
Prathap Rudra Boppuru- Doctor of Philosophy
- Professor at M S Ramaiah University of Applied Sciences
Prathap Rudra Boppuru
- Doctor of Philosophy
- Professor at M S Ramaiah University of Applied Sciences
About
53
Publications
18,892
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
277
Citations
Introduction
Machine learning,Sentiment analysis,Crime analysis and prediction.
Current institution
Additional affiliations
June 2012 - present
June 2012 - present
Education
December 2014 - May 2020
August 2008 - October 2010
Publications
Publications (53)
Social media is the platforms where users communicate, interact, share ideas, career interest, pictures, video, etc. Social media gives an opportunity to analyze the human behavior. Crime analysis using data from social media such as Newsfeeds, Facebook, Twitter, etc., is becoming one of the emerging areas of research for law enforcement organizati...
In developing countries like India, crime plays a detrimental role in economic growth and prosperity. With the increase in delinquencies, law enforcement needs to deploy limited resources optimally to protect citizens. Data mining and predictive analytics provide the best options for the same. This paper examines the news feed data collected from v...
Social media is a platform where people communicate, interact, share ideas, interest in careers, photos, videos, etc. The study says that social media provides an opportunity to observe human behavioral traits, spatial and temporal relationships. Based on study Crime analysis using social media data such as Facebook, Newsfeed articles, Twitter, etc...
Crime is the most common social problem faced in a developing country. Crime affects the reputation of a nation and the quality of life of its citizens. Crime also affects the economy of the country, increasing the financial burden of the government due to the need for expenditure in the police force and judicial system. Various initiatives are tak...
The integrated automated safety monitoring system for construction sites utilizes RFID, Wi-Fi, and vision-based recognition systems to enhance worker safety and ensure adherence to safety regulations. This system combines sophisticated components such as RFID tags and Raspberry Pi, solenoid locks, servo motors, and PIR sensors to provide an exhaust...
For today's environment, it is extremely important to understand hostility and motion in a variety of contexts, particularly where accidents are concerned. There's also a high safety risk in public places if there is no proper identification of suspicious activities that occur fast and cannot be accurately observed through traditional surveillance...
In today's dynamic industrial landscape, optimizing machinery performance and minimizing downtime are paramount for sustained operational excellence. This paper presents advanced predictive maintenance strategies, with a focus on leveraging machine learning and data analytics to enhance the reliability and efficiency of industrial equipment. The st...
The integrated automated smart attendance system utilizes RFID, Wi-Fi, and visual recognition technologies to elevate classroom security and ensure precise monitoring of attendance records. It consolidates cutting-edge components such as RFID tags, ESP8266 Wi-Fi modules, ESP-32 CAM modules, solenoid locks, servo motors, and PIR sensors to devise a...
The widespread use of deepfake technology in recent years has given rise to grave worries about the alteration of audiovisual material. The integrity of voice-based communication is particularly vulnerable to the threat posed by deepfake voice synthesis. The development of cutting-edge methods for the identification of deepfake voices is examined i...
Addressing hate speech on social media platforms is a pressing concern, particularly on platforms like Twitter and Facebook. To date, extensive research and numerous projects on the subject of hate speech detection and prevention have been conducted, as well as for crime detection and its prevention. However, there is a major void in the current re...
The health of both the mother and the baby is affected by how well the fetus is doing during pregnancy, making it a matter of utmost importance. To achieve the best results possible, it is essential to regularly monitor and intervene when needed. While there are many ways to observe the well-being of the fetus in the mother's womb, using artificial...
With cyberbullying surging across social media, this study investigates the effectiveness of four prominent deep learning models-CNN, Bi-LSTM, GRU, and LSTM-in identifying cyberbullying within Twitter texts. Driven by the urgent need for robust tools, this research aims to enrich the field of cyberbullying detection by thoroughly evaluating these m...
Utilization of artificial intelligence contributes to the efficient examination of emotions, resulting in valuable insights into the psychological condition of users on a large scale. In this research endeavor, sentiment analysis is conducted on a dataset from Reddit, which was obtained through Kaggle. The feedback in this collection of data was di...
The risk of dying from a heart attack is high everywhere in the world. This is based on the fact that every forty seconds, someone dies from a myocardial infarction. In this paper, heart attack is predicted with the help of dataset sourced from UCI Machine Learning Repository. The dataset analyses 13 attributes of 303 patients. The categorization m...
Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laboratories, pharmacies, and daily medical status reports. The electronic format of medical reports ensures that all information is availab...
With the growing number of city vehicles, traffic management is becoming a persistent challenge. Traffic bottlenecks cause significant disturbances in our everyday lives and raise stress levels, negatively impacting the environment by increasing carbon emissions. Due to the population increase, megacities are experiencing severe challenges and sign...
The number of automobiles on the road grows in lock-step with the advancement of vehicle manufacturing. Road accidents appear to be on the rise, owing to this growing proliferation of vehicles. Accidents frequently occur in our daily lives, and are the top ten causes of mortality from injuries globally. It is now an important component of the world...
The concept of social media began to gain popularity in the late 1990s and has played a significant role in connecting people across the globe. The constant addition of features to old social media platforms and the creation of new ones have helped amass and retain an extensive user base. Users could now share their views and provide detailed accou...
Studies linking two broader spectra of topics have fascinated scholars in many aspects. Here we tried associating two such far-reaching aspects which have finite connectivity between them. Multiverse has been the talk of the hour which explains the theory of multiple universes which exist in parallel. This is a topic in physics concerned with many...
