Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776353
N. Bhoopal, P. Sumanjali, D. Kumar, A. Ganesh, S. Saravanan, M. Prameela
As the years go by, technology is growing rapidly. This article presents the Methodology for MPPT for RES System Particle Swarm Optimization (PSO). A new optimization algorithm was developed every day. In the current work of optimizing MPPT Controller by GWO algorithm, for instance, for improving power performance on a distribution system, the PV System control technique is used. In the MATLAB / SIMULINK environment, the whole system is modelled. Finally, this paper shows how the power quality of a grid system is improved with the use of PSO based MPPT Controllers.
{"title":"Performance Evaluation of Optimal MPPT for PV System Considering Partial Shading Conditions","authors":"N. Bhoopal, P. Sumanjali, D. Kumar, A. Ganesh, S. Saravanan, M. Prameela","doi":"10.1109/CCGE50943.2021.9776353","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776353","url":null,"abstract":"As the years go by, technology is growing rapidly. This article presents the Methodology for MPPT for RES System Particle Swarm Optimization (PSO). A new optimization algorithm was developed every day. In the current work of optimizing MPPT Controller by GWO algorithm, for instance, for improving power performance on a distribution system, the PV System control technique is used. In the MATLAB / SIMULINK environment, the whole system is modelled. Finally, this paper shows how the power quality of a grid system is improved with the use of PSO based MPPT Controllers.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125590590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776436
V. Raskar, S. Lahudkar
Ultra-Wide Band (UWB) radio communication plays a major role and widely applied for low data level applications like networks sensor and delivers data rates which are high for short-term communications. However, the enormous ratio of fading channel solvable paths confounds the layout of the receiver. To solve these issues (timing and channel estimation), channel communication, transmitted reference (TR) UWB systems were used. Still, the implementation of the TR-UWB systems faces problems as difficulty building in an integrated circuit with low power and mysterious delay dimension. To overcome these issues, the study presents a Frequency-Shifted Reference (FSR) UWB system toward estimating the timing error and control the timing pulse. Specifically, a tracking loop based on particle filtering with the acquisition method in FSR-UWB system with multipath channel conditions has been considered. The particles are discrete and signals are having distributed samples that grow over time. From the simulation results, it is seen that a higher tracking precision and wider timing range is obtained with digital timing loop.
{"title":"Analysis and Simulation of Frequency Shifted Reference Ultra-Wideband System: Effects of frequency, data rate and communication","authors":"V. Raskar, S. Lahudkar","doi":"10.1109/CCGE50943.2021.9776436","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776436","url":null,"abstract":"Ultra-Wide Band (UWB) radio communication plays a major role and widely applied for low data level applications like networks sensor and delivers data rates which are high for short-term communications. However, the enormous ratio of fading channel solvable paths confounds the layout of the receiver. To solve these issues (timing and channel estimation), channel communication, transmitted reference (TR) UWB systems were used. Still, the implementation of the TR-UWB systems faces problems as difficulty building in an integrated circuit with low power and mysterious delay dimension. To overcome these issues, the study presents a Frequency-Shifted Reference (FSR) UWB system toward estimating the timing error and control the timing pulse. Specifically, a tracking loop based on particle filtering with the acquisition method in FSR-UWB system with multipath channel conditions has been considered. The particles are discrete and signals are having distributed samples that grow over time. From the simulation results, it is seen that a higher tracking precision and wider timing range is obtained with digital timing loop.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130509257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776434
Dhokane Nilima Tatyasaheb, B. Kumar
Nowadays, IoT systems are widely used in many different sectors such as medicine, industrial, etc. also it makes life easier by doing different tasks automatically. Therefore, it became prevalent, leading to produce a large number of IoT devices. Different protocols, like as MQTT, COAP, HTTP, and others, are now available for communication between these devices. Each protocol has its pros and cons. In these protocols, MQTT has become one the most popular protocols because its properties are suitable for most of the IoT systems but it also has some disadvantages like less security, complex mechanics used for security, no message priority feature, overloading, etc. In this paper, different protocols are compared with MQTT, also the architecture, advantages, and limitations of MQTT arediscussed. The evolution of MQTT is also given. The time complexity for Modified MQTT protocol over MQTT protocol.
{"title":"Implementation and Comparison of MQTT Protocol to Check the Drawbacks for Future Enhancement","authors":"Dhokane Nilima Tatyasaheb, B. Kumar","doi":"10.1109/CCGE50943.2021.9776434","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776434","url":null,"abstract":"Nowadays, IoT systems are widely used in many different sectors such as medicine, industrial, etc. also it makes life easier by doing different tasks automatically. Therefore, it became prevalent, leading to produce a large number of IoT devices. Different protocols, like as MQTT, COAP, HTTP, and others, are now available for communication between these devices. Each protocol has its pros and cons. In these protocols, MQTT has become one the most popular protocols because its properties are suitable for most of the IoT systems but it also has some disadvantages like less security, complex mechanics used for security, no message priority feature, overloading, etc. In this paper, different protocols are compared with MQTT, also the architecture, advantages, and limitations of MQTT arediscussed. The evolution of MQTT is also given. The time complexity for Modified MQTT protocol over MQTT protocol.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129544807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776397
Tanvi Kulkarni, P. de, Swara Lawande, Vagisha Sinha, Shilpa Deshpande, Supriya Kelkar
Cloud computing is a vast platform which provides users with ample services. It offers various benefits such as expense reduction, resource elasticity, managing data and easier services for hosting. At the same time, the aspects such as security, performance and reliability are the key concerns in cloud paradigm. Therefore, trustworthiness in adopting a cloud service becomes an important issue from the end user's viewpoint. Trust represents the degree to which user's expectations about the capabilities of a service are met. This paper proposes trust evaluation and cloud service recommendation system (TECSRS) which concentrates on evaluation of trust using Quality of Service (QoS) parameters. TECSRS uses Machine Learning techniques which include Linear Regression, Artificial Neural Networks (ANN), Random Forest Regression and Support Vector Regression (SVR), in trust computation. TECSRS facilitates recommending a cloud service to the end user and forecasting the trust values of cloud services. Experimental results depict that the Random Forest Regression model outperforms the other machine learning models with regard to accuracy of trust computation.
{"title":"Trust Evaluation and Cloud Service Recommendation System Based On Machine Learning Techniques","authors":"Tanvi Kulkarni, P. de, Swara Lawande, Vagisha Sinha, Shilpa Deshpande, Supriya Kelkar","doi":"10.1109/CCGE50943.2021.9776397","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776397","url":null,"abstract":"Cloud computing is a vast platform which provides users with ample services. It offers various benefits such as expense reduction, resource elasticity, managing data and easier services for hosting. At the same time, the aspects such as security, performance and reliability are the key concerns in cloud paradigm. Therefore, trustworthiness in adopting a cloud service becomes an important issue from the end user's viewpoint. Trust represents the degree to which user's expectations about the capabilities of a service are met. This paper proposes trust evaluation and cloud service recommendation system (TECSRS) which concentrates on evaluation of trust using Quality of Service (QoS) parameters. TECSRS uses Machine Learning techniques which include Linear Regression, Artificial Neural Networks (ANN), Random Forest Regression and Support Vector Regression (SVR), in trust computation. TECSRS facilitates recommending a cloud service to the end user and forecasting the trust values of cloud services. Experimental results depict that the Random Forest Regression model outperforms the other machine learning models with regard to accuracy of trust computation.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130052344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776403
Anjali Saner, Ashish Sharma, Atharva Patil, Avinash Soni, Pranav More
In this paper, we have introduce a real-time color recognition framework using openCv and PyObjC API. Hand Gestures with color detection are a natural form of communication between humans as well as between humans and machines. They are also useful in fields like sign language recognition, human-machine interface, and behavior understanding. The focus of creating colors recognition to create better communication between humans and computers for conveying information. The proposed project aims to create a video game controller wherein we can use our color detection and play the video Game on the computer. Several combinations of hand motions can be detected using deep learning and neural networks, rather than simple image processing and machine learning.
{"title":"Dynamic Color Recognition for Video Game Controller","authors":"Anjali Saner, Ashish Sharma, Atharva Patil, Avinash Soni, Pranav More","doi":"10.1109/CCGE50943.2021.9776403","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776403","url":null,"abstract":"In this paper, we have introduce a real-time color recognition framework using openCv and PyObjC API. Hand Gestures with color detection are a natural form of communication between humans as well as between humans and machines. They are also useful in fields like sign language recognition, human-machine interface, and behavior understanding. The focus of creating colors recognition to create better communication between humans and computers for conveying information. The proposed project aims to create a video game controller wherein we can use our color detection and play the video Game on the computer. Several combinations of hand motions can be detected using deep learning and neural networks, rather than simple image processing and machine learning.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776430
Nikita Deshmukh, Anamika Ahire, S. Bhandari, Apurva Mali, Kalyani Warkari
Lip reading is an approach for understanding speech by visually interpreting lip movements. Vision based lip leading system takes a video (without audio) as an input of a person speaking some word or phrase and provides the predicted word or phrase the person is speaking as output. This paper presents the method for Vision based Lip Reading system that uses convolutional neural network (CNN) with attention-based Long Short-Term Memory (LSTM). The dataset includes video clips pronouncing single digits. The pretrained CNN is used for extracting features from pre-processed video frames which then are processed for learning temporal characteristics by LSTM. The SoftMax layer of architecture provides the result of lip reading. In the present work experiments are performed with two pre-trained models namely VGG19 and ResNet50 and the results are compared. To further improve the performance of the system ensembled learning is also used. The system provides 85% accuracy using ResNet50 and ensemble learning.
{"title":"Vision based Lip Reading System using Deep Learning","authors":"Nikita Deshmukh, Anamika Ahire, S. Bhandari, Apurva Mali, Kalyani Warkari","doi":"10.1109/CCGE50943.2021.9776430","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776430","url":null,"abstract":"Lip reading is an approach for understanding speech by visually interpreting lip movements. Vision based lip leading system takes a video (without audio) as an input of a person speaking some word or phrase and provides the predicted word or phrase the person is speaking as output. This paper presents the method for Vision based Lip Reading system that uses convolutional neural network (CNN) with attention-based Long Short-Term Memory (LSTM). The dataset includes video clips pronouncing single digits. The pretrained CNN is used for extracting features from pre-processed video frames which then are processed for learning temporal characteristics by LSTM. The SoftMax layer of architecture provides the result of lip reading. In the present work experiments are performed with two pre-trained models namely VGG19 and ResNet50 and the results are compared. To further improve the performance of the system ensembled learning is also used. The system provides 85% accuracy using ResNet50 and ensemble learning.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124852420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776476
Amit Hire, J. Katti
The most prevalent form of authentication or computer system intrusion protection is the use of alphanumeric usernames and passwords. Strong password schemes have traditionally provided a certain level of protection, but they are complicated and difficult to remember, prompting their owners to write them down on paper. As a consequence, protection is jeopardized.Increasing the sharing of information, internet use, data transfer, protection and validation of passwords have become significant challenges.As a result, many programmes use different hashing and salting algorithms to store password files in databases.Attackers, on the other hand, do not consider password hashing to be safe since they use brute force attacks, password guessing attacks, and other methods to obtain the user's password from the database's password log.Some systems store passwords in databases using honeywords or bogus passwords generated using the generation technique for honeywords to prevent hacker attacks.In our recommended approach, passwords are saved using a distinct hashing mechanism with a less complexity of time in which majority of the processes need basic operation based on binarys.
{"title":"Security of User Credentials on Web Portals","authors":"Amit Hire, J. Katti","doi":"10.1109/CCGE50943.2021.9776476","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776476","url":null,"abstract":"The most prevalent form of authentication or computer system intrusion protection is the use of alphanumeric usernames and passwords. Strong password schemes have traditionally provided a certain level of protection, but they are complicated and difficult to remember, prompting their owners to write them down on paper. As a consequence, protection is jeopardized.Increasing the sharing of information, internet use, data transfer, protection and validation of passwords have become significant challenges.As a result, many programmes use different hashing and salting algorithms to store password files in databases.Attackers, on the other hand, do not consider password hashing to be safe since they use brute force attacks, password guessing attacks, and other methods to obtain the user's password from the database's password log.Some systems store passwords in databases using honeywords or bogus passwords generated using the generation technique for honeywords to prevent hacker attacks.In our recommended approach, passwords are saved using a distinct hashing mechanism with a less complexity of time in which majority of the processes need basic operation based on binarys.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776351
D. Salunke, Pooja Sabne, Hitesh Saini, Vivekanand Shivanagi, Pradnya Jadhav
Devanagari language comprises 47 primary characters that include 14 vowels and 33 consonants. Nearly 120 scripts have been developed from it like Marathi, Hindi, Bengali, etc. This paper deals with a Marathi handwritten word recognition system. Marathi is an Indian language that is spoken primarily in the state of Maharashtra, most of the government paperwork is done in this language only. This system will mainly be used in recognizing various handwritten words present in the titles of different municipal documents. The main concern regarding these documents was the task of storing them digitally. The existing works have used the method of segmentation and have proposed a hidden Markov model to recognize pseudo characters, but the accuracy can be increased. We have devised a system that will overcome this limitation. In our system, a dataset is created for 2000 samples and by applying different augmentation techniques the dataset size is further increased to 12000 images. The proposed system is implemented using deep learning based Customized Convolution Neural Network which is pre-trained on a manually collected dataset containing various Marathi handwritten words. Out of which 75% of the dataset is used for training and 25% for testing purposes. This system has proved better results on augmented data with 94% accuracy.
{"title":"Handwritten Devanagari Word Recognition using Customized Convolution Neural Network","authors":"D. Salunke, Pooja Sabne, Hitesh Saini, Vivekanand Shivanagi, Pradnya Jadhav","doi":"10.1109/CCGE50943.2021.9776351","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776351","url":null,"abstract":"Devanagari language comprises 47 primary characters that include 14 vowels and 33 consonants. Nearly 120 scripts have been developed from it like Marathi, Hindi, Bengali, etc. This paper deals with a Marathi handwritten word recognition system. Marathi is an Indian language that is spoken primarily in the state of Maharashtra, most of the government paperwork is done in this language only. This system will mainly be used in recognizing various handwritten words present in the titles of different municipal documents. The main concern regarding these documents was the task of storing them digitally. The existing works have used the method of segmentation and have proposed a hidden Markov model to recognize pseudo characters, but the accuracy can be increased. We have devised a system that will overcome this limitation. In our system, a dataset is created for 2000 samples and by applying different augmentation techniques the dataset size is further increased to 12000 images. The proposed system is implemented using deep learning based Customized Convolution Neural Network which is pre-trained on a manually collected dataset containing various Marathi handwritten words. Out of which 75% of the dataset is used for training and 25% for testing purposes. This system has proved better results on augmented data with 94% accuracy.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776446
Prasad C. Mahajan, A. Kiwelekar, L. Netak, Akshay Ghodake
Automatic Identification System (AIS), the automated data collection system for vessel tracking, plays an essential role in marine traffic management. AIS system is generating an enormous volume of data which has rampant growth. The AIS data has the potential to drive transport activities, and significant hidden insights are possible to draw by analyzing the AIS data. Some of the tasks which can rely on the AIS data are predicting routes of vessels, predicting traffic intensity, estimating the time of arrival of a ship and transport of volume. The development of analytical techniques for AIS data would lead to the attainment of business goals such as increasing profit, optimally utilize human resources at a port and reducing traffic in the ocean. This paper reviews existing and emerging techniques used to analyze AIS data in the field of marine transportation.
{"title":"Applications of Predictive Analytics in Marine Transportation","authors":"Prasad C. Mahajan, A. Kiwelekar, L. Netak, Akshay Ghodake","doi":"10.1109/CCGE50943.2021.9776446","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776446","url":null,"abstract":"Automatic Identification System (AIS), the automated data collection system for vessel tracking, plays an essential role in marine traffic management. AIS system is generating an enormous volume of data which has rampant growth. The AIS data has the potential to drive transport activities, and significant hidden insights are possible to draw by analyzing the AIS data. Some of the tasks which can rely on the AIS data are predicting routes of vessels, predicting traffic intensity, estimating the time of arrival of a ship and transport of volume. The development of analytical techniques for AIS data would lead to the attainment of business goals such as increasing profit, optimally utilize human resources at a port and reducing traffic in the ocean. This paper reviews existing and emerging techniques used to analyze AIS data in the field of marine transportation.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"4 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115729272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-23DOI: 10.1109/CCGE50943.2021.9776445
Saurabh Pargaien, R. Prakash, V. P. Dubey
The NDVI is an extensively used numerical indicator that utilizes the NIR and red band of the EM spectrum. It is waged to analyse and evaluate the ground locations for the presence of live green vegetation by using remote sensing images. This paper provides an analysis of the utility of NDVI in mapping the wheat crop of selected area of Saharanpur region, Uttar Pradesh, India. Images of Sentinel 2B were collected from November 16, 2018 to April 15, 2019. A total of 16 different date satellite images were analysed to calculate NDVI values of same region. For land cover classification various indices are used. Vegetation, sparse vegetation and dense vegetation can be identified by computing NDVI. In this article 16 different sentinel images of Saharanpur region are processed to identify the wheat crop on the basis of NDVI values. the graph shows high NDVI values in the month of march.
{"title":"Wheat Crop Classification based on NDVI using Sentinel Time Series: A Case Study Saharanpur Region","authors":"Saurabh Pargaien, R. Prakash, V. P. Dubey","doi":"10.1109/CCGE50943.2021.9776445","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776445","url":null,"abstract":"The NDVI is an extensively used numerical indicator that utilizes the NIR and red band of the EM spectrum. It is waged to analyse and evaluate the ground locations for the presence of live green vegetation by using remote sensing images. This paper provides an analysis of the utility of NDVI in mapping the wheat crop of selected area of Saharanpur region, Uttar Pradesh, India. Images of Sentinel 2B were collected from November 16, 2018 to April 15, 2019. A total of 16 different date satellite images were analysed to calculate NDVI values of same region. For land cover classification various indices are used. Vegetation, sparse vegetation and dense vegetation can be identified by computing NDVI. In this article 16 different sentinel images of Saharanpur region are processed to identify the wheat crop on the basis of NDVI values. the graph shows high NDVI values in the month of march.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126774811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}