IOSR Journal of Computer Engineering (IOSR-JCE)

International Conference On Recent Advances In Computer Science, Engineering And Technology

Volume 1

Paper Type : Research Paper
Title : Indian Musical Instrument Recognition based MFCC Feature Set
Country : Ethiopia
Authors : Sankaye, S.R. || Tandon U.S.

Abstract: As the music databases grow in size and number, the retrieval of music information is becoming an important task for various applications. There has been shift with the researcher's trends from speech signal processing to the musical information retrieval (MIR). In this study we endeavored for the recognition of Indian Musical Instruments sound sample recorded in natural environment. The Features considered for the recognition include zero crossing, root means Square Energy and Mel-Frequency Cepstral Coefficient. We achieved an aggregate of 77.5% correct results for the recognition of four instruments considered with highest value for the Harmonium at 90.00%.

Keywords - Avanadha Vadya, Ghana Vadya, Indian Musical Instrument, Mel-Frequency Cepstral Coefficient, RootMeans Square Energy, Sushir Vadya, Tantu Vadya, Zero Crossing

[1]. Slim ESSID*, Ga¨el RICHARD and Bertrand DAVID "Instrument Recognition in Polyphonic MusicBased on Automatic Taxonomies"
[2]. Tetsuro Kitahara, Masataka Goto, Kazunori Komatani, Tetsuya Ogata and Hiroshi G. Okuno "Instrument Identification In Polyphonic Music: Feature Weighting With Mixed Sounds, Pitch-Dependent Timbre Modeling, And Use Of Musical Context", 2005.
[3]. S. Essid, G. Richard, and B. David, "Musical instrument recognition on solo performance," in Proc. Eur. Signal Processing Conf., pp. 1288–1292 , 2004.
[4]. Antti Eronen , "Automatic Musical Instrument Recognition", Master of Science Thesis, 2001.
[5]. A. Eronen, "Comparison of features for music instrument recognition" in Proc. of the IEEE Workshopon Applications of Signal Processing to Audio and Acoustics, pp. 19–22, 2001.


Paper Type : Research Paper
Title : A Review: Ear Biometrics
Country : India
Authors : Ravindra Komte || Seema Kawathekar

Abstract: To an automatic authentication to individual the biometric is an active pitch. Ear recognition is attracting the interest of researchers as its clear physiological appearance and identical structure for a long period. So it In this paper study has been going on to explore the ear as a biometric treat to authenticate individual for that concern here primarily twelve papers are selected. Reviving these papers we observe that different techniques used by authors.............
Keywords: SIFT, 2D, 3D, USTB, FRGCv2, DB, WPUTE, SCFace, KD, UND, NCC, HAAR, GF, Recognition, Findings Techniques etc.

[1]. J. Zhou, S. Cadavid and M. Abdel-Mottaleb, "Exploiting color SIFT features for 2D ear recognition," 2011 18th IEEE International Conference on Image Processing, Brussels, 2011, pp. 553-556.doi: 10.1109/ICIP.2011.6116405.
[2]. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6116405&isnumber=6115588.
[3]. N. Poh, A. Rattani and F. Roli, "Critical analysis of adaptive biometric systems," in IET Biometrics, vol. 1, no. 4, pp. 179-187, December 2012.doi: 10.1049/iet-bmt.2012.0019.
[4]. URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6403227&isnumber=6403226.
[5]. A. Pflug and C. Busch, "Ear biometrics: a survey of detection, feature extraction and recognition methods," in IET Biometrics, vol. 1, no. 2, pp. 114-129, June 2012.doi: 10.1049/iet-bmt.2011.0003.


Paper Type : Research Paper
Title : A Review: the Risks And weakness Security on the IoT
Country : India
Authors : Mohammed Tawfik || Ali M. Almadni || Alhasan A. Alharbi

Abstract: Internet of things is the technique which is provided by the unique identifiers that can automatically transfer the data over the wide network without the help of human being. The devices uses are vulnerable to hack. The purpose of hacking the devices of Internet of things may not be accessing data only, but it could be harming the users of those devices. In other words, it might affect them economically, endanger their health or put their lives at risk since this technology is directly connected to their daily lives, and this is considered a violation of users' privacy................

Keywords- Architecture, Attack, Risk, identities, DDOS.

[1]. Licklider, J.C.R., and Clark, W. On-Line Man-Computer Communication. Aug. 1962.
[2]. Leonard Kleinrock; "Breaking loos", communication of the ACM, Vol.44-No.09, Sept-2001.


Paper Type : Research Paper
Title : Aadhar Based Election Voting System
Country : India
Authors : Ankita R. Kasliwal || Jaya S. Gadekar || Manjiri A. Lavadkar || Pallavi K. Thorat || Dr. Prapti Deshmukh

Abstract: "Vote" means to choose from a list. Citizens choose a leader in all candidates from a list by casting their votes, this process is voting. In this paper, we propose a system in which, people who have citizenship of India and whose age is above 18 years they can vote without going to their home constituency on the Election Day. Our purpose of Aadhar based Election voting system in public elections that would allow people to vote electronically, from their current city. In this system, voting is based on Aadhar's biometric database that is a fingerprint. This voting system would offer higher security and it will increase voting percentage.

Keywords: Aadhar, Biometric, Electronic Voting Machine, Fingerprint and voting system.

[1]. R. Murali Prasad, Polaiah Bojja and Madhu Nakirekanti, AADHAR based Electronic Voting Machine using Arduino,
[2]. International Journal of Computer Applications (0975 – 8887) Volume 145 – No.12, July 2016.
[3]. Hari K. Prasad et.al., Security Analysis of India's Electronic Voting Machines, International Journal of Engineering Science &
[4]. Advanced Technology, ISSN: 2250-3676, Volume-4, Issue-2, 237-240.
[5]. Saurabh Yadav and Ajay Kr. Singh, A Biometric Traits based Authentication System for Indian Voting System, International


Paper Type : Research Paper
Title : Comparative Performance Analysis of Feature Extraction Techniques of Iris Recognition
Country : India
Authors : Rita B Patil || Nirupama Patodkar || Dr.Prapti D Deshmukh

Abstract: Iris Recognition is a very accurate method for highly secure identification and personal verification system as compare to other biometric traits. It has been first introduced by J. Daugman, later many scientist have worked on the trait with different feature extraction techniques. Among the Biometric technologies, Iris recognition system is mostly used because of its uniqueness & stable characteristics. Iris recognition consist of many sections among which feature extraction is an important stage. I have worked on RED algorithm based Feature extraction of iris. The algorithm works well on CASIA 1 database, the obtained result shows high recognition rate. In this paper analysis of performance of this technique is compared with the some other methods available in literature.

Keywords:- FAR-False acceptance rate , FRR-False rejection rate, RED-Ridge energy Detection.

[1]. Ms. Rita B Patil, Prof. Dr. R. R. Deshmukh, Development of Iris recognition system for person Identification, International Journal of Engineering Research and Technology IJRIT , volume 3, November 2015 .
[2]. Mayank vatsa,Richa singh,P.Gupta Comparison of Iris Recognition Algoristhms,.IEEE,2004.
[3]. John Daugman, Biometric Personal Identification System Based On Iris Analysis, UK, July, (1991) .
[4]. R.Wildes,J.Asmuth,G.Green,H.Hsu, A system for automated Iris Recognition, proceeding IEEE workshop on applications of Computer vision,Sarasota,FL, pp 121-128,1994.


Paper Type : Research Paper
Title : Social Media Effect on Drought Crisis
Country : India
Authors : Surabhi D. Thorat || C. Namrata Mahender

Abstract: Social media is a very promising platform