Papers by Ripalkumar Patel
IEEE, 2024
This study introduces an advanced deep learning model, showcasing its superior performance agains... more This study introduces an advanced deep learning model, showcasing its superior performance against established architectures like CNNs, LSTMs, and Transformers in the realm of predictive analytics. The Proposed model outperforms existing benchmarks, achieving an 84.09% accuracy, 86% precision, and 85% F1-score, while substantially reducing the False Rejection Rate to 16.53%. Its robustness is validated by a consistent Receiver Operating Characteristic score of 0.99. The results advocate for the model's application in advanced predictive tasks, setting a new standard for accuracy and reliability.

Intellectual Property India, 2024
The present invention discloses a Secure Multi-Tenant Data Isolation Mechanism designed to enhanc... more The present invention discloses a Secure Multi-Tenant Data Isolation Mechanism designed to enhance security in cloud-based services. The mechanism employs advanced encryption, access control, network segmentation, and dynamic data masking techniques to ensure robust protection of tenant data within shared cloud environments. Encryption methods utilize tenant-specific keys and strong cryptographic algorithms to secure data-at-rest and data-in-transit, while role-based access controls (RBAC) enforce granular access permissions based on user roles and responsibilities. Network segmentation techniques create isolated zones for each tenant, minimizing the risk of unauthorized access between tenants. Additionally, dynamic data masking selectively obscures sensitive data elements in real-time based on predefined policies, enhancing data privacy and regulatory compliance. The mechanism includes monitoring and auditing capabilities to detect and respond to security incidents promptly. Overall, the Secure Multi-Tenant Data Isolation Mechanism sets a new standard for safeguarding sensitive information in multi-tenant cloud environments, balancing security requirements with operational efficiency and scalability.
GOV.UK, 2024
In the evolving landscape of cyber threats, the implementation of effective Cyber Security Monito... more In the evolving landscape of cyber threats, the implementation of effective Cyber Security Monitoring Devices (CSMDs) has become paramount for safeguarding information systems. This research paper explores the architecture, functionalities, and impacts of CSMDs, emphasizing their role in proactive threat detection and response. It also examines case studies and future trends to provide a comprehensive understanding of CSMDs in enhancing cybersecurity resilience.

Journal of Computer Technology & Applications ISSN: 2229-6964, 2024
Artificial Intelligence (AI) which become the important force that shapes human activities across... more Artificial Intelligence (AI) which become the important force that shapes human activities across different domains. This research is showcasing to delves into the complex relationship between AI and human intelligence, scrutinizing its interplay, and also examining the consequential impacts on diversified human activities. Through the extensive literature review, this paper also investigates the current landscape of AI technologies and their implications, which showcase the multifaceted roles AI plays in augmenting, challenging, and reshaping human intelligence. The methods include a careful examination of academic books, articles, and research studies that look at how artificial intelligence (AI) affects human thinking, working, making decisions, and social issues. The results show that AI makes people better at what they do while also raising moral, social, and economic questions. The commentary talks about the study's limits and offers ways to study these results in the future, while also critically evaluating them in light of the research question.
Journal Of Network security, 2024
This paper explores the multifaceted impacts of Artificial Intelligence (AI) across human activit... more This paper explores the multifaceted impacts of Artificial Intelligence (AI) across human activities which must be employment, privacy, social interactions, proper decision-making, and also the ethical considerations. It tries to get closer to the bottom of AI's complicated behavior by focusing on its changes, problems, and moral roots in human activities. A careful review of the research shows where there are holes and gives a full picture of the dangers AI poses to many areas of interactions with humans. Issues about justice, responsibility, along privacy are addressed in the study, which shows how important it is to keep looking into AI's social effects. This will encourage responsible AI development and teamwork between different fields.

