Volume no :
9 |Issue no :
1Article Type :
Scholarly ArticleAuthor :
Mrs. S. Tejaswi, N. Sanjay Bhargav, R. Manohar Reddy, V. Charitha ReddyPublished Date :
April, 2025Publisher :
Journal of Theoretical and Computational Advances in Scientific Research (JTCASR)
Page No: 1 - 12
Abstract : Agriculture is a critical sector facing numerous challenges such as climate change, resource limitations, and the need to increase productivity to feed a growing global population. “Crop Connect” presents a comprehensive technological approach to modernizing agriculture by integrating advanced digital tools and smart systems to optimize crop management and enhance farm productivity. This system leverages Internet of Things (IoT) devices, data analytics, and wireless communication to provide real-time monitoring of soil health, weather conditions, crop growth, and pest detection. By enabling precise and timely interventions, Crop Connect helps farmers make informed decisions, reduce resource wastage, and improve yield quality and quantity. The platform incorporates sensor networks to collect vital agricultural data, which is then processed using machine learning algorithms to generate actionable insights and predictive analytics. These insights assist in efficient irrigation scheduling, fertilizer application, and early pest detection, minimizing environmental impact while maximizing crop output. Additionally, Crop Connect facilitates connectivity between farmers, agronomists, and agricultural markets, enabling knowledge sharing and access to better market opportunities.
The proposed technological framework addresses key issues in traditional farming methods, including inefficient resource use and delayed responses to crop stress. By empowering farmers with data-driven tools, Crop Connect aims to enhance sustainability, profitability, and resilience in agriculture. This modernization approach contributes to food security and supports the global shift toward smart farming practices.
Keyword Modern Agriculture, Internet of Things (IoT), Precision Farming, Smart Agriculture, Crop Monitoring, Data Analytics, Sustainable Farming, Agricultural Technology, Machine Learning, Resource Optimization.
Reference:
- Reddy, C. N. K., & Murthy, G. V. (2012). Evaluation of Behavioral Security in Cloud Computing. International Journal of Computer Science and Information Technologies, 3(2), 3328-3333.
- Murthy, G. V., Kumar, C. P., & Kumar, V. V. (2017, December). Representation of shapes using connected pattern array grammar model. In 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)(pp. 819-822). IEEE.
- Krishna, K. V., Rao, M. V., & Murthy, G. V. (2017). Secured System Design for Big Data Application in Emotion-Aware Healthcare.
- Rani, G. A., Krishna, V. R., & Murthy, G. V. (2017). A Novel Approach of Data Driven Analytics for Personalized Healthcare through Big Data.
- Rao, M. V., Raju, K. S., Murthy, G. V., & Rani, B. K. (2020). Configure and Management of Internet of Things. Data Engineering and Communication Technology, 163.
- Ramakrishna, C., Kumar, G. K., Reddy, A. M., & Ravi, P. (2018). A Survey on various IoT Attacks and its Countermeasures. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), 5(4), 143-150.
- Madar, B., Kumar, G. K., & Ramakrishna, C. (2017). Captcha breaking using segmentation and morphological operations. International Journal of Computer Applications, 166(4), 34-38.
- Ramakrishna, C., Kumar, G. S., & Reddy, P. C. S. (2021). Quadruple band-notched compact monopole UWB antenna for wireless applications. Journal of Electromagnetic Engineering and Science, 21(5), 406-416.
- Manivasagan, S., Kumar, G. S. R. S., & Joon, M. S. (2006). Qualitative changes in karonda (Carissa carandas Linn.) candy during storage at room temperature. Haryana Journal of Horticultural Sciences, 35(1/2), 19.
- Kumar, G. K., Kumar, B. K., Boobalan, G., Kumar, C. S., & Reddy, A. G. (2015). Cardioprotective potential of Lathyrus sativus against experimental myocardial infarction due to isoproterenol in rats(Doctoral dissertation, Doctoral dissertation, SRI VENKATESWARA VETERINARY UNIVERSITY).
- Chithanuru, V., & Ramaiah, M. (2023). An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions–A review. Concurrency and Computation: Practice and Experience, 35(22), e7724.
- Ramaiah, M., Chithanuru, V., Padma, A., & Ravi, V. (2022). A review of security vulnerabilities in industry 4.0 application and the possible solutions using blockchain. Cyber Security Applications for Industry 4.0, 63-95.
