To produce Augmented reality learning media products based on Discovery learning on circulatory system material, assessing the feasibility and effectiveness of Discovery learning based Augmented reality learning media products on circulatory system material in the learning process of class XI students at SMA Plus Sedayu Nusantara. This research is a Research and Development (R & D) development research with the ADDIE development model. Subjects included 2 material experts, 2 media experts, 3 students in the individual test, 9 students in the small group test, and 30 students in the limited field test. The results showed that: Augmented Reality learning media based on Discovery Learning on the circulatory system is very suitable to be used as a learning resource in learning material for the Circulatory System Class XI SMA; Discovery Learning-based Augmented Reality learning media on the circulatory system is very effective in use, testing the effectiveness of Discovery Learning-based Augmented Reality learning media products on the circulatory system fulfills the criteria of being effectively used which is shown from the results of product effectiveness testing using the t-test on different independent test tests. The average result of the assessment in the experimental class was that the average score of the learning outcomes test was higher than the average result of the control class students who did not use learning media.
{"title":"Augmented Reality Based on Discovery Learning: The Human Circulatory System to Improve Biological Literacy","authors":"Rogaya ., R. Mursid, Baharuddin .","doi":"10.7753/ijcatr1204.1011","DOIUrl":"https://doi.org/10.7753/ijcatr1204.1011","url":null,"abstract":"To produce Augmented reality learning media products based on Discovery learning on circulatory system material, assessing the feasibility and effectiveness of Discovery learning based Augmented reality learning media products on circulatory system material in the learning process of class XI students at SMA Plus Sedayu Nusantara. This research is a Research and Development (R & D) development research with the ADDIE development model. Subjects included 2 material experts, 2 media experts, 3 students in the individual test, 9 students in the small group test, and 30 students in the limited field test. The results showed that: Augmented Reality learning media based on Discovery Learning on the circulatory system is very suitable to be used as a learning resource in learning material for the Circulatory System Class XI SMA; Discovery Learning-based Augmented Reality learning media on the circulatory system is very effective in use, testing the effectiveness of Discovery Learning-based Augmented Reality learning media products on the circulatory system fulfills the criteria of being effectively used which is shown from the results of product effectiveness testing using the t-test on different independent test tests. The average result of the assessment in the experimental class was that the average score of the learning outcomes test was higher than the average result of the control class students who did not use learning media.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125973246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As a branch of image recognition, facial expression recognition helps to carry out medical, educational, security and other work more efficiently. This article combines deep learning knowledge and conducts research on expression recognition based on DenseNet121, a dense convolutional neural network that integrates attention mechanisms for multi-scale feature extraction. Firstly, in response to the insufficient ability of DenseNet121 to extract complex facial expression features, multi-scale feature extraction dense blocks were introduced to replace DenseBlocks used to extract features of different sizes; Secondly, using multi-scale feature extraction convolutional blocks to replace the large convolutional kernel at the head of DenseNet121 further enriches feature extraction; Finally, in order to extract more important features from the channel dimension, we consider combining ECA channel attention mechanism to help improve model performance. The experiment proves that the model proposed in this chapter has improved recognition accuracy by 2.034% and 3.031% compared to DenseNet121 on the FER2013 and CK+datasets, respectively. It also has certain advantages compared to other commonly used classification models.
{"title":"Facial Expression Recognition Based on Improved Densenet Network","authors":"Tao JunChen","doi":"10.7753/ijcatr1204.1012","DOIUrl":"https://doi.org/10.7753/ijcatr1204.1012","url":null,"abstract":"As a branch of image recognition, facial expression recognition helps to carry out medical, educational, security and other work more efficiently. This article combines deep learning knowledge and conducts research on expression recognition based on DenseNet121, a dense convolutional neural network that integrates attention mechanisms for multi-scale feature extraction. Firstly, in response to the insufficient ability of DenseNet121 to extract complex facial expression features, multi-scale feature extraction dense blocks were introduced to replace DenseBlocks used to extract features of different sizes; Secondly, using multi-scale feature extraction convolutional blocks to replace the large convolutional kernel at the head of DenseNet121 further enriches feature extraction; Finally, in order to extract more important features from the channel dimension, we consider combining ECA channel attention mechanism to help improve model performance. The experiment proves that the model proposed in this chapter has improved recognition accuracy by 2.034% and 3.031% compared to DenseNet121 on the FER2013 and CK+datasets, respectively. It also has certain advantages compared to other commonly used classification models.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115789016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The 21st century education system prioritizes students to have critical, creative, collaborative thinking skills and communication skills, including higher-order thinking skills. This study aims to develop online teaching materials for HOTS-based integrated General Chemistry courses using the ADDIE model to improve students' higher order thinking skills. This development research resulted in HOTS-based integrated online teaching materials that were feasible and effective in improving students' higher order thinking skills. Through the HOTS-based media integrated online teaching materials produced, students are required and trained to be able to think critically, creatively, analytically towards existing information and data and have the ability to solve problems.
{"title":"Development of Online General Chemistry Teaching Materials Integrated with HOTS-Based Media Using the ADDIE Model","authors":"","doi":"10.7753/ijcatr1105.1001","DOIUrl":"https://doi.org/10.7753/ijcatr1105.1001","url":null,"abstract":"The 21st century education system prioritizes students to have critical, creative, collaborative thinking skills and communication skills, including higher-order thinking skills. This study aims to develop online teaching materials for HOTS-based integrated General Chemistry courses using the ADDIE model to improve students' higher order thinking skills. This development research resulted in HOTS-based integrated online teaching materials that were feasible and effective in improving students' higher order thinking skills. Through the HOTS-based media integrated online teaching materials produced, students are required and trained to be able to think critically, creatively, analytically towards existing information and data and have the ability to solve problems.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115418533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system’s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
{"title":"A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Templates in Verification and Identification Systems","authors":"Joseph Mwema, S. Kimani, Michael W. Kimwele","doi":"10.7753/ijcatr0402.1005","DOIUrl":"https://doi.org/10.7753/ijcatr0402.1005","url":null,"abstract":"The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system’s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133124277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The goal of Computer aided device start from the physical description of integrated circuit devices, considering both the physical configuration and related device properties and build the link between the broad range of physics and electrical behavior models that support circuit design. Physics-based modeling of devices, is distributed and lumped form is an essential part of the IC process development. It seeks to quantify the underlying understanding of the technology and abstract that knowledge to the device design level, including extraction of the key parameters that support circuit design and statistical metrology [1][2]. IC development for more than a quarter-century has been dominated by the MOS technology. In the 1970s and 1980s NMOS was favored owing to speed and area advantages, coupled with technology limitations and concerns related to isolation, parasitic effects and process complexity. During that era of NMOS-dominated LSI and the emergence of VLSI, the fundamental scaling laws of MOS technology were codified and broadly applied [3]. It was also during this period that Computer Aided Device reached maturity in terms of realizing robust process modeling (primarily one-dimensional) which then became an integral technology design tool, used universally across the industry [4]. At the same time device simulation, dominantly two-dimensional owing to the nature of MOS devices, became the work-horse of technologists in the design and scaling of devices [5]. The transition from NMOS to CMOS technology resulted in the necessity of tightly coupled and fully 2D simulators for process and device simulations [6][7].
{"title":"Computer Interface for Electroluminescence (EL)","authors":"A. Mishra","doi":"10.7753/ijcatr0503.1010","DOIUrl":"https://doi.org/10.7753/ijcatr0503.1010","url":null,"abstract":"The goal of Computer aided device start from the physical description of integrated circuit devices, considering both the physical configuration and related device properties and build the link between the broad range of physics and electrical behavior models that support circuit design. Physics-based modeling of devices, is distributed and lumped form is an essential part of the IC process development. It seeks to quantify the underlying understanding of the technology and abstract that knowledge to the device design level, including extraction of the key parameters that support circuit design and statistical metrology [1][2]. IC development for more than a quarter-century has been dominated by the MOS technology. In the 1970s and 1980s NMOS was favored owing to speed and area advantages, coupled with technology limitations and concerns related to isolation, parasitic effects and process complexity. During that era of NMOS-dominated LSI and the emergence of VLSI, the fundamental scaling laws of MOS technology were codified and broadly applied [3]. It was also during this period that Computer Aided Device reached maturity in terms of realizing robust process modeling (primarily one-dimensional) which then became an integral technology design tool, used universally across the industry [4]. At the same time device simulation, dominantly two-dimensional owing to the nature of MOS devices, became the work-horse of technologists in the design and scaling of devices [5]. The transition from NMOS to CMOS technology resulted in the necessity of tightly coupled and fully 2D simulators for process and device simulations [6][7].","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130893626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Script identification is very essential before running an individual OCR system. Automatic language script identification from document images facilitates many important applications such as sorting, transcription of multilingual documents and indexing of large collection of such images, or as a precursor to optical character recognition (OCR), in this paper the characterized are between Syriac and English documents or between Syriac and Arabic documents were the characterized is achieved by extracting Haralick texture Features. it is investigated a texture as a tool for determining the script of document image ,based on the observation that text has a distinct visual texture. Further, K nearest neighbour algorithm is used to classify 300 text blocks into one of the two scripts: Syriac, and English , or Syriac and Arabic based on Haralick texture Features . The script was inserted to the System with different rotation angles between 0º and 135º and the results of recognition were good.
{"title":"Haralick Texture Features based Syriac(Assyrian) and English or Arabic documents Classification","authors":"Basima Z. Yacob","doi":"10.7753/ijcatr0402.1006","DOIUrl":"https://doi.org/10.7753/ijcatr0402.1006","url":null,"abstract":"Script identification is very essential before running an individual OCR system. Automatic language script identification from document images facilitates many important applications such as sorting, transcription of multilingual documents and indexing of large collection of such images, or as a precursor to optical character recognition (OCR), in this paper the characterized are between Syriac and English documents or between Syriac and Arabic documents were the characterized is achieved by extracting Haralick texture Features. it is investigated a texture as a tool for determining the script of document image ,based on the observation that text has a distinct visual texture. Further, K nearest neighbour algorithm is used to classify 300 text blocks into one of the two scripts: Syriac, and English , or Syriac and Arabic based on Haralick texture Features . The script was inserted to the System with different rotation angles between 0º and 135º and the results of recognition were good.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123793661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
SOA is structural approach for creating services to be reused and shared, so it provides agility and cost saving in software development by dividing the application into multiple software components to be reused in other systems. Cloud computing is truly scalable and provide virtualized resources which users can subscribe. Using a cloud and SOA in virtual learning systems provide a great chance for learners to enhance gained learning outcomes. The adoption of cloud services also assists in reducing the cost of software, hardware, human resources and infrastructure. This paper will use SOA and cloud computing to transfer virtual learning systems in the cloud to be more integrated and interoperable through showing a conceptual model of distributed virtual learning system and using cloud computing combined with services oriented architecture, to contribute in interoperability and integration of e-learning systems in general
{"title":"SOA for Dynamically Integrated Virtual Learning Environment Systems with Cloud Based Services","authors":"Mohammed E Abdelhag, S. F. Osman","doi":"10.7753/ijcatr0402.1007","DOIUrl":"https://doi.org/10.7753/ijcatr0402.1007","url":null,"abstract":"SOA is structural approach for creating services to be reused and shared, so it provides agility and cost saving in software development by dividing the application into multiple software components to be reused in other systems. Cloud computing is truly scalable and provide virtualized resources which users can subscribe. Using a cloud and SOA in virtual learning systems provide a great chance for learners to enhance gained learning outcomes. The adoption of cloud services also assists in reducing the cost of software, hardware, human resources and infrastructure. This paper will use SOA and cloud computing to transfer virtual learning systems in the cloud to be more integrated and interoperable through showing a conceptual model of distributed virtual learning system and using cloud computing combined with services oriented architecture, to contribute in interoperability and integration of e-learning systems in general","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124508360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The advent of Big Data has presented nee challenges in terms of Data Security. There is an increasing need of research in technologies that can handle the vast volume of Data and make it secure efficiently. Current Technologies for securing data are slow when applied to huge amounts of data. This paper discusses security aspect of Big Data.
{"title":"Solve Big Data Security Issues","authors":"A. Banik, S. K. Bandyopadhyay","doi":"10.7753/ijcatr0503.1009","DOIUrl":"https://doi.org/10.7753/ijcatr0503.1009","url":null,"abstract":"The advent of Big Data has presented nee challenges in terms of Data Security. There is an increasing need of research in technologies that can handle the vast volume of Data and make it secure efficiently. Current Technologies for securing data are slow when applied to huge amounts of data. This paper discusses security aspect of Big Data.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"29 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114008172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Establishing referential relations in discourse is one of the most relevant but difficult to model problems of automatic text analysis. Reference means attributing a textual unit (linguistic expression) to a non-linguistic object (referent). The correct interpretation of the statement in the analyzed text requires solving the referent of the textual reference about the object, that is, the reference of the textual expression. In this work, a model for resolving referential relations is proposed. The method used to solve the referential relationship is finding equivalence, that is, by calculating the degree of similarity of possible elements in the word, the similarity in the referential relationship is calculated, and as a result, the relationship value of the referent in the sequence of sentences is obtained. These opportunities will be a new beginning for solving referential relationships in the Kazakh language. Based on the possibilities of computer technology, this direction in developing language education creates a great opportunity for extensive research and analysis at various levels of the language treasure as a bright mirror of the spiritual and material culture of the people.
{"title":"An Algorithm for Finding Equivalence in Referential Relations","authors":"Kalman Gulzhamal, Ilyubayev Adelzhan, Aktaeva Dilara Aidosovna, Kasym Karlygash Kydyrbekkyzy, Likerova Zinaida Valentinovna, Dauletbek Aigerim","doi":"10.7753/ijcatr1204.1009","DOIUrl":"https://doi.org/10.7753/ijcatr1204.1009","url":null,"abstract":"Establishing referential relations in discourse is one of the most relevant but difficult to model problems of automatic text analysis. Reference means attributing a textual unit (linguistic expression) to a non-linguistic object (referent). The correct interpretation of the statement in the analyzed text requires solving the referent of the textual reference about the object, that is, the reference of the textual expression. In this work, a model for resolving referential relations is proposed. The method used to solve the referential relationship is finding equivalence, that is, by calculating the degree of similarity of possible elements in the word, the similarity in the referential relationship is calculated, and as a result, the relationship value of the referent in the sequence of sentences is obtained. These opportunities will be a new beginning for solving referential relationships in the Kazakh language. Based on the possibilities of computer technology, this direction in developing language education creates a great opportunity for extensive research and analysis at various levels of the language treasure as a bright mirror of the spiritual and material culture of the people.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123672679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. K, Abhay Nataraj, M. Affan, Calden Michael D’Souza, Charan Kannati
India is one of the fifth largest economies in the world by nominal GDP with 70 per cent of the rural households still depending on agriculture as their primary source of livelihood. India is responsible for 7.39 per cent of total world agricultural production. But the agricultural supply chain used in India is inefficient and caters less to the producer. Farmers who are the producers get very less profit from selling their produce. It is estimated that about 80 percent of the profits are secured by the middlemen who have significant control over the agriculture trade in the country. The lack of communication between different stages in the chain and data transparency is also one of the major reasons why the current supply chain in India is flawed. Proper communication is essential in any system to avoid the spread of any misinformation and at each stage in the supply chain sensors are required to share data with the users so that information is collected and made available to everyone concerned with the particular transaction of goods. The combination of blockchain and IoT in the agricultural sector can provide a better supply chain system from the ground up which addresses communication and transparency issues suffered by the latter systems.
{"title":"A Survey on Blockchain-Based Supply Chain Management in Agriculture","authors":"M. K, Abhay Nataraj, M. Affan, Calden Michael D’Souza, Charan Kannati","doi":"10.7753/ijcatr1204.1008","DOIUrl":"https://doi.org/10.7753/ijcatr1204.1008","url":null,"abstract":"India is one of the fifth largest economies in the world by nominal GDP with 70 per cent of the rural households still depending on agriculture as their primary source of livelihood. India is responsible for 7.39 per cent of total world agricultural production. But the agricultural supply chain used in India is inefficient and caters less to the producer. Farmers who are the producers get very less profit from selling their produce. It is estimated that about 80 percent of the profits are secured by the middlemen who have significant control over the agriculture trade in the country. The lack of communication between different stages in the chain and data transparency is also one of the major reasons why the current supply chain in India is flawed. Proper communication is essential in any system to avoid the spread of any misinformation and at each stage in the supply chain sensors are required to share data with the users so that information is collected and made available to everyone concerned with the particular transaction of goods. The combination of blockchain and IoT in the agricultural sector can provide a better supply chain system from the ground up which addresses communication and transparency issues suffered by the latter systems.","PeriodicalId":104117,"journal":{"name":"International Journal of Computer Applications Technology and Research","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115583146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}