Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563336
Silambarasan Elkana Ebinazer, N. Savarimuthu, Saira Bhanu S Mary
Cloud storage is the decisive service for the organization, hospitals etc., for storing huge amount of data within their budget. But, Cloud Service Providers (CSPs) are facing the major problem of duplicate and redundant data being accumulated by Data Owners (DO) in the cloud storages. Deduplication is one of the major technique to solve the above problem but faces the major drawback in the form of security flaws. Secure deduplication is a very promising solution proposed by the researchers for addressing this issue. In this paper, problems like revocation of DOs, brute force attack and duplicate faking attack are addressed as part of secure deduplication. The proposed approach is having two protocols, namely, Proof of Identity (PoI) and Proof of Data Integrity (PoDI) which solves the above-mentioned problems. The proposed approach improves the efficiency of secure deduplication, enhances data privacy and addresses Data Owner (DO) revocation problem.
{"title":"PoI: Proof of Identity and PoDI: Proof of Data Integrity for Secure Data Deduplication in the Cloud","authors":"Silambarasan Elkana Ebinazer, N. Savarimuthu, Saira Bhanu S Mary","doi":"10.1109/ACCESS51619.2021.9563336","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563336","url":null,"abstract":"Cloud storage is the decisive service for the organization, hospitals etc., for storing huge amount of data within their budget. But, Cloud Service Providers (CSPs) are facing the major problem of duplicate and redundant data being accumulated by Data Owners (DO) in the cloud storages. Deduplication is one of the major technique to solve the above problem but faces the major drawback in the form of security flaws. Secure deduplication is a very promising solution proposed by the researchers for addressing this issue. In this paper, problems like revocation of DOs, brute force attack and duplicate faking attack are addressed as part of secure deduplication. The proposed approach is having two protocols, namely, Proof of Identity (PoI) and Proof of Data Integrity (PoDI) which solves the above-mentioned problems. The proposed approach improves the efficiency of secure deduplication, enhances data privacy and addresses Data Owner (DO) revocation problem.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563325
S. Wagle, A. A. Bazilraj, K. Ray
Wireless Sensor Networks (WSN) are gaining popularity as being the backbone of Cyber physical systems, IOT and various data acquisition from sensors deployed in remote, inaccessible terrains have remote deployment. However due to remote deployment, WSN is an adhoc network of large number of sensors either heli-dropped in inaccessible terrain like volcanoes, Forests, border areas are highly energy deficient and available in large numbers. This makes it the right soup to become vulnerable to various kinds of Security attacks. The lack of energy and resources makes it deprived of developing a robust security code for mitigation of various kinds of attacks. Many attempts have been made to suggest a robust security Protocol. But these consume so much energy, bandwidth, processing power, memory and other resources that the sole purpose of data gathering from inaccessible terrain from energy deprived sensors gets defeated. This paper makes an attempt to study the types of attacks on different layers of WSN and the examine the recent trends in development of various security protocols to mitigate the attacks. Further, we have proposed a simple, lightweight but powerful security protocol known as Simple Sensor Security Protocol (SSSP), which captures the uniqueness of WSN and its isolation from internet to develop an energy efficient security solution.
{"title":"Energy efficient security solution for attacks on Wireless Sensor Networks","authors":"S. Wagle, A. A. Bazilraj, K. Ray","doi":"10.1109/ACCESS51619.2021.9563325","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563325","url":null,"abstract":"Wireless Sensor Networks (WSN) are gaining popularity as being the backbone of Cyber physical systems, IOT and various data acquisition from sensors deployed in remote, inaccessible terrains have remote deployment. However due to remote deployment, WSN is an adhoc network of large number of sensors either heli-dropped in inaccessible terrain like volcanoes, Forests, border areas are highly energy deficient and available in large numbers. This makes it the right soup to become vulnerable to various kinds of Security attacks. The lack of energy and resources makes it deprived of developing a robust security code for mitigation of various kinds of attacks. Many attempts have been made to suggest a robust security Protocol. But these consume so much energy, bandwidth, processing power, memory and other resources that the sole purpose of data gathering from inaccessible terrain from energy deprived sensors gets defeated. This paper makes an attempt to study the types of attacks on different layers of WSN and the examine the recent trends in development of various security protocols to mitigate the attacks. Further, we have proposed a simple, lightweight but powerful security protocol known as Simple Sensor Security Protocol (SSSP), which captures the uniqueness of WSN and its isolation from internet to develop an energy efficient security solution.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115510212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563293
Advait P. Samant, K. Warhade, Kishanprasad G. Gunale
To predict the intent of human beings walking on the street or crossing the road can be an important safety feature for intelligent cars. It has drawn the attention of the automotive industry in the past few years. Estimating whether the pedestrian is going to cross the road or not is a very challenging task because there are multiple factors involved such as the speed at which the pedestrian is walking, whether the person is walking alone or walking with someone, are they aware of the vehicle etc. The Pedestrians Intent Detection system explores the different factors that affect the pedestrian's intent while walking or crossing the road as well as how different techniques are used to predict the intent of the pedestrian considering those factors. This research work will help design the system which predicts pedestrian's intent much like the human ability to interpret the behaviour of the pedestrian.
{"title":"Pedestrian Intent Detection using Skeleton-based Prediction for Road Safety","authors":"Advait P. Samant, K. Warhade, Kishanprasad G. Gunale","doi":"10.1109/ACCESS51619.2021.9563293","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563293","url":null,"abstract":"To predict the intent of human beings walking on the street or crossing the road can be an important safety feature for intelligent cars. It has drawn the attention of the automotive industry in the past few years. Estimating whether the pedestrian is going to cross the road or not is a very challenging task because there are multiple factors involved such as the speed at which the pedestrian is walking, whether the person is walking alone or walking with someone, are they aware of the vehicle etc. The Pedestrians Intent Detection system explores the different factors that affect the pedestrian's intent while walking or crossing the road as well as how different techniques are used to predict the intent of the pedestrian considering those factors. This research work will help design the system which predicts pedestrian's intent much like the human ability to interpret the behaviour of the pedestrian.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130666953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563288
N. Aswathy, N. M. Sivamangai
Emerging Nonvolatile Memory (NVM) devices is a technology advancement in the area of memories, which is giving a tough challenge to the existing silicon based application. This paper focuses mainly on the present and various emerging memory technologies, in order to explore its research domains. FeRAM (ferroelectric random-access memory), PCM (phase-change memory), MRAM (magnetic random-access memory) and RRAM (resistive random-access memory) are some of the types of memories taken into consideration for this purpose, with each having its own pros and cons. The performance comparison illustrates the complexity to identify the “universal memory” among the four. In this article, initially we revisit the conventional memory technologies and later part we will discuss more on the advanced studies of NVM memory technologies.
{"title":"Future Nonvolatile Memory Technologies: Challenges and Applications","authors":"N. Aswathy, N. M. Sivamangai","doi":"10.1109/ACCESS51619.2021.9563288","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563288","url":null,"abstract":"Emerging Nonvolatile Memory (NVM) devices is a technology advancement in the area of memories, which is giving a tough challenge to the existing silicon based application. This paper focuses mainly on the present and various emerging memory technologies, in order to explore its research domains. FeRAM (ferroelectric random-access memory), PCM (phase-change memory), MRAM (magnetic random-access memory) and RRAM (resistive random-access memory) are some of the types of memories taken into consideration for this purpose, with each having its own pros and cons. The performance comparison illustrates the complexity to identify the “universal memory” among the four. In this article, initially we revisit the conventional memory technologies and later part we will discuss more on the advanced studies of NVM memory technologies.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129807546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563295
S. Bharath
This paper suggests a novel idea to implement a smart switch where users can control the appliances using a mobile app that is developed using kodular tool. A series of pushbutton was installed in the system. Users can turn on or turn off the appliances by pressing relevant buttons, which will send a message through Message Queuing Telemetry Transport (MQTT). Users can also set timer to turn on or turn off appliances after a certain time. This scheduled time will store in the database and continuously process to turn on/off the appliances at a user-specified time using the node red framework. Also, this system has Bluetooth based receiver module and speaker to hear songs which have a good amount of range to receive signal. Also, users can operate or set time intervals using mobile phone app anywhere in the world. This system will save time and gives comfort to the user to operate from anywhere.
{"title":"IoT Based Smart Switch With Bluetooth Speaker Using MQTT Protocol: Node-red Framework","authors":"S. Bharath","doi":"10.1109/ACCESS51619.2021.9563295","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563295","url":null,"abstract":"This paper suggests a novel idea to implement a smart switch where users can control the appliances using a mobile app that is developed using kodular tool. A series of pushbutton was installed in the system. Users can turn on or turn off the appliances by pressing relevant buttons, which will send a message through Message Queuing Telemetry Transport (MQTT). Users can also set timer to turn on or turn off appliances after a certain time. This scheduled time will store in the database and continuously process to turn on/off the appliances at a user-specified time using the node red framework. Also, this system has Bluetooth based receiver module and speaker to hear songs which have a good amount of range to receive signal. Also, users can operate or set time intervals using mobile phone app anywhere in the world. This system will save time and gives comfort to the user to operate from anywhere.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128662476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563330
N. Santhosh, Jo Cheriyan, M. Sindhu
Recommendation systems (RS) have become a hot topic in the study, intending to assist consumers in finding goods online by offering choices that closely match their interests. Recommending a product to customers exclusively based on a quantitative review may result in the recommendation of a product that is irrelevant. Various recommendation algorithms are used by online e-commerce companies like Amazon and Flipkart to offer different choices to different customers. Amazon now uses item-to-item collaborative filtering, which expands to enormous data sets and produces high-quality real-time suggestions. This type of filtering compares the users purchased and rated items to similar things, the results are then compiled into a user-friendly list of recommendations. The goal of this research is to create a product suggestion system for an e-commerce platform that is tailored to the preferences of customers. Collaborative Filtering is one of the methods for generating suggestions. Recommend products to consumers based on their previous purchases and the ratings left by other customers who purchased comparable things. This paper discusses a model-based collaborative filtering approach, which assists in the development of predictive items for a specific user by recognizing patterns based on preferences gleaned from various user data.
{"title":"An Intelligent Exploratory Approach for Product Recommendation Using Collaborative Filtering","authors":"N. Santhosh, Jo Cheriyan, M. Sindhu","doi":"10.1109/ACCESS51619.2021.9563330","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563330","url":null,"abstract":"Recommendation systems (RS) have become a hot topic in the study, intending to assist consumers in finding goods online by offering choices that closely match their interests. Recommending a product to customers exclusively based on a quantitative review may result in the recommendation of a product that is irrelevant. Various recommendation algorithms are used by online e-commerce companies like Amazon and Flipkart to offer different choices to different customers. Amazon now uses item-to-item collaborative filtering, which expands to enormous data sets and produces high-quality real-time suggestions. This type of filtering compares the users purchased and rated items to similar things, the results are then compiled into a user-friendly list of recommendations. The goal of this research is to create a product suggestion system for an e-commerce platform that is tailored to the preferences of customers. Collaborative Filtering is one of the methods for generating suggestions. Recommend products to consumers based on their previous purchases and the ratings left by other customers who purchased comparable things. This paper discusses a model-based collaborative filtering approach, which assists in the development of predictive items for a specific user by recognizing patterns based on preferences gleaned from various user data.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125391411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563287
Chippy Susan Rajan, K. Ansal, Chinchu S. Ragamalika, M. Sreenath
An asymmetric antenna for UWB (Ultra Wide Band) applications is designed and simulated. This antenna exhibits a low profile with a size of 25×12×1.52mm3 and has an operational bandwidth from 3.185 to 13.29GHz. This paper is an evolved version of a coplanar waveguide fed antenna in anticipation of obtaining the ultrawide band even after reducing the size of the antenna by half. Designed antenna has staircase slits on the side of patch, meander slots on its feed line and a staircase shaped ground structure. The plots of return loss, current distribution, VSWR, impedance characteristics, and radiation pattern are obtained using Ansys HFSS version'21 on designing the proposed antenna.
{"title":"Meander Slotted ACS fed Antenna with Stepped Ground Plane for UWB Applications","authors":"Chippy Susan Rajan, K. Ansal, Chinchu S. Ragamalika, M. Sreenath","doi":"10.1109/ACCESS51619.2021.9563287","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563287","url":null,"abstract":"An asymmetric antenna for UWB (Ultra Wide Band) applications is designed and simulated. This antenna exhibits a low profile with a size of 25×12×1.52mm3 and has an operational bandwidth from 3.185 to 13.29GHz. This paper is an evolved version of a coplanar waveguide fed antenna in anticipation of obtaining the ultrawide band even after reducing the size of the antenna by half. Designed antenna has staircase slits on the side of patch, meander slots on its feed line and a staircase shaped ground structure. The plots of return loss, current distribution, VSWR, impedance characteristics, and radiation pattern are obtained using Ansys HFSS version'21 on designing the proposed antenna.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127518757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563323
K. Saikiran, G. Lithesh, Birru Srinivas, S. Ashok
This paper uses various machine learning algorithms to predict the Air Quality Index used to control pollution to avoid significant health concerns. Air Quality Index shows the quality of air pollution. The major pollutants are particulate matters, nitrous oxide (NO2), Sulphur dioxide (SO2) and carbon monoxide (CO). Earlier techniques such as probability and statistics are measured to forecast air quality, but these methods are very complex to predict. Machine-learning algorithms are a better approach to predicting air pollution levels to overcome difficulties in previous techniques. Various Machine Learning algorithms are random forest regression, support vector regression and Linear Regression. The accuracy of several models is measured by the root mean square error (RMSE) technique.
{"title":"Prediction of Air Quality Index Using Supervised Machine Learning Algorithms","authors":"K. Saikiran, G. Lithesh, Birru Srinivas, S. Ashok","doi":"10.1109/ACCESS51619.2021.9563323","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563323","url":null,"abstract":"This paper uses various machine learning algorithms to predict the Air Quality Index used to control pollution to avoid significant health concerns. Air Quality Index shows the quality of air pollution. The major pollutants are particulate matters, nitrous oxide (NO2), Sulphur dioxide (SO2) and carbon monoxide (CO). Earlier techniques such as probability and statistics are measured to forecast air quality, but these methods are very complex to predict. Machine-learning algorithms are a better approach to predicting air pollution levels to overcome difficulties in previous techniques. Various Machine Learning algorithms are random forest regression, support vector regression and Linear Regression. The accuracy of several models is measured by the root mean square error (RMSE) technique.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121203642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563320
M. Sreerag, A. Pradeep
In this paper dual band multiple input multiple output antenna (MIMO) is presented. MIMO antenna consists of two concave shaped patches with partial ground printed on FR4 epoxy substrate with permittivity 4.4. It resonates at two frequency bands namely 2.92 GHz to 3.22 GHz and 5.11GHz to 5.26 GHz. Antenna achieved better than 20 dB isolation at the desired bands. Envelope coorelation coefficient(ECC) less than 0.0015 is achieved which is required for MIMO systems. Experimental results match well with simulation results.
{"title":"Dual Band MIMO Antenna With Reduced Mutual Coupling","authors":"M. Sreerag, A. Pradeep","doi":"10.1109/ACCESS51619.2021.9563320","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563320","url":null,"abstract":"In this paper dual band multiple input multiple output antenna (MIMO) is presented. MIMO antenna consists of two concave shaped patches with partial ground printed on FR4 epoxy substrate with permittivity 4.4. It resonates at two frequency bands namely 2.92 GHz to 3.22 GHz and 5.11GHz to 5.26 GHz. Antenna achieved better than 20 dB isolation at the desired bands. Envelope coorelation coefficient(ECC) less than 0.0015 is achieved which is required for MIMO systems. Experimental results match well with simulation results.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121966017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ACCESS51619.2021.9563284
Mansi Phute, Jyoti Madake, S. Bhatlawande
Soil fertility is a very important parameter in agriculture. The yield of the produce depends heavily on fertility. Fertility of the soil is dependent on multiple parameters like the moisture, temperature, Nitrogen, Phosphorous and Potassium (NPK) content of the soil, and pH value of the soil. These can be identified by sensors directly, but they have a very localized view of the field. Hyperspectral imaging can give us an overall view of the field. In this project, the relation between the hyperspectral images and the moisture and temperature of the soil is established and machine learning models like linear regression and random forests to predict the values are created. The hyperspectral images used for this project are from the satellite EO-1 Hyperion.
{"title":"Precision Farming Based Soil Fertility Assessment Techniques","authors":"Mansi Phute, Jyoti Madake, S. Bhatlawande","doi":"10.1109/ACCESS51619.2021.9563284","DOIUrl":"https://doi.org/10.1109/ACCESS51619.2021.9563284","url":null,"abstract":"Soil fertility is a very important parameter in agriculture. The yield of the produce depends heavily on fertility. Fertility of the soil is dependent on multiple parameters like the moisture, temperature, Nitrogen, Phosphorous and Potassium (NPK) content of the soil, and pH value of the soil. These can be identified by sensors directly, but they have a very localized view of the field. Hyperspectral imaging can give us an overall view of the field. In this project, the relation between the hyperspectral images and the moisture and temperature of the soil is established and machine learning models like linear regression and random forests to predict the values are created. The hyperspectral images used for this project are from the satellite EO-1 Hyperion.","PeriodicalId":409648,"journal":{"name":"2021 2nd International Conference on Advances in Computing, Communication, Embedded and Secure Systems (ACCESS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121979818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}