Gururaj H L

Gururaj H L
Manipal Institute of Technology

Doctor of Philosophy

About

159
Publications
54,963
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
791
Citations
Introduction
Dr.Gururaj H L is currently working as Associate Professor, Department of Computer Science and Engineering, Vidyavardhaka College of Engineering, Mysuru, India. He holds a Ph.D. Degree in Computer Science and Engineering from Visweswaraya Technological University, Belagavi, India in 2019. He is a professional member of ACM and working as ACM Distinguish Speaker from 2018. He is the founder of Wireless Internetworking Group(WiNG). He is a Senior member of IEEE and lifetime member of ISTE and CSI.
Additional affiliations
August 2013 - December 2019
Malnad College of Engineering
Position
  • Researcher
Education
August 2006 - August 2010
Visvesvaraya Technological University
Field of study
  • Computer Science & Engineering

Publications

Publications (159)
Article
Full-text available
The breast cancer (BC) prediction is improved through the machine learning (ML) techniques. In this study, we develop an innovative forecasting framework called the Dynamic Harris Hawks Optimized Gated Recurrent Unit (DHH-GRU) for the prediction of BC. It combines the Gated Recurrent Unit (GRU) and Harris Hawks Optimization (HHO) methods. We gather...
Article
Full-text available
INTRODUCTION: In integrating Spiral Coverage into Cellular Decomposition, which combines structured grid-based techniques with flexible, quick spiral traversal, time efficiency is increased. OBJECTIVES: In the field of robotics and computational geometry, the study proposes a comparative exploration of two prominent path planning methodologies-Bous...
Article
Full-text available
Introduction Mucormycosis (black fungal attack) has recently been identified as a significant threat, specifically to patients who have recovered from coronavirus infection. This fungus enters the body through the nose and first infects the lungs but can affect other body parts, such as the eye and brain, resulting in vision loss and death. Early d...
Article
Full-text available
Aims: The aim of this study is to develop a strong Multi-objective Convolutional Neural Network (MOCNN) optimized using Perceptual Pigeon Galvanized Optimization (PPGO) for accurate identification and classification of mango leaf diseases. This approach aims to increase classification accuracy, computational efficiency, and generalization ability....
Chapter
Full-text available
Individuals and organizations use electronic mail (E-mail) to send and receive digital messages over the internet. In 2023, 347.3 billion emails are sent and received per day among which are spam emails. These emails can lead to communication overload, waste of time, irritation, loss of important emails, and potential exposure to malware. Irrelevan...
Article
Full-text available
Autism spectrum disorder is a condition that affects around one out of every 54 children. Many studies have identified abnormalities in electroencephalography (EEG) signals for ASD diagnosis. The early and accurate identification of autism poses a substantial difficulty. The detection accuracy needs to be significantly boosted and the computational...
Research
Full-text available
Call for Book chapter, Elsevier (Scopus indexed)
Research
Full-text available
Call for Book Chapter, Springer (Scopus indexed)
Article
Full-text available
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated to securing cloud computing systems. It includes keeping data private and safe across online-ba...
Article
Full-text available
Trajectory planning is a new research topic in the field of automated vehicles (AVs). It is the process of identifying a trajectory for the vehicle to traverse its environment without obstacle collision. Trajectories are computed fast in real time as the environment constantly changes with time. To address these problems, the Ridge Regressive Data...
Article
Full-text available
Automated face recognition plays a vital role in forensics. The most important evidence in the criminal investigation is the facial images captured from the crime scene, as they represent the identity of the people involved in crime. The role of law enforcement agencies is to identify the facial images from the suitable database. This information c...
Article
Full-text available
Radio frequency (RF) energy harvesting (EH) for wireless networks provides a green and sustainable solution and offers an energy‐efficient system. It is most crucial for fulfilling the power requirement of the rising number of low‐powered wireless devices and achieving sustainable development goals (SDG). It ensures the longevity of devices in the...
Chapter
A cybersecurity paradigm known as “zero trust” is centred on resource protection and is based on the idea that trust should never be taken for granted and must always be assessed. An all-encompassing strategy for enterprise resource and data security, zero trust architecture covers identity (person and nonperson entities), credentials, operations,...
Chapter
The implementation of the Zero Trust cybersecurity approach has grown more and more important in response to increasingly complex and developing cyberthreats. With Zero Trust, every user, device, and network component is viewed as potentially untrusted, taking a proactive and suspicious approach in contrast to standard security paradigms that rely...