The exponential rise in the use of social media has resulted in a massive increase in the volume of unstructured text created. This content is presented through messages, conversations, postings, and blogs. Microblogging has become a popular way for people to share what they are thinking. Many people express their thoughts on various issues relatin...
Abstract— Machine learning algorithms enable
computers to continuously learn from data and enhance
their performance without explicit programming.
Machine learning techniques have been used a
considerably in thyroid prediction to improve the
accuracy and effectiveness of diagnosis and treatment. To
predict hypothyroid profiles, this study examined...
Law enforcement agencies use various crime analysis tools. A large amount of crime data has enabled crime analysis. In this paper, the proposed research methodology uses Kernel Density Estimation (KDE) in a Geographical Information System (GIS) to analyze crime-type data. Bangalore and India newsfeeds are considered for experimental purposes. The p...
Introduction: The world is currently experiencing the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) [COVID-19], however, this is not a new phenomenon; it occurred in 2009-2010 in the form of novel influenza A. (H1N1). The H1N1 virus primarily afflicted people between the ages of 26 and 50, but SARS-CoV-2 primarily afflicted those ove...
This book gives an overview of innovative approaches in telehealth and telemedicine. The Goal of the content is to inform readers about recent computer applications in e-health, including Internet of Things (IoT) and Internet of Medical Things (IoMT) technology. The 9 chapters will guide readers to determine the urgency to intervene in specific med...
COVID-19 is an infectious disease of the newly discovered coronavirus (CoV). The importance and value of open access (OA) resources are critical in the context of the COVID-19 epidemic. OA aided in the development of a vaccine and informed public health actions necessary to stop the virus from spreading. Many publishers implicitly acknowledged that...
The Internet of Things (IoT) is a broad term that refers to the collection of information about all of the items that are linked to the Internet. It supervises and controls the functions from a distance, without the need for human interaction. It has the ability to react to the environment either immediately or via its previous experiences. In a si...
Inherited Retinal Diseases is one among the most significant cause for defects in children resulting in blindness among the children. As diseases of this kind require several clinical test patterns which at most times are inefficient and inappropriate and mostly result in acceptance of alternate methods, as sometime even invasive methods are also u...
Cybercrime has several antecedents, including the rapid expansion of the internet and the wide variety of users around the world. It is now possible to use this data for a variety of purposes, whether for profit, non-profit, or purely for the benefit of the individual. As a result, tracing and detecting online acts of terrorism requires the develop...
Post-harvest loss (PHL) leads to both decline in quantity and quality of food processing output from harvest to consumption. They can be caused by a wide range of circumstances, from growth conditions to retail handling. As storage loss is considered one among the detrimental factors, in this study, 25 data units were collected from a cold storage...
Machine intelligence is what has been generated by programming computers with certain aspects of human intellect, like training, solving problems, and priority setting. A machine can solve a number of complicated issues using these capabilities. In major industries, such as customer support and manufacturing, machine intelligence is now being emplo...
is article focuses on providing solutions for one important application termed as agriculture. In India, one major occupation for people living in urban and rural areas is agriculture where an economic rate depends only on the crops they yield. In such cases, if an intelligent monitoring device is not integrated then it becomes difficult for the fa...
People use social media to engage, connect, and exchange ideas, for professional interests, and for sharing images, videos, and other contents. According to the investigation, social media allows researchers to examine individual behavior features and geographic and temporal interactions. According to studies, criminology has become a prominent sub...
As object detection has gained popularity in recent years, there are many object detection algorithms available in today's world. Yet the algorithm with better accuracy and better speed is considered vital for critical applications. Therefore, in this article, the use of the YOLOV4 object detection algorithm is combined with improved and efficient...
In today’s digital world, data protection is extremely important. Every company’s data is a valuable asset, so it’s important to ensure that it's secured from outside threats. Information security is not only an effective but also a necessary element to protect data from unauthorized access. The confidentiality of any communication system is streng...
Abstract
As of late, the Internet of Things (IoT) innovation has been utilized in applications, for example, transportation, medical care, video observation, and so on. The quick appropriation and development of IoT in these segments are producing an enormous measure of information. For instance, IoT gadgets, for example, cameras produce various pi...
Sentimental Analysis or Opinion Mining plays a vital role in the experimentation field that determines the user’s opinions, emotions and sentiments concealing a text. News on the Internet is becoming vast, and it is drawing attention and has reached the point of adequately affecting political and social realities. The popular way of checking online...
With the advent of new technology every year, human beings continue to make clever innovations to benefit not only themselves but also those with some kind of impairment. Communication is carried out by talking to each other for regular people, but people who are deaf interact with each other through sign language. Taking this problem into account,...
Advancement in technology and Social media has grown to become one amongst the foremost powerful communication channels in human history and this is where individuals are sharing their perspectives, thoughts, suppositions, and feelings. Law enforcement units are having hard time fighting crime with ever-growing population, regional issues and polit...
Social media has grown to become one amongst the foremost powerful communication channels in human history and this is where individuals are sharing their perspectives, thoughts, suppositions, and feelings. The adoption of social media data for crime analysis is increasing day by day. In recent days, the collection of crime data from different hete...
From the recent years the large volume of data is growing bigger and bigger. It is difficult to measure the total volume of structured and unstructured data that require machine-based systems and technologies in order to be fully analyzed. Efficient implementation techniques are the key to meeting the scalability and performance requirements entail...