- Padma, A., Chithanuru, V., Uppamma, P., & VishnuKumar, R. (2024). Exploring Explainable AI in Healthcare: Challenges and Future Directions. In Analyzing Explainable AI in Healthcare and the Pharmaceutical Industry(pp. 199-233). IGI Global.
- Ramaiah, M., Padma, A., Vishnukumar, R., Rahamathulla, M. Y., & Chithanuru, V. (2024, May). A hybrid wrapper technique enabled Network Intrusion Detection System for Software defined networking based IoT networks. In 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)(pp. 1-6). IEEE.
- Chithanuru, V., & Ramaiah, M. (2025). Proactive detection of anomalous behavior in Ethereum accounts using XAI-enabled ensemble stacking with Bayesian optimization. PeerJ Computer Science, 11, e2630.
- Prashanth, J. S., & Nandury, S. V. (2015, June). Cluster-based rendezvous points selection for reducing tour length of mobile element in WSN. In 2015 IEEE International Advance Computing Conference (IACC)(pp. 1230-1235). IEEE.
- Prashanth, J. S., & Nandury, S. V. (2019). A Cluster—based Approach for Minimizing Energy Consumption by Reducing Travel Time of Mobile Element in WSN. International Journal of Computers Communications & Control, 14(6), 691-709.
- Kumar, K. A., Pabboju, S., & Desai, N. M. S. (2014). Advance text steganography algorithms: an overview. International Journal of Research and Applications, 1(1), 31-35.
- Shyam, D. N. M., & Hussain, M. A. (2023). Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property. Fusion: Practice & Applications, 13(2).
- Shyam, D. N. M., & Hussain, M. A. (2023). A Naive Bayes-Driven Mechanism for Mitigating Packet-Dropping Attacks in Autonomous Wireless Networks. Ingenierie des Systemes d’Information, 28(4), 1019.
- Hnamte, V., & Balram, G. (2022). Implementation of Naive Bayes Classifier for Reducing DDoS Attacks in IoT Networks. Journal of Algebraic Statistics, 13(2), 2749-2757.
- Balram, G., Anitha, S., & Deshmukh, A. (2020, December). Utilization of renewable energy sources in generation and distribution optimization. In IOP Conference Series: Materials Science and Engineering(Vol. 981, No. 4, p. 042054). IOP Publishing.
- Subrahmanyam, V., Sagar, M., Balram, G., Ramana, J. V., Tejaswi, S., & Mohammad, H. P. (2024, May). An Efficient Reliable Data Communication For Unmanned Air Vehicles (UAV) Enabled Industry Internet of Things (IIoT). In 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)(pp. 1-4). IEEE.
- Mahammad, F. S., Viswanatham, V. M., Tahseen, A., Devi, M. S., & Kumar, M. A. (2024, July). Key distribution scheme for preventing key reinstallation attack in wireless networks. In AIP Conference Proceedings(Vol. 3028, No. 1). AIP Publishing.
- Tahseen, A., Shailaja, S. R., & Ashwini, Y. (2024). Extraction for Big Data Cyber Security Analytics. Advances in Computational Intelligence and Informatics: Proceedings of ICACII 2023, 993, 365.
- Tahseen, A., Shailaja, S. R., & Ashwini, Y. (2023, December). Security-Aware Information Classification Using Attributes Extraction for Big Data Cyber Security Analytics. In International Conference on Advances in Computational Intelligence and Informatics(pp. 365-373). Singapore: Springer Nature Singapore.
- Lavanya, P. (2024). Personalized Medicine Recommendation System Using Machine Learning.
- Lavanya, P. (2024). In-Cab Smart Guidance and support system for Dragline operator.
- Lavanya, P. (2024). Price Comparison of GeM Products with other eMarketplaces.
- Kovoor, M., Durairaj, M., Karyakarte, M. S., Hussain, M. Z., Ashraf, M., & Maguluri, L. P. (2024). Sensor-enhanced wearables and automated analytics for injury prevention in sports. Measurement: Sensors, 32, 101054.
- Rao, N. R., Kovoor, M., Kishor Kumar, G. N., & Parameswari, D. V. L. (2023). Security and privacy in smart farming: challenges and opportunities. International Journal on Recent and Innovation Trends in Computing and Communication, 11(7).
- Madhuri, K. (2023). Security Threats and Detection Mechanisms in Machine Learning. Handbook of Artificial Intelligence, 255.