Chapter
In today’s digital landscape, organizations face an ever-growing array of security threats and regulatory challenges. With the proliferation of data breaches, cyberattacks, and stringent regulatory requirements, it has become imperative for businesses to adopt a proactive approach to security and compliance.
Chapter
The goal of the multidisciplinary discipline of cybersecurity is to protect digital networks, systems, and data from harm, unwanted access, and attacks. It entails putting in place a variety of procedures, practices, and technologies to safeguard private data, preserve system integrity, and guarantee data confidentiality, threat recognition, managi...
Chapter
The idea of zero trust has evolved as a paradigm change in the quickly altering field of cybersecurity, where existing security paradigms are showing themselves to be more inadequate. This method pushes back against the traditional idea of implicitly trusting people or things inside a network and supports ongoing identity validation and verificatio...
Chapter
In the same Fortinet survey, firms mentioned additional difficulties they encountered when implementing zero trust. The majority, 59%, found it difficult to continuously authenticate users and devices and to monitor users once they had done so (54%). Concerns were also raised by the absence of cloud and on-premises integration (33%). A cybersecurit...
Chapter
The popularity of zero trust cybersecurity architecture is rising and is currently surpassing that of traditional perimeter defense. Single perimeter cybersecurity approaches are less successful in the face of an ever-changing corporate network landscape and a growing remote and hybrid workforce (Arabi and Mahmoud. in Turkish Journal of Computer an...
Chapter
In contrast to the literal definition of zero trust, the term “zero” in this context refers to zero implicit or inherent trust rather than an absolute lack of trust. Sociological research has demonstrated that as two parties’ mutual trust grows, the objective implicit trust which is based on social norms becomes less and less important than the sub...
Article
Full-text available
Introduction/Background Plant diseases and pernicious insects are a considerable threat in the agriculture sector. Leaf diseases impact agricultural production. Therefore, early detection and diagnosis of these diseases are essential. This issue can be addressed if a farmer can detect the diseases properly. Objective The fundamental goal of this p...
Article
Full-text available
In most cosmopolitan cities like Bengaluru, the major problems are the woes of congestion, such as increased vehicular density, travel time, stress, and vehicular carbon emissions are the major problems. These issues have led to quantifiable and non-quantifiable losses, such as high vehicle operation and maintenance costs, reduced human productivit...
Article
Full-text available
Social media users are more receptive to products or events and share their thoughts through raw textual data, which is classified as semi-structured data. This data, which is presented using a variety of terminologies, is noisy by nature but yet contains important information and superfluous details, giving analysts a way to identify patterns and...
Article
Full-text available
Handwritten character recognition is one of the classical problems in the field of image classification. Supervised learning techniques using deep learning models are highly effective in their application to handwritten character recognition. However, they require a large dataset of labeled samples to achieve good accuracies. Recent supervised lear...
Conference Paper
The paper investigates the use of “Shree Rama Prashanavali,” a Vedic method employed in Indian Astrology for the encryption or decryption of Hindi characters. “Shree Rama Prashanavali” is taken from the “Shree Ramacharitramanas” one of the significant works of the great Saint Tulsidas. It is used to infer the most probable solutions to the problems...
Article
Full-text available
Face Recognition (FR) is the technology used to identify and verify individuals based on their facial features. In recent decades, FR plays a crucial role in various sectors including security, healthcare, banking, and criminal identification. For effective FR, numerous techniques are currently under development which range from appearance to hybri...
Article
Full-text available
Aims This study investigates predicting and eliminating malnutrition and anemia using ML Algorithms and comparing all the methods with various malnutrition-based parameters. Background The health of the nation is more important than the wealth of the nation. Malnutrition and anemia are serious health issues but the least importance is given to era...
Article
Full-text available
Due to their greatly increased spectrum efficiency, high-order quadrature amplitude modulation (QAM) formats are especially successful at increasing transmission capacity. QAM is extremely sensitive to nonlinear distortion because of its dense constellation and SNR-hungry configuration. Autonomous neural network (ANN) derived nonlinear decision bou...
Article
Full-text available
Aims In this study, chest X-ray (CXR) and computed tomography (CT) images are used to analyse and detect COVID-19 using an unsupervised deep learning-based feature fusion approach. Background The reverse transcription-polymerase chain reaction (RT-PCR) test, which has a reduced viral load, sampling error, etc., is used to detect COVID-19, which ha...
