Volume no :
9 |Issue no :
1Article Type :
Scholarly ArticleAuthor :
Mrs. Jyothi Vemunuri, V.Bhanu Prasad, D.Shiva Sai, S.vadhan ReddyPublished Date :
April, 2025Publisher :
Journal of Theoretical and Computationsl Advances in Scientific Research (JTCASR)
Page No: 1 - 15
Abstract : Plant diseases pose a major threat to global agricultural productivity, often leading to significant yield losses and economic setbacks. Crops such as cotton, tomato, and apple are highly vulnerable to a range of diseases caused by fungal, bacterial, and viral pathogens. Conventional methods of disease detection primarily rely on manual observation, which is not only time-consuming and labor-intensive but also susceptible to human error. To address these limitations, this study presents a deep learning-based approach for automated plant leaf disease identification. Leveraging the capabilities of Convolutional Neural Networks (CNNs), the proposed system is trained to detect and classify various plant diseases from high-resolution images of healthy and diseased leaves. The dataset is curated and pre-processed to enhance image quality and improve feature extraction, ensuring model robustness under diverse environmental conditions. The CNN model demonstrates superior accuracy, precision, and recall rates compared to traditional image processing techniques. Experimental results confirm the system’s effectiveness in identifying multiple diseases across the selected crops. This approach not only accelerates the diagnosis process but also reduces dependency on agricultural experts, enabling timely intervention and effective crop management. The findings advocate for the integration of AI-based tools into precision agriculture practices, contributing to improved crop health monitoring, sustainable farming, and enhanced food security. This research highlights the transformative potential of deep learning in modern agriculture.
Keyword Plant Disease Detection, Deep Learning, Convolutional Neural Networks (CNN), Image Classification, Cotton Leaf Disease, Tomato Leaf Disease, Apple Leaf Disease, Precision Agriculture, Smart Farming, Sustainable Agriculture.
Reference:
- Reddy, C. N. K., & Murthy, G. V. (2012). Evaluation of Behavioral Security in Cloud Computing. International Journal of Computer Science and Information Technologies, 3(2), 3328-3333.
- Murthy, G. V., Kumar, C. P., & Kumar, V. V. (2017, December). Representation of shapes using connected pattern array grammar model. In 2017 IEEE Region 10 Humanitarian Technology Conference (R10-HTC)(pp. 819-822). IEEE.
- Krishna, K. V., Rao, M. V., & Murthy, G. V. (2017). Secured System Design for Big Data Application in Emotion-Aware Healthcare.
- Rani, G. A., Krishna, V. R., & Murthy, G. V. (2017). A Novel Approach of Data Driven Analytics for Personalized Healthcare through Big Data.
- Rao, M. V., Raju, K. S., Murthy, G. V., & Rani, B. K. (2020). Configure and Management of Internet of Things. Data Engineering and Communication Technology, 163.
- Ramakrishna, C., Kumar, G. K., Reddy, A. M., & Ravi, P. (2018). A Survey on various IoT Attacks and its Countermeasures. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), 5(4), 143-150.
- Madar, B., Kumar, G. K., & Ramakrishna, C. (2017). Captcha breaking using segmentation and morphological operations. International Journal of Computer Applications, 166(4), 34-38.
- Ramakrishna, C., Kumar, G. S., & Reddy, P. C. S. (2021). Quadruple band-notched compact monopole UWB antenna for wireless applications. Journal of Electromagnetic Engineering and Science, 21(5), 406-416.
- Manivasagan, S., Kumar, G. S. R. S., & Joon, M. S. (2006). Qualitative changes in karonda (Carissa carandas Linn.) candy during storage at room temperature. Haryana Journal of Horticultural Sciences, 35(1/2), 19.
- Kumar, G. K., Kumar, B. K., Boobalan, G., Kumar, C. S., & Reddy, A. G. (2015). Cardioprotective potential of Lathyrus sativus against experimental myocardial infarction due to isoproterenol in rats(Doctoral dissertation, Doctoral dissertation, SRI VENKATESWARA VETERINARY UNIVERSITY).
- Chithanuru, V., & Ramaiah, M. (2023). An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions–A review. Concurrency and Computation: Practice and Experience, 35(22), e7724.
- Ramaiah, M., Chithanuru, V., Padma, A., & Ravi, V. (2022). A review of security vulnerabilities in industry 4.0 application and the possible solutions using blockchain. Cyber Security Applications for Industry 4.0, 63-95.
- Padma, A., Chithanuru, V., Uppamma, P., & VishnuKumar, R. (2024). Exploring Explainable AI in Healthcare: Challenges and Future Directions. In Analyzing Explainable AI in Healthcare and the Pharmaceutical Industry(pp. 199-233). IGI Global.
- Ramaiah, M., Padma, A., Vishnukumar, R., Rahamathulla, M. Y., & Chithanuru, V. (2024, May). A hybrid wrapper technique enabled Network Intrusion Detection System for Software defined networking based IoT networks. In 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)(pp. 1-6). IEEE.
- Chithanuru, V., & Ramaiah, M. (2025). Proactive detection of anomalous behavior in Ethereum accounts using XAI-enabled ensemble stacking with Bayesian optimization. PeerJ Computer Science, 11, e2630.
- Prashanth, J. S., & Nandury, S. V. (2015, June). Cluster-based rendezvous points selection for reducing tour length of mobile element in WSN. In 2015 IEEE International Advance Computing Conference (IACC)(pp. 1230-1235). IEEE.
- Prashanth, J. S., & Nandury, S. V. (2019). A Cluster—based Approach for Minimizing Energy Consumption by Reducing Travel Time of Mobile Element in WSN. International Journal of Computers Communications & Control, 14(6), 691-709.
- Kumar, K. A., Pabboju, S., & Desai, N. M. S. (2014). Advance text steganography algorithms: an overview. International Journal of Research and Applications, 1(1), 31-35.
- Shyam, D. N. M., & Hussain, M. A. (2023). Mutual authenticated key agreement in Wireless Infrastructure-less network by Chaotic Maps based Diffie-Helman Property. Fusion: Practice & Applications, 13(2).
- Shyam, D. N. M., & Hussain, M. A. (2023). A Naive Bayes-Driven Mechanism for Mitigating Packet-Dropping Attacks in Autonomous Wireless Networks. Ingenierie des Systemes d’Information, 28(4), 1019.
- Hnamte, V., & Balram, G. (2022). Implementation of Naive Bayes Classifier for Reducing DDoS Attacks in IoT Networks. Journal of Algebraic Statistics, 13(2), 2749-2757.
- Balram, G., Anitha, S., & Deshmukh, A. (2020, December). Utilization of renewable energy sources in generation and distribution optimization. In IOP Conference Series: Materials Science and Engineering(Vol. 981, No. 4, p. 042054). IOP Publishing.
- Subrahmanyam, V., Sagar, M., Balram, G., Ramana, J. V., Tejaswi, S., & Mohammad, H. P. (2024, May). An Efficient Reliable Data Communication For Unmanned Air Vehicles (UAV) Enabled Industry Internet of Things (IIoT). In 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)(pp. 1-4). IEEE.
- Mahammad, F. S., Viswanatham, V. M., Tahseen, A., Devi, M. S., & Kumar, M. A. (2024, July). Key distribution scheme for preventing key reinstallation attack in wireless networks. In AIP Conference Proceedings(Vol. 3028, No. 1). AIP Publishing.
- Tahseen, A., Shailaja, S. R., & Ashwini, Y. (2024). Extraction for Big Data Cyber Security Analytics. Advances in Computational Intelligence and Informatics: Proceedings of ICACII 2023, 993, 365.
- Tahseen, A., Shailaja, S. R., & Ashwini, Y. (2023, December). Security-Aware Information Classification Using Attributes Extraction for Big Data Cyber Security Analytics. In International Conference on Advances in Computational Intelligence and Informatics(pp. 365-373). Singapore: Springer Nature Singapore.
- Lavanya, P. (2024). Personalized Medicine Recommendation System Using Machine Learning.
- Lavanya, P. (2024). In-Cab Smart Guidance and support system for Dragline operator.
- Lavanya, P. (2024). Price Comparison of GeM Products with other eMarketplaces.
- Kovoor, M., Durairaj, M., Karyakarte, M. S., Hussain, M. Z., Ashraf, M., & Maguluri, L. P. (2024). Sensor-enhanced wearables and automated analytics for injury prevention in sports. Measurement: Sensors, 32, 101054.
- Rao, N. R., Kovoor, M., Kishor Kumar, G. N., & Parameswari, D. V. L. (2023). Security and privacy in smart farming: challenges and opportunities. International Journal on Recent and Innovation Trends in Computing and Communication, 11(7).
- Madhuri, K. (2023). Security Threats and Detection Mechanisms in Machine Learning. Handbook of Artificial Intelligence, 255.
- Madhuri, K., Viswanath, N. K., & Gayatri, P. U. (2016, November). Performance evaluation of AODV under Black hole attack in MANET using NS2. In 2016 international conference on ICT in Business Industry & Government (ICTBIG)(pp. 1-3). IEEE.
- Reddy, P. R. S., Bhoga, U., Reddy, A. M., & Rao, P. R. (2017). OER: Open Educational Resources for Effective Content Management and Delivery. Journal of Engineering Education Transformations, 30(3), 322-326.
- Reddy, P. R. S., & Ravindranath, K. (2024). Enhancing Secure and Reliable Data Transfer through Robust Integrity. Journal of Electrical Systems, 20, 900-910.
- REDDY, P. R. S., & RAVINDRANATH, K. (2022). A HYBRID VERIFIED RE-ENCRYPTION INVOLVED PROXY SERVER TO ORGANIZE THE GROUP DYNAMICS: SHARING AND REVOCATION. Journal of Theoretical and Applied Information Technology, 100(13).
- Reddy, B. A., & Reddy, P. R. S. (2012). Effective data distribution techniques for multi-cloud storage in cloud computing. CSE, Anurag Group of Institutions, Hyderabad, AP, India.
- Raj, R. S., & Raju, G. P. (2014, December). An approach for optimization of resource management in Hadoop. In International Conference on Computing and Communication Technologies(pp. 1-5). IEEE.
- Reddy, P. R. S., Bhoga, U., Reddy, A. M., & Rao, P. R. (2017). OER: Open Educational Resources for Effective Content Management and Delivery. Journal of Engineering Education Transformations, 30(3), 322-326.
- Ramana, A. V., Bhoga, U., Dhulipalla, R. K., Kiran, A., Chary, B. D., & Reddy, P. C. S. (2023, June). Abnormal Behavior Prediction in Elderly Persons Using Deep Learning. In 2023 International Conference on Computer, Electronics & Electrical Engineering & their Applications (IC2E3)(pp. 1-5). IEEE.
- Ujwala, B., & Reddy, P. R. S. (2016). An effective mechanism for integrity of data sanitization process in the cloud. European Journal of Advances in Engineering and Technology, 3(8), 82-84.
- Rani, K. P., Reddy, Y. S., Sreedevi, P., Dastagiraiah, C., Shekar, K., & Rao, K. S. (2024, June). Tracking The Impact of PM Poshan on Child’s Nutritional Status. In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)(pp. 1-4). IEEE.
- Yakoob, S., Krishna Reddy, V., & Dastagiraiah, C. (2017). Multi User Authentication in Reliable Data Storage in Cloud. In Computer Communication, Networking and Internet Security: Proceedings of IC3T 2016(pp. 531-539). Springer Singapore.
- Sukhavasi, V., Kulkarni, S., Raghavendran, V., Dastagiraiah, C., Apat, S. K., & Reddy, P. C. S. (2024). Malignancy Detection in Lung and Colon Histopathology Images by Transfer Learning with Class Selective Image Processing.
- Mahalakshmi, A., Goud, N. S., & Murthy, G. V. (2018). A survey on phishing and it’s detection techniques based on support vector method (Svm) and software defined networking (sdn). International Journal of Engineering and Advanced Technology, 8(2), 498-503.
- Swapna Goud, N., & Mathur, A. (2019). A certain investigations on web security threats and phishing website detection techniques. International Journal of Advanced Science and Technology, 28(16), 871-879.
- Swapna, N. (2017). „Analysis of Machine Learning Algorithms to Protect from Phishing in Web Data Mining‟. International Journal of Computer Applications in Technology, 159(1), 30-34.
- SAIPRASANNA, S., GOUD, N. S., & MURTHY, G. V. (2021). ENHANCED RECURRENT CONVOLUTIONAL NEURAL NETWORKS BASED EMAIL PHISHING DETECTION. Elementary Education Online, 20(5), 5970-5970.
- Balakrishna, G., Kumar, A., Younas, A., Kumar, N. M. G., & Rastogi, R. (2023, October). A novel ensembling of CNN-A-LSTM for IoT electric vehicle charging stations based on intrusion detection system. In 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS)(pp. 1312-1317). IEEE.