- Madhuri, K., Viswanath, N. K., & Gayatri, P. U. (2016, November). Performance evaluation of AODV under Black hole attack in MANET using NS2. In 2016 international conference on ICT in Business Industry & Government (ICTBIG)(pp. 1-3). IEEE.
- Reddy, P. R. S., Bhoga, U., Reddy, A. M., & Rao, P. R. (2017). OER: Open Educational Resources for Effective Content Management and Delivery. Journal of Engineering Education Transformations, 30(3), 322-326.
- Reddy, P. R. S., & Ravindranath, K. (2024). Enhancing Secure and Reliable Data Transfer through Robust Integrity. Journal of Electrical Systems, 20, 900-910.
- REDDY, P. R. S., & RAVINDRANATH, K. (2022). A HYBRID VERIFIED RE-ENCRYPTION INVOLVED PROXY SERVER TO ORGANIZE THE GROUP DYNAMICS: SHARING AND REVOCATION. Journal of Theoretical and Applied Information Technology, 100(13).
- Reddy, B. A., & Reddy, P. R. S. (2012). Effective data distribution techniques for multi-cloud storage in cloud computing. CSE, Anurag Group of Institutions, Hyderabad, AP, India.
- Raj, R. S., & Raju, G. P. (2014, December). An approach for optimization of resource management in Hadoop. In International Conference on Computing and Communication Technologies(pp. 1-5). IEEE.
- Reddy, P. R. S., Bhoga, U., Reddy, A. M., & Rao, P. R. (2017). OER: Open Educational Resources for Effective Content Management and Delivery. Journal of Engineering Education Transformations, 30(3), 322-326.
- Ramana, A. V., Bhoga, U., Dhulipalla, R. K., Kiran, A., Chary, B. D., & Reddy, P. C. S. (2023, June). Abnormal Behavior Prediction in Elderly Persons Using Deep Learning. In 2023 International Conference on Computer, Electronics & Electrical Engineering & their Applications (IC2E3)(pp. 1-5). IEEE.
- Ujwala, B., & Reddy, P. R. S. (2016). An effective mechanism for integrity of data sanitization process in the cloud. European Journal of Advances in Engineering and Technology, 3(8), 82-84.
- Rani, K. P., Reddy, Y. S., Sreedevi, P., Dastagiraiah, C., Shekar, K., & Rao, K. S. (2024, June). Tracking The Impact of PM Poshan on Child’s Nutritional Status. In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)(pp. 1-4). IEEE.
- Yakoob, S., Krishna Reddy, V., & Dastagiraiah, C. (2017). Multi User Authentication in Reliable Data Storage in Cloud. In Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016(pp. 531-539). Springer Singapore.
- Sukhavasi, V., Kulkarni, S., Raghavendran, V., Dastagiraiah, C., Apat, S. K., & Reddy, P. C. S. (2024). Malignancy Detection in Lung and Colon Histopathology Images by Transfer Learning with Class Selective Image Processing.
- Mahalakshmi, A., Goud, N. S., & Murthy, G. V. (2018). A survey on phishing and it’s detection techniques based on support vector method (Svm) and software defined networking (sdn). International Journal of Engineering and Advanced Technology, 8(2), 498-503.
- Swapna Goud, N., & Mathur, A. (2019). A certain investigations on web security threats and phishing website detection techniques. International Journal of Advanced Science and Technology, 28(16), 871-879.
- Swapna, N. (2017). „Analysis of Machine Learning Algorithms to Protect from Phishing in Web Data Mining‟. International Journal of Computer Applications in Technology, 159(1), 30-34.
- SAIPRASANNA, S., GOUD, N. S., & MURTHY, G. V. (2021). ENHANCED RECURRENT CONVOLUTIONAL NEURAL NETWORKS BASED EMAIL PHISHING DETECTION. Elementary Education Online, 20(5), 5970-5970.
- Balakrishna, G., Kumar, A., Younas, A., Kumar, N. M. G., & Rastogi, R. (2023, October). A novel ensembling of CNN-A-LSTM for IoT electric vehicle charging stations based on intrusion detection system. In 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS)(pp. 1312-1317). IEEE.
- Moparthi, N. R., Bhattacharyya, D., Balakrishna, G., & Prashanth, J. S. (2021). Paddy leaf disease detection using CNN.
- Balakrishna, G., & Babu, C. S. (2013). Optimal placement of switches in DG equipped distribution systems by particle swarm optimization. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2(12), 6234-6240.
- Moparthi, N. R., Sagar, P. V., & Balakrishna, G. (2020, July). Usage for inside design by AR and VR technology. In 2020 7th International Conference on Smart Structures and Systems (ICSSS)(pp. 1-4). IEEE.
- Amarnadh, V., & Moparthi, N. R. (2024). Prediction and assessment of credit risk using an adaptive Binarized spiking marine predators’ neural network in financial sector. Multimedia Tools and Applications, 83(16), 48761-48797.
- Amarnadh, V., & Moparthi, N. R. (2023). Comprehensive review of different artificial intelligence-based methods for credit risk assessment in data science. Intelligent Decision Technologies, 17(4), 1265-1282.
- Amarnadh, V., & Moparthi, N. (2023). Data Science in Banking Sector: Comprehensive Review of Advanced Learning Methods for Credit Risk Assessment. International Journal of Computing and Digital Systems, 14(1), 1-xx.
- Amarnadh, V., & Rao, M. N. (2025). A Consensus Blockchain-Based Credit Risk Evaluation and Credit Data Storage Using Novel Deep Learning Approach. Computational Economics, 1-34.
- Swetha, A., & Shailaja, K. (2019, December). An effective approach for security attacks based on machine learning algorithms. In International Conference on Advances in Computational Intelligence and Informatics(pp. 293-299). Singapore: Springer Singapore.
- Madhuri, N. S., Shailaja, K., Saha, D., Glory, K. B., & Sumithra, M. (2022). IOT integrated smart grid management system for effective energy management. Measurement: Sensors, 24, 100488.
- Shailaja, K., & Anuradha, B. (2017, October). Deep learning based adaptive linear collaborative discriminant regression classification for face recognition. In International Conference on Next Generation Computing Technologies(pp. 675-686). Singapore: Springer Singapore.
- Shailaja, K., & Anuradha, B. (2017). Improved face recognition using a modified PSO based self-weighted linear collaborative discriminant regression classification. Eng. Appl. Sci, 12, 7234-7241.
- Sekhar, P. R., & Sujatha, B. (2020, July). A literature review on feature selection using evolutionary algorithms. In 2020 7th International Conference on Smart Structures and Systems (ICSSS)(pp. 1-8). IEEE.
- Sekhar, P. R., & Goud, S. (2024). Collaborative Learning Techniques in Python Programming: A Case Study with CSE Students at Anurag University. Journal of Engineering Education Transformations, 38.
- Sekhar, P. R., & Sujatha, B. (2023). Feature extraction and independent subset generation using genetic algorithm for improved classification. J. Intell. Syst. Appl. Eng, 11, 503-512.
- Pesaramelli, R. S., & Sujatha, B. (2024, March). Principle correlated feature extraction using differential evolution for improved classification. In AIP Conference Proceedings(Vol. 2919, No. 1). AIP Publishing.
- Sharma, S., Vij, S., Praveen, R. V. S., Srinivasan, S., Yadav, D. K., & VS, R. K. (2024, October). Stress Prediction in Higher Education Students Using Psychometric Assessments and AOA-CNN-XGBoost Models. In 2024 4th International Conference on Sustainable Expert Systems (ICSES)(pp. 1631-1636). IEEE.
- Anuprathibha, T., Praveen, R. V. S., Sukumar, P., Suganthi, G., & Ravichandran, T. (2024, October). Enhancing Fake Review Detection: A Hierarchical Graph Attention Network Approach Using Text and Ratings. In 2024 Global Conference on Communications and Information Technologies (GCCIT)(pp. 1-5). IEEE.
- Shinkar, A. R., Joshi, D., Praveen, R. V. S., Rajesh, Y., & Singh, D. (2024, December). Intelligent solar energy harvesting and management in IoT nodes using deep self-organizing maps. In 2024 International Conference on Emerging Research in Computational Science (ICERCS)(pp. 1-6). IEEE.
- Praveen, R. V. S., Hemavathi, U., Sathya, R., Siddiq, A. A., Sanjay, M. G., & Gowdish, S. (2024, October). AI Powered Plant Identification and Plant Disease Classification System. In 2024 4th International Conference on Sustainable Expert Systems (ICSES)(pp. 1610-1616). IEEE.
