A Machine Learning Based Crop and Fertilizer Recommendation System
Research Paper | Journal Paper
Vol.9 , Issue.7 , pp.64-68, Jul-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i7.6468
Abstract
India is a country where agricultural and agriculture-related sectors provide the majority of the country`s income. Agriculture is the country`s main source of revenue. It is also one of the countries that has major natural disasters such as drought or flooding, which have caused crop devastation and repeated crop cultivation leads to soil degradations due to this farmers suffer significant financial losses as a result of this, leading to suicide. The goal is to build a machine learning model for crop and fertilizer recommendations system based on soil features which includes different types of parameters value such as PH, Organic Carbon, Nitrogen, phosphorus, potassium, sulphur, zinc, iron, temperature, rainfall. Naïve Bayes and LVQ algorithms are used for crop recommendations and KNN classifier are used for fertilizer recommendations. This system displays the results of a study on the machine learning approaches and compare with the neural networks to forecast the best crops recommendations. The Machine Learning algorithm gives more accurate results than CNN.
Key-Words / Index Term
Crop and Fertilizer Recommendation, Naïve Bayes (NB), Machine Learning, Agriculture, Learning vector quantization (LVQ)
References
[1] F. F. Haque, A. Abdelgawad, V. P. Yanambaka and K. Yelamarthi, "Crop Yield AnalysisUsing Machine Learning Algorithms," 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), pp. 1-2, 2020, doi: 10.1109/WF-IoT48130.2020.9221459.
[2] D. Ramesh , B. Vishnu Vardhan, “Data Mining Techniques and Applications to Agricultural Yield Data”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 9, September 2013.
[3] Monali Paul, Santosh K. Vishwakarma, Ashok Verma , “Analysis of Soil Behaviour and Prediction of Crop Yield using Data Mining Approach”, International Conference on Computational Intelligence and Communication Networks. 2015.
[4] Ami Mistry1, Vinita Shah , “Brief Survey of data mining Techniques Applied to applications of Agriculture” , International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2, February 2016 Copyright to IJARCCE DOI 10.17148/IJARCCE.2016.5263 301 .
[5] Yogesh Gandge, Sandhya , “A Study on Various Data Mining Techniques for Crop Yield Prediction”, International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques 2017 (ICEECCOT) 978-1-5386-2361-9/17/$31.00 ©2017 IEEE.
[6] Md. Tahmid Shakoor, Karishma Rahman, Sumaiya Nasrin Rayta, Amitabha Chakrabarty, “Agricultural Production Output Prediction Using Supervised Machine Learning Techniques”, 978-1-5386-3831-6/17/$31.00 2017 IEEE.
[7] R. N. Bhimanpallewar and M. R. Narasingarao, "Alternative approaches of Machine Learning for Agriculture Advisory System," 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), pp. 27-31, 2020, doi: 10.1109/Confluence47617.2020.9058152.
[8] Nischitha K, DhanushVishwakarma, Mahendra N, Ashwini, Manjuraju M.R, “Crop Prediction using Machine Learning Approaches”, International Journal of Engineering Research & Technology (IJERT), Vol. 9 Issue 08, August-2020.
[9] Fahim Jawad, Tawsif Ur Rahman Choudhury, S M Asif Sazed, Shamima Yasmin , Kanaz Iffat Rishva, Fouzia Tamanna, Rashedur M Rahman ,”Analysis of Optimum Crop Cultivation Using Fuzzy System”, 978-1-5090-0806-3/16/$31.00 copyright 2016 IEEE ICIS 2016, June 26-29, 2016, Okayama, Japan.
[10] R. B. Guruprasad, K. Saurav and S. Randhawa, "Machine Learning Methodologies for Paddy Yield Estimation in India: a Case Study," IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium, pp. 7254-7257, 2019, doi: 10.1109/IGARSS.2019.8900339.
Citation
Supriya M.S., Nagarathna, "A Machine Learning Based Crop and Fertilizer Recommendation System," International Journal of Computer Sciences and Engineering, Vol.9, Issue.7, pp.64-68, 2021.
