About
• Software Engineering, Product Development & Data Science professional with several…
Articles by Kushal
Activity
-
Time for a slight strategy pivot (read: saving my sanity). For my next fund, I’ll be focusing a lot more on IIT alumni outside India for those clean…
Time for a slight strategy pivot (read: saving my sanity). For my next fund, I’ll be focusing a lot more on IIT alumni outside India for those clean…
Liked by Kushal Dalal
-
𝗦𝘁𝗮𝗿𝘁 𝗗𝗲𝗹𝗲𝗴𝗮𝘁𝗶𝗻𝗴 𝗢𝘂𝘁𝗰𝗼𝗺𝗲𝘀, 𝗡𝗼𝘁 𝗝𝘂𝘀𝘁 𝗧𝗮𝘀𝗸𝘀 As engineering leaders, many of us pride ourselves on being effective…
𝗦𝘁𝗮𝗿𝘁 𝗗𝗲𝗹𝗲𝗴𝗮𝘁𝗶𝗻𝗴 𝗢𝘂𝘁𝗰𝗼𝗺𝗲𝘀, 𝗡𝗼𝘁 𝗝𝘂𝘀𝘁 𝗧𝗮𝘀𝗸𝘀 As engineering leaders, many of us pride ourselves on being effective…
Liked by Kushal Dalal
-
𝗦𝘁𝗮𝗿𝘁 𝗗𝗲𝗹𝗲𝗴𝗮𝘁𝗶𝗻𝗴 𝗢𝘂𝘁𝗰𝗼𝗺𝗲𝘀, 𝗡𝗼𝘁 𝗝𝘂𝘀𝘁 𝗧𝗮𝘀𝗸𝘀 As engineering leaders, many of us pride ourselves on being effective…
𝗦𝘁𝗮𝗿𝘁 𝗗𝗲𝗹𝗲𝗴𝗮𝘁𝗶𝗻𝗴 𝗢𝘂𝘁𝗰𝗼𝗺𝗲𝘀, 𝗡𝗼𝘁 𝗝𝘂𝘀𝘁 𝗧𝗮𝘀𝗸𝘀 As engineering leaders, many of us pride ourselves on being effective…
Posted by Kushal Dalal
Experience
Education
Licenses & Certifications
-
Data Visualization with Python
IBM Cognitive Class
-
-
-
-
-
Volunteer Experience
-
Mock Interviewer
CodePath.org
- 1 month
Science and Technology
I volunteered for the codepath.org and provide mock interview practice and help students with resume from Nigeria, Africa.
-
Volunteer
Habitat for Humanity International
- 1 year 1 month
Human Rights
We went to the construction site and help build the house in Queens, NY.
Publications
-
Analysis of using IoT Sensors in Healthcare units Supported by Cloud Computing
IEEE
See publicationThe current study analyzes the impact of IoT sensors in health care units in association with cloud computing. The advantages, disadvantages and risks associated with the pragmatic implementation is discussed elaborately along with future benefits. The study aims to establish a standardized viewpoint with respect to the adoption of IoT sensors in the daily applications.
-
Developing a framework to improve the accuracy of point-of-care testing for healthcare applications
IEEE
See publicationPoint-of-Care Test (POCT) is considered as the diagnostic test which is administrated in the outside of the central laboratory ator near the patient location. Therefore, it can be stated that the use of POCT devices in the department of emergency represents a significant benefit to the management of the patient. It can be able to give proper governance to credible policy, safe practice, and effective process performance by the healthcare clinics. The major contribution of the POCT is it can…
Point-of-Care Test (POCT) is considered as the diagnostic test which is administrated in the outside of the central laboratory ator near the patient location. Therefore, it can be stated that the use of POCT devices in the department of emergency represents a significant benefit to the management of the patient. It can be able to give proper governance to credible policy, safe practice, and effective process performance by the healthcare clinics. The major contribution of the POCT is it can give a huge improvement over the test result in the context of turnaround time. Here this research paper considers the process of development framework of POCT in the emergency department (ED). Moreover, the challenges faced by the clinical staff during the usage of previous POCT and the implementation process are also discussed to give a clear clarification about the essentiality of the developed framework of POCT.