- Dhivya, R., Sagili, S. R., Praveen, R. V. S., VamsiLala, P. N. V., Sangeetha, A., & Suchithra, B. (2024, December). Predictive Modelling of Osteoporosis using Machine Learning Algorithms. In 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS)(pp. 997-1002). IEEE.
- Kemmannu, P. K., Praveen, R. V. S., Saravanan, B., Amshavalli, M., & Banupriya, V. (2024, December). Enhancing Sustainable Agriculture Through Smart Architecture: An Adaptive Neuro-Fuzzy Inference System with XGBoost Model. In 2024 International Conference on Sustainable Communication Networks and Application (ICSCNA)(pp. 724-730). IEEE.
- Praveen, R. V. S. (2024). Data Engineering for Modern Applications. Addition Publishing House.
- Sharma, T., Reddy, D. N., Kaur, C., Godla, S. R., Salini, R., Gopi, A., & Baker El-Ebiary, Y. A. (2024). Federated Convolutional Neural Networks for Predictive Analysis of Traumatic Brain Injury: Advancements in Decentralized Health Monitoring. International Journal of Advanced Computer Science & Applications, 15(4).
- JYOTHI, D., VIJAY, P. J., KUMAR, M. K., LAKSHMI, R. V., POPELO, O., MARHASOVA, V., … & KUMAR, D. V. (2025). DESIGN OF AN IMPROVED METHOD FOR INTRUSION DETECTION USING CNN, LSTM, AND BLOCK CHAIN. Journal of Theoretical and Applied Information Technology, 102(1).
- Saravanan, V., Sumalatha, A., Reddy, D. N., Ahamed, B. S., & Udayakumar, K. (2024, October). Exploring Decentralized Identity Verification Systems Using Blockchain Technology: Opportunities and Challenges. In 2024 5th IEEE Global Conference for Advancement in Technology (GCAT)(pp. 1-6). IEEE.
- GAVARRAJU, L. N. J., RAO, A. S., ANUSHA, R., REDDY, D. N., ANANTULA, J., & SURENDRA, D. (2024). INTEGRATING MULTIMODAL MEDICAL IMAGING DATA FOR ENHANCED BONE CANCER DETECTION: A DEEP LEARNING-BASED FEATURE FUSION APPROACH. Journal of Theoretical and Applied Information Technology, 102(18).
- Nimma, D., Rao, P. L., Ramesh, J. V. N., Dahan, F., Reddy, D. N., Selvakumar, V., … & Jangir, P. (2025). Reinforcement Learning-Based Integrated Risk Aware Dynamic Treatment Strategy for Consumer-Centric Next-Gen Healthcare. IEEE Transactions on Consumer Electronics.
- Arockiam, J. M., Panhalkar, A. R., Bhosale, R. S., Kavitha, S., Reddy, D. N., & Kodali, S. (2025). Leveraging Gradient based Optimization based Unequal Clustering Algorithm for Hotspot Problem in Wireless Sensor Networks. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 13(1), 156-168.
- Pathipati, H., Ramisetti, L. N. B., Reddy, D. N., Pesaru, S., Balakrishna, M., & Anitha, T. (2025). Optimizing Cancer Detection: Swarm Algorithms Combined with Deep Learning in Colon and Lung Cancer using Biomedical Images. Diyala Journal of Engineering Sciences, 91-102.
- REDDY, D. N., KADARU, B. B., SREENIVASULU, A., KANCHANA, R., JANGIR, P., & KUMAR, C. R. (2025). EFFICIENT OBJECT DETECTION IN AGRICULTURAL ENVIRONMENTS IMPLEMENTING COLOR FEATURES EXTREME LEARNING MACHINE. Journal of Theoretical and Applied Information Technology, 103(1).
- Padmaja, G., Pesaru, S., Reddy, D. N., Kumari, D. A., & Maram, S. P. (2025). Robust Vehicle Number Plate Text Recognition and Data Analysis Using Tesseract Ocr. In ITM Web of Conferences(Vol. 74, p. 01009). EDP Sciences.
- Reddy, K. V., Reddy, D. N., Balakrishna, M., Srividya, Y., & Pesaru, S. (2025). User Friendly and Efficient Mini Wallet for Sending Ethers. In ITM Web of Conferences(Vol. 74, p. 02008). EDP Sciences.