Article
Full-text available
Aims: This research work aims to develop an interoperable electronic health record (EHR) system to aid the early detection of diabetes by the use of Machine Learning (ML) algorithms. A decision support system developed using many ML algorithms results in optimizing the decision in preventive care in the health information system. Methods: The prop...
Article
Full-text available
Aims This research work aims to develop an interoperable electronic health record (EHR) system to aid the early detection of diabetes by the use of Machine Learning (ML) algorithms. A decision support system developed using many ML algorithms results in optimizing the decision in preventive care in the health information system. Methods The propos...
Article
Full-text available
One of the main problems with WSNs is that most sensor nodes in wireless sensor networks (WSNs) are motorized by energy-constrained, which significantly affects the system’s effectiveness, dependability, and lifespan. Numerous clustering strategies have been created to enhance the energy efficiency of WSNs in 5G and 6G transmission. To overcome the...
Article
Agriculture is associated with the production of essential food crops for decades and is the one which is playing an important role in the economy of a country as well as in life of an individual. Due to various uncertain variations in the climatic conditions such as rain and other affecting factors, crop prices vary in an unusual pattern. This var...
Article
Full-text available
Purpose Diabetes is a condition where the body cannot utilize insulin properly. Maintenance of the levels of insulin in the body is mandatory, otherwise it will lead to several disorders of kidney failure, heart attack, nervous weakness, blindness, etc. Among the 10 majority diseases, diabetes is occupying the second role by covering 34.2 million i...
Article
Full-text available
Terabytes of data are now being handled by an increasing number of apps, and rapid user decision-making is hampered by data analysis. At the same time, there is a rise in interest in big data analysis for social networks at the moment. Thus, adopting distributed multi-agent-based technology in an optimum way is one of the solutions to effective big...
Article
Full-text available
Purposethe problem of big data analytics and health care support systems are analyzed. There exist several techniques in supporting such analytics and robust support systems; still, they suffer to achieve higher performance in disease prediction and generating the analysis.. For a hospital unit, maintaining such massive data becomes a headache. How...
Article
Full-text available
A tumor is an abnormal development of cells in the human body. A tumor develops when cells divide without any control. Tumors change their size from a small to large lump. Tumors appear anywhere in the body. The early stage of diagnosis is an essential one in disease treatment. Many researchers carried out their research on different tumor detectio...
Article
Full-text available
Sentiment Analysis (SA) using machine learning approaches is a fascinating field of research to unravel the opinion expressed by online users. It deals with the classification problem of opinions expressed on a product or service in review texts as positive or negative or neutral. Classification beyond binary classes poses even greater challenges u...
Article
Full-text available
Software defect prediction project focuses on finding errors or flaws in software and aiming to improve accuracy which gives evolution batch with detectable results while adding to modern outcomes and advancement liability foretelling defective code regions can assist initiators with recognizing bugs and arrange their test activities. The percentag...
Article
Full-text available
Busy lifestyle, modernization, increasing pollution and unhealthy diet have led to problems which people are neglecting. Not drinking enough water, stress and hormonal changes are causing problems to skin. Causes may be situational or genetic. Few skin conditions are minor while others can be life-threatening. The skin is the largest organ of the b...
Article
Full-text available
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method of connecting medical equipment and the software that operates on it to the computer networks that are used in healthcare 5.0. The rapid development of smart medical devices on IoMT platforms has led to the adoption of major technologies in the modernization...
Article
Full-text available
The amount of road accidents caused by driver drowsiness is one of the world’s major challenges. These accidents lead to numerous fatal and non-fatal injuries which impose substantial financial strain on individuals and governments every year. As a result, it is critical to prevent catastrophic accidents and reduce the financial burden on society c...
Article
Full-text available
In recent times, the number of cyberattacks has escalated quickly and predominantly. There is no particular victim of this attack as it has outrageously tampered with all the domains in society. Cogitating this issue, the paper focuses on the cyberattacks on smart grids and endeavors some prevention techniques for the DDOS attacks. The researchers...