International Journal on Recent and Innovation Trends in Computing and Communication, 2024
The protection of intellectual property (IP) in today's world characterized by digitalization and... more The protection of intellectual property (IP) in today's world characterized by digitalization and interconnectedness cannot be overemphasized due to the significance of cybersecurity. This research seeks to establish how the cybersecurity measures interact with the management of IP assets across different domains. They analyze existing forms of threats that include hacking, data breaches, andinternal threats that are a major concern to the IP's integrity and confidentiality. Furthermore, this research focuses on how current and emergent technologies and initiatives can be utilized in the prevention and management of the threats; with relevant aspects discussed including encryption, access controls, and consciousness monitoring as key principles in IP shield. Looking at case studies and the present field practices, this work expects to reveal important benchmarks and innovative ideas in cybersecurity that the organization needs to follow and adapt to reduce vulnerability and protect the long-term security of its valuable intellectual assets. In this research paper, the need to incorporate adequate cybersecurity measures geared towards the protection of IP has been presented as crucial in the present day organizations. It highlights legal compliance, new age technology, and organizational support in building up the lines of defense against emerging cyber threats. In dissociating cybersecurity and IP protectionism in this piece, the paper addresses a gap in literature by increasing the existing knowledge of how effective preventive measures can be taken in order to reduce threats and secure ideas, financial and innovative value inherent in intellectual properties in the face of the modern threat landscape of computerization.

International Journal on Recent and Innovation Trends in Computing and Communication, 2024
AI data center networking is transforming with a great pace as per the requirement of present day... more AI data center networking is transforming with a great pace as per the requirement of present day computation arena. In this given research paper, the subject of focus is on Artificial Intelligence and Data Center Networking and associated trends and issues. There are plans of using AI technologies within data centers in a bid to optimize the flow of networks in resource utilization and other parameters. This also entails use of AI based algorithms for real time traffic control, health check and workload allocation in order to have a solid and unshakeable network. Thus, the integration of the computing continuum also introduces difficult issues like the ability to scale the fabric efficiently, security, and the necessity of dedicated hardware accelerators to handle AI workloads optimally. These are complex problems that need novel approaches to the architecture of the networks, SDN architecture and AI focused analytics to have efficient and adaptive AI data center networking. Of particular importance to the field of AI data center networking is the edge computing and real-time data processing breakthroughs. This technology smartly integrates real-time analyses at the network edge at an organization's data centers, and can decrease the amount of time needed to respond to applications that necessitate quick decision making such as Self-driving vehicles and industrial IoT. It is lest felt in this research work that AI can make a difference in changing the conventional Data center networking into a dynamic architecture to meet a modern digital world. Futuristic advancements of artificial intelligence and development for research will promote the complexity and cohesion between data centers and networking applications in the computational world.

International Journal on Recent and Innovation Trends in Computing and Communication, 2024
This systematic review focuses on the emerging domains of data science and AI in healthcare; the ... more This systematic review focuses on the emerging domains of data science and AI in healthcare; the research question guiding the study was to establish the trends and gaps in literature. Over the past few decades, with the advancement of technology, various application areas of Artificial Intelligence in healthcare delivery has seen a drastic improvement from diagnosis to treatment and patient monitoring. Thus, the search included all the major databases in AI containing universal machine learning, natural language, and predictive analysis techniques. This review also divides these applications into several fields which include disease risk prognosis, medical image analyzing, and personalized medicine stressing that they will bring about improvements on the clinical diagnosis and patients' care. Concerning the critical challenges it provides a response regarding such issues as ethical questionnaires, technical constraints, and prospects of spreading its application in spheres of healthcare. This issue is particularly relevant because ethical issues such as the protection of the patient's identity, fairness in algorithm design, and the lack or appropriate regulatory measures become apparent. Another set of barriers relates to technical issues, including data conversion and the possibilities of using AI models in cancer diagnosis. Nevertheless, based on the aforementioned challenges, the review suggests potential directions of future studies and practical advancements that the authors and the healthcare community in general should consider in order to unlock the potential of data science and AI for improving worldwide healthcare systems.

