![Gururaj H L](https://i1.rgstatic.net/ii/profile.image/974778118725655-1609416622959_Q128/Gururaj-H-L-2.jpg)
Gururaj H LManipal Institute of Technology
Gururaj H L
Doctor of Philosophy
About
159
Publications
54,963
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
791
Citations
Introduction
Dr.Gururaj H L is currently working as Associate Professor, Department of Computer Science and Engineering, Vidyavardhaka College of Engineering, Mysuru, India. He holds a Ph.D. Degree in Computer Science and Engineering from Visweswaraya Technological University, Belagavi, India in 2019. He is a professional member of ACM and working as ACM Distinguish Speaker from 2018. He is the founder of Wireless Internetworking Group(WiNG). He is a Senior member of IEEE and lifetime member of ISTE and CSI.
Additional affiliations
August 2013 - December 2019
Education
August 2006 - August 2010
Publications
Publications (159)
The breast cancer (BC) prediction is improved through the machine learning (ML) techniques. In this study, we develop an innovative forecasting framework called the Dynamic Harris Hawks Optimized Gated Recurrent Unit (DHH-GRU) for the prediction of BC. It combines the Gated Recurrent Unit (GRU) and Harris Hawks Optimization (HHO) methods. We gather...
INTRODUCTION: In integrating Spiral Coverage into Cellular Decomposition, which combines structured grid-based techniques with flexible, quick spiral traversal, time efficiency is increased. OBJECTIVES: In the field of robotics and computational geometry, the study proposes a comparative exploration of two prominent path planning methodologies-Bous...
Introduction
Mucormycosis (black fungal attack) has recently been identified as a significant threat, specifically to patients who have recovered from coronavirus infection. This fungus enters the body through the nose and first infects the lungs but can affect other body parts, such as the eye and brain, resulting in vision loss and death. Early d...
Aims: The aim of this study is to develop a strong Multi-objective Convolutional Neural Network (MOCNN) optimized using Perceptual Pigeon Galvanized Optimization (PPGO) for accurate identification and classification of mango leaf diseases. This approach aims to increase classification accuracy, computational efficiency, and generalization ability....
Individuals and organizations use electronic mail (E-mail) to send and receive digital messages over the internet. In 2023, 347.3 billion emails are sent and received per day among which are spam emails. These emails can lead to communication overload, waste of time, irritation, loss of important emails, and potential exposure to malware. Irrelevan...
Autism spectrum disorder is a condition that affects around one out of every 54 children. Many studies have identified abnormalities in electroencephalography (EEG) signals for ASD diagnosis. The early and accurate identification of autism poses a substantial difficulty. The detection accuracy needs to be significantly boosted and the computational...
Call for Book chapter, Elsevier (Scopus indexed)
Call for Book Chapter, Springer (Scopus indexed)
Call for Book Chapter CRC Press (Scopus indexed)
Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated to securing cloud computing systems. It includes keeping data private and safe across online-ba...
Trajectory planning is a new research topic in the field of automated vehicles (AVs). It is the process of identifying a trajectory for the vehicle to traverse its environment without obstacle collision. Trajectories are computed fast in real time as the environment constantly changes with time. To address these problems, the Ridge Regressive Data...
Automated face recognition plays a vital role in forensics. The most important evidence in the criminal investigation is the facial images captured from the crime scene, as they represent the identity of the people involved in crime. The role of law enforcement agencies is to identify the facial images from the suitable database. This information c...
Radio frequency (RF) energy harvesting (EH) for wireless networks provides a green and sustainable solution and offers an energy‐efficient system. It is most crucial for fulfilling the power requirement of the rising number of low‐powered wireless devices and achieving sustainable development goals (SDG). It ensures the longevity of devices in the...
A cybersecurity paradigm known as “zero trust” is centred on resource protection and is based on the idea that trust should never be taken for granted and must always be assessed. An all-encompassing strategy for enterprise resource and data security, zero trust architecture covers identity (person and nonperson entities), credentials, operations,...
