Srujan kotagiri Raju

Srujan kotagiri Raju
  • M.Tech(CSE),PhD
  • Dean Research & Development at CMR Technical Campus

About

202
Publications
207,513
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
661
Citations
Introduction
Information Security, Machine Learning, Data Analytics, Computer Networks, Web Technologies, Image Processing, Mobile Application Development, Internet of Things
Current institution
CMR Technical Campus
Current position
  • Dean Research & Development

Publications

Publications (202)
Conference Paper
Full-text available
Digital forensics is essential to cybersecurity and the examination of virtual activities-particularly criminal ones. This research outlines a predictive analytical technique in his based on the time series to improve digital forensics traceability. The performance of the research is assessed by using the Digital Forensic Investigation Dataset (DFI...
Conference Paper
Full-text available
Two supervised machine learning methods, among them Support Vector Machine (SVM) and Artificial Neural Networks (ANN), are employed in Network Intrusion Detection to identify whether the data requested contains signatures indicative of an attack or an abnormality. All services are now accessible online, and malicious users may employ this to attack...
Article
Full-text available
The increased need of various services with different QoS (Quality of Service) requirements motivated the deployment of 5G wireless communication networks. While the one logical network approach was good in theory, today has given rise to a new technology called Network Slicing where multiple independent Logical Networks were provided on shared inf...
Article
Full-text available
The increased need of various services with different QoS (Quality of Service) requirements motivated the deployment of 5G wireless communication networks. While the one logical network approach was good in theory, today has given rise to a new technology called Network Slicing where multiple independent Logical Networks were provided on shared inf...
Article
Full-text available
Introduction: Automated sleepiness detection plays a vital role in ensuring driving-related safety, monitoring physical well-being, worker safety, and various other applications. The ability to detect and respond to signs of sleepiness is essential in preventing accidents and improving overall safety and productivity. Objectives: The primary object...
Article
Full-text available
In response to growing security concerns and the increasing demand for face recognition (FR) technology in various sectors, this research explores the application of deep learning techniques, specifically pre-trained Convolutional Neural Network (CNN) models, in the field of FR. The study harnesses the power of five pre-trained CNN models—DenseNet2...
Article
Full-text available
The irregularity in the heartbeats caused cardiac arrhythmia, which resulted in serious health problems. This cardiac arrhythmia is monitored by electrocardiogram (ECG) signals. As a result, an accurate and timely analysis of ECG data can prevent serious health problems. However, the conventional manual prediction systems and artificial intelligenc...
Chapter
Full-text available
The integration of deep learning models and computer vision techniques has created new agricultural possibilities, transforming traditional farming practices into smart and efficient operations. These advanced technologies have enabled farmers to optimise resource utilisation, manage crops effectively, maximise yields, and make informed decisions,...
Chapter
Full-text available
Stock market prediction is a highly popular topic among investors, traders, and financial analysts. It involves predicting the future direction of stock prices, which can help investors make decisions about buying or selling stocks. One method of predicting stock prices is through sentiment analysis. Sentiment analysis has become an increasingly po...
Chapter
Full-text available
This research paper proposes the dermatological diseases are very predominant diseases around the world. Even though being general, treatment is very problematic and needs broad knowledge in subject. The skin illnesses are mainly caused by bacteria, fungal infection, viruses, allergy, etc. The Photonics-based medical technology and lasers advanceme...
Book
Full-text available
Presents research papers written by active researchers in the areas of communication technologies Results of IC3T 2023 organized by Kakatiya Institute of Technology and Science, Warangal, India Serves as a reference for researchers and practitioners in academia and industry
Conference Paper
Full-text available
According to this research, stress is typically a human response to various dangers or goals. When it works well, this reaction can help us stay focused, motivated, and cognitively engaged. However, when it goes out of control, it can be hazardous and result in depression, anxiety, hypertension, and a variety of other serious problems. Cyberspace s...
Conference Paper
Full-text available
The main goal is to create an automatic facial analyzer system for the human face, which will be a crucial component of future analysis. The topic of this work is the recognition of emotion, gender, age, and eye colour from an image. We developed a facial recognition system to forecast facial data with the help of deep learning and OpenCV. Three me...
Conference Paper
Full-text available
According to weeds increased competition with crops, they have been given responsible for 45% of crop losses in the agricultural industry. This percentage can be decreased with an effective method of weed detection. The conventional weeding techniques take a long time and largely require manual labor. So, this process has to be automated. As a resu...
Conference Paper
Full-text available
This work presents an automated smart plastic waste recycling management system is presented. In this analysis, Waste Classification data set from Kaggle is used. Firstly, the images of various years will be cleaned and merged. Using Time series algorithm, waste generation, recycling generation and recycling rate of various years will be calculated...
Chapter
Full-text available
Steganography involves the use of hiding a secret or unknown message in a regular message. Steganography is commonly used in such a way that smaller messages are difficult to detect within a larger image’s noisy areas. In this chapter, we try to fit a color image in another image which is of the same size. Deep Neural Networks (DNN) are trained to...
Conference Paper
Full-text available
The human brain serves as the principal controller of the humanoid system. Brain tumors are the result of abnormal cell division and proliferation, and the development of these tumors can result in brain cancer. The use of computer vision in diagnostic procedures has the potential to lessen human mistake in judgment. The incorporation of new techno...
Chapter
Full-text available
The atmosphere of Earth is divided into five distinct layers, each with its own characteristics. Each layer has its own unique characteristics and plays a vital role in protecting life on Earth. The lowest part of the atmosphere on Earth is called the troposphere. One of its key characteristics is the nocturnal boundary layer (NBL), which plays a m...
Conference Paper
Full-text available
Technology is everywhere in the 21st Century. So, for optimum results in each field, various methods to minimize loss and maximize benefits. The application of Machine Learning in crop type prediction for modern farming is crucial. Also, suggesting the type of fertilizer and amount can increase the application's usability. Various aspects of rain a...
Conference Paper
Full-text available
Seizures are neurological disorders that affect approximately 50 million people worldwide. It occurs unusually and unpredictably due to transient electrical brain disruption. The electroencephalogram (EEG) signal was decomposed using the discrete wavelet transform into five frequency bands are delta, theta, alpha beta and gamma. Signals were reproc...
Conference Paper
Full-text available
Machine Learning (ML),which is a sub-section of Artificial Intelligence (AI) which lets in all kinds of programs to emerge as greater way at predicting consequences without being explicitly programmed to do so. ML algorithms use historic records to predict new outputs. Classical device getting to know is frequently categorized with the aid of using...
Conference Paper
Full-text available
The human brain serves as the principal controller of the humanoid system. Brain tumors are the result of abnormal cell division and proliferation, and the development of these tumors can result in brain cancer. The use of computer vision in diagnostic procedures has the potential to lessen human mistake in judgment. The incorporation of new techno...
Article
Full-text available
The integration of intelligence into everyday products has been possible due to the ongoing shrinking of hardware and a rise in power efficiency. The Internet of Things (IoT) area arose from the tendency to add computational capabilities to so-called non-intelligent daily items. IoT systems are attractive targets for cyber-attacks because they have...
Article
Full-text available
Agriculture is the backbone of the Indian economy and a source of employment for millions of people across the globe. The perennial problem faced by Indian farmers is that they do not select crops based on environmental conditions, resulting in significant productivity losses. This decision support system assists in resolving this issue. In our stu...
Book
Full-text available
This book includes original, peer-reviewed research articles from International Conference on Advances in Computer Engineering and Communication Systems (ICACECS 2022), held in VNR Vignana Jyoythi Institute of Engineering and Technology (VNR VJIET), Hyderabad, Telangana, India, during August 11–12, 2022. The book focuses on “Smart Innovations in Me...
Book
Full-text available
The Springer Scopus indexed 4th International Conference on Computer and Communication Technologies (IC3T) 2022 organized by Department of ECE, KITSW, was held in Warangal, Telangana, during July 29–30, 2022. Warangal, the home of a major state university amid pleasant surroundings, was a delightful place for the conference. The 230 scientific part...
Chapter
Full-text available
Birdwatching is a form of wildlife observation of birds which is a recreational activity. Bird watchers make use of bird books to know about the birds. Convolutional neural network (CNN) is utilized to assist users in identifying bird species, making it a useful tool for admiring the beauty of birds. A CNN uses bird imagery to learn how to locate e...
Article
Full-text available
Image processing is one of the most widely used techniques in the medical field for the early diagnosis of diseases. The most common application of image processing in medicine is the detection of cancer. Colon cancer is one of the most typical cancers worldwide. Early disease detection using image processing, which is more accurate. Early cancer d...
Article
Full-text available
Network packet diagnoses are analyzed to predict the overall network diagnosis of the packet. The network port handles the multiple transmissions that request the use of the single physical network infrastructure. This process follows up on the send and receive data transmissions, where the network port follows the transmission requests. Tx-Rx pack...
Article
Full-text available
Recently, COVID-19 infection has been spread to a wider human population worldwide and deemed a pandemic for its rapidity. The absence of medicine or immunization for the “COVID-19” illness, along with the requirement for early discovery and isolation of affected persons, is critical in reducing the risk of infection in healthy population. Blood sp...
Chapter
Full-text available
Surprises are an inevitable part of any gaming application. These surprises eventually make decision-making a tough task. Cognitive learning always works in actions and associative responses. Gaming and cognition have a close association while decision-making in gaming or economics applications. These applications always respond to opponents’ moves...
Chapter
These days, for every half seconds a cyber-attack is happening in this world. Most of them are hard to manage and mitigate by having appropriate cyber security measures. This article reports how cyber threat intelligence (CTI) can prevent an attack before it strikes, rather than researching about how to repair the damage caused by it. cyber threat...
Chapter
Full-text available
Agriculture expansion is critical to the economic prosperity of any country. Agriculture employs more than 60% of the Indian population, either directly or indirectly. Nowadays, monitoring the crop is the challenging task in the world. In this article, data has been collected from various sensors to propose an IoT-assisted hybrid machine learning a...
Chapter
Full-text available
Agriculture has a captious part in maintaining a large population. It plays a decisive role to forward our country’s economic development. Crop cultivation has been the most prominent problem in recent days due to changes in weather patterns. This has a significant impact on crop productivity, either directly or indirectly. As a result, new technol...
Article
Full-text available
Wireless body area networks (WBANs) have seen an increase in popularity in recent years. Electromagnetic waves created by the body have the capacity to connect nodes all over the epidermis and throughout the body. If the gadget does not cause discomfort or harm, it can be linked to or implanted in the body. This is something that is currently being...
Chapter
Full-text available
Smart cities and villages have enhanced the quality of lives of residents. Various computer-assisted technologies have been harnessed for the development of smart cities and villages in order to provide solutions for common and niche urban problems. The development of smart environments has been possible due to advances in computing power and artif...
Chapter
Full-text available
Conventional agriculture strategies do not suffice to serve the food demand for the growing population nowadays. Scientists carried out many investigations for effective agricultural outputs over the last few decades. The newly emerging technologies such as Artificial Intelligence (AI), deep learning, machine learning, Internet of Things (IoT), clo...
Article
Full-text available
Crop Yield Prediction is essential in today's rapidly changing agricultural market (CYP). Accurate prediction relies on machine learning algorithms and selected features. Any machine learning algorithm's performance might well be enhanced by introducing a diverse set of features into the same training dataset. Crop yield prediction includes paramet...
Chapter
Full-text available
Diabetic retinopathy (DR) is a severe complication of eyes found in the diabetic patients. It is the main cause of sightlessness among them, and it progresses with the duration of the disease. Commonly, the diagnosis will be done by an ophthalmologist. But, the huge number of patients especially in the rural areas has a limited number of ophthalmol...
Patent
Using two developing technologies, the Internet of Things and machine learning, we have offered a unique way for smart agriculture in this innovation. It is possible to improve the accuracy of the result by including both real-time and historical data. Additionally, comparing several machine learning algorithms improves the accuracy of the system....
Article
Full-text available
Solid waste management is crucial in India. In metropolitan India, nearly, 377 million population produces 62 million tons of municipal solid waste per annum, 70% is collected, 20% is treated, and 50% is neglected. With the current rate of increase in population, it will be incremental till 2025. Domestic house waste per person is also important pa...
Article
Full-text available
The research work presents, constrained network coding technique to ensure the successful data transmission based composite channel cmos technology using dielectric properties. The charge fragmentation and charge splitting are two components of the filtered switch domino (FSD) technique. Further behavior of selected switching is achieved using gene...
Chapter
Full-text available
The agricultural sector is rising as a high-tech industry, attracting young workers, new enterprises, and buyers. The technology is increasingly evolving, improving farmers’ processing capability, and progressing robotics and automation technology as we know it. The introduction of sensors and agrobot has sparked a new path in agricultural and farm...
Chapter
Full-text available
For the extraction of summaries of individual Telugu papers in this study, we propose using the Particle Swarm Optimization (PSO) algorithm. The PSO technique is analogous to the development of genetics and harmony search approaches (HS). The proposed technique will be examined using the Telugu NLP docs and the ROUGE tool. Experimental tests have d...
Conference Paper
Full-text available
Facial Expressions pass on a lot of data outwardly instead of articulately. From the past few years, Facial Expression Recognition has been a challenging task in computer vision for Human-Machine Interaction as the way of expressing the emotions varies significantly. The main objective of Facial Expression Recognition (FER) systems is to detect an...
Chapter
Full-text available
Digital imaging collections are widely used in image analysis particularly in medical and healthcare systems. Medical images collected are prone to some type of inaccuracies called noise or incompleteness. Images with inaccuracy even are important in medical image analyses as they contain image components that form rare models. To overcome the prob...
Chapter
Full-text available
Password-based validation frameworks are as yet the most regularly utilized components for ensuring the data regardless of being helpless against dictionary reference-based attacks. Password breaking is the way towards speculating or recuperating a secret key from put away areas or from an information transmission framework. Best state-of-the-art p...
Chapter
Full-text available
Cyber threat hunting plays a leading role in the cyber security activity. Attackers rapidly change their attacks to steer clear of detection. This threat hunting mechanism is used when the current security mechanism is unable to prevent new attacks. Most of the existing companies do not have enough knowledge about cyber security threat hunting and...
Chapter
Full-text available
Image categorization is the process of assigning land cover classes to pixels. It may categorize images into forest, urban, agricultural, and other categories. The approaches in this study are tested using a large image dataset comprising 21 land use categories. There are comparisons to be done in addition to traditional approaches. DWT at two degr...
Chapter
Full-text available
Diabetes sickness upsurges the quantity of glucose in the blood triggered by a deficiency of insulin. Diabetes affects retina, heart, nerves and kidney. One important complication is Diabetic Retinopathy. The mechanized methods for Diabetic Retinopathy recognition are flexible for cost and time reduction and are more competent over manual analysis....
Book
Full-text available
This book presents the peer-reviewed proceedings of the 2nd International Conference on Computational and Bioengineering (CBE 2020) jointly organized in virtual mode by the Department of Computer Science and the Department of BioScience & Sericulture, Sri Padmavati Mahila Visvavidyalayam (Women's University), Tirupati, Andhra Pradesh, India, during...

Network

Cited By