International Journal on Recent and Innovation Trends in Computing and Communication, 2024
Online work may be made safer and simpler with the help of secure cloud collaboration. This artic... more Online work may be made safer and simpler with the help of secure cloud collaboration. This article discusses challenges encountered, solutions proposed, and novel approaches to data security in cloud collaboration. Access restrictions, data integrity checks, and encryption are some of the instruments that we might employ to secure private data while it is being sent or stored. The report also discusses recent developments that have made cloud collaboration even safer, such as the use of blockchain technology and zero-trust techniques. As more businesses utilize the cloud for collaboration, they must be aware of and abide by security guidelines to preserve client privacy and adhere to legal requirements. This article outlines strategies for enhancing the security of data and cloud collaboration in several businesses, both now and in the future.
International Journal on Recent and Innovation Trends in Computing and Communication, 2024
Preventing spam is becoming increasingly crucial as online commerce and communication grow quickl... more Preventing spam is becoming increasingly crucial as online commerce and communication grow quickly because it helps to keep people secure and websites reliable. Finding and lowering internet spam increasingly depends critically on artificial intelligence (AI). This paper describes how artificial intelligence detects spam now by use of methods like machine learning, language interpretation, and pattern recognition. AI can combine unsupervised approaches to identify odd behavior with supervised learning using labeled data. Among the difficulties include spotting fresh spam compositions and keeping precise realtime detection. By means of improved spam detection capability of artificial intelligence, researchers want to increase online platform security and thereby influence people's internet use.
International Journal on Recent and Innovation Trends in Computing and Communication, 2024
This paper consultation presents a technique for creating a layered taxonomy of Intrusion Locatio... more This paper consultation presents a technique for creating a layered taxonomy of Intrusion Location and Prevention Frameworks (IDPS). The strategy methodically classifies IDPSs based on their utility components, research strategies, layout plans, and mechanical systems. Through the introduction of a comprehensive written study, keynote and real cases, the scientific classification presents an organized system that improves the understanding and application of IDPS in various security situations, and especially emphasizes their contribution to cloud security. This study contributes to the advancement of IDPS classification, advertising experiences in and education research, and the thought of implementing cyber security methods.
Educational Administration: Theory and Practice, 2024
This paper explores the development and application of visualization tools and techniques for net... more This paper explores the development and application of visualization tools and techniques for network security and highlights their role in addressing cyber security challenges. It explores current trends and methods in security visualization with a focus on developing a common pipeline for creating effective visualizations. Key steps in this process include problem identification, data preprocessing, use of visualization tools, and data interpretation. Methods such as treemaps and RGB color techniques are discussed for their effectiveness in analyzing network activity and identifying potential threats. The study underscores the importance of comprehensive research in guiding tool selection and customization, ensuring strong cybersecurity protection against evolving threats.

Educational Administration: Theory and Practice, 2024
This paper investigates how artificial intelligence (AI) is making systems way better. It centers... more This paper investigates how artificial intelligence (AI) is making systems way better. It centers on making strides things like how information voyages, overseeing activity, finding programmers, and spotting bizarre exercises. By looking at later thinks about and real-world illustrations, we see that AI is much way better than more seasoned ways at making systems quicker, more secure, and more effective. AI models, particularly those utilizing profound learning and fortification learning, are extraordinary at making beyond any doubt information voyages perfect way" the most perfect way conceivable, taking care of active times on systems, and securing against cyber dangers. Real-life tests appear AI can decrease holding up times, speed up information, and make systems more secure totally different circumstances. These discoveries appear that AI is changing networks to be more intelligent and harder, which is able lead to more advancements in how we oversee and secure systems.

Educational Administration: Theory and Practice, 2024
The rapid emergence and evolution of cloud computing have revolutionized the way organizations an... more The rapid emergence and evolution of cloud computing have revolutionized the way organizations and individuals manage their data. However, this new technology also comes with its own set of security issues. The paper investigates the security concerns that arise when it comes to using cloud computing. It will help researchers and practitioners identify the most effective ways to protect their organizations from these threats. The paper explores the critical role that the application layer plays in the delivery of cloud services. It highlights the numerous vulnerabilities in this component that allow it to be exploited for various attacks, such as distributed denial of service and SQL injection. It also emphasizes the importance of following regulatory standards, such as HIPAA and GDPR, in order to protect sensitive information. This paper explores the various security techniques that can be used to protect an organization's cloud computing applications. Some of these include multi-factor authentication and encryption techniques. It also suggests the use of continuous monitoring and firewalls. The paper is based on the findings of a survey, which provides recommendations for improving the security of an organization's cloud computing applications. Through the sharing of knowledge and best practices, organizations can manage the complexity of their cloud computing environment.

