Prathap Rudra Boppuru

Prathap Rudra Boppuru
Verified
Prathap verified their affiliation via an institutional email.
Verified
Prathap verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Professor at M S Ramaiah University of Applied Sciences

About

53
Publications
18,892
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
277
Citations
Current institution
M S Ramaiah University of Applied Sciences
Current position
  • Professor
Additional affiliations
June 2012 - present
Christ University
Position
  • Professor (Associate)
June 2012 - present
Christ University
Position
  • Professor (Assistant)
Education
December 2014 - May 2020
Christ University
Field of study
  • Engineering-CSE
August 2008 - October 2010
Jawaharlal Nehru Technological University, Kakinada
Field of study
  • CSE-Software Engineering

Publications

Publications (53)
Article
Full-text available
Social media is the platforms where users communicate, interact, share ideas, career interest, pictures, video, etc. Social media gives an opportunity to analyze the human behavior. Crime analysis using data from social media such as Newsfeeds, Facebook, Twitter, etc., is becoming one of the emerging areas of research for law enforcement organizati...
Article
Full-text available
In developing countries like India, crime plays a detrimental role in economic growth and prosperity. With the increase in delinquencies, law enforcement needs to deploy limited resources optimally to protect citizens. Data mining and predictive analytics provide the best options for the same. This paper examines the news feed data collected from v...
Chapter
Full-text available
Social media is a platform where people communicate, interact, share ideas, interest in careers, photos, videos, etc. The study says that social media provides an opportunity to observe human behavioral traits, spatial and temporal relationships. Based on study Crime analysis using social media data such as Facebook, Newsfeed articles, Twitter, etc...
Article
Full-text available
Crime is the most common social problem faced in a developing country. Crime affects the reputation of a nation and the quality of life of its citizens. Crime also affects the economy of the country, increasing the financial burden of the government due to the need for expenditure in the police force and judicial system. Various initiatives are tak...
Conference Paper
Full-text available
The integrated automated safety monitoring system for construction sites utilizes RFID, Wi-Fi, and vision-based recognition systems to enhance worker safety and ensure adherence to safety regulations. This system combines sophisticated components such as RFID tags and Raspberry Pi, solenoid locks, servo motors, and PIR sensors to provide an exhaust...
Conference Paper
Full-text available
For today's environment, it is extremely important to understand hostility and motion in a variety of contexts, particularly where accidents are concerned. There's also a high safety risk in public places if there is no proper identification of suspicious activities that occur fast and cannot be accurately observed through traditional surveillance...
Conference Paper
In today's dynamic industrial landscape, optimizing machinery performance and minimizing downtime are paramount for sustained operational excellence. This paper presents advanced predictive maintenance strategies, with a focus on leveraging machine learning and data analytics to enhance the reliability and efficiency of industrial equipment. The st...
Conference Paper
The integrated automated smart attendance system utilizes RFID, Wi-Fi, and visual recognition technologies to elevate classroom security and ensure precise monitoring of attendance records. It consolidates cutting-edge components such as RFID tags, ESP8266 Wi-Fi modules, ESP-32 CAM modules, solenoid locks, servo motors, and PIR sensors to devise a...
Chapter
Full-text available
The widespread use of deepfake technology in recent years has given rise to grave worries about the alteration of audiovisual material. The integrity of voice-based communication is particularly vulnerable to the threat posed by deepfake voice synthesis. The development of cutting-edge methods for the identification of deepfake voices is examined i...
Article
Full-text available
Addressing hate speech on social media platforms is a pressing concern, particularly on platforms like Twitter and Facebook. To date, extensive research and numerous projects on the subject of hate speech detection and prevention have been conducted, as well as for crime detection and its prevention. However, there is a major void in the current re...
Conference Paper
Full-text available
The health of both the mother and the baby is affected by how well the fetus is doing during pregnancy, making it a matter of utmost importance. To achieve the best results possible, it is essential to regularly monitor and intervene when needed. While there are many ways to observe the well-being of the fetus in the mother's womb, using artificial...
Conference Paper
Full-text available
With cyberbullying surging across social media, this study investigates the effectiveness of four prominent deep learning models-CNN, Bi-LSTM, GRU, and LSTM-in identifying cyberbullying within Twitter texts. Driven by the urgent need for robust tools, this research aims to enrich the field of cyberbullying detection by thoroughly evaluating these m...
