 1-7 - [c52]Hussien Saleh Altwassi, Zeeshan Pervez, Keshav P. Dahal, Baraq Ghaleb:
The RPL Load Balancing in IoT Network with Burst Traffic Scenarios. SKIMA 2018: 1-7 - 2017
- [c51]Pampa Sadhukhan, Keshav P. Dahal, Zeeshan Pervez:
Impact of beacon coverage on clustering strategies for fingerprinting localization system. ICNC 2017: 184-188 - [c50]Antesar M. Shabut, Keshav P. Dahal:
Social factors for data sparsity problem of trust models in MANETs. ICNC 2017: 876-880 - [c49]Bhupesh Kumar Mishra, Keshav P. Dahal, Zeeshan Pervez:
Dual-mode round-robin greedy search with fair factor algorithm for relief logistics scheduling. ICT-DM 2017: 1-7 - [c48]Arindam Giri, Subrata Dutta, Sarmistha Neogy, Keshav P. Dahal, Zeeshan Pervez:
Internet of things (IoT): a survey on architecture, enabling technologies, applications and challenges. IML 2017: 7:1-7:12 - [c47]Antesar M. Shabut, Keshav P. Dahal, M. Shamim Kaiser, M. Alamgir Hossain:
Malicious Insider Threats in Tactical MANET: The Performace Analysis of DSR Routing Protocol. iThings/GreenCom/CPSCom/SmartData 2017: 390-395 - [c46]Suyesh Bhattarai, Parag Vichare, Keshav P. Dahal, Subodh Kumar Ghimire, D. Krishna Mohan Raju:
Computational fluid dynamics based performance evaluation of louvered fin radiator. SKIMA 2017: 1-6 - [c45]Sulakshana Chilukuri, Keshav P. Dahal:
A CPW fed antenna with semicircular patch on triangle for wideband wireless applications. SKIMA 2017: 1-6 - [c44]Jirawit Yanchinda, Thepparit Sinthamrongruk, Keshav P. Dahal:
STEM learning concept with fuzzy inference for organic rice farming knowledge acquisition. SKIMA 2017: 1-8 - 2016
- [c43]Jesus Monge-Alvarez, Carlos Hoyos-Barcelo, Paul Lesso, Javier Escudero, Keshav P. Dahal, Pablo Casaseca-de-la-Higuera:
Effect of importance sampling on robust segmentation of audio-cough events in noisy environments. EMBC 2016: 3740-3744 - [c42]Ankhbayar Otgonbayar, Zeeshan Pervez, Keshav P. Dahal:
Toward Anonymizing IoT Data Streams via Partitioning. MASS 2016: 331-336 - [c41]Andreas Stiegler, Claudius Messerschmidt, Johannes Maucher, Keshav P. Dahal:
Hearthstone deck-construction with a utility system. SKIMA 2016: 21-28 - [c40]Thepparit Sinthamrongruk, Keshav P. Dahal:
Route scheduling for HSSP using adaptive genetic algorithm with constructive scheduling technique. SKIMA 2016: 274-280 - [c39]Martins Olaleye, Keshav P. Dahal, Zeeshan Pervez:
Cognitive radio engine learning adaptation. SKIMA 2016: 325-332 - 2015
- [j20]Keshav P. Dahal, Khaled Almejalli, M. Alamgir Hossain, Wenbing Chen:
GA-based learning for rule identification in fuzzy neural networks. Appl. Soft Comput. 35: 605-617 (2015) - [j19]Wenbing Chen, Qizhou Li, Keshav P. Dahal:
ROI image retrieval based on multiple features of mean shift and expectation-maximisation. Digit. Signal Process. 40: 117-130 (2015) - [j18]Keshav P. Dahal, Khalid Al-Arfaj, Krishna Paudyal:
Modelling generator maintenance scheduling costs in deregulated power markets. Eur. J. Oper. Res. 240(2): 551-561 (2015) - [j17]Keshav P. Dahal, Yacine Ouzrout:
Guest editorial. Int. J. Intell. Comput. Cybern. 8(3) (2015) - [j16]Antesar M. Shabut, Keshav P. Dahal, Sanat Kumar Bista, Irfan-Ullah Awan:
Recommendation Based Trust Model with an Effective Defence Scheme for MANETs. IEEE Trans. Mob. Comput. 14(10): 2101-2115 (2015) - [c38]Nopasit Chakpitak, Piang-or Loahavilai, Keshav P. Dahal, Abdelaziz Bouras:
Knowledge Management on Asset Management for End of Life Products. PLM 2015: 428-443 - [c37]Antesar M. Shabut, Keshav P. Dahal, Irfan Awan, Zeeshan Pervez:
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks. InfoSec 2015: 28-34 - [c36]Piang-or Loahavilai, Nopasit Chakpitak, Pradorn Sureephong, Keshav P. Dahal:
Serious game to motivate the knowledge sharing among knowledge technicians in machinery relocation of foreign direct investment. SKIMA 2015: 1-7 - [c35]Chunbo Luo, Pablo Casaseca-de-la-Higuera, Xinheng Wang, Keshav P. Dahal, Cheng Jin, Peng Ren:
On the study of wireless signal noise for designing network infrastructure of knowledge management systems. SKIMA 2015: 1-8 - 2014
- [c34]Antesar M. Shabut, Keshav P. Dahal, Irfan Awan:
Friendship Based Trust Model to Secure Routing Protocols in Mobile Ad Hoc Networks. FiCloud 2014: 280-287 - 2013
- [j15]Keshav P. Dahal, Khaled Almejalli, M. Alamgir Hossain:
Decision support for coordinated road traffic control actions. Decis. Support Syst. 54(2): 962-975 (2013) - [j14]M. Alamgir Hossain, A. A. Madkour, Keshav P. Dahal, Li Zhang:
A real-time dynamic optimal guidance scheme using a general regression neural network. Eng. Appl. Artif. Intell. 26(4): 1230-1236 (2013) - [j13]Dewan Md. Farid, Li Zhang, M. Alamgir Hossain, Chowdhury Mofizur Rahman, Rebecca Strachan, Graham Sexton, Keshav P. Dahal:
An adaptive ensemble classifier for mining concept drifting data streams. Expert Syst. Appl. 40(15): 5895-5906 (2013) - [j12]Bilal I. Sowan, Keshav P. Dahal, M. Alamgir Hossain, Li Zhang, Linda Spencer:
Fuzzy association rule mining approaches for enhancing prediction performance. Expert Syst. Appl. 40(17): 6928-6937 (2013) - [c33]Antesar M. Shabut, Keshav P. Dahal, Irfan Awan:
Enhancing Dynamic Recommender Selection Using Multiple Rules for Trust and Reputation Models in MANETs. ICTAI 2013: 654-660 - [i4]Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling:
Evolution of Cooperation in an Incentive Based Business Game Environment. CoRR abs/1305.2978 (2013) - [i3]Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Bhadra Man Tuladhar:
Unraveling the Evolution of Defectors in Online Business Games. CoRR abs/1305.2979 (2013) - [i2]Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Bhadra Man Tuladhar:
Metrics for Computing Trust in a Multi-Agent Environment. CoRR abs/1305.2981 (2013) - 2012
- [j11]Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling:
Decision Theoretic Assessment Model for Online Business Games. Int. J. Next Gener. Comput. 3(1) (2012) - [j10]Stephen Remde, Peter I. Cowling, Keshav P. Dahal, Nic Colledge, E. Selensky:
An empirical study of hyperheuristics for managing very large sets of low level heuristics. J. Oper. Res. Soc. 63(3): 392-405 (2012) - 2011
- [c32]Walid Adly Atteya, Keshav P. Dahal, M. Alamgir Hossain:
Distributed BitTable Multi-Agent Association Rules Mining Algorithm. KES (1) 2011: 151-160 - 2010
- [j9]Maher Ragheb Aburrous, M. Alamgir Hossain, Keshav P. Dahal, Fadi A. Thabtah:
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies. Cogn. Comput. 2(3): 242-253 (2010) - [j8]Aysh Menoer Alhroob, Keshav P. Dahal, M. Alamgir Hossain:
Automatic Test Cases Generation from Software Specifications. e Informatica Softw. Eng. J. 4(1): 109-121 (2010) - [j7]Maher Ragheb Aburrous, M. Alamgir Hossain, Keshav P. Dahal, Fadi A. Thabtah:
Intelligent phishing detection system for e-banking using fuzzy data mining. Expert Syst. Appl. 37(12): 7913-7921 (2010) - [j6]Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Bhadra Man Tuladhar:
Acquaintance-based trust model for the evolution of cooperation in business games. Serv. Oriented Comput. Appl. 4(3): 181-189 (2010) - [c31]Bilal I. Sowan, Keshav P. Dahal, M. Alamgir Hossain, Mohammad S. Alam:
Diversification of Fuzzy Association Rules to improve prediction accuracy. FUZZ-IEEE 2010: 1-8 - [c30]Bilal I. Sowan, Keshav P. Dahal, M. Alamgir Hossain:
Fuzzy Multiple Support Associative Classification Approach for Prediction. ICAISC (1) 2010: 216-223 - [c29]Walid Adly Atteya, Keshav P. Dahal, M. Alamgir Hossain:
Multi-agent system for early prediction of urinary bladder inflammation disease. ISDA 2010: 539-544 - [c28]Maher Ragheb Aburrous, M. Alamgir Hossain, Keshav P. Dahal, Fadi A. Thabtah:
Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case Studies. ITNG 2010: 176-181 - [c27]Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Aziz Bouras:
Assessing trustworthiness of nodes to enhance performance in mobile ad hoc networks. PST 2010: 80-87 - [i1]Beenish Anam, Kazi Sakib, M. Alamgir Hossain, Keshav P. Dahal:
Review on the Advancements of DNA Cryptography. CoRR abs/1010.0186 (2010)
2000 – 2009
- 2009
- [c26]Khaled Almejalli, Keshav P. Dahal, M. Alamgir Hossain:
An intelligent multi-agent approach for road traffic management systems. CCA/ISIC 2009: 825-830 - [c25]Stephen Remde, Keshav P. Dahal, Peter I. Cowling, Nic Colledge:
Binary Exponential Back Off for Tabu Tenure in Hyperheuristics. EvoCOP 2009: 109-120 - [c24]Fatos Xhafa, Juan Antonio Gonzalez, Keshav P. Dahal, Ajith Abraham:
A GA(TS) Hybrid Algorithm for Scheduling in Computational Grids. HAIS 2009: 285-292 - [c23]Maher Ragheb Aburrous, M. Alamgir Hossain, Keshav P. Dahal, Fadi A. Thabtah:
Modelling Intelligent Phishing Detection System for E-banking Using Fuzzy Data Mining. CW 2009: 265-272 - [c22]Sanat Kumar Bista, Keshav P. Dahal, Peter I. Cowling, Bhadra Man Tuladhar:
Evolution of Cooperativeness in a Business Game Relying on Acquaintance Based Trustworthiness Assessment. CEC 2009: 16-23 - 2008
- [c21]Fatos Xhafa, Bernat Duran, Ajith Abraham, Keshav P. Dahal:
Tuning Struggle Strategy in Genetic Algorithms for Scheduling in Computational Grids. CISIM 2008: 275-280 - [c20]Keshav P. Dahal, M. Alamgir Hossain, Benny Varghese, Ajith Abraham, Fatos Xhafa, Atanasi Daradoumis:
Scheduling in Multiprocessor System Using Genetic Algorithms. CISIM 2008: 281-286 - [c19]Keshav P. Dahal, Stephen Remde, Peter I. Cowling, Nic Colledge:
Improving Metaheuristic Performance by Evolving a Variable Fitness Function. EvoCOP 2008: 170-181 - [c18]Maher Ragheb Aburrous, M. Alamgir Hossain, Fadi A. Thabtah, Keshav P. Dahal:
Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy Logic. ITNG 2008: 420-425 - 2007
- [j5]Keshav P. Dahal, Chris J. Aldridge, Stuart J. Galloway:
Evolutionary hybrid approaches for generation scheduling in power systems. Eur. J. Oper. Res. 177(3): 2050-2068 (2007) - [j4]A. Madkour, M. Alamgir Hossain, Keshav P. Dahal, Hongnian Yu:
Intelligent Learning Algorithms for Active Vibration Control. IEEE Trans. Syst. Man Cybern. Part C 37(5): 1022-1033 (2007) - [c17]Prisadarng Skolpadungket, Keshav P. Dahal, Napat Harnpornchai:
Portfolio optimization using multi-obj ective genetic algorithms. IEEE Congress on Evolutionary Computation 2007: 516-523 - [c16]Napat Harnpornchai, Nopasit Chakpitak, Tirapot Chandarasupsang, Tuang-Ath Chaikijkosi, Keshav P. Dahal:
Dynamic adjustment of age distribution in Human Resource Management by genetic algorithms. IEEE Congress on Evolutionary Computation 2007: 1234-1239 - [c15]Stephen Remde, Peter I. Cowling, Keshav P. Dahal, Nic Colledge:
Exact/Heuristic Hybrids Using rVNS and Hyperheuristics for Workforce Scheduling. EvoCOP 2007: 188-197 - [c14]Khaled Almejalli, Keshav P. Dahal, M. Alamgir Hossain:
Intelligent Traffic Control Decision Support System. EvoWorkshops 2007: 688-701 - [c13]Chartchai Doungsa-ard, Keshav P. Dahal, M. Alamgir Hossain, Taratip Suwannasart:
Test Data Generation from UML State Machine Diagrams using GAs. ICSEA 2007: 47 - [c12]Khaled Almejalli, Keshav P. Dahal, M. Alamgir Hossain:
GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks. ISDA 2007: 289-296 - [c11]Stephen Remde, Peter I. Cowling, Keshav P. Dahal, Nic Colledge:
Evolution of Fitness Functions to Improve Heuristic Performance. LION 2007: 206-219 - [p1]Keshav P. Dahal, Stuart J. Galloway:
Evolutionary Generator Maintenance Scheduling in Power Systems. Evolutionary Scheduling 2007: 349-382 - [e1]Keshav P. Dahal, Kay Chen Tan, Peter I. Cowling:
Evolutionary Scheduling. Studies in Computational Intelligence 49, Springer 2007, ISBN 978-3-540-48582-7 [contents] - 2006
- [c10]Peter I. Cowling, Nic Colledge, Keshav P. Dahal, Stephen Remde:
The Trade Off Between Diversity and Quality for Multi-objective Workforce Scheduling. EvoCOP 2006: 13-24 - 2005
- [c9]Keshav P. Dahal, Zabeer Hussain, M. Alamgir Hossain:
Loan Risk Analyzer based on Fuzzy Logic. EEE 2005: 363-366 - [c8]Keshav P. Dahal, Stuart J. Galloway, Graeme M. Burt, Jim R. McDonald, Ian Hopkins:
A case study of process facility optimization using discrete event simulation and genetic algorithm. GECCO 2005: 2197-2198 - [c7]M. Alamgir Hossain, A. A. Madkour, Keshav P. Dahal:
Comparative performance of intelligent identification and control algorithms for a flexible beam vibration. ICINCO 2005: 364-367 - 2004
- [c6]M. Alamgir Hossain, M. Osman Tokhi, Keshav P. Dahal:
Impact of Algorithm Design in Implementing Real-Time Active Control Systems. AACC 2004: 247-254 - [c5]Keshav P. Dahal, Tomasz A. Siewierski, Stuart J. Galloway, Graeme M. Burt, Jim R. McDonald:
An evolutionary generation scheduling in an open electricity market. IEEE Congress on Evolutionary Computation 2004: 1135-1142 - 2003
- [j3]Keshav P. Dahal, Stuart J. Galloway, Graeme M. Burt, Jim R. McDonald, Ian Hopkins:
A Port System Simulation Facility With An Optimization Capability. Int. J. Comput. Intell. Appl. 3(4): 395-410 (2003) - [c4]Keshav P. Dahal, Stuart J. Galloway, Chris J. Aldridge:
Developing GA-based hybrid approaches for a real-world mixed-integer scheduling problem. IEEE Congress on Evolutionary Computation 2003: 1887-1894 - 2001
- [j2]Keshav P. Dahal, Graeme M. Burt, Jim R. McDonald, A. Moyes:
A case study of scheduling storage tanks using a hybrid genetic algorithm. IEEE Trans. Evol. Comput. 5(3): 283-294 (2001) - 2000
- [c3]Keshav P. Dahal, Graeme M. Burt, Jim R. McDonald, Stuart J. Galloway:
GA/SA-based hybrid techniques for the scheduling of generator maintenance in power systems. CEC 2000: 567-574
1990 – 1999
- 1999
- [j1]Keshav P. Dahal, Chris J. Aldridge, James R. McDonald:
Generator maintenance scheduling using a genetic algorithm with a fuzzy evaluation function. Fuzzy Sets Syst. 102(1): 21-29 (1999) - [c2]Keshav P. Dahal, Chris J. Aldridge, James R. McDonald, Graeme M. Burt:
A GA-based technique for the scheduling of storage tanks. CEC 1999: 2199-2206 - 1997
- [c1]Keshav P. Dahal, James R. McDonald:
Generational and Steady-State Genetic Algorithms for Generator Maintenance Scheduling Problems. ICANNGA 1997: 259-263
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint