Srujan kotagiri Raju

Srujan kotagiri Raju
CMR Technical Campus · Department of Computer Science and Engineering

M.Tech(CSE),PhD

About

120
Publications
89,257
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
185
Citations
Introduction
Information Security, Machine Learning, Data Analytics, Computer Networks, Web Technologies, Image Processing, Mobile Application Development, Internet of Things

Publications

Publications (120)
Article
Full-text available
Wireless body area networks (WBANs) have seen an increase in popularity in recent years. Electromagnetic waves created by the body have the capacity to connect nodes all over the epidermis and throughout the body. If the gadget does not cause discomfort or harm, it can be linked to or implanted in the body. This is something that is currently being...
Chapter
Smart cities and villages have enhanced the quality of lives of residents. Various computer-assisted technologies have been harnessed for the development of smart cities and villages in order to provide solutions for common and niche urban problems. The development of smart environments has been possible due to advances in computing power and artif...
Chapter
Conventional agriculture strategies do not suffice to serve the food demand for the growing population nowadays. Scientists carried out many investigations for effective agricultural outputs over the last few decades. The newly emerging technologies such as Artificial Intelligence (AI), deep learning, machine learning, Internet of Things (IoT), clo...
Article
Full-text available
Crop Yield Prediction is essential in today's rapidly changing agricultural market (CYP). Accurate prediction relies on machine learning algorithms and selected features. Any machine learning algorithm's performance might well be enhanced by introducing a diverse set of features into the same training dataset. Crop yield prediction includes paramet...
Article
Full-text available
Aluminium 7075 metal matrix composite reinforced with silicon nitride was fabricated using the stir casting technique. Composite fabricated was machined and subjected to wire electrical discharge machining to study the significant process parameter. Taguchi design of experiment using L9 orthogonal array was selected with three factors, current, pul...
Patent
Using two developing technologies, the Internet of Things and machine learning, we have offered a unique way for smart agriculture in this innovation. It is possible to improve the accuracy of the result by including both real-time and historical data. Additionally, comparing several machine learning algorithms improves the accuracy of the system....
Article
Full-text available
Solid waste management is crucial in India. In metropolitan India, nearly, 377 million population produces 62 million tons of municipal solid waste per annum, 70% is collected, 20% is treated, and 50% is neglected. With the current rate of increase in population, it will be incremental till 2025. Domestic house waste per person is also important pa...
Article
Full-text available
The research work presents, constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties. The charge fragmentation and charge splitting are two components of the filtered switch domino (FSD) technique. Further behavior of selected switching is achieved using gene...
Chapter
The agricultural sector is rising as a high-tech industry, attracting young workers, new enterprises, and buyers. The technology is increasingly evolving, improving farmers’ processing capability, and progressing robotics and automation technology as we know it. The introduction of sensors and agrobot has sparked a new path in agricultural and farm...
Conference Paper
Facial Expressions pass on a lot of data outwardly instead of articulately. From the past few years, Facial Expression Recognition has been a challenging task in computer vision for Human-Machine Interaction as the way of expressing the emotions varies significantly. The main objective of Facial Expression Recognition (FER) systems is to detect an...
Chapter
Cyber threat hunting plays a leading role in the cyber security activity. Attackers rapidly change their attacks to steer clear of detection. This threat hunting mechanism is used when the current security mechanism is unable to prevent new attacks. Most of the existing companies do not have enough knowledge about cyber security threat hunting and...
Article
Full-text available
Human action recognition in the surveillance video is currently one of the challenging research topics. Most of the works in this area are based on either building classifiers on sophisticated handcrafted features or designing deep learning-based convolutional neural networks (CNNs), which directly act on raw inputs and extract meaningful informati...
Book
Full-text available
This book presents the peer-reviewed proceedings of the 2nd International Conference on Computational and Bioengineering (CBE 2020) jointly organized in virtual mode by the Department of Computer Science and the Department of BioScience & Sericulture, Sri Padmavati Mahila Visvavidyalayam (Women's University), Tirupati, Andhra Pradesh, India, during...
Article
Full-text available
Nanomaterials play a vital role in healthcare, electronics, manufacturing industries, biotechnology, and security systems. One such material is graphene and its oxides are specifically used for recycling industrial waste water. Graphene, a single layer in honeycomb cross section, provides excellent attention because of its significant optical, mech...
Article
Full-text available
Unsolicited e-mail also known as Spam has become a huge concern for each e-mail user. In recent times, it is very difficult to filter spam emails as these emails are produced or created or written in a very special manner so that anti-spam filters cannot detect such emails. This paper compares and reviews performance metrics of certain categories o...
Article
Full-text available
Load forecasting has been deeply studied because of its critical role in Smart Grid. In current Smart Grid, there are various types of customers with different energy consumption patterns. Customer's energy consumption patterns are referred as customer behaviors. It would significantly benefit load forecasting in a grid if customer behaviors could...
Chapter
Full-text available
The current pandemic caused by the novel coronavirus, probably referred to as COVID-19, has posed a major threat worldwide and has already been declared as a global health emergency. As the WHO has claimed, close contact with an infected COVID-19 individual increases the chances of infection as the droplets produced by an infected person’s coughing...
Chapter
Full-text available
At receiver, the radio channel knowledge is important for channel estimation. The time-varying channel is tracked by the proposed algorithm. The time- and frequency-selective channels cause the inter-carrier interference (ICI) into GFDM system which provides some impact for receiver design. The suggested design can accomplish virtually equal mean s...
Chapter
Full-text available
Mobile ad-hoc network (MANET) is a network without base station framework progressively shaped via self-sufficient arrangement of portable mobile nodes that are associated by means of wireless links. Battery operated mobile nodes have bounded lifetime. Energizing or substituting a mobile node is not constantly likely. In the event of depleted batte...
Chapter
Full-text available
In order to satisfy the user desires, device to device communication concept is used. To increase the spectral efficiency, throughput and to bring down the energy requirement and latency through a technique of GFDM with device to device communication setup. To contribute the data over riotous transportation channel, low density parity check codes a...
Article
Full-text available
With vibrating Indian culture life style is changing in urban as well as rural India. Adapting changes with international standard India is growing economy in global market. Instead of diversity observed with culture, geological subgroups, languages and many more, people in India always ready to adapt new technology and research which makes life st...
Article
Full-text available
Curriculum Development is defined as planned, a purposeful, progressive, and systematic process to create positive improvements in the educational system. The first step in curriculum development is to define the aim, objectives and outcomes for an educational program. Student learning outcomes must be developed for each educational program, for ea...
Article
Full-text available
This paper gives a review of design of various antennas for Radar applications. Micro-electromechanical (MEMS) antenna, Dielectric resonator antennas, Planar Yagi-Uda antenna, rectangular waveguide aperture, multifunctional phased array and sinuous antenna are used for Radar application. The design parameters and methodology of these antennas are d...
Article
Full-text available
Monitoringisbasedonsocialmediaforonlineusers.Theonlineusersdataiscollected (like chat history, posts, timeline, user details). The main aim is to find the black mailing words used by the users. To find the blackmailing words we monitor the user activities by extracting the chat. To extract the chat NLP steps are used (tokenization, stop words, smoo...
Chapter
Full-text available
Compression is the technique for effective utilization of space in servers as well as in personal computers. Most significantly, being multimedia compression. In this paper, the focus is on the audio compression method. Audio compression method has two types: lossy and lossless compression. Vector quantization is an effective way of lossy compressi...
Book
Full-text available
This book comprises the best deliberations with the theme “Smart Innovations in Mezzanine Technologies, Data Analytics, Networks and Communication Systems” in the “International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2020)”, organized by the Department of Computer Science and Engineering, VNR Vignana Jyoth...
Book
Full-text available
This book comprises the best deliberations with the theme “Machine Learning Technologies and Applications” in the “International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2020),” organized by the Department of Computer Science and Engineering, VNR Vignana Jyothi Institute of Engineering and Technology. The bo...
Book
Full-text available
This book includes selected papers presented at the 4th International Conference on Data Engineering and Communication Technology (ICDECT 2020), held at Kakatiya Institute of Technology & Science, Warangal, India, during 25–26 September 2020. It features advanced, multidisciplinary research towards the design of smart computing, information systems...
Book
Full-text available
This book presents the peer-reviewed proceedings of the 2nd International Conference on Computational and Bioengineering (CBE 2020) jointly organized in virtual mode by the Department of Computer Science and the Department of BioScience & Sericulture, Sri Padmavati Mahila Visvavidyalayam (Women's University), Tirupati, Andhra Pradesh, India, during...
Article
Full-text available
Research on Medical Image presents an efficient platform for automated analysis and identification of any deformations in a given medical image data collection, particularly in the Spinal Cord, for more effective and better comprehension of the diagnosis. Tumors, disc hernias, fractures, edoema, and other abnormalities of the spinal cord may be dis...
Conference Paper
Full-text available
A novel statistical metric measurement approach for the evaluation of enhancement of hazy images. Metric measurement plays a critical role in picture enhancement in hazy weather conditions and leads to a lessening in pixel resolution , a distortion in color, and gray images. In this paper hazy and foggy images are considered for evaluation using co...
Article
Full-text available
In present scenario, cancer is the universal problem in the world because it effects the people in the world. The growth of uncontrolled and abnormal cells in the body is known as cancer. These cells with abnormal named as cells of cancer, cells of malignant or cells of tumour. To recognize the genomicorigin of tumour cell explosion and the develop...
Poster
Full-text available
Computational Engineering (CE) is a relatively new discipline that deals with the development and application of computational models and simulations, often coupled with high-performance computing, to solve complex physical problems arising in engineering analysis and design as well as natural phenomena. Bio Engineering (BE) is a significant task o...
Article
Full-text available
Corticosteroids are hormone surrogates formed within the cortex of adrenal glands. They serve an important part in the treatment of numerous pathological states. Many of the clinical roles of steroids are associated with their potent anti-inflammatory and immune-modulating properties. The study conducted for a period of 6 months and encompasses 151...
Article
Full-text available
Cloud Computing is widespread to support industrial and academy related applications worldwide. The archival data process in the cloud is one of the challenging tasks. To handle this issue, the authors addressed the model, which allows authenticating the cloud storage using the JOSS (Java Library for Open stack storage) through the authentication U...
Chapter
Full-text available
Today the applications of Internet of things (IoT) are progressing rapidly in variety of domains. This encouraged to develop new applications (e.g., smart grid, smart home, smart cities, wearables, and vehicle networking) advancement as well. The emerging application of IoT is exposed toward security, privacy issues, and its challenges. The main ob...
Article
Full-text available
Compression is the technique for effective utilization of space in servers as well as in personal computers. Most significantly, being multimedia compression. In this paper, the focus is on the audio compression method. Audio compression method has two types: lossy and lossless compression. Vector quantization is an effective way of lossy compressi...
Article
Full-text available
The concept of cache memory partitioning is handled and implemented few times earlier. Partitioning is essential in cache memory to attain still higher speed while searching and transaction of data, as L1 cache is comparatively small in size, memory interference in L1 cache is very low data, and instruction were partitioned easily. For effective us...
Article
Full-text available
Speech signal analysis using multi-level wavelet transform and signal decomposition is presented in this paper. This research work carried out by recording the voices of the 40 different speakers. In this work, same set of words were spoken by the speakers, those 4 words are 'Bhavana,' 'How,' 'Are,' and 'You.' From these words, features were extrac...
Article
Full-text available
Now a days for identifying or predict any diseases on human beings, we should have proper diagnosis for predicting the disease which is present in that human body. In general for prediction of diseases we try to use either X-Ray, CT or MRI scan techniques for taking decision on that appropriate disease. In general medical person need complete knowl...
Article
Full-text available
Energy generation and distribution according to the customer demand are major challenging tasks in the smart grid. In this paper, allocation and distribution of energy in the grid network based on load weight and time are proposed. Energy allocated to different levels in the grid based on load weight during high demand. Finally, based on the time z...
Article
Full-text available
Medical image segmentation is an important component in medical image analysis and diagnosis which is used as a useful application for medical image processing. Image segmentation of medical images has been implemented and studied by numerous researchers in their various research activities. Robustness of the method is all-time challenge in this ty...
Article
Full-text available
Automatic temperature control system is an important application used in almost all modern gadgets and smart homes. The system for controlling temperature automatically is achieved by using Arduino Uno-based microcontroller system. Arduino Uno due to its increased popularity finds its varied range of applications. Temperature sensor LM35 and Arduin...
Article
Full-text available
Humanity has been in the pursuit of lengthening its lifespan for centuries. Healthcare provides many solutions to illnesses, injuries, and data mining, which provides useful patterns in data, is being actively used in healthcare sectors for the betterment of services provided by healthcare institutions. Obesity is a major issue in the current world...
Book
Full-text available
This book features high-quality papers presented at the International Conference on Computational Intelligence and Informatics (ICCII 2018), which was held on 28–29 December 2018 at the Department of Computer Science and Engineering, JNTUH College of Engineering, Hyderabad, India. The papers focus on topics such as data mining, wireless sensor netw...
Conference Paper
Full-text available
In era Computer evolution many problems can be solved using computer vision and signal processing. These domains are typically Digitized in binary files like Images, Audio, and Videos. The translation, recognition and synthesis are required while understating the meaning of the binary content. The recognition process is also having many problems in...
Patent
Full-text available
A method of verifying the authenticity of goods or services, in which breaking the life cycle of goods or services into stages, at the first stage of the life cycle, a unique tracking code is generated, which is applied to the goods or the document corresponding to the service is marked, each such unique tracking code is assigned information in a s...
Patent
Full-text available
Exemplary embodiments of the present disclosure is directed towards a complex of intellectual property (IP) management. Complex comprises a crypto currency exchange, computers with software based on a block blockchain platform with an electronic bank IP, associated with recording objects IP world databases, providing automatic international search...
Chapter
Full-text available
This document is in the required format. Internet of Things (IoT) became buzzword everywhere in the market. It’s designed with embedded things and Internet. These systems are used to interact with every other devices or services or human being on a large platform in the world. This type of architecture creates the scope in ease of use the improved...
Book
Full-text available
This book includes selected papers presented at the 3rd International Conference on Data Engineering and Communication Technology (ICDECT 2019), held at Stanley College of Engineering and Technology for Women, Hyderabad, from 15 to 16 March 2019. It features advanced, multidisciplinary research towards the design of smart computing, information sys...
Book
Full-text available
This book gathers state-of-the-art research in computational engineering and bioengineering to facilitate knowledge exchange between various scientific communities. Computational engineering (CE) is a relatively new discipline that addresses the development and application of computational models and simulations often coupled with high-performance...
Book
Full-text available
This book gathers state-of-the-art research in computational engineering and bioengineering to facilitate knowledge exchange between various scientific communities. Computational engineering (CE) is a relatively new discipline that addresses the development and application of computational models and simulations often coupled with high-performance...
Book
Full-text available
This book constitutes the proceedings of the First International Conference on Emerging Trends in Engineering (ICETE), held at University College of Engineering and organised by the Alumni Association, University College of Engineering, Osmania University, in Hyderabad, India on 22–23 March 2019. The proceedings of the ICETE are published in three...
Book
Full-text available
This book constitutes the proceedings of the First International Conference on Emerging Trends in Engineering (ICETE), held at University College of Engineering and organised by the Alumni Association, University College of Engineering, Osmania University, in Hyderabad, India on 22–23 March 2019. The proceedings of the ICETE are published in three...
Book
Full-text available
This book constitutes the proceedings of the First International Conference on Emerging Trends in Engineering (ICETE), held at University College of Engineering and organised by the Alumni Association, University College of Engineering, Osmania University, in Hyderabad, India on 22–23 March 2019. The proceedings of the ICETE are published in three...
Article
Full-text available
Human behavior for memorizing things are based on pattern. To determine patterns various attributes, entities or features are considered. If there is completely new object is there, human tries to associate things with existing similar object or tries to remember it as it is. Same techniques are adapted in development of image recognition. There ar...
Patent
Full-text available
Exemplary embodiments of the present disclosure are directed towards a method involving drift correction of micromechanical gyroscope in augmented reality system on mobile object by generating an angular coordinate of the users head through an augmented reality glasses with a built-in video camera; and a micromechanical gyroscope; and constructing...
Article
Full-text available
The Cloud computing is an explicit term that includes conveying facilitated benefits over the Internet, Cloud offers different kinds of on interest benefits that empower clients to get to concurrent figuring capacities. Traffic Redundancy disposal is the most widely recognized factor in distributed computing. Distributed computing includes for the...
Article
Full-text available
The a lot of computerized media getting to be accessible necessitate that new methodologies are created for recovering, exploring and prescribing the information to clients in a way that responds how we semantically see the substance. The postulation researches approaches to recover and give content for clients the assistance of relevant informatio...
Chapter
Full-text available
A novel statistical metric measurement approach for the evaluation of enhancement of hazy images. Metric measurement plays a critical role in picture enhancement in hazy weather conditions and leads to a lessening in pixel resolution, a distortion in color, and gray images. In this paper hazy and foggy images are considered for evaluation using con...
Article
Full-text available
Human behavior for memorizing things are based on pattern. To determine patterns various attributes, entities or features are considered. If there is completely new object is there, human tries to associate things with existing similar object or tries to remember it as it is. Same techniques are adapted in development of image recognition. There ar...