Kushal Dalal

Kushal Dalal

Rutherford, New Jersey, United States
21K followers 500+ connections

About

• Software Engineering, Product Development & Data Science professional with several…

Articles by Kushal

  • Venture Capital Technical Due Diligence: What VCs Look At Under the Hood

    I was involved in the technical due diligence for raising the fund for couple of companies I worked. Depends on market…

    1 Comment
  • A Practical Guide to Consistency Models in Distributed Systems

    In today’s world of distributed databases and cloud-native applications, ensuring data consistency while maintaining…

  • How Managers Become Leaders

    In today's dynamic business environment, the transition from manager to leader is crucial for organizational success…

    1 Comment
  • Embracing Human Centered Leadership in the Modern Workplace

    In today’s rapidly evolving workplace, traditional leadership models are being challenged by a new paradigm that places…

  • API Security Best Practices

    APIs (Application Programming Interfaces) are the foundation of modern applications, enabling seamless interaction…

  • Taking Risk and Scaling Up: Cultivating a Smart Risk-Taking Culture

    2025 is going to be an interesting year. There is so much innovation going on and 2025 it will accelerate.

  • The Anxious Generation

    Few weeks back went to my son's school for parent teacher conference. One of the books suggested was The Anxious…

  • Data Protection Audit Lifecycle

    In today’s world where Data is everything, protection of the data is one of the most difficult tasks of an…

  • SAML Vs OIDC

    𝗦𝗔𝗠𝗟 (𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗔𝘀𝘀𝗲𝗿𝘁𝗶𝗼𝗻 𝗠𝗮𝗿𝗸𝘂𝗽 𝗟𝗮𝗻𝗴𝘂𝗮𝗴𝗲) 𝗮𝗻𝗱 𝗢𝗜𝗗𝗖 (𝗢𝗽𝗲𝗻𝗜𝗗…

    2 Comments
  • Why Atomicity is Critical in Distributed Systems

    Atomicity is a foundational concept in distributed system design, providing robust methods for managing failures and…

Activity

Join now to see all activity

Experience

  • Plato  Graphic
  • -

    New York, New York, United States

  • -

    New York, New York

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

    Greater New York City Area

  • -

  • -

  • -

  • -

  • -

Education

Licenses & Certifications

Volunteer Experience

  • CodePath.org Graphic

    Mock Interviewer

    CodePath.org

    - 1 month

    Science and Technology

    I volunteered for the codepath.org and provide mock interview practice and help students with resume from Nigeria, Africa.

  • Habitat for Humanity International Graphic

    Volunteer

    Habitat for Humanity International

    - 1 year 1 month

    Human Rights

    We went to the construction site and help build the house in Queens, NY.

Publications

  • Analysis of using IoT Sensors in Healthcare units Supported by Cloud Computing

    IEEE

    The current study analyzes the impact of IoT sensors in health care units in association with cloud computing. The advantages, disadvantages and risks associated with the pragmatic implementation is discussed elaborately along with future benefits. The study aims to establish a standardized viewpoint with respect to the adoption of IoT sensors in the daily applications.

    See publication
  • Developing a framework to improve the accuracy of point-of-care testing for healthcare applications

    IEEE

    Point-of-Care Test (POCT) is considered as the diagnostic test which is administrated in the outside of the central laboratory ator near the patient location. Therefore, it can be stated that the use of POCT devices in the department of emergency represents a significant benefit to the management of the patient. It can be able to give proper governance to credible policy, safe practice, and effective process performance by the healthcare clinics. The major contribution of the POCT is it can…

    Point-of-Care Test (POCT) is considered as the diagnostic test which is administrated in the outside of the central laboratory ator near the patient location. Therefore, it can be stated that the use of POCT devices in the department of emergency represents a significant benefit to the management of the patient. It can be able to give proper governance to credible policy, safe practice, and effective process performance by the healthcare clinics. The major contribution of the POCT is it can give a huge improvement over the test result in the context of turnaround time. Here this research paper considers the process of development framework of POCT in the emergency department (ED). Moreover, the challenges faced by the clinical staff during the usage of previous POCT and the implementation process are also discussed to give a clear clarification about the essentiality of the developed framework of POCT.

    See publication
  • Analysing the Implementation of Machine Learning in Healthcare

    IEEE

    The implementation of machine learning (ML) in clinical settings reflects the promising opportunities for improving the delivery of healthcare. Private healthcare businesses are considering and utilizing the development of ML in the process of decision making, adopting and supporting medical fields. This strong subcategory of AI appears familiar in several cases like the use of speech recognition by voice assistants, and the creation of personalized medical experiences. This report aims to…

    The implementation of machine learning (ML) in clinical settings reflects the promising opportunities for improving the delivery of healthcare. Private healthcare businesses are considering and utilizing the development of ML in the process of decision making, adopting and supporting medical fields. This strong subcategory of AI appears familiar in several cases like the use of speech recognition by voice assistants, and the creation of personalized medical experiences. This report aims to critically analyse the implementation of ML in the healthcare industry by understanding how ML is revolutionizing the industry and what its full potential is for the industry.

    See publication
  • Analysing the Role of Supervised and Unsupervised Machine Learning in IoT

    IEEE

    To harness the value of data generated from IoT, there is a crucial requirement of new mechanisms. Machine learning (ML) is among the most suitable paradigms of computation which embeds strong intelligence within IoT devices. Various ML techniques are being widely utilised for improving network security in IoT. These techniques include reinforcement learning, semi-supervised learning, supervised learning, and unsupervised learning. This report aims to critically analyse the role played by…

    To harness the value of data generated from IoT, there is a crucial requirement of new mechanisms. Machine learning (ML) is among the most suitable paradigms of computation which embeds strong intelligence within IoT devices. Various ML techniques are being widely utilised for improving network security in IoT. These techniques include reinforcement learning, semi-supervised learning, supervised learning, and unsupervised learning. This report aims to critically analyse the role played by supervised and unsupervised ML for the enhancement of IoT security.

    See publication
  • A Novel Hybrid data security algorithm for Electronic Health Records security

    IEEE

    Data security is a critical aspect in this digital world. Data security algorithms are designed to suit specific applications. Electronic Health Records (EHR) are the digital documents that contain the digital data of the patients. The data includes personal information of the patient along with the medical and treatment histories. The radiology images and medical information is also contained in the digital form in the EHRs. This data is usually stored in the cloud servers because of the data…

    Data security is a critical aspect in this digital world. Data security algorithms are designed to suit specific applications. Electronic Health Records (EHR) are the digital documents that contain the digital data of the patients. The data includes personal information of the patient along with the medical and treatment histories. The radiology images and medical information is also contained in the digital form in the EHRs. This data is usually stored in the cloud servers because of the data storage issues. The common practice is that the data is divided into multiple segments and stored in different cloud servers. The issue of reconstruction using searchable metrics is the problem that is addressed in this paper using a novel hybrid algorithm. The personal data of the patient is preserved using the k-Nearest Neighbor classification algorithm to secure the data. The proposed method is novel and works in different stages.

    See publication
  • Cyber Security: Threat Detection Model based on Machine learning Algorithm

    IEEE Xplore

    A threat can be anything that causes potential
    damage to the network system. These threats can turn out to be a
    attack to the system. Threat may occur in any forms like viruses,
    outright attack, and phishing attack from hackers to gain
    information. Such attacks put a user’s system and also business
    system at risks. Cyber security aims at the protection of system
    from attacks like unauthorized network access, intrusions attacks
    etc. This paper presents a novel architecture…

    A threat can be anything that causes potential
    damage to the network system. These threats can turn out to be a
    attack to the system. Threat may occur in any forms like viruses,
    outright attack, and phishing attack from hackers to gain
    information. Such attacks put a user’s system and also business
    system at risks. Cyber security aims at the protection of system
    from attacks like unauthorized network access, intrusions attacks
    etc. This paper presents a novel architecture model based on
    machine learning for the prediction of Cyber security malware
    that requires execution in a sandbox environment. In order to
    prevent the attackers from infiltrating the system Machine
    Learning approach is adapted.

    See publication
  • A Review on Machine Learning Techniques Adapted for Cyber Security

    IEEE

    Machine learning is one among the widely used techniques in the field of Computer Science, and it finds wide applications in cybersecurity, natural language processing, image processing, pattern recognition and other fields. Despite successful applications of machine learning techniques in various cases like intrusion detection, data security, network security and cyber security, the performance of such techniques significantly decreases because these machine learning algorithms and equivalent…

    Machine learning is one among the widely used techniques in the field of Computer Science, and it finds wide applications in cybersecurity, natural language processing, image processing, pattern recognition and other fields. Despite successful applications of machine learning techniques in various cases like intrusion detection, data security, network security and cyber security, the performance of such techniques significantly decreases because these machine learning algorithms and equivalent training data are susceptible to various security attacks. This calls for in depth analysis of security threats and related defensive techniques of machine learning intensively which leads to the motivation of this review paper. An exploratory research on the existing methodology of machine learning techniques are studied and the research gap in the field of adaption of machine learning defensive techniques to cybersecurity is analysed.

Courses

  • Analysis of

    -

  • Analysis of Algorithm

    -

  • Analysis of Algorithm

    -

  • Database Design

    -

  • Service Oriented Architecture

    -

  • Service Oriented Architecture

    -

  • Web Development with E-Commerce

    -

  • Windows Development

    -

Languages

  • Hindi

    Native or bilingual proficiency

  • Gujarati

    Native or bilingual proficiency

  • English

    Full professional proficiency

Recommendations received

8 people have recommended Kushal

Join now to view

More activity by Kushal

View Kushal’s full profile

  • See who you know in common
  • Get introduced
  • Contact Kushal directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses