B. Dinesh Reddy's research while affiliated with Vignan’s Institute of Information Technology and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (14)


Mental Disorder Detection in Social Networks Using SVM Classification: An Improvised Approach
  • Chapter

January 2023

·

22 Reads

B. Dinesh Reddy

·

·

N. Thirupathi Rao

·

Online social networking has caused profound changes within the manner folks communicate and move. These changes might have an effect on sure traditional aspects of human behavior and cause medical specialty disorders. Mental disease is quickly turning into one in every of the foremost current public unfitness around the world. Social media networks, wherever clients will categorical their emotions, feelings, and thoughts, area unit a worthy supply of knowledge for analyzing mental state, and procedures supported machine intelligence area unit more and more used for this purpose. It is difficult to sight social network mental disorder (SNMDs) as a result of the mental factors thought of in existing diagnostic criteria (questionnaire) cannot be determined from online group action logs. To mechanically sight SNMDs cases of OSN clients, taking out these constraints to evaluate user’s online psychological states is extremely difficult. As an instance, the range of isolation with the impact of less inhibition of OSN clients do not seem to be simply discernible. Abnormal activity connected keywords area unit generated and hold on server. Each user activity (tweets, post, comments, etc.) information area unit hold on in information that may be accustomed analyze folie. This can facilitate to observe user activities in social network. Projected work detects sever style of SNMDs with a binary SVM classification approach.

Share

Pulse-Based Smart Electricity Meter Using Raspberry Pi and MEFN

January 2023

·

38 Reads

Eswar Abisheak Tadiparthi

·

Majji Prasanna Kumari

·

Basanaboyana Vamsi Sai

·

[...]

·

As the computation power of microcomputers increases over time, we need to put them to proper use. Green energy generation and consumption are evident problems that need to be prioritized. We know that green energy is not produced at a scale for us to rely on but if we know how electricity is consumed, we might be able to hack our way. In order to know that we are using light-dependant resistor (LDR) to count pulses from the electricity meter and update it in the database using a Raspberry Pi connected to the Internet which hits the server, the end user can see the utilization in real time.


Detection of Eye Blink Using SVM Classifier

January 2023

·

64 Reads

·

3 Citations

The eyes are the most important feature of our bodies because they allow us to see and explore the world. Nowadays, technology is continually evolving, paving the way for greater development and increased use of gadgets by everyone. When people stare at digital screens for long periods of time, they develop eye strain and visual issues, which is known as computer vision syndrome (CVS). The best way to avoid visual problems caused by digital screens is to take appropriate preventive measures such as getting regular eye care. To protect users from eye disorders, we created a model that uses the Viola–Jones method and the SVM classifier to estimate the user's eye blinking ratio. As a result, the proposed approach calculates locations of significance and another scalar parameter is derived—ratio of the eyes (EAR)—that characterizes each frame's eye opening. Finally, in a limited temporal window, eye blinks are recognized as a pattern of EAR values using an SVM classifier. The user can be notified about his gadget usage based on the results of the eye blink ratio and gradually diminish his addiction to digital screens that affect his eyes.



Review on Space and Security Issues in Cloud Computing

February 2022

·

8 Reads

Cloud computing is the most advanced and the most used technology for the never-ending IT and software technologies. Various large servers was used in cloud models for storing the vast amount of data. To store massive databases, various setoff servers with high-end hardware and with fast internet facilities were required and with a set of servers for providing services to the end users. In these servers, users store massive amount of data and also retrieve it from time to time, providing security to the data in these cloud computing models was very much essential and important. Hence, as the data storing in the various locations of the servers, the provision of adjusting the various amount of considerable data in the servers at various locations from time to time was essential and also the provision of security to these massive set of databases and also retrieving and storing the data is more critical. Hence, we need to provide more security to the data being stored in the huge number of the server. As we need to provide security to these servers, several factors are important to note. The detailed description of these points was presented in the current article.KeywordsSecurity techniquesSpace issues for securityArchitectureCloud computingFirewalls


Medical Image Denoising Using Non-Local Means Filtering

February 2022

·

9 Reads

·

1 Citation

Due to the exponential advancement of information technology, computer, storage systems and networking technology, medical devices and clinical diagnosis has acquired tremendous popularity in the last two decades. Mostly in medical field including biomedical science, the effect of such advances is becoming apparent, allowing the detection and diagnosis in a much more vivid way. The significant hurdle in the diagnostic imaging study is to select an image without any substantial details being lost. It is extremely likely that throughout the course of the retrieval organ in subsequent processing phases, the data captured can be distorted by noises or artifacts. Noise is defined as the initial pixel value being modified at random. Noise lowers the clarity of the image which is particularly important whenever the structures are scanned is smaller and even has comparatively poor intensity. Denoising of image data is thus important, and in medical diagnostics it has always been a necessary preprocessing level. An analysis of several significant researches in the field of image denoising is discussed in this article. Since images were quite essential in any area, image denoising is indeed a valuable preprocess prior toward more image analysis, such as segmentation, extraction of features, texture analysis, etc. This research intended to perform the comprehensive study of various denoising strategies for medical imaging that involves MRI, CT, and Retinal funding images. A comparison study with many existing methods approaches focused on resemblance tests, reveals that the proposed approach is superior in image consistency to them.KeywordsImage denoisingOn-local means filteringSpatial filteringCT scanMRI


Secure Information Transmission in Bunch-Based WSN

January 2021

·

27 Reads

·

3 Citations

Remote network incorporates a bigger favourable position in the present correspondence application like ecological, movement, military and well-being perception. To understand these applications, it is important to have a solid directing convention. The self-sorting out nature of MANETs makes them appropriate for some applications and henceforth, extensive exertion has been put into anchoring this kind of systems. Secure correspondence in a system is dictated by the unwavering quality of the key administration conspire, which is in charge of creating, circulating and looking after encryption/decoding keys among the hubs. In this paper, different key administration plans for MANETs are talked about. This examination work proposes a novel secure identity-based key management convention making utilization of cryptographic and information theoretic security.




An intelligent traffic light controller (TLC) system using iot model

October 2020

·

7 Reads

·

1 Citation

Journal of Green Engineering

Traffic problems in cities and developing cities are proliferating. Several methods are being followed to reduce the congestion on city roads. In the current article, an attempt has been made to identify the number of vehicles on city roads and based on the number of vehicles on city roads, the traffic lights are controlled automatically such that to reduce the congestion on city roads. Identifying vehicles on different lanes at traffic signals and trying to control the signals based on the number of vehicles. The current model was developed and implemented on the platform of Python, and the testing of the current model was done with four cases. The results observed for the four test cases are excellent and encouraging. The exact method and it's functioning and the results are displayed in the results and discussions sections in detail.


Citations (7)


... Based on the InceptionV3 model, the proposed CNN model achieved a validation accuracy of over 90%, with up to 5% improvement in testing accuracy. In [17], DR is currently considered one of the most challenging diseases caused by diabetes. This disease affects the retina and the blood vessels in the retina back, which causes poor vision and loss of sight and leads to blindness. ...

Reference:

Review of Eye Diseases Detection and Classification Using Deep Learning Techniques
Diabetic Retinopathy Detection Using Deep Learning
  • Citing Conference Paper
  • November 2022

... The detection mechanisms can be grouped into two categories [22]. The first mechanism is based on image processing using data obtained by a camera [4,23,24]. This solution includes a structure to place a camera pointing at the user's face [25,26]. ...

Detection of Eye Blink Using SVM Classifier
  • Citing Chapter
  • January 2023

... Customer engagement is highly essential for brands. According to (Ramaswamy & Ozcan 2018;Bhattacharyya, et al., 2020) the interactive platform created through IoT technologies makes it possible for retailers to engage with individual customers effectively. To further amplify customer experience retailers, use beacon technology, integrate supply chain operation and streamline operations across channels Gregory Jonathan (2015). ...

An intelligent traffic light controller (TLC) system using iot model
  • Citing Article
  • October 2020

Journal of Green Engineering

... The controlling traditions can be ordered in perspective of the nodes' participation, gathering traditions, technique for working and framework structure. The diverse challenges in coordinating join essentialness usage, center point plan, versatility, accessibility, scope, security (Sarkar and Murugan, 2016;Raj et al., 2021). ...

Secure Information Transmission in Bunch-Based WSN
  • Citing Chapter
  • January 2021

... Natural language processing (NLP) is the capacity of a PC program to comprehend human language as it is spoken. NLP is a part of man-made brainpower (AI) [7] [8]. The advancement of NLP applications is testing since PCs customarily expect people to "talk" to them in a programming language that is exact, unambiguous and profoundly organized, or through a predetermined number of unmistakably articulated voice directions. ...

Solving Venn-Diagram Based Comprehension Questions in Set Theory using Natural Language Processing
  • Citing Article
  • May 2019

International Journal of Advanced Science and Technology

... The characteristics of blockchain technology include decentralization, integrity, reliability, traceability, and nonrepudiation of users [25]. Blockchain technology was first applied to the Bitcoin cryptocurrency [26][27], and has since been applied to fraud detection, identity management, document verification, and rights protection [28][29][30][31][32][33]. Via private key signature, transaction blocks and consensus of ledger are constructed to achieve the validity and authenticity of transactions [34]. ...

Secure Electronic Voting System using Blockchain Technology
  • Citing Article
  • September 2018

International Journal of Advanced Science and Technology