Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060428
V. Karunakaran, Ajay Sharma
Eye tracking evaluations have been applied to HCI by breaking down the usability of PC UIs. The designers of Internet business PC UIs follow usability rules to execute web site interfaces. The web sites are by and large assessed by utilizing usability rules that give a nittier gritty agenda to web site creators. Clients are further expected to finish a usability poll to assess the client's fulfillment with the UI. New advances are continually being used to further develop web site usability evaluations. Eye tracking permits scientists to see where the client is cantering their consideration on the web site and can give extra data not given by standard usability evaluations. This exploration, utilizing an eye tracker, examines the mental cycles that a fledgling and experienced clients encounters while shopping on the web and lays out whether this cycle enhances usability testing.
{"title":"User Engagement Analysis of E-Commerce Websites from the Perspective of Eye Tracking","authors":"V. Karunakaran, Ajay Sharma","doi":"10.1109/ICERECT56837.2022.10060428","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060428","url":null,"abstract":"Eye tracking evaluations have been applied to HCI by breaking down the usability of PC UIs. The designers of Internet business PC UIs follow usability rules to execute web site interfaces. The web sites are by and large assessed by utilizing usability rules that give a nittier gritty agenda to web site creators. Clients are further expected to finish a usability poll to assess the client's fulfillment with the UI. New advances are continually being used to further develop web site usability evaluations. Eye tracking permits scientists to see where the client is cantering their consideration on the web site and can give extra data not given by standard usability evaluations. This exploration, utilizing an eye tracker, examines the mental cycles that a fledgling and experienced clients encounters while shopping on the web and lays out whether this cycle enhances usability testing.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129779067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060652
Feng Wang
Taking CNKI (China National Knowledge Infrastructure) as the data source and “digital archives information security” as the theme, this paper searches the papers in Chinese core journals such as SCI, EI and CSSCI in the field of Science in CNKI database, and obtains 396 documents after de duplication, Using the methods of literature metrology and knowledge atlas, this paper analyzes the publishing trend, publishing institutions, authors, journals, research hotspots and other issues in the field of information security of Digital Archives in China, and comprehensively combs the whole development process of this field, so as to provide reference for relevant units.
{"title":"Research on the Development of Digital Archives Information Security in China","authors":"Feng Wang","doi":"10.1109/ICERECT56837.2022.10060652","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060652","url":null,"abstract":"Taking CNKI (China National Knowledge Infrastructure) as the data source and “digital archives information security” as the theme, this paper searches the papers in Chinese core journals such as SCI, EI and CSSCI in the field of Science in CNKI database, and obtains 396 documents after de duplication, Using the methods of literature metrology and knowledge atlas, this paper analyzes the publishing trend, publishing institutions, authors, journals, research hotspots and other issues in the field of information security of Digital Archives in China, and comprehensively combs the whole development process of this field, so as to provide reference for relevant units.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129789445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060667
Ch.Naga Phaneendra, K. Ram, D. Naveen, L. Sreekar, K. K. Naik
Multiple-input-multiple-output (MIMO) antenna systems was designed with electromagnetic simulator for 4G and 5G wireless applications. The computational measured results of two parasitic L-shaped elements are proposed to enhance and operate multiple frequencies. The proposed MIMO antenna has operated at 9.3 GHz, 17.5 GHz, and 19.3 GHz with reflection coefficient of −28 dB, −29 dB, and −18 dB respectively. The proposed MIMO antenna's gain are successively, 5.22 dB, 5.27 dB, 5.71 dB, and impedance bandwidth of 1.24 GHz, 1.6 GHz, and 5.89 GHz for respective operating frequencies. The proposed antenna model was work at X-band, K-band and Ku-band respectively for wireless applications. The simulated and measured parameters of proposed antenna results were agreed.
{"title":"Design a Multi-Band MIMO Patch Antenna at X, K, and Ku Band for Wireless Applications","authors":"Ch.Naga Phaneendra, K. Ram, D. Naveen, L. Sreekar, K. K. Naik","doi":"10.1109/ICERECT56837.2022.10060667","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060667","url":null,"abstract":"Multiple-input-multiple-output (MIMO) antenna systems was designed with electromagnetic simulator for 4G and 5G wireless applications. The computational measured results of two parasitic L-shaped elements are proposed to enhance and operate multiple frequencies. The proposed MIMO antenna has operated at 9.3 GHz, 17.5 GHz, and 19.3 GHz with reflection coefficient of −28 dB, −29 dB, and −18 dB respectively. The proposed MIMO antenna's gain are successively, 5.22 dB, 5.27 dB, 5.71 dB, and impedance bandwidth of 1.24 GHz, 1.6 GHz, and 5.89 GHz for respective operating frequencies. The proposed antenna model was work at X-band, K-band and Ku-band respectively for wireless applications. The simulated and measured parameters of proposed antenna results were agreed.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128437771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059802
H. S. Sridhar, Sakcham Somvanshi, Mansi Ramsinghani, Nimishambha H. C.
The Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real-world objects through the Internet. When it comes to our homes, this concept can be suitably incorporated to make them smarter, safer and more automated. Therefore, smart home automation is a topic that is gaining popularity day by day due to its advantages. One can quickly achieve automation by connecting home appliances to the Internet or cloud storage. The cloud computing-based platform helps to connect with the things that surround everyone so that they can easily access anything and everything anytime anywhere in a user-friendly way. This IoT paper focuses on building an innovative wireless system that allows the owner to control the appliances of the place. The most important aspect of this system is to incorporate smooth working of the automated appliances via both the internet and the manual control. The ESP 8266 is a low-cost microcontroller that works on a 3.3V dc supply and has integrated Wi-Fi and Bluetooth modules with built-in TCP/IP networking software. It has 17 programmable GPIOs, enough to control all four relays, and two servo motors for the paper. Bell types switches are used for the manual control of the appliances.
{"title":"Designing of Smart Home Automation Using IoT","authors":"H. S. Sridhar, Sakcham Somvanshi, Mansi Ramsinghani, Nimishambha H. C.","doi":"10.1109/ICERECT56837.2022.10059802","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059802","url":null,"abstract":"The Internet of Things (IoT) conceptualizes the idea of remotely connecting and monitoring real-world objects through the Internet. When it comes to our homes, this concept can be suitably incorporated to make them smarter, safer and more automated. Therefore, smart home automation is a topic that is gaining popularity day by day due to its advantages. One can quickly achieve automation by connecting home appliances to the Internet or cloud storage. The cloud computing-based platform helps to connect with the things that surround everyone so that they can easily access anything and everything anytime anywhere in a user-friendly way. This IoT paper focuses on building an innovative wireless system that allows the owner to control the appliances of the place. The most important aspect of this system is to incorporate smooth working of the automated appliances via both the internet and the manual control. The ESP 8266 is a low-cost microcontroller that works on a 3.3V dc supply and has integrated Wi-Fi and Bluetooth modules with built-in TCP/IP networking software. It has 17 programmable GPIOs, enough to control all four relays, and two servo motors for the paper. Bell types switches are used for the manual control of the appliances.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"06 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127199385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060086
Karthik Kulkarni, Prakash J. Patil, Suvarna G. Kanakaraddi
Multimodal learning research has advanced quickly over the past ten years in a variety of fields, especially computer vision. Due to the growing opportunities of multimodal streaming data and deep learning algorithms, deep multimodal learning is increasingly common. This calls for the development of models that can reliably handle and interpret the multimodal data. Unstructured real-world data, often known as modalities, can naturally assume many different shapes, including both text and images often. Deep learning researchers are still driven by the need to extract useful patterns from this type of data. It is crucial to have well-organized product catalogues to enhance customers' experiences as they explore the plethora of possibilities provided by online marketplaces. The availability of product characteristics like colour or material is a crucial component of it. However, attribute data is frequently erroneous or absent on several of the markets we focus on. Utilizing deep models that have been trained on huge corpora to predict features from unstructured data, such as product descriptions and photographs (referred to as modalities in this study), is one potential approach to solving this issue. To receive a comprehensive rundown of the various multi-modal colour extraction techniques and their advantages, drawbacks and open challenges.
{"title":"Multi-Modal Colour Extraction Using Deep Learning Techniques","authors":"Karthik Kulkarni, Prakash J. Patil, Suvarna G. Kanakaraddi","doi":"10.1109/ICERECT56837.2022.10060086","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060086","url":null,"abstract":"Multimodal learning research has advanced quickly over the past ten years in a variety of fields, especially computer vision. Due to the growing opportunities of multimodal streaming data and deep learning algorithms, deep multimodal learning is increasingly common. This calls for the development of models that can reliably handle and interpret the multimodal data. Unstructured real-world data, often known as modalities, can naturally assume many different shapes, including both text and images often. Deep learning researchers are still driven by the need to extract useful patterns from this type of data. It is crucial to have well-organized product catalogues to enhance customers' experiences as they explore the plethora of possibilities provided by online marketplaces. The availability of product characteristics like colour or material is a crucial component of it. However, attribute data is frequently erroneous or absent on several of the markets we focus on. Utilizing deep models that have been trained on huge corpora to predict features from unstructured data, such as product descriptions and photographs (referred to as modalities in this study), is one potential approach to solving this issue. To receive a comprehensive rundown of the various multi-modal colour extraction techniques and their advantages, drawbacks and open challenges.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128982556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060595
Niall Davis, Emanuel S. Grant
Phishing, a type of social engineering attack, continues to be a problem, and anti-phishing approaches must be implemented to stymie these attacks. With the rise of new educational methods that go beyond lecture-based, the question is whether there is a modern approach to education. One method that has existed for years is that of simulated phishing training, but it is thought that there needs to be a more engaging approach to this area of education. Gamification in phishing education is a more recent but not extremely well studied approach, which leads to the question – Which is better for phishing education of users, simulated phishing exercises or gamified phishing training? In this report, five research articles in each category are described and summarized, and then an analysis is conducted within the groups and between the two groups. The analysis is focused on quantitative metrics that appear in the selected research articles; there is a lesser focus on the qualitative analysis conducted in the reviewed reports. From this comparative analysis, gamified phishing training appears to be a more suitable method of educating users, as it reduces susceptibility and engages students at a higher level of learning.
{"title":"Simulated Phishing Training Exercises versus Gamified Phishing Education Games","authors":"Niall Davis, Emanuel S. Grant","doi":"10.1109/ICERECT56837.2022.10060595","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060595","url":null,"abstract":"Phishing, a type of social engineering attack, continues to be a problem, and anti-phishing approaches must be implemented to stymie these attacks. With the rise of new educational methods that go beyond lecture-based, the question is whether there is a modern approach to education. One method that has existed for years is that of simulated phishing training, but it is thought that there needs to be a more engaging approach to this area of education. Gamification in phishing education is a more recent but not extremely well studied approach, which leads to the question – Which is better for phishing education of users, simulated phishing exercises or gamified phishing training? In this report, five research articles in each category are described and summarized, and then an analysis is conducted within the groups and between the two groups. The analysis is focused on quantitative metrics that appear in the selected research articles; there is a lesser focus on the qualitative analysis conducted in the reviewed reports. From this comparative analysis, gamified phishing training appears to be a more suitable method of educating users, as it reduces susceptibility and engages students at a higher level of learning.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130746206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060732
A. Karegowda, A. Leenarani, D. Poornima, R. Pooja, Shreetha Bhatt, P. Bharathi
Manual recognition of different styles of handwritten characters, digits, symbols, and operators is quite intricate. This paper attempts to automate the process of recognition of digits (0 to 9), decimal point, opening and closing parenthesis (‘(’ and ‘)’) brackets, and five binary arithmetic operators: sum (+), difference (-), product (×), exponent (A) and division in input handwritten equation followed by evaluation of expression. Firstly the segmentation based on binary threshold and contouring is applied to segregate the components of input handwritten equation. The individual segregated components are further input to Convolution Neural Networks(CNN) for recognition as part of second step, followed by evaluation of valid expression as the final step. The publicly available MNIST dataset handwritten digits (0–9) are considered and rest of the images for parenthesis, decimal point and five arithmetic operators are manually generated. The CNN model identified the handwritten expression with a high accuracy of 99% followed by a correct evaluation of the valid expression.
{"title":"Deep Learning based Handwritten Arithmetic Equation Solver","authors":"A. Karegowda, A. Leenarani, D. Poornima, R. Pooja, Shreetha Bhatt, P. Bharathi","doi":"10.1109/ICERECT56837.2022.10060732","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060732","url":null,"abstract":"Manual recognition of different styles of handwritten characters, digits, symbols, and operators is quite intricate. This paper attempts to automate the process of recognition of digits (0 to 9), decimal point, opening and closing parenthesis (‘(’ and ‘)’) brackets, and five binary arithmetic operators: sum (+), difference (-), product (×), exponent (A) and division in input handwritten equation followed by evaluation of expression. Firstly the segmentation based on binary threshold and contouring is applied to segregate the components of input handwritten equation. The individual segregated components are further input to Convolution Neural Networks(CNN) for recognition as part of second step, followed by evaluation of valid expression as the final step. The publicly available MNIST dataset handwritten digits (0–9) are considered and rest of the images for parenthesis, decimal point and five arithmetic operators are manually generated. The CNN model identified the handwritten expression with a high accuracy of 99% followed by a correct evaluation of the valid expression.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131342035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060273
K. Swetha, R. G K, Shashikala S V
Brain-Computer Interface will recognize patterns in mental activity using the computer's algorithm in controlling a third-party device. Ideally, BDI will measure the activity of the brain to command and control messages. Electroencephalogram (EEG) is a commonly used approach in BCI based on its non-invasive and convenient use. As a result, more and more BCIs have been designed for persons with disabilities who suffer from spinal cord injury helping to rehabilitate and live. BCI includes feature extraction methods, the signal processing. Later, the different hybrid BCI combined methods and review the synchronous/asynchronous BCI designs.
{"title":"SSVEP-Based Brain-Computer Interface System for Managing Disabilities","authors":"K. Swetha, R. G K, Shashikala S V","doi":"10.1109/ICERECT56837.2022.10060273","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060273","url":null,"abstract":"Brain-Computer Interface will recognize patterns in mental activity using the computer's algorithm in controlling a third-party device. Ideally, BDI will measure the activity of the brain to command and control messages. Electroencephalogram (EEG) is a commonly used approach in BCI based on its non-invasive and convenient use. As a result, more and more BCIs have been designed for persons with disabilities who suffer from spinal cord injury helping to rehabilitate and live. BCI includes feature extraction methods, the signal processing. Later, the different hybrid BCI combined methods and review the synchronous/asynchronous BCI designs.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129194397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10060475
Wen Li, Jingjing Liu
As an integral part of an enterprise, accounting information system (AIS) plays a supporting role for the enterprise. Therefore, the goal of AIS control is consistent with this goal, and has certain expansion on this basis. The AIS provides the information that the enterprise needs to achieve its goals, so it also needs to be consistent with the enterprise's strategic goals. In addition, it is also necessary to consider the reliability and effectiveness of information, as well as the requirements of laws and superior supervisors, the rational use of information resources and risk control. Therefore, this paper briefly introduces the theory of COBIT and COSO, analyzes the design of the internal control (IC) processing module of the AIS and the IC processing module of the AIS, discusses the selection of variables and the establishment model of the IC of the AIS, and constructs the IC model under the IT environment based on COSO and COBIT, which will facilitate the analysis and control of the construction and application process of the AIS, Provide security for users of AIS through management and control.
{"title":"Internal Control Accounting Information System based on COBIT and COSO Reports","authors":"Wen Li, Jingjing Liu","doi":"10.1109/ICERECT56837.2022.10060475","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10060475","url":null,"abstract":"As an integral part of an enterprise, accounting information system (AIS) plays a supporting role for the enterprise. Therefore, the goal of AIS control is consistent with this goal, and has certain expansion on this basis. The AIS provides the information that the enterprise needs to achieve its goals, so it also needs to be consistent with the enterprise's strategic goals. In addition, it is also necessary to consider the reliability and effectiveness of information, as well as the requirements of laws and superior supervisors, the rational use of information resources and risk control. Therefore, this paper briefly introduces the theory of COBIT and COSO, analyzes the design of the internal control (IC) processing module of the AIS and the IC processing module of the AIS, discusses the selection of variables and the establishment model of the IC of the AIS, and constructs the IC model under the IT environment based on COSO and COBIT, which will facilitate the analysis and control of the construction and application process of the AIS, Provide security for users of AIS through management and control.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126652127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-26DOI: 10.1109/ICERECT56837.2022.10059793
S. N, H. Kumar
Farming is the major occupation in India and farmers are the backbone of India. Over 70 percent of people are empowered by farming. Mandya district is one of the most agriculturally prosperous districts in Karnataka. Farming is the dominant activity in the district. Sugarcane is one of the major crops of the district. The salient provenance for farming is soil. By adapting the traditional methods of farming and adding chemical fertilizers without any recommendation, soil is losing its essence. Technologies play a major role in farming. Like smart home, smart city, many researchers are working towards smart farming. As soil is the salient provenance of farming, identifying the chemical, physical and biological parameters in the soil and monitoring the soil quality will assist farmers to be aware of the soil fertility and crop suggestions. To assist growers, proposing an approach to identifying and monitoring the quality of the soil in a modern way for the betterment of farming and to retain the fertile soil for the future generation. In this approach, use machine learning techniques (Random Forest Algorithm) to monitor the quality of the soil, decide the quantity of fertilizers to be added to the soil, and crop rotation.
{"title":"Soil Quality Identifying and Monitoring Approach for Sugarcane Using Machine Learning Techniques","authors":"S. N, H. Kumar","doi":"10.1109/ICERECT56837.2022.10059793","DOIUrl":"https://doi.org/10.1109/ICERECT56837.2022.10059793","url":null,"abstract":"Farming is the major occupation in India and farmers are the backbone of India. Over 70 percent of people are empowered by farming. Mandya district is one of the most agriculturally prosperous districts in Karnataka. Farming is the dominant activity in the district. Sugarcane is one of the major crops of the district. The salient provenance for farming is soil. By adapting the traditional methods of farming and adding chemical fertilizers without any recommendation, soil is losing its essence. Technologies play a major role in farming. Like smart home, smart city, many researchers are working towards smart farming. As soil is the salient provenance of farming, identifying the chemical, physical and biological parameters in the soil and monitoring the soil quality will assist farmers to be aware of the soil fertility and crop suggestions. To assist growers, proposing an approach to identifying and monitoring the quality of the soil in a modern way for the betterment of farming and to retain the fertile soil for the future generation. In this approach, use machine learning techniques (Random Forest Algorithm) to monitor the quality of the soil, decide the quantity of fertilizers to be added to the soil, and crop rotation.","PeriodicalId":205485,"journal":{"name":"2022 Fourth International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121468404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}