Anusha Papasani

@vitap.ac.in

Ph.D Research scholor
VIT-AP University



              

https://researchid.co/anushapapasani
9

Scopus Publications

129

Scholar Citations

8

Scholar h-index

6

Scholar i10-index

Scopus Publications

  • A Novel Feature Selection Algorithm Using Multi-Objective Improved Honey Badger Algorithm and Strength Pareto Evolutionary Algorithm-II
    Anusha Papasani, , Nagaraju Devarakonda, and

    Elsevier BV
    An important task for classification is feature selection that removes the redundant or irrelevant features from the dataset. Multi-objective feature selection approach is mainly proposed by many researchers. However, these approaches failed to maintain the higher classification accuracy while removing redundancy in the features. In this work, a wrapper based feature selection technique is proposed with a hybrid of Multi Objective Honey Badger Algorithm (MO-HBA) and Strength Pareto Evolutionary Algorithm-II to maintain the balance between classification accuracy and removal of redundancy. Classification accuracy improvement and removal of redundant features are considered as the multi-objective optimization functions of the proposed multi-objective feature selection technique. The Levy flight algorithm is utilized to initialize the population to enhance the ability of the exploration and exploitation of MO-HBA. The regularized Extreme Learning Machine is used to classify the selected features. To evaluate the performance of the proposed feature selection technique, eighteen benchmark datasets are utilized and results are compared with the four well known multi-objective feature selection techniques in terms of accuracy, hamming loss, ranking loss, mean value, standard deviation, length of features, and training time. The proposed approach achieved maximum accuracy of 100% with the maximum value of selected features as 80. The minimum value of hamming loss, ranking loss, mean value and standard deviation value achieved by the proposed approach are 0.0092, 0.0003, 0.018 and 0.001 respectively. The experimental results show that the proposed approach can give improved classification accuracy while the removal of redundancy in large scale datasets.


  • Identifying Rotten Region on the Plant Leaf in Advance to Increase the Crop Yield using Multinominal Probit Regression
    Anveshini Dumala, Anusha Papasani, Rajeswari Bommala, and Vikkurty Sireesha

    IEEE
    Detection of plant disease at an early stage increases the crop yield otherwise these diseases may negatively impact the agro market economy. The conventional methods were time consuming and practically infeasible to cover thousands acres of farming areas to detect leaf diseases. A methodology is proposed in this paper, to spot and to analyze the plant leaf diseases using digital image processing techniques through a supervised machine learning technique called multi-support vector machine (m-SVM) algorithm. SVM handles both semi structured and unstructured data. The proposed model recognizes and classifies the images of the leaves that were captured by digital camera or a mobile phone or drones or web camera. A novel way of training and methodology was used to accelerate the speedy, easy and simple implementation of the system in real-time. The experimental outcomes make evident that the proposed system detects and classifies the major 6 plant leaves diseases successfully: Cercospora leaf spot, Alternaria Alternata, Rust, Anthracnose, Powdery Mildew and Bacterial Blight. Also some of the unanswered challenges are discussed that require to be answered by developing a sensible automatic plant disease recognition system to apply in field conditions.

  • Parkinson's Neurodegenerative Disease Prediction with Robust Methods of Machine Learning
    Anusha Papasani, Nagaraju Devarakonda, and Zdzislaw Polkowski

    IEEE

  • COVID-19 Face Mask Live Detection Using OpenCV
    Anveshini Dumala, Anusha Papasani, and Sireesha Vikkurty

    Springer Singapore
    Severe acute respiratory syndrome coronavirus (SARS-CoV) is recognized, and very first person infected is from the Guangdong province of southern China in 2002 while the virus that causes COVID-19 (Corona VIrus Disease-2019) is known as SARS-CoV-2. World Health Organization (WHO) named it as “COVID-19” on February 11, 2020. Currently, the COVID-19 has frightened the whole world of human beings and pushed into the pandemic. This coronavirus affects the respiratory system by entering into the human body through the droplets of saliva and mucus. It takes 14 days to observe the symptoms of the virus attack. In the meantime, the virus affected person may spread the virus to the coexisting people in the abode unknowingly. Also, it takes 48 h to confirm if a person is virus attacked after the test sample is collected. So, there is a serious need to wear a face mask that covers the nose and mouth besides maintaining the social distance to break the chain of massive increase. This paper attempts to detect if an individual wears a mask, using OpenCV. The accurate identification of landmarks of face in the image is an imperative challenge. Being instinctive it is simple for a human to detect the object, but it took years of research to raise the accessibility of quality datasets and a remarkable progress. The purpose of the paper is identifying the count of faces with the mask in the image and count of faces without a mask on live webcam. © 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

  • Enhanced morphological operations for improving the pixel intensity level


  • Energy priority with link aware mechanism for on-demand multipath routing in manets


  • Use of block chain technology in providing security during data sharing
    B. Mounika, P. Anusha, V. Narayana and G. V. Lakshmi

    SynthesisHub Advance Scientific Research
    This article overviews a chain based methodologies for a few security administrations. The Existing framework is contrasted and the proposed framework and it was discovered that the proposed framework has preferred execution over the existing one. Square chain offers a creative way to deal with putting away data, executing exchanges, performing capacities, and building up trust in an open situation. Many consider the square chain as an innovative leap forward for cryptography and digital security. Square chain administrations incorporate verification, secrecy, security and access control list (ACL), information and asset provenance, and uprightness affirmation. Every one of these administrations is basic for the current appropriated applications, particularly because of the huge measure of information being handled over the systems and the utilization of distributed computing. Square chain method is furnished with validation, inspecting, and responsibility, and consequently, it can fill in as a promising instrument for giving secure information correspondence on the system. Validation guarantees that the client is who he/she professes to be. Privacy ensures that information can't be perused by unapproved clients. Protection gives the clients the capacity to control who can get to their information. Provenance permits an effective following of the information and assets alongside their proprietorship and usage over the system. Trustworthiness helps in checking that the information has not been changed or adjusted. These administrations are right now overseen by concentrated controllers, for instance, a declaration authority. Along these lines, the administrations are inclined to assaults on the incorporated controller. Then again, the square chain is made sure about and disseminated records that can help settle a large number of the issues with centralization. From a security viewpoint, the square chain is made and kept up utilizing a distributed overlay arrangement and made sure about through shrewd and decentralized use of cryptography with swarm processing. Block chain offers an imaginative way to deal with putting away data, executing exchanges, performing capacities, and setting up a trust in an open environment. Many consider the square chain as an innovative leap forward for cryptography and digital security, with use cases running from internationally conveyed digital money frameworks. A decentralized distributed storage arranges has been presented with numerous favorable circumstances over the server farm based capacity. Comparable to conventional arrangement, decentralized distributed storage organize use customer side encryption to keep up information security.

  • Fuzzy base artificial neural network model for text extraction from images
    V. Narayana, B. Sudheer, Venkata Rao Maddumala and P. Anusha

    SynthesisHub Advance Scientific Research
    Content Extraction assumes a significant job in discovering essential and important data. Content extraction includes discovery, restriction, following, binarization, extraction, improvement and acknowledgment of the content from the given picture. This paper proposes a bi-leveled picture characterization framework to group printed and transcribed reports into totally unrelated predefined classes. In the present article, we propose a Fuzzy guideline guided novel strategy that is utilitarian without any outer intercession during execution. The Fuzzy validation processor utilizes subtleties of divider speed and force, just as change, to decide if the deliberate reverberation signal part to be separated genuinely speaks to the divider speed as it were. Test results propose that this methodology is a proficient one in contrast with various different strategies widely tended to in writing. At long last, the exhibition of the proposed framework is contrasted and the current frameworks and it is seen that proposed framework performs superior to numerous different frameworks.

RECENT SCHOLAR PUBLICATIONS

  • A novel feature selection algorithm using multi-objective improved honey badger algorithm (mo-hba) and spea-ii
    A Papasani, N Devarakonda
    Journal of Engineering Research 11 (2B) 2023

  • A Quick Dynamic Attribute Subset Method for High Dimensional Data Using Correlation-Guided Cluster Analysis and Genetic Algorithm
    N Bhagya Lakshmi, N Devarakonda, Z Polkowski, A Papasani
    Innovations in Computational Intelligence and Computer Vision: Proceedings 2022

  • Identifying Rotten Region on the Plant Leaf in Advance to Increase the Crop Yield using Multinominal Probit Regression
    A Dumala, A Papasani, R Bommala, V Sireesha
    2022 International Conference on Applied Artificial Intelligence and 2022

  • Feature Selection Using PSO Optimized-Framework with Machine Learning Classification System via Breast Cancer Survival Data
    A Papasani, N Devarakonda, Z Polkowski, M Thotakura, ...
    Computational Vision and Bio-Inspired Computing: Proceedings of ICCVBIC 2021 2022

  • A novel feature selection algorithm using multi-objective improved honey badger algorithm and strength pareto evolutionary algorithm-II
    A Papasani, N Devarakonda
    J Eng Res 2022

  • A Novel Feature Selection Algorithm Using Decomposition Based Multi-Objective Guided Honey Badger Algorithm (MO-GHBA) And NSGA-III
    A Papasani, N Devarakonda
    Kuwait Journal of Science 2022

  • Parkinson’s Neurodegenerative Disease Prediction with Robust Methods Of Machine Learning
    A Papasani, N Devarakonda, Z Polkowski
    2021 Fourth International Conference on Electrical, Computer and 2021

  • COVID-19 face mask live detection using OpenCV
    A Dumala, A Papasani, S Vikkurty
    Smart Computing Techniques and Applications: Proceedings of the Fourth 2021

  • Time Series Analysis on COVID-19
    AP Anveshini Dumala
    Journal of Xi'an University of Architecture & Technology 12 (06), 567-574 2020

  • Back Off Algorithm for Reducing the Connection Loss In AD-HOC Network
    PR P.Anusha1, P.Satya Gopi2, K.Santhi Sri3
    Test engineering & Management 83, 11046 - 11057 2020

  • Energy Priority With Link Aware Mechanism For On-Demand Multipath Routing In Manets
    PAARVLNVR Maddumala4
    International Journal of Advanced Science and Technology 29 (03), 8979 - 8991 2020

  • Classification of Cancer Cells Detection Using Machine Learning Concepts
    VRMSGGPAPS Krishna4
    International Journal of Advanced Science and Technology 29 (03), 9177 - 9190 2020

  • USE OF BLOCK CHAIN TECHNOLOGY IN PROVIDING SECURITY DURING DATA SHARING
    GVL Banavathu Mounika, P. Anusha, V. Lakshman Narayana
    Journal of Critical Reviews 7 (06), 338-343 2020

  • SUPERVISED AND UNSUPERVISED ASPECT BASED CATEGORY DETECTION USING SENTIMENT ANALYSIS WITH RANDOM FOREST ALGORITHM
    AP Ch. Puspa Satvika1, P.Tejaswini2, M.Jyothsna3 , T.Mahitha4
    Journal of Enginnering sciences 11 (04), 0377-9254 2020

  • Use of Blockchain in Malicious Activity Detection for Improving Security
    BTRVLNVPP Anusha4
    International Journal of Advanced Science and Technology 29 (03), 9135 - 9146 2020

  • SOCIAL NETWORK MENTAL DISORDER DETECTION VIA ONLINE SOCIAL MEDIA MINING USING MACHINE LEARNING FRAMEWORK
    P Farjana, GN Nikhila, KK Nandini, M Afrin, A Papasani
    2020

  • FUZZY BASE ARTIFICIAL NEURAL NETWORK MODEL FOR TEXT EXTRACTION FROM IMAGES
    VL Narayana, BN Sudheer, VR Maddumala, P Anusha
    Journal of Critical Reviews 7 (6), 2020 2020

  • Improving Relevant Text Extraction Accuracy using Clustering Methods
    PA K. Sarada1, V. Lakshman Narayana2, A. Peda Gopi3
    Test engineering & Management 83, 15212 - 15219 2020

  • Enhanced Morphological Operations for Improving the Pixel Intensity Level
    VRMKMLPAVL Narayana4
    International Journal of Advanced Science and Technology 29 (03), 9191 - 9201 2020

  • Improvement of AOMDV routing protocol in MANET and performance analysis of security attacks
    A Papasani, N Devarakonda
    International Journal Of Research in Computer Science & Engineering 6 (5 2016

MOST CITED SCHOLAR PUBLICATIONS

  • Improvement of AOMDV routing protocol in MANET and performance analysis of security attacks
    A Papasani, N Devarakonda
    International Journal Of Research in Computer Science & Engineering 6 (5 2016
    Citations: 25

  • USE OF BLOCK CHAIN TECHNOLOGY IN PROVIDING SECURITY DURING DATA SHARING
    GVL Banavathu Mounika, P. Anusha, V. Lakshman Narayana
    Journal of Critical Reviews 7 (06), 338-343 2020
    Citations: 16

  • Use of Blockchain in Malicious Activity Detection for Improving Security
    BTRVLNVPP Anusha4
    International Journal of Advanced Science and Technology 29 (03), 9135 - 9146 2020
    Citations: 16

  • FUZZY BASE ARTIFICIAL NEURAL NETWORK MODEL FOR TEXT EXTRACTION FROM IMAGES
    VL Narayana, BN Sudheer, VR Maddumala, P Anusha
    Journal of Critical Reviews 7 (6), 2020 2020
    Citations: 16

  • Enhanced Morphological Operations for Improving the Pixel Intensity Level
    VRMKMLPAVL Narayana4
    International Journal of Advanced Science and Technology 29 (03), 9191 - 9201 2020
    Citations: 16

  • COVID-19 face mask live detection using OpenCV
    A Dumala, A Papasani, S Vikkurty
    Smart Computing Techniques and Applications: Proceedings of the Fourth 2021
    Citations: 11

  • Energy Priority With Link Aware Mechanism For On-Demand Multipath Routing In Manets
    PAARVLNVR Maddumala4
    International Journal of Advanced Science and Technology 29 (03), 8979 - 8991 2020
    Citations: 9

  • Improving Relevant Text Extraction Accuracy using Clustering Methods
    PA K. Sarada1, V. Lakshman Narayana2, A. Peda Gopi3
    Test engineering & Management 83, 15212 - 15219 2020
    Citations: 9

  • A novel feature selection algorithm using multi-objective improved honey badger algorithm (mo-hba) and spea-ii
    A Papasani, N Devarakonda
    Journal of Engineering Research 11 (2B) 2023
    Citations: 3

  • Feature Selection Using PSO Optimized-Framework with Machine Learning Classification System via Breast Cancer Survival Data
    A Papasani, N Devarakonda, Z Polkowski, M Thotakura, ...
    Computational Vision and Bio-Inspired Computing: Proceedings of ICCVBIC 2021 2022
    Citations: 3

  • Identifying Rotten Region on the Plant Leaf in Advance to Increase the Crop Yield using Multinominal Probit Regression
    A Dumala, A Papasani, R Bommala, V Sireesha
    2022 International Conference on Applied Artificial Intelligence and 2022
    Citations: 2

  • A novel feature selection algorithm using multi-objective improved honey badger algorithm and strength pareto evolutionary algorithm-II
    A Papasani, N Devarakonda
    J Eng Res 2022
    Citations: 2

  • Parkinson’s Neurodegenerative Disease Prediction with Robust Methods Of Machine Learning
    A Papasani, N Devarakonda, Z Polkowski
    2021 Fourth International Conference on Electrical, Computer and 2021
    Citations: 1