Conference Paper
Full-text available
Utilization of artificial intelligence contributes to the efficient examination of emotions, resulting in valuable insights into the psychological condition of users on a large scale. In this research endeavor, sentiment analysis is conducted on a dataset from Reddit, which was obtained through Kaggle. The feedback in this collection of data was di...
Chapter
Full-text available
The risk of dying from a heart attack is high everywhere in the world. This is based on the fact that every forty seconds, someone dies from a myocardial infarction. In this paper, heart attack is predicted with the help of dataset sourced from UCI Machine Learning Repository. The dataset analyses 13 attributes of 303 patients. The categorization m...
Article
Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laboratories, pharmacies, and daily medical status reports. The electronic format of medical reports ensures that all information is availab...
Article
Full-text available
With the growing number of city vehicles, traffic management is becoming a persistent challenge. Traffic bottlenecks cause significant disturbances in our everyday lives and raise stress levels, negatively impacting the environment by increasing carbon emissions. Due to the population increase, megacities are experiencing severe challenges and sign...
Article
Full-text available
The number of automobiles on the road grows in lock-step with the advancement of vehicle manufacturing. Road accidents appear to be on the rise, owing to this growing proliferation of vehicles. Accidents frequently occur in our daily lives, and are the top ten causes of mortality from injuries globally. It is now an important component of the world...
Article
Full-text available
The concept of social media began to gain popularity in the late 1990s and has played a significant role in connecting people across the globe. The constant addition of features to old social media platforms and the creation of new ones have helped amass and retain an extensive user base. Users could now share their views and provide detailed accou...
Article
Full-text available
Studies linking two broader spectra of topics have fascinated scholars in many aspects. Here we tried associating two such far-reaching aspects which have finite connectivity between them. Multiverse has been the talk of the hour which explains the theory of multiple universes which exist in parallel. This is a topic in physics concerned with many...
Article
Full-text available
The exponential rise in the use of social media has resulted in a massive increase in the volume of unstructured text created. This content is presented through messages, conversations, postings, and blogs. Microblogging has become a popular way for people to share what they are thinking. Many people express their thoughts on various issues relatin...
Conference Paper
Full-text available
Abstract— Machine learning algorithms enable computers to continuously learn from data and enhance their performance without explicit programming. Machine learning techniques have been used a considerably in thyroid prediction to improve the accuracy and effectiveness of diagnosis and treatment. To predict hypothyroid profiles, this study examined...
Article
Full-text available
Law enforcement agencies use various crime analysis tools. A large amount of crime data has enabled crime analysis. In this paper, the proposed research methodology uses Kernel Density Estimation (KDE) in a Geographical Information System (GIS) to analyze crime-type data. Bangalore and India newsfeeds are considered for experimental purposes. The p...
Article
Full-text available
Introduction: The world is currently experiencing the severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) [COVID-19], however, this is not a new phenomenon; it occurred in 2009-2010 in the form of novel influenza A. (H1N1). The H1N1 virus primarily afflicted people between the ages of 26 and 50, but SARS-CoV-2 primarily afflicted those ove...
Chapter
Full-text available
This book gives an overview of innovative approaches in telehealth and telemedicine. The Goal of the content is to inform readers about recent computer applications in e-health, including Internet of Things (IoT) and Internet of Medical Things (IoMT) technology. The 9 chapters will guide readers to determine the urgency to intervene in specific med...
Chapter
Full-text available
COVID-19 is an infectious disease of the newly discovered coronavirus (CoV). The importance and value of open access (OA) resources are critical in the context of the COVID-19 epidemic. OA aided in the development of a vaccine and informed public health actions necessary to stop the virus from spreading. Many publishers implicitly acknowledged that...
Article
Full-text available
The Internet of Things (IoT) is a broad term that refers to the collection of information about all of the items that are linked to the Internet. It supervises and controls the functions from a distance, without the need for human interaction. It has the ability to react to the environment either immediately or via its previous experiences. In a si...
Article
Full-text available
Inherited Retinal Diseases is one among the most significant cause for defects in children resulting in blindness among the children. As diseases of this kind require several clinical test patterns which at most times are inefficient and inappropriate and mostly result in acceptance of alternate methods, as sometime even invasive methods are also u...
Chapter
Full-text available
Cybercrime has several antecedents, including the rapid expansion of the internet and the wide variety of users around the world. It is now possible to use this data for a variety of purposes, whether for profit, non-profit, or purely for the benefit of the individual. As a result, tracing and detecting online acts of terrorism requires the develop...
Article
Full-text available
Post-harvest loss (PHL) leads to both decline in quantity and quality of food processing output from harvest to consumption. They can be caused by a wide range of circumstances, from growth conditions to retail handling. As storage loss is considered one among the detrimental factors, in this study, 25 data units were collected from a cold storage...
Article
Full-text available
Machine intelligence is what has been generated by programming computers with certain aspects of human intellect, like training, solving problems, and priority setting. A machine can solve a number of complicated issues using these capabilities. In major industries, such as customer support and manufacturing, machine intelligence is now being emplo...
Article
Full-text available
is article focuses on providing solutions for one important application termed as agriculture. In India, one major occupation for people living in urban and rural areas is agriculture where an economic rate depends only on the crops they yield. In such cases, if an intelligent monitoring device is not integrated then it becomes difficult for the fa...
Chapter
People use social media to engage, connect, and exchange ideas, for professional interests, and for sharing images, videos, and other contents. According to the investigation, social media allows researchers to examine individual behavior features and geographic and temporal interactions. According to studies, criminology has become a prominent sub...
Chapter
Full-text available
As object detection has gained popularity in recent years, there are many object detection algorithms available in today's world. Yet the algorithm with better accuracy and better speed is considered vital for critical applications. Therefore, in this article, the use of the YOLOV4 object detection algorithm is combined with improved and efficient...
Article
Full-text available
In today’s digital world, data protection is extremely important. Every company’s data is a valuable asset, so it’s important to ensure that it's secured from outside threats. Information security is not only an effective but also a necessary element to protect data from unauthorized access. The confidentiality of any communication system is streng...
Article
Abstract As of late, the Internet of Things (IoT) innovation has been utilized in applications, for example, transportation, medical care, video observation, and so on. The quick appropriation and development of IoT in these segments are producing an enormous measure of information. For instance, IoT gadgets, for example, cameras produce various pi...
Chapter
Full-text available
Sentimental Analysis or Opinion Mining plays a vital role in the experimentation field that determines the user’s opinions, emotions and sentiments concealing a text. News on the Internet is becoming vast, and it is drawing attention and has reached the point of adequately affecting political and social realities. The popular way of checking online...
Article
Full-text available
With the advent of new technology every year, human beings continue to make clever innovations to benefit not only themselves but also those with some kind of impairment. Communication is carried out by talking to each other for regular people, but people who are deaf interact with each other through sign language. Taking this problem into account,...
Article
Full-text available
Advancement in technology and Social media has grown to become one amongst the foremost powerful communication channels in human history and this is where individuals are sharing their perspectives, thoughts, suppositions, and feelings. Law enforcement units are having hard time fighting crime with ever-growing population, regional issues and polit...
Article
Full-text available
Social media has grown to become one amongst the foremost powerful communication channels in human history and this is where individuals are sharing their perspectives, thoughts, suppositions, and feelings. The adoption of social media data for crime analysis is increasing day by day. In recent days, the collection of crime data from different hete...
Conference Paper
Full-text available
From the recent years the large volume of data is growing bigger and bigger. It is difficult to measure the total volume of structured and unstructured data that require machine-based systems and technologies in order to be fully analyzed. Efficient implementation techniques are the key to meeting the scalability and performance requirements entail...

Network

Cited By