The implementation of the Zero Trust cybersecurity approach has grown more and more important in response to increasingly complex and developing cyberthreats. With Zero Trust, every user, device, and network component is viewed as potentially untrusted, taking a proactive and suspicious approach in contrast to standard security paradigms that rely...
In today’s digital landscape, organizations face an ever-growing array of security threats and regulatory challenges. With the proliferation of data breaches, cyberattacks, and stringent regulatory requirements, it has become imperative for businesses to adopt a proactive approach to security and compliance.
The goal of the multidisciplinary discipline of cybersecurity is to protect digital networks, systems, and data from harm, unwanted access, and attacks. It entails putting in place a variety of procedures, practices, and technologies to safeguard private data, preserve system integrity, and guarantee data confidentiality, threat recognition, managi...
The idea of zero trust has evolved as a paradigm change in the quickly altering field of cybersecurity, where existing security paradigms are showing themselves to be more inadequate. This method pushes back against the traditional idea of implicitly trusting people or things inside a network and supports ongoing identity validation and verificatio...
In the same Fortinet survey, firms mentioned additional difficulties they encountered when implementing zero trust. The majority, 59%, found it difficult to continuously authenticate users and devices and to monitor users once they had done so (54%). Concerns were also raised by the absence of cloud and on-premises integration (33%). A cybersecurit...
The popularity of zero trust cybersecurity architecture is rising and is currently surpassing that of traditional perimeter defense. Single perimeter cybersecurity approaches are less successful in the face of an ever-changing corporate network landscape and a growing remote and hybrid workforce (Arabi and Mahmoud. in Turkish Journal of Computer an...
In contrast to the literal definition of zero trust, the term “zero” in this context refers to zero implicit or inherent trust rather than an absolute lack of trust. Sociological research has demonstrated that as two parties’ mutual trust grows, the objective implicit trust which is based on social norms becomes less and less important than the sub...
Introduction/Background
Plant diseases and pernicious insects are a considerable threat in the agriculture sector. Leaf diseases impact agricultural production. Therefore, early detection and diagnosis of these diseases are essential. This issue can be addressed if a farmer can detect the diseases properly.
Objective
The fundamental goal of this p...
In most cosmopolitan cities like Bengaluru, the major problems are the woes of congestion, such as increased vehicular density, travel time, stress, and vehicular carbon emissions are the major problems. These issues have led to quantifiable and non-quantifiable losses, such as high vehicle operation and maintenance costs, reduced human productivit...
Social media users are more receptive to products or events and share their thoughts
through raw textual data, which is classified as semi-structured data. This data, which is presented
using a variety of terminologies, is noisy by nature but yet contains important information and
superfluous details, giving analysts a way to identify patterns and...
Handwritten character recognition is one of the classical problems in the field of image classification. Supervised learning techniques using deep learning models are highly effective in their application to handwritten character recognition. However, they require a large dataset of labeled samples to achieve good accuracies. Recent supervised lear...
The paper investigates the use of “Shree Rama Prashanavali,” a Vedic method employed in Indian Astrology for the encryption or decryption of Hindi characters. “Shree Rama Prashanavali” is taken from the “Shree Ramacharitramanas” one of the significant works of the great Saint Tulsidas. It is used to infer the most probable solutions to the problems...
Face Recognition (FR) is the technology used to identify and verify individuals based on their facial features. In recent decades, FR plays a crucial role in various sectors including security, healthcare, banking, and criminal identification. For effective FR, numerous techniques are currently under development which range from appearance to hybri...
Aims
This study investigates predicting and eliminating malnutrition and anemia using ML Algorithms and comparing all the methods with various malnutrition-based parameters.
Background
The health of the nation is more important than the wealth of the nation. Malnutrition and anemia are serious health issues but the least importance is given to era...
Due to their greatly increased spectrum efficiency, high-order quadrature amplitude modulation (QAM) formats are especially successful at increasing transmission capacity. QAM is extremely sensitive to nonlinear distortion because of its dense constellation and SNR-hungry configuration. Autonomous neural network (ANN) derived nonlinear decision bou...
