{"id":24,"date":"2024-04-22T09:01:02","date_gmt":"2024-04-22T09:01:02","guid":{"rendered":"https:\/\/drraghudhumpati.com\/?page_id=24"},"modified":"2026-03-04T20:00:16","modified_gmt":"2026-03-04T20:00:16","slug":"research","status":"publish","type":"page","link":"https:\/\/drraghudhumpati.com\/index.php\/research\/","title":{"rendered":"Research"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Research Profile<\/h2>\n\n\n\n<p>My research focuses on the development of intelligent systems at the intersection of artificial intelligence and cybersecurity. I work on machine learning approaches for threat detection, intrusion detection systems, predictive analytics, and biometric recognition technologies. I have published 28 papers in refereed conferences and journals, and hold 5 patents in AI-based security systems and intelligent computing.<\/p>\n\n\n\n<p>Below you will find links to my academic profiles and a complete list of publications and patents.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Academic Profiles<\/h3>\n\n\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>SL.NO.<\/td><td>NAME<\/td><td>LINK<\/td><\/tr><tr><td>1<\/td><td>ORCID<\/td><td><a href=\"https:\/\/orcid.org\/0000-0002-2794-543X\">CLICK HERE<\/a><\/td><\/tr><tr><td>2<\/td><td>Web of science<\/td><td><a href=\"https:\/\/www.webofscience.com\/wos\/author\/record\/KIB-0220-2024\">CLICK HERE<\/a><\/td><\/tr><tr><td>3<\/td><td>Scopus<\/td><td><a href=\"https:\/\/www.scopus.com\/authid\/detail.uri?authorId=57715486500\">CLICK HERE<\/a><\/td><\/tr><tr><td>4<\/td><td>IEEE<\/td><td><a href=\"https:\/\/ieeexplore.ieee.org\/author\/231319327419549\">CLICK HERE<\/a><\/td><\/tr><tr><td>5<\/td><td>Research Gate<\/td><td><a href=\"https:\/\/www.researchgate.net\/profile\/Raghu-Dhumpati?ev=hdr_xprf\" data-type=\"link\" data-id=\"https:\/\/www.researchgate.net\/profile\/Raghu-Dhumpati?ev=hdr_xprf\">CLICK HERE<\/a><\/td><\/tr><tr><td>6<\/td><td>Google Scholar<\/td><td><a href=\"https:\/\/scholar.google.com\/citations?view_op=list_works&amp;hl=en&amp;hl=en&amp;user=to5RknkAAAAJ&amp;sortby=pubdate\">CLICK HERE<\/a><\/td><\/tr><tr><td>7<\/td><td>Vidwan<\/td><td><a href=\"https:\/\/vidwan.inflibnet.ac.in\/profile\/517259\">CLICK HERE<\/a><\/td><\/tr><tr><td>8<\/td><td>GitHub<\/td><td><a href=\"https:\/\/github.com\/drraghudhumpati-eng\" data-type=\"link\" data-id=\"https:\/\/github.com\/drraghudhumpati-eng\">CLICK HERE<\/a><\/td><\/tr><tr><td>9<\/td><td>Linkedln<\/td><td><a href=\"https:\/\/www.linkedin.com\/in\/raghu-dhumpati-18135998\/\" data-type=\"link\" data-id=\"https:\/\/www.linkedin.com\/in\/raghu-dhumpati-18135998\/\">CLICK HERE<\/a><\/td><\/tr><tr><td>10<\/td><td>Huggingface<\/td><td><a href=\"https:\/\/huggingface.co\/raghu-dhumpati\" data-type=\"link\" data-id=\"https:\/\/huggingface.co\/raghu-dhumpati\">CLICK HERE<\/a><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Publications:<\/p>\n\n\n\n<p><strong>[28]<\/strong> R. Dhumpati et al., \u201cA Literature Survey on Deep Learning and Explainable AI Approaches for Crop Disease Prediction,\u201d <em>Proc. Int. Conf. on Sustainable Communication Networks<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[27]<\/strong> R. Dhumpati et al., \u201cBlockchain-Enabled Oracle-Based Transparent Insurance Model with Automated Payouts,\u201d <em>Proc. World Skills Conf. on Universal Data Analytics and Sciences<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[26]<\/strong> R. Veeramani et al., \u201cAn Interpretable Stacking Ensemble Model AB-CBLC for High-Accuracy Lung Cancer Detection Using Clinical and Behavioral Data,\u201d <em>Proc. 8th Int. Conf. on Computing Methodologies<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[25]<\/strong> R. Dhumpati et al., \u201cSecure Routing and Attack Detection in MANETs Using Depthwise Separable Convolutional Neural Networks,\u201d <em>Proc. 6th Int. Conf. on Data Intelligence and Cognitive Systems<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[24]<\/strong> R. Dhumpati et al., \u201cEnhancing Sarcasm Detection in Sentiment Analysis for Cyberspace Safety Using Advanced Deep Learning Techniques,\u201d <em>Scientific Reports<\/em>, vol. 15, no. 1, p. 22681, 2025.<\/p>\n\n\n\n<p><strong>[23]<\/strong> A. C. Nawalagatti et al., \u201cLow-Latency Communication Protocol for 6G Systems Using Intelligent Edge-Enabled Routing and Traffic Forecasting,\u201d <em>Proc. 3rd Int. Conf. on Data Science and Information Systems<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[22]<\/strong> R. Dhumpati et al., \u201cEnhanced GAN-Assisted Intrusion Detection Model for Addressing Data Imbalance Issues,\u201d <em>Proc. 4th Int. Conf. on Distributed Computing and Electrical Systems<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[21]<\/strong> V. U. Krishnan et al., \u201cEmploying Generative Adversarial Networks for Secure and Reliable Synthetic Data Generation in Cyber Security Applications,\u201d <em>Proc. 4th Int. Conf. on Distributed Computing and Electrical Systems<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[20]<\/strong> N. Gurrapu et al., \u201cEffective Summarization Techniques for Legal Document Analysis,\u201d <em>Proc. 4th Int. Conf. on Sentiment Analysis and Deep Learning (ICSADL)<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[19]<\/strong> B. Kiranmayee et al., \u201cDeveloping a Robust Intrusion Detection System Using SMOTE and Hybrid SVNN Model,\u201d <em>Proc. 4th Int. Conf. on Sentiment Analysis and Deep Learning (ICSADL)<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[18]<\/strong> M. Bhonsle et al., \u201cEnhancing Security in Wireless Mesh Networks: A Deep Learning Approach to Black Hole Attack Detection,\u201d <em>Advance Sustainable Science Engineering and Technology<\/em>, vol. 7, no. 1, 2025.<\/p>\n\n\n\n<p><strong>[17]<\/strong> R. Dhumpati et al., \u201cEnhancing Edge Computing with Machine Learning for Low-Latency Applications,\u201d <em>Proc. IEEE Int. Conf. on Advances in Computing Research<\/em>, 2025.<\/p>\n\n\n\n<p><strong>[16]<\/strong> P. V. A. Raghu Dhumpati et al., \u201cAnalyzing the Vulnerability of Consumer IoT Devices to Sophisticated Phishing Attacks and Ransomware Threats in Home Automation Systems,\u201d <em>Journal of Intelligent Systems and Internet of Things<\/em>, vol. 15, no. 1, pp. 53\u201363, 2025.<\/p>\n\n\n\n<p><strong>[15]<\/strong> F. Mohamad et al., \u201cAttention-Guided CNN with LSTM for Temporal Gastrointestinal Disease Progression Prediction in Endoscopic Video Sequences,\u201d <em>Proc. 4th Int. Conf. on Mobile Networks and Wireless<\/em>, 2024.<\/p>\n\n\n\n<p><strong>[14]<\/strong> R. Dhumpati et al., \u201cBowNetCrypt: Sleek Vaulted Messenger Secured by Bowerbird-Driven Finite Neural Messaging with Dual Elliptic Protection,\u201d <em>Proc. 5th Int. Conf. on Data Intelligence and Cognitive Computing<\/em>, 2024.<\/p>\n\n\n\n<p><strong>[13]<\/strong> V. S. Raja et al., \u201cAutomated Heart Disease Diagnosis and Monitoring System Using Similarity-Navigated Graph Neural Networks with Leopard Seal Optimization in IoT Healthcare Applications,\u201d <em>Proc. 4th Int. Conf. on Sustainable Expert Systems (ICSES)<\/em>, 2024.<\/p>\n\n\n\n<p><strong>[12]<\/strong> R. Dhumpati et al., \u201cEfficient Detection of Multiple Lung Diseases from Chest CT Scans and Cough Sound Using a Simplicial Attention-Based Sparse Graph Convolutional Network,\u201d <em>Proc. 8th Int. Conf. on I-SMAC<\/em>, 2024.<\/p>\n\nPublications:\n\n<p><strong>[11]<\/strong> R. Dhumpati et al., \u201cA Fuzzy Logic Approach for Efficient Control of BLDC Motors for Low-Cost Electric Two-Wheelers,\u201d <em>Nanotechnology Perceptions<\/em>, vol. 20, no. 5, pp. 191\u2013202, 2024.<\/p>\n\n\n\n<p><strong>[10]<\/strong> D. Raghu, H. K. Tripathy, and R. Borreo, \u201cA Novel Graph Convolutional Neural Networks (GCNNs)-Based Framework to Enhance the Detection of COVID-19 from X-Ray and CT Scan Images,\u201d <em>International Journal of Advanced Computer Science &amp; Applications<\/em>, vol. 15, no. 4, 2024.<\/p>\n\n\n\n<p><strong>[9]<\/strong> K. K. M. Bhonsle et al., \u201cMED-LeafNet: Medicinal Leaf Classification and Identification Using CNN-LSTM Hybrid Approach,\u201d <em>African Journal of Biological Sciences<\/em>, vol. 6, no. 5, pp. 9712\u20139732, 2024.<\/p>\n\n\n\n<p><strong>[8]<\/strong> R. D. H. K. Tripathy, \u201cCNN-GRU-Based Hybrid Approach for COVID-19 Detection Through Chest X-Ray Images,\u201d <em>Journal of Theoretical and Applied Information Technology<\/em>, vol. 100, no. 14, pp. 5281\u20135291, 2022.<\/p>\n\n\n\n<p><strong>[7]<\/strong> D. Raghu and H. K. Tripathy, \u201cMedical Image Analysis Using Deep Learning Algorithm Convolutional Neural Networks,\u201d in <em>Computer Networks, Big Data and IoT<\/em>, LNDECT, vol. 117, Springer, 2022.<\/p>\n\n\n\n<p><strong>[6]<\/strong> G. A. D. D. Raghu, \u201cChain Algorithm to Protect Datasets from Hackers,\u201d <em>International Journal of Computer Theory and Applications<\/em>, vol. 10, no. 9, pp. 437\u2013449, 2017.<\/p>\n\n\n\n<p><strong>[5]<\/strong> R. D. and N. Prameela, \u201cRDCT Software Experts for Healthy Software Products,\u201d <em>International Journal of Recent Advances in Engineering &amp; Technology<\/em>, vol. 3, no. 1, 2015.<\/p>\n\n\n\n<p><strong>[4]<\/strong> G. P. S. V. Dumpati Raghu and P. Ratna Kumar, \u201c3-Phase Parallel Model With Testing for MIS,\u201d <em>International Journal of Computer Science and Technology<\/em>, vol. 4, no. 4, pp. 66\u201369, 2013.<\/p>\n\n\n\n<p><strong>[3]<\/strong> G. P. S. V. Ch. Suresh Kumar, D. Raghu, and P. Ratna Kumar, \u201cAddiction of Computer is Sabotage to Human Life,\u201d <em>International Journal on Advanced Computer Theory and Engineering<\/em>, vol. 1, no. 1, pp. 121\u2013128, 2012.<\/p>\n\n\n\n<p><strong>[2]<\/strong> R. A. D. Raghu et al., \u201cDynamic Search Algorithm in Unstructured Peer-to-Peer Networks,\u201d <em>International Journal of Computer Science &amp; Technology<\/em>, vol. 2, no. 1, p. 38, 2011.<\/p>\n\n\n\n<p><strong>[1]<\/strong> A. M. P. Ratna Kumar, R. D., and U. D., \u201cChronological Test Generation for Software Project SLoC,\u201d <em>International Journal of Computer Science &amp; Technology<\/em>, vol. 2, no. SP 1, pp. 117\u2013121, 2011.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Patents:<\/h2>\n\n\n\n<p>Total No. of Patents : 05<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Sl.No.<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Title<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Application No.<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Publication No.<\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Country<\/strong><\/td><\/tr><tr><td>5<\/td><td class=\"has-text-align-center\" data-align=\"center\">AI-Powered Multi-Layer Cybersecurity Monitoring Console<\/td><td class=\"has-text-align-center\" data-align=\"center\">6420420<\/td><td class=\"has-text-align-center\" data-align=\"center\">28\/2025<\/td><td class=\"has-text-align-center\" data-align=\"center\">UK<\/td><\/tr><tr><td>4<\/td><td class=\"has-text-align-center\" data-align=\"center\">Android-Based Design and Implementation of Voice-Controlled Autonomous Robotic Vehicle<\/td><td class=\"has-text-align-center\" data-align=\"center\">202441058249<\/td><td class=\"has-text-align-center\" data-align=\"center\">08\/2024<\/td><td class=\"has-text-align-center\" data-align=\"center\">India<\/td><\/tr><tr><td>3<\/td><td class=\"has-text-align-center\" data-align=\"center\">AI based cyber security detecting device<\/td><td class=\"has-text-align-center\" data-align=\"center\">420377-001&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/td><td class=\"has-text-align-center\" data-align=\"center\">08\/2024<\/td><td class=\"has-text-align-center\" data-align=\"center\">India<\/td><\/tr><tr><td>2<\/td><td class=\"has-text-align-center\" data-align=\"center\">Neural Network-Driven Real-Time Emotion Recognition and Response System for Virtual Assistants<\/td><td class=\"has-text-align-center\" data-align=\"center\">202441078191<\/td><td class=\"has-text-align-center\" data-align=\"center\">10\/2024<\/td><td class=\"has-text-align-center\" data-align=\"center\">India<\/td><\/tr><tr><td>1<\/td><td class=\"has-text-align-center\" data-align=\"center\">IoT and Artificial Intelligence based perdition of food contamination using data mining techniques<\/td><td class=\"has-text-align-center\" data-align=\"center\">202241015283<\/td><td class=\"has-text-align-center\" data-align=\"center\">12\/2022<\/td><td class=\"has-text-align-center\" data-align=\"center\">India<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Books:<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><\/summary>\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Book Title<\/td><td>ISBN<\/td><td>Link for Purchase<\/td><\/tr><tr><td>Fundamentals of Medical Image Processing<\/td><td>978-93-5762-368-1<\/td><td><a href=\"https:\/\/www.amazon.in\/FUNDAMENTALS-MEDICAL-IMAGE-PROCESSING-DHUMPATI\/dp\/B0FJ8BTTST\">Amazon link<\/a><\/td><\/tr><tr><td>The Complete Ethical Hacking<\/td><td>978-93-6674-256-4<\/td><td><a href=\"https:\/\/www.amazon.in\/dp\/B0DNN29S83\/ref=sr_1_4?crid=PZTOCG7P5CL0&amp;dib=eyJ2IjoiMSJ9.ymYLJvqJahzntiYtQSelUjk3G8GtLVv95Ak_EPwhsMEy3x-PrsWGUmJ3VHXCVMwDknkDoH7cTI77cgvTUk7q9TFZ-UGHsBm-sSW65dDKHq7Oimdziwycir4oauHwaNsSUSdiX9J0_237nzJEaBJLROCIQrTNzEBRcEkT3Dxgrg2wQ7VRgYPpgb0r5C6J-XZc6l8YEAh79kwv-07EAF1RXpUOqd55JV-nvzE6P7b9aPk.A5ufz3JDPSc4PaW_5_4Xi5MZDugacsIgHy_0pEfWq7Q&amp;dib_tag=se&amp;keywords=The+Complete+Ethical+Hacking&amp;qid=1732531680&amp;s=books&amp;sprefix=the+complete+ethical+hacking%2Cstripbooks%2C1010&amp;sr=1-4\" data-type=\"link\" data-id=\"https:\/\/www.amazon.in\/dp\/B0DNN29S83\/ref=sr_1_4?crid=PZTOCG7P5CL0&amp;dib=eyJ2IjoiMSJ9.ymYLJvqJahzntiYtQSelUjk3G8GtLVv95Ak_EPwhsMEy3x-PrsWGUmJ3VHXCVMwDknkDoH7cTI77cgvTUk7q9TFZ-UGHsBm-sSW65dDKHq7Oimdziwycir4oauHwaNsSUSdiX9J0_237nzJEaBJLROCIQrTNzEBRcEkT3Dxgrg2wQ7VRgYPpgb0r5C6J-XZc6l8YEAh79kwv-07EAF1RXpUOqd55JV-nvzE6P7b9aPk.A5ufz3JDPSc4PaW_5_4Xi5MZDugacsIgHy_0pEfWq7Q&amp;dib_tag=se&amp;keywords=The+Complete+Ethical+Hacking&amp;qid=1732531680&amp;s=books&amp;sprefix=the+complete+ethical+hacking%2Cstripbooks%2C1010&amp;sr=1-4\">Amazon link<\/a><\/td><\/tr><tr><td>Cyber Security for beginners <\/td><td>978-93-6132-931-9<\/td><td><a href=\"https:\/\/amzn.in\/d\/bjkK911\" data-type=\"link\" data-id=\"https:\/\/amzn.in\/d\/bjkK911\">Amazon link<\/a><\/td><\/tr><tr><td>Generative AI: ChatGPT tool<\/td><td>978-93-6132-593-9<\/td><td><a href=\"https:\/\/amzn.in\/d\/12lv4VB\" data-type=\"link\" data-id=\"https:\/\/amzn.in\/d\/12lv4VB\">Amazon link<\/a> <\/td><\/tr><\/tbody><\/table><\/figure>\n<\/details>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>Research Profile My research focuses on the development of intelligent systems at the intersection of artificial intelligence and cybersecurity. I work on machine learning approaches for threat detection, intrusion detection systems, predictive analytics, and biometric recognition technologies. I have published 28 papers in refereed conferences and journals, and hold 5 patents in AI-based security systems<\/p>\n<div class=\"more-link\">\n\t\t\t\t <a href=\"https:\/\/drraghudhumpati.com\/index.php\/research\/\" class=\"link-btn theme-btn\"><span>Read More <\/span> <i class=\"fa fa-caret-right\"><\/i><\/a>\n\t\t\t<\/div>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-24","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/drraghudhumpati.com\/index.php\/wp-json\/wp\/v2\/pages\/24","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drraghudhumpati.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/drraghudhumpati.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/drraghudhumpati.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/drraghudhumpati.com\/index.php\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":194,"href":"https:\/\/drraghudhumpati.com\/index.php\/wp-json\/wp\/v2\/pages\/24\/revisions"}],"predecessor-version":[{"id":333,"href":"https:\/\/drraghudhumpati.com\/index.php\/wp-json\/wp\/v2\/pages\/24\/revisions\/333"}],"wp:attachment":[{"href":"https:\/\/drraghudhumpati.com\/index.php\/wp-json\/wp\/v2\/media?parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}