Digital Certificate System for Verification of Educational Certificates Using Blockchain
Research Paper | Journal Paper
Vol.9 , Issue.7 , pp.69-73, Jul-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i7.6973
Abstract
In India Ministry of Education statistics, about one million graduates each year, some of them will goto countries, high schools or tertiary institutions to continue to attend, and some will be ready to enter the workplace employment. During the course of study, the students’ all kinds of excellent performance certificates, score transcripts, diplomas, etc., will become an important reference for admitting new schools or new works. As schools make various awards or diplomas, only the names of the schools and the students are input. Due to the lack of effective anti-forge mechanism, events that cause the graduation certificate to be forged often get noticed. In order to solve the problem of counterfeiting certificates, the digital certificate system based on block chain technology would be proposed. By the modifiable property of block chain, the digital certificate with anti-counterfeit and verifiability could be made. The procedure of issuing the digital certificate in this system is as follows. First, generate the electronic file of a paper certificate accompanying other related data into the database, meanwhile calculate the electronic file for its hash value. Finally, store the hash value into the block in the chain system. The system will create a related QR-code and inquiry string code to affix to the paper certificate. It will provide the demand unit to verify the authenticity of the paper certificate through mobile phone scanning or website inquiries. Through the modifiable properties of the block chain, the system not only enhances the credibility of various paper-based certificates, but also electronically reduces the loss risks of various types of certificates.
Key-Words / Index Term
Custom Blockchain, Digital Certificate, Hashing, Mining, Smart Contrast
References
[1] Sukhodolskiy, Ilya, and Sergey Zapechnikov. “A blockchain-based access control system for cloud storage” Young Researchers in Electrical and Electronic Engineering (EIConRus), IEEE Conference of Russian.IEEE, 2018.
[2] D. Vidhate, P. Kulkarni,“Performance comparison of multiagent cooperative reinforcement learning algorithms for dynamic decision making in retail shop application”, International Journal of Computational Systems Engineering, Inderscience Publishers (IEL), Vol 5, Issue 3, pp 169-178, 2019.
[3] A. Dorri, S. S. Kanhere, and R. Jurdak, “Blockchainin internet of things: Challenges and Solutions,”arXiv:1608.05187, 2016.
[4] D. Vidhate, P. Kulkarni, “A Framework for Dynamic Decision Making by Multi-agent Cooperative Fault Pair Algorithm (MCFPA) in Retal Shop Application”,Information and Communication Technology for Intelligent Systems, Springer, Singapore, pp 693-703, 2018.
[5] Yang, Huihui, and Bian Yang “A Blockchain-based Approach to the Secure Sharing of Healthcare Data”Proceedings of the Norwegian Information Security Conference 2017.
[6] D. Vidhate, P. Kulkarni,“A Novel Approach by Cooperative Multiagent Fault Pair Learning (CMFPL)”, Communications in Computer and Information Science, Springer, Singapore, Volume 905, pp 352-361, 2018.
[7] Goyal, Vipul, et al. “Attribute-based encryption for fine-grained access control of encrypted data” Proceedings of the 13th ACM conference on Computer and communications security.Acm, 2006.
[8] D. Vidhate, P. Kulkarni,“Exploring Cooperative Multi-agent Reinforcement Learning Algorithm (CMRLA) for Intelligent Traffic Signal Control”, Smart Trends in Information Technology and Computer Communications, Volume 876, pp 71-81,2018.
[9] Wang, Hao, and Yujiao Song. “Secure cloud-based EHR system using attributebased cryptosystem and blockchain” Journal of medical systems 42.8 (2018), 152.
[10] D. Vidhate, P. Kulkarni, “A Framework for Improved Cooperative Learning Algorithms with Expertness (ICLAE)”, International Conference on Advanced Computing and Communication Technologies Advances in Intelligent Systems and Computing, Springer Singapore, Volume 562, pp. 149-160, 2017.
[11] Khan S, Khan R. “Multiple authorities attribute-based verification mechanism for Blockchain mircogrid transactions”Energies May;11(5), 1154, 2018.
[12] Guo, Rui, et al. “Secure attribute-based signature scheme with multiple authorities for Blockchain in electronic health records systems” IEEE Access 776.99, 1-12, 2018.
[13] Ouaddah, Aafaf, AnasAbouElkalam, and AbdellahAitOuahman. ”FairAccess: a new Blockchain-based access control framework for the Internet of Things.” Security and Communication Networks 9.18, 5943-5964, 2016.
[14] Wu, Axin, et al “Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing” Sensors 18.7, 2158, 2018.
[15] Rahulamathavan, Yogachandran, et al. “Privacy-preserving block chain based IoT ecosystem using attribute-based encryption” IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), IEEE, 2017.
[16] D.Vidhate, P. Kulkarni,“Expertise Based Cooperative Reinforcement Learning Methods (ECRLM)”, International Conference on Information & Communication Technology for Intelligent System, Springer book series Smart Innovation, Systems &Technologies,Vol.84,Springer Cham,pp350-360, 2017 .
Citation
P.S. Gayke, Jayesh Chennur, Mulla Muzzamil, Jathin Joy, Kunal Gosavi, "Digital Certificate System for Verification of Educational Certificates Using Blockchain," International Journal of Computer Sciences and Engineering, Vol.9, Issue.7, pp.69-73, 2021.
Detection and Localization of Iris using Digital Image Processing Techniques
Research Paper | Journal Paper
Vol.9 , Issue.7 , pp.74-77, Jul-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i7.7477
Abstract
An automated method utilized for biometric identification which includes various mathematical patterns recognition methods in it known as the iris recognition method. The images of the irises of various individuals` eyes are studied in this technique. The complex random patterns present within this approach are single, constant and can as well be viewed from a particular distance. In the base paper, intensity transformation is applied with edge detection. The image processing techniques are applied which will extract the contrast, energy, entropy and heterogeneity of the detected iris has been calculated. To increase the accuracy of iris detection and reduce execution time, improvement in existing algorithms, feature extraction techniques are being proposed and also evaluate the ROC curve for performance analysis and achieve 0.81 area under curve.
Key-Words / Index Term
Iris, localization, Image Processing
References
[1] Jafar M.H.Ali, Aboul Ella Hassanien, An Iris Recognition System to Enhance E-security Environment Based on Wavelet Theory, Advanced Modeling and Optimization, Vol 5, No.2 ,2003.
[2] S.V.Sheela, P.A. Vijaya, Iris Recognition Methods- Survey, International Journal of Computer Application, vol. 3, -No. 5, June 2010.
[3] Hanho Sung, J. Lim, J. Park, Y. Lee, Iris recognition using Collarette Boundary Localization, Proceedings of the 17th international conference on Pattern Recognition (ICPR 04).
[4] Xiaoyan Yuan, Pengfei Shi, Efficient Iris Recognition System based on iris anatomical Structure, IEICE Electronics Express, Vol. 4, No. 17, 2007
[5] Habibeh Naderi, Behrouz Haji Soleimani, Babak Nadjar Araabi and Hamid Soltanian Zadeh, “Fusing Iris, Palmprint and Fingerprint in a Multi-Biometric Recognition System”, IEEE International Conference on Computer and Robot vision, ISBN 5090-2491, pp. 327-334, 2016.
[6] Chiara Galdi and Jean-Luc Dugelay, “Fusing Iris Colour and Texture information for fast Iris Recognition on mobile devices,” IEEE International conference on Pattern Recognition, ISBN 50903- 4847, pp. 160-164, 2016.
[7] Sarika B Solanke and Ratnadeep R Deshmukh, “Biometrics-Iris Recognition System: A Study of Promising Approach for Secured Authentication,” IEEE International Conference on Computong for Sustainable Global Development, ISBN 3805-4421, pp. 811-814, 2016
[8] Y. J. Lee and J. Yoon, “Image zooming method using edgedirected moving least squares interpolation based on exponential polynomials,” Applied Mathematics and Computation, vol. 26 issue 9, pp. 569–583, September 2015.
[9] Huseyin Nasifoglu, Osman Erogul, Gokce Kaan Atac, and Galip Ozdemir, “Multi-Regional Adaptive Image Compression (AIC) for Hip Fractures in Pelvis Radiography”, Springer Nature Singapore Pte Ltd. 61, CMBEBIH, IFMBE Proceedings 62, Vol 4, pp. 12-16, 2017.
[10] Rocky Yefrenes, Dillakr Martini and Ganantowe intiri, “A Novel Approach for Iris Recognition,” IEEE Region Symposium, ISBN 5090-0931, pp. 231- 236, 2016.
[11] Neda Ahmadi, Gholamreza Akbarizadeh, “Hybrid robust iris recognition approach using iris image preprocessing, two-dimensional gabor features and multi-layer perceptron neural network/PSO”, IET Biom., Vol. 7 Iss. 2, pp. 153-162, 2018.
[12] Sunil S. Harakannanavar, Veena I Puranikmath, “Comparative Survey of Iris Recognition”, 2017 International Conference on Electrical, Electronics, Communication, Computer and Optimization Techniques (ICEECCOT), vol. 3, issue 1, pp. 42-53, 2017.
[13] N. Pattabhi Ramaiah, Ajay Kumar,” Towards More Accurate Iris Recognition using Cross-Spectral Matching”, vol. 5, issue 3, pp. 12-23, 2016.
[14] Yang Hu, Konstantinos Sirlantzis, and Gareth Howells,” Optimal Generation of Iris Codes for Iris Recognition”, vol. 7, issue 1, pp. 33-45, 2016.
[15] Jagadeesh N., 2Dr. Chandrasekhar M. Patil, “Iris recognition system development using Matlab”, 2017 International Conference on Computing Methodologies and Communication (ICCMC), vol. 6, issue 1, pp. 12-19, 2017.
[16] Mohamed ahmed ali alhamrouni, “iris recognition by using image processing techniques”, vol. 6, issue 3, pp. 12-23, 2017.
[17] Iliana V. Voynichka, and Dalila B. Megherbi,” Analysis of the Effect of Selecting Statistically Significant Registered Image Pixels on Individual Face Physiognomy Recognition Accuracy”, 2016, IEEE, 978-1-5090-0770
[18] Jianxu Chen, Feng Shen, Danny Z. Chen and Patrick J. Flynn,” Iris Recognition Based on HumanInterpretable Features”, 2015, IEEE, 1556-6013
[19] Peter Chondro, Hao-Chun Hu, Hsuan-Yen Hung, Shin-Yuan Chang, Lieber Po-Hung Li, and ShanqJang Ruan,” An Effective Occipitomental View Enhancement Based on Adaptive Morphological Texture Analysis”, 2016, IEEE, 2168-2194
[20] Juan E. Tapia, Claudio A. Perez, Kevin W. Bowyer,” Gender Classification from the Same Iris Code Used for Recognition”, 2015, IEEE, 1556-6013
Citation
Ashwini Chate, Pramod Kumar, Sushilkumar Holambe, "Detection and Localization of Iris using Digital Image Processing Techniques," International Journal of Computer Sciences and Engineering, Vol.9, Issue.7, pp.74-77, 2021.
Literature Review on Improving Data Security using DES and DCT
Research Paper | Journal Paper
Vol.9 , Issue.7 , pp.78-83, Jul-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i7.7883
Abstract
Steganography is the art and science for hiding information by embedding data into cover media. Image processing in steganography is done mainly by using spatial domain and frequency domain. In this review literature, hiding spatial domain using LSB technique and hiding frequency domain using DCT technique is studied and compared. BMP cover images with 256x256 and 512x512 resolutions for LSB and DCT techniques are used for experimental study. For DCT technique, various BMP image is converted to JPEG image. The DCT technique is used to hide the data into the JPEG cover image. The resultant stego image obtained in JPEG is converted to BMP stego image. Thereafter, the comparison tool PSNR is used to compare the BMP images obtained from LSB and DCT. The data security and privacy play an important role for data transmission for exchanging information over internet. The two techniques like; cryptography and steganography both are pillars to be utilized for securing digital data by using different methods specifically DES (Data Encryption Standard) and DCT (Discrete Cosine Transform). The mixture of DES and DCT improves the digital data security with multiple level of security for encryption process which shows better results. In this research, we analyze the combination of cryptographic method with DES technique and stenographic method with DCT technique to develop a framework for digital data security environment. This paper also presents a proposed least significant bit (LSB) based framework for DES and DCT to secure digital data with better compression approach.
Key-Words / Index Term
LSB, DCT, DES, Stego Image
References
[1] Anderson, R. J., & Petitcolas, F. A., On the limits of steganography.Selected Areas in Communications, IEEE Journal on, 16(4), 474- 481, 1998.
[2] Anderson, R., Stretching the limits of steganography. In Information Hiding. Springer Berlin Heidelberg, pp. 39-48, 1996, January.
[3] Amin, M. M., Salleh, M., Ibrahim, S., Katmin, M. R., & Shamsuddin, M. Z. I. Information hiding using steganography. InTelecommunication Technology, 2003. NCTT 2003 Proceedings. 4th National Conference on, pp. 21- 25, 2003, January. IEEE.
[4] Saraswat, P. K., & Gupta, D. R., A Review of Digital Image Steganography. Journal of Pure and Applied Science & Technology Copyright, 2(1), 98-106, 2011.
[5] General model of today’s Steganography. Retrieved on December 8, 2013 from: http://www.datahide.com
[6] Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P., Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752, 2010.
[7] Hemalatha, S., Acharya, U. D., Renuka, A., & Kamath, P. R., A secure and high capacity image steganography technique. Signal & Image Processing: An International Journal (SIPIJ) Vol, 4, 83-89, 2013.
[8] Kaur, R., & Singh, B., Survey and Analysis of Various Steganography Techniques. International Journal of Computer Science and Advanced Technology, 6(3), 561 – 566, 2012.
[9] Hamid, N., Yahya, A., Ahmad, R. B., & Al-Qershi, O. M., Image steganography techniques: an overview. International Journal of Computer Science and Security (IJCSS), 6(3), 168-187, 2012.
[10] Rouse, M. (2010). Retrieved on December 19, 2013, from: http://whatis.techtarget.com
[11] Tiwari, N., & Shandilya, D. M., Evaluation of Various LSB based Methods of Image Steganography on GIF File Format. International Journal of Computer Applications, 0975–8887, 2010.
[12] Grantham, B., “Bitmap Steganography: An Introduction”, 2007.
[13] Fridrich, J., Goljan, M., & Hogea, D., Steganalysis of JPEG images: Breaking the F5 algorithm. In Information Hiding, Springer Berlin Heidelberg. pp.310-323, 2003, January.
[14] Provos, N., & Honeyman, P., Hide and seek: An introduction to steganography. Security & Privacy, IEEE, 1(3), 32-44, 2003.
[15] Jókay, M., & Morav?ík, T, Image-based JPEG steganography. Tatra Mountains Mathematical Publications, 45(1), 65-74, 2010.
[16] Morkel, T., Eloff, J. H., & Olivier, M.S., An overview of image steganography. In ISSA, pp. 1-11, 2005, June.
[17] Wang, S.J., Steganography of capacity required using modulo operator for embedding secret image. Applied Mathematics and Computation, 164(1), 99-116, 2005.
[18] Hariri, M., Karimi, R., & Nosrati, M., An introduction to steganography methods. World Applied Programming, 1(3),191-195, 2011.
[19] Joshi, R., Gagnani, L., & Pandey, S., Image Steganography With LSB.International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 2(1), pp-228, 2013.
[20] Sutaone, M. S., & Khandare, M.V., Image based steganography using LSB insertion technique. In Wireless, Mobile and Multimedia Networks, 2008. IET International Conference on, pp. 146-151, 2008 January. IET.
[21] Sravanthi, M. G., Devi, M. B. S., Riyazoddin, S. M., & Reddy, M.J., A Spatial Domain Image Steganography Technique Based on Plane Bit Substitution Method. Global Journal of Computer Science and Technology Graphics & Vision, 12 (15), 2012.
[22] Gupta, M., & Garg, A.K., Analysis of Image Compression Algorithm Using DCT. International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 2, 515-521, 2012.
Citation
Vikas Singhal, Devendra Singh, Sanjai Gupta, "Literature Review on Improving Data Security using DES and DCT," International Journal of Computer Sciences and Engineering, Vol.9, Issue.7, pp.78-83, 2021.