Aims
In this study, chest X-ray (CXR) and computed tomography (CT) images are used to analyse and detect COVID-19 using an unsupervised deep learning-based feature fusion approach.
Background
The reverse transcription-polymerase chain reaction (RT-PCR) test, which has a reduced viral load, sampling error, etc., is used to detect COVID-19, which ha...
Aims:
This research work aims to develop an interoperable electronic health record (EHR) system to aid the early detection of diabetes by the use of Machine Learning (ML) algorithms. A decision support system developed using many ML algorithms results in optimizing the decision in preventive care in the health information system.
Methods:
The prop...
Aims
This research work aims to develop an interoperable electronic health record (EHR) system to aid the early detection of diabetes by the use of Machine Learning (ML) algorithms. A decision support system developed using many ML algorithms results in optimizing the decision in preventive care in the health information system.
Methods
The propos...
One of the main problems with WSNs is that most sensor nodes in wireless sensor networks (WSNs) are motorized by energy-constrained, which significantly affects the system’s effectiveness, dependability, and lifespan. Numerous clustering strategies have been created to enhance the energy efficiency of WSNs in 5G and 6G transmission. To overcome the...
Agriculture is associated with the production of essential food crops for decades and is the one which is playing an important role in the economy of a country as well as in life of an individual. Due to various uncertain variations in the climatic conditions such as rain and other affecting factors, crop prices vary in an unusual pattern. This var...
Purpose
Diabetes is a condition where the body cannot utilize insulin properly. Maintenance of the levels of insulin in the body is mandatory, otherwise it will lead to several disorders of kidney failure, heart attack, nervous weakness, blindness, etc. Among the 10 majority diseases, diabetes is occupying the second role by covering 34.2 million i...
Terabytes of data are now being handled by an increasing number of apps, and rapid user decision-making is hampered by data analysis. At the same time, there is a rise in interest in big data analysis for social networks at the moment. Thus, adopting distributed multi-agent-based technology in an optimum way is one of the solutions to effective big...
Purposethe problem of big data analytics and health care support systems are analyzed. There exist several techniques in supporting such analytics and robust support systems; still, they suffer to achieve higher performance in disease prediction and generating the analysis.. For a hospital unit, maintaining such massive data becomes a headache. How...
A tumor is an abnormal development of cells in the human body. A tumor develops when cells divide without any control. Tumors change their size from a small to large lump. Tumors appear anywhere in the body. The early stage of diagnosis is an essential one in disease treatment. Many researchers carried out their research on different tumor detectio...
Sentiment Analysis (SA) using machine learning approaches is a fascinating field of research to unravel the opinion expressed by online users. It deals with the classification problem of opinions expressed on a product or service in review texts as positive or negative or neutral. Classification beyond binary classes poses even greater challenges u...
Software defect prediction project focuses on finding errors or flaws in software and aiming to improve accuracy which gives evolution batch with detectable results while adding to modern outcomes and advancement liability foretelling defective code regions can assist initiators with recognizing bugs and arrange their test activities. The percentag...
Busy lifestyle, modernization, increasing pollution and unhealthy diet have led to problems which people are neglecting. Not drinking enough water, stress and hormonal changes are causing problems to skin. Causes may be situational or genetic. Few skin conditions are minor while others can be life-threatening. The skin is the largest organ of the b...
Background: The Internet of Medical Things, often known as IoMT, is a revolutionary method of connecting medical equipment and the software that operates on it to the computer networks that are used in healthcare 5.0. The rapid development of smart medical devices on IoMT platforms has led to the adoption of major technologies in the modernization...
The amount of road accidents caused by driver drowsiness is one of the world’s major challenges. These accidents lead to numerous fatal and non-fatal injuries which impose substantial financial strain on individuals and governments every year. As a result, it is critical to prevent catastrophic accidents and reduce the financial burden on society c...
In recent times, the number of cyberattacks has escalated quickly and predominantly. There is no particular victim of this attack as it has outrageously tampered with all the domains in society. Cogitating this issue, the paper focuses on the cyberattacks on smart grids and endeavors some prevention techniques for the DDOS attacks. The researchers...