-
Analysing the Implementation of Machine Learning in Healthcare
IEEE
See publicationThe implementation of machine learning (ML) in clinical settings reflects the promising opportunities for improving the delivery of healthcare. Private healthcare businesses are considering and utilizing the development of ML in the process of decision making, adopting and supporting medical fields. This strong subcategory of AI appears familiar in several cases like the use of speech recognition by voice assistants, and the creation of personalized medical experiences. This report aims to…
The implementation of machine learning (ML) in clinical settings reflects the promising opportunities for improving the delivery of healthcare. Private healthcare businesses are considering and utilizing the development of ML in the process of decision making, adopting and supporting medical fields. This strong subcategory of AI appears familiar in several cases like the use of speech recognition by voice assistants, and the creation of personalized medical experiences. This report aims to critically analyse the implementation of ML in the healthcare industry by understanding how ML is revolutionizing the industry and what its full potential is for the industry.
-
Analysing the Role of Supervised and Unsupervised Machine Learning in IoT
IEEE
See publicationTo harness the value of data generated from IoT, there is a crucial requirement of new mechanisms. Machine learning (ML) is among the most suitable paradigms of computation which embeds strong intelligence within IoT devices. Various ML techniques are being widely utilised for improving network security in IoT. These techniques include reinforcement learning, semi-supervised learning, supervised learning, and unsupervised learning. This report aims to critically analyse the role played by…
To harness the value of data generated from IoT, there is a crucial requirement of new mechanisms. Machine learning (ML) is among the most suitable paradigms of computation which embeds strong intelligence within IoT devices. Various ML techniques are being widely utilised for improving network security in IoT. These techniques include reinforcement learning, semi-supervised learning, supervised learning, and unsupervised learning. This report aims to critically analyse the role played by supervised and unsupervised ML for the enhancement of IoT security.
-
A Novel Hybrid data security algorithm for Electronic Health Records security
IEEE
See publicationData security is a critical aspect in this digital world. Data security algorithms are designed to suit specific applications. Electronic Health Records (EHR) are the digital documents that contain the digital data of the patients. The data includes personal information of the patient along with the medical and treatment histories. The radiology images and medical information is also contained in the digital form in the EHRs. This data is usually stored in the cloud servers because of the data…
Data security is a critical aspect in this digital world. Data security algorithms are designed to suit specific applications. Electronic Health Records (EHR) are the digital documents that contain the digital data of the patients. The data includes personal information of the patient along with the medical and treatment histories. The radiology images and medical information is also contained in the digital form in the EHRs. This data is usually stored in the cloud servers because of the data storage issues. The common practice is that the data is divided into multiple segments and stored in different cloud servers. The issue of reconstruction using searchable metrics is the problem that is addressed in this paper using a novel hybrid algorithm. The personal data of the patient is preserved using the k-Nearest Neighbor classification algorithm to secure the data. The proposed method is novel and works in different stages.
-
Cyber Security: Threat Detection Model based on Machine learning Algorithm
IEEE Xplore
See publicationA threat can be anything that causes potential
damage to the network system. These threats can turn out to be a
attack to the system. Threat may occur in any forms like viruses,
outright attack, and phishing attack from hackers to gain
information. Such attacks put a user’s system and also business
system at risks. Cyber security aims at the protection of system
from attacks like unauthorized network access, intrusions attacks
etc. This paper presents a novel architecture…A threat can be anything that causes potential
damage to the network system. These threats can turn out to be a
attack to the system. Threat may occur in any forms like viruses,
outright attack, and phishing attack from hackers to gain
information. Such attacks put a user’s system and also business
system at risks. Cyber security aims at the protection of system
from attacks like unauthorized network access, intrusions attacks
etc. This paper presents a novel architecture model based on
machine learning for the prediction of Cyber security malware
that requires execution in a sandbox environment. In order to
prevent the attackers from infiltrating the system Machine
Learning approach is adapted. -
A Review on Machine Learning Techniques Adapted for Cyber Security
IEEE
Machine learning is one among the widely used techniques in the field of Computer Science, and it finds wide applications in cybersecurity, natural language processing, image processing, pattern recognition and other fields. Despite successful applications of machine learning techniques in various cases like intrusion detection, data security, network security and cyber security, the performance of such techniques significantly decreases because these machine learning algorithms and equivalent…
Machine learning is one among the widely used techniques in the field of Computer Science, and it finds wide applications in cybersecurity, natural language processing, image processing, pattern recognition and other fields. Despite successful applications of machine learning techniques in various cases like intrusion detection, data security, network security and cyber security, the performance of such techniques significantly decreases because these machine learning algorithms and equivalent training data are susceptible to various security attacks. This calls for in depth analysis of security threats and related defensive techniques of machine learning intensively which leads to the motivation of this review paper. An exploratory research on the existing methodology of machine learning techniques are studied and the research gap in the field of adaption of machine learning defensive techniques to cybersecurity is analysed.
Courses
-
Analysis of
-
-
Analysis of Algorithm
-
-
Analysis of Algorithm
-
-
Database Design
-
-
Service Oriented Architecture
-
-
Service Oriented Architecture
-
-
Web Development with E-Commerce
-
-
Windows Development
-
Languages
-
Hindi
Native or bilingual proficiency
-
Gujarati
Native or bilingual proficiency
-
English
Full professional proficiency
Recommendations received
8 people have recommended Kushal
Join now to viewMore activity by Kushal
-
It's election season in India. And that means only one thing for me personally. Watching every episode of UNFILTERED by Samdish on Youtube…
It's election season in India. And that means only one thing for me personally. Watching every episode of UNFILTERED by Samdish on Youtube…
Liked by Kushal Dalal
-
𝗧𝗵𝗲 "𝗚𝗿𝗼𝘂𝘁" 𝘀𝘁𝗼𝗿𝘆. 𝗠𝗶𝘀𝘀𝗶𝗻𝗴 𝘁𝗵𝗲 𝗙𝗼𝗿𝗲𝘀𝘁 𝗳𝗼𝗿 𝘁𝗵𝗲 𝗧𝗿𝗲𝗲𝘀. Recently I listened Grout Story in Anecdote podcast…
𝗧𝗵𝗲 "𝗚𝗿𝗼𝘂𝘁" 𝘀𝘁𝗼𝗿𝘆. 𝗠𝗶𝘀𝘀𝗶𝗻𝗴 𝘁𝗵𝗲 𝗙𝗼𝗿𝗲𝘀𝘁 𝗳𝗼𝗿 𝘁𝗵𝗲 𝗧𝗿𝗲𝗲𝘀. Recently I listened Grout Story in Anecdote podcast…
Shared by Kushal Dalal
-
We almost saved millions. Then everything started failing. No one owned the problem. No safe options. And a decision that could either save the…
We almost saved millions. Then everything started failing. No one owned the problem. No safe options. And a decision that could either save the…
Liked by Kushal Dalal
-
#CrickIt | For the upcoming Women's T20 World Cup, the International Cricket Council announced a record prize fund of INR 82 crore (USD 8,764,615)…
#CrickIt | For the upcoming Women's T20 World Cup, the International Cricket Council announced a record prize fund of INR 82 crore (USD 8,764,615)…
Liked by Kushal Dalal
-
"Choose your mountain to climb, and you will have already won half the battle." Applicable to many forks in the road encountered in both life and…
"Choose your mountain to climb, and you will have already won half the battle." Applicable to many forks in the road encountered in both life and…
Liked by Kushal Dalal
-
The recent visit of Ranveer Singh to Nagpur, where he met Mohan Bhagwat at the RSS headquarters, has once again sparked a familiar debate. The film…
The recent visit of Ranveer Singh to Nagpur, where he met Mohan Bhagwat at the RSS headquarters, has once again sparked a familiar debate. The film…
Liked by Kushal Dalal
-
𝗧𝗵𝗲 𝗳𝗲𝗲𝗱𝗯𝗮𝗰𝗸 𝘆𝗼𝘂 𝗮𝘃𝗼𝗶𝗱 𝗶𝘀 𝗼𝗳𝘁𝗲𝗻 𝘁𝗵𝗲 𝗳𝗲𝗲𝗱𝗯𝗮𝗰𝗸 𝘆𝗼𝘂 𝗻𝗲𝗲𝗱 𝗺𝗼𝘀𝘁. In both personal and professional life…
𝗧𝗵𝗲 𝗳𝗲𝗲𝗱𝗯𝗮𝗰𝗸 𝘆𝗼𝘂 𝗮𝘃𝗼𝗶𝗱 𝗶𝘀 𝗼𝗳𝘁𝗲𝗻 𝘁𝗵𝗲 𝗳𝗲𝗲𝗱𝗯𝗮𝗰𝗸 𝘆𝗼𝘂 𝗻𝗲𝗲𝗱 𝗺𝗼𝘀𝘁. In both personal and professional life…
Posted by Kushal Dalal
-
Exciting news—NPS Prism just released our much-anticipated U.S. Cross-Industry Net Promoter Score Benchmarks Report, revealing the latest NPS leaders…
Exciting news—NPS Prism just released our much-anticipated U.S. Cross-Industry Net Promoter Score Benchmarks Report, revealing the latest NPS leaders…
Liked by Kushal Dalal
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content