- Moparthi, N. R., Bhattacharyya, D., Balakrishna, G., & Prashanth, J. S. (2021). Paddy leaf disease detection using CNN.
- Balakrishna, G., & Babu, C. S. (2013). Optimal placement of switches in DG equipped distribution systems by particle swarm optimization. International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2(12), 6234-6240.
- Moparthi, N. R., Sagar, P. V., & Balakrishna, G. (2020, July). Usage for inside design by AR and VR technology. In 2020 7th International Conference on Smart Structures and Systems (ICSSS)(pp. 1-4). IEEE.
- Amarnadh, V., & Moparthi, N. R. (2024). Prediction and assessment of credit risk using an adaptive Binarized spiking marine predators’ neural network in financial sector. Multimedia Tools and Applications, 83(16), 48761-48797.
- Amarnadh, V., & Moparthi, N. R. (2023). Comprehensive review of different artificial intelligence-based methods for credit risk assessment in data science. Intelligent Decision Technologies, 17(4), 1265-1282.
- Amarnadh, V., & Moparthi, N. (2023). Data Science in Banking Sector: Comprehensive Review of Advanced Learning Methods for Credit Risk Assessment. International Journal of Computing and Digital Systems, 14(1), 1-xx.
- Amarnadh, V., & Rao, M. N. (2025). A Consensus Blockchain-Based Credit Risk Evaluation and Credit Data Storage Using Novel Deep Learning Approach. Computational Economics, 1-34.
- Swetha, A., & Shailaja, K. (2019, December). An effective approach for security attacks based on machine learning algorithms. In International Conference on Advances in Computational Intelligence and Informatics(pp. 293-299). Singapore: Springer Singapore.
- Madhuri, N. S., Shailaja, K., Saha, D., Glory, K. B., & Sumithra, M. (2022). IOT integrated smart grid management system for effective energy management. Measurement: Sensors, 24, 100488.
- Shailaja, K., & Anuradha, B. (2017, October). Deep learning based adaptive linear collaborative discriminant regression classification for face recognition. In International Conference on Next Generation Computing Technologies(pp. 675-686). Singapore: Springer Singapore.
- Shailaja, K., & Anuradha, B. (2017). Improved face recognition using a modified PSO based self-weighted linear collaborative discriminant regression classification. Eng. Appl. Sci, 12, 7234-7241.
- Sekhar, P. R., & Sujatha, B. (2020, July). A literature review on feature selection using evolutionary algorithms. In 2020 7th International Conference on Smart Structures and Systems (ICSSS)(pp. 1-8). IEEE.
- Sekhar, P. R., & Goud, S. (2024). Collaborative Learning Techniques in Python Programming: A Case Study with CSE Students at Anurag University. Journal of Engineering Education Transformations, 38.
- Sekhar, P. R., & Sujatha, B. (2023). Feature extraction and independent subset generation using genetic algorithm for improved classification. J. Intell. Syst. Appl. Eng, 11, 503-512.
- Pesaramelli, R. S., & Sujatha, B. (2024, March). Principle correlated feature extraction using differential evolution for improved classification. In AIP Conference Proceedings(Vol. 2919, No. 1). AIP Publishing.
- Sharma, S., Vij, S., Praveen, R. V. S., Srinivasan, S., Yadav, D. K., & VS, R. K. (2024, October). Stress Prediction in Higher Education Students Using Psychometric Assessments and AOA-CNN-XGBoost Models. In 2024 4th International Conference on Sustainable Expert Systems (ICSES)(pp. 1631-1636). IEEE.
- Anuprathibha, T., Praveen, R. V. S., Sukumar, P., Suganthi, G., & Ravichandran, T. (2024, October). Enhancing Fake Review Detection: A Hierarchical Graph Attention Network Approach Using Text and Ratings. In 2024 Global Conference on Communications and Information Technologies (GCCIT)(pp. 1-5). IEEE.
- Shinkar, A. R., Joshi, D., Praveen, R. V. S., Rajesh, Y., & Singh, D. (2024, December). Intelligent solar energy harvesting and management in IoT nodes using deep self-organizing maps. In 2024 International Conference on Emerging Research in Computational Science (ICERCS)(pp. 1-6). IEEE.
- Praveen, R. V. S., Hemavathi, U., Sathya, R., Siddiq, A. A., Sanjay, M. G., & Gowdish, S. (2024, October). AI Powered Plant Identification and Plant Disease Classification System. In 2024 4th International Conference on Sustainable Expert Systems (ICSES)(pp. 1610-1616). IEEE.
- Dhivya, R., Sagili, S. R., Praveen, R. V. S., VamsiLala, P. N. V., Sangeetha, A., & Suchithra, B. (2024, December). Predictive Modelling of Osteoporosis using Machine Learning Algorithms. In 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS)(pp. 997-1002). IEEE.
- Kemmannu, P. K., Praveen, R. V. S., Saravanan, B., Amshavalli, M., & Banupriya, V. (2024, December). Enhancing Sustainable Agriculture Through Smart Architecture: An Adaptive Neuro-Fuzzy Inference System with XGBoost Model. In 2024 International Conference on Sustainable Communication Networks and Application (ICSCNA)(pp. 724-730). IEEE.
- Praveen, R. V. S. (2024). Data Engineering for Modern Applications. Addition Publishing House.
- Sharma, T., Reddy, D. N., Kaur, C., Godla, S. R., Salini, R., Gopi, A., & Baker El-Ebiary, Y. A. (2024). Federated Convolutional Neural Networks for Predictive Analysis of Traumatic Brain Injury: Advancements in Decentralized Health Monitoring. International Journal of Advanced Computer Science & Applications, 15(4).
- JYOTHI, D., VIJAY, P. J., KUMAR, M. K., LAKSHMI, R. V., POPELO, O., MARHASOVA, V., … & KUMAR, D. V. (2025). DESIGN OF AN IMPROVED METHOD FOR INTRUSION DETECTION USING CNN, LSTM, AND BLOCK CHAIN. Journal of Theoretical and Applied Information Technology, 102(1).
- Saravanan, V., Sumalatha, A., Reddy, D. N., Ahamed, B. S., & Udayakumar, K. (2024, October). Exploring Decentralized Identity Verification Systems Using Blockchain Technology: Opportunities and Challenges. In 2024 5th IEEE Global Conference for Advancement in Technology (GCAT)(pp. 1-6). IEEE.
- GAVARRAJU, L. N. J., RAO, A. S., ANUSHA, R., REDDY, D. N., ANANTULA, J., & SURENDRA, D. (2024). INTEGRATING MULTIMODAL MEDICAL IMAGING DATA FOR ENHANCED BONE CANCER DETECTION: A DEEP LEARNING-BASED FEATURE FUSION APPROACH. Journal of Theoretical and Applied Information Technology, 102(18).
- Nimma, D., Rao, P. L., Ramesh, J. V. N., Dahan, F., Reddy, D. N., Selvakumar, V., … & Jangir, P. (2025). Reinforcement Learning-Based Integrated Risk Aware Dynamic Treatment Strategy for Consumer-Centric Next-Gen Healthcare. IEEE Transactions on Consumer Electronics.
- Arockiam, J. M., Panhalkar, A. R., Bhosale, R. S., Kavitha, S., Reddy, D. N., & Kodali, S. (2025). Leveraging Gradient based Optimization based Unequal Clustering Algorithm for Hotspot Problem in Wireless Sensor Networks. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 13(1), 156-168.
- Pathipati, H., Ramisetti, L. N. B., Reddy, D. N., Pesaru, S., Balakrishna, M., & Anitha, T. (2025). Optimizing Cancer Detection: Swarm Algorithms Combined with Deep Learning in Colon and Lung Cancer using Biomedical Images. Diyala Journal of Engineering Sciences, 91-102.
- REDDY, D. N., KADARU, B. B., SREENIVASULU, A., KANCHANA, R., JANGIR, P., & KUMAR, C. R. (2025). EFFICIENT OBJECT DETECTION IN AGRICULTURAL ENVIRONMENTS IMPLEMENTING COLOR FEATURES EXTREME LEARNING MACHINE. Journal of Theoretical and Applied Information Technology, 103(1).
- Padmaja, G., Pesaru, S., Reddy, D. N., Kumari, D. A., & Maram, S. P. (2025). Robust Vehicle Number Plate Text Recognition and Data Analysis Using Tesseract Ocr. In ITM Web of Conferences(Vol. 74, p. 01009). EDP Sciences.
- Reddy, K. V., Reddy, D. N., Balakrishna, M., Srividya, Y., & Pesaru, S. (2025). User Friendly and Efficient Mini Wallet for Sending Ethers. In ITM Web of Conferences(Vol. 74, p. 02008). EDP Sciences.