Educational Administration: Theory and Practice, 2024
The rise of the cloud has revolutionized the way people think about and act on information. Its a... more The rise of the cloud has revolutionized the way people think about and act on information. Its ability to provide cost-effective and scalable solutions for fraud detection and identity management has revolutionized the way organizations and individuals think about and act on these issues. This paper aims to provide a comprehensive analysis of the significance of the cloud in addressing these challenges. Using advanced technologies such as big data analytics, machine learning, and real-time monitoring and monitoring, cloud-based fraud and identity solutions can help organizations improve their operational efficiency and security. This paper explores the various aspects of fraud detection and identity management that can be achieved through these solutions. The paper investigates the various challenges that can be encountered when implementing cloud-based methods, such as privacy, scalability, and integration issues. Future research initiatives and techniques, like federated learning and quantum computing, as well as artificial intelligence techniques, are also covered. This paper highlights the continuous progress and innovations in the field of fraud management and identity.

Educational Administration: Theory and Practice, 2024
The rapid emergence and evolution of AI, machine learning, and NLP have significantly changed the... more The rapid emergence and evolution of AI, machine learning, and NLP have significantly changed the way decision support systems are designed and operated. This paper explores how these technologies can be integrated into DSS to enhance their effectiveness and capabilities. The paper explores how cognitive computing can help improve the processing of data and provide more accurate and timely recommendations. It also covers the various technical issues that need to be resolved to implement these technologies in DSS. In addition, this paper presents case studies about the successful implementation of cognitive-enhanced decision support systems in various industries. These demonstrate how the technology can help improve the efficiency and accuracy of the operations of these organizations. The findings show that cognitive computing can help transform how decision-making is done.

Educational Administration: Theory and Practice, 2024
This paper investigates how artificial intelligence (AI) is making systems way better. It centers... more This paper investigates how artificial intelligence (AI) is making systems way better. It centers on making strides things like how information voyages, overseeing activity, finding programmers, and spotting bizarre exercises. By looking at later thinks about and real-world illustrations, we see that AI is much way better than more seasoned ways at making systems quicker, more secure, and more effective. AI models, particularly those utilizing profound learning and fortification learning, are extraordinary at making beyond any doubt information voyages perfect way" the most perfect way conceivable, taking care of active times on systems, and securing against cyber dangers. Real-life tests appear AI can decrease holding up times, speed up information, and make systems more secure totally different circumstances. These discoveries appear that AI is changing networks to be more intelligent and harder, which is able lead to more advancements in how we oversee and secure systems.
Kalpa publications in engineering, Mar 23, 2018
Flicker is the most common and an intolerable blemish present in signal processing world that lea... more Flicker is the most common and an intolerable blemish present in signal processing world that leads to distortion in the transmitted frame of a video string. To dodge such misinterpretations a technique for detection of the flickering frame in a video is depicted in this research. Earlier methods were based on removing flicker by calculating the threshold of the consecutive frame difference and then finding the flickering frame. The proposed method in this research includes finding flickering frame using neural network concept. Therefore, the advantage of the practice disclosed here is that it removes the tedious calculation part of the threshold value and thereby the computational part becomes easier with added accurate result.
Objective is this paper is recognize the characters in a given scanned documents and study the ef... more Objective is this paper is recognize the characters in a given scanned documents and study the effects of changing the Models of ANN.Today Neural Networks are mostly used for Pattern Recognition task. The paper describes the behaviors of different Models of Neural Network used in OCR. OCR is widespread use of Neural Network. We have considered parameters like number of Hidden Layer, size of Hidden Layer and epochs. We have used Multilayer Feed Forward network with Back propagation. In Preprocessing we have applied some basic algorithms for segmentation of characters, normalizing of characters and De-skewing. We have used different Models of Neural Network and applied the test set on each to find the accuracy of the respective Neural Network.
Uploads
Papers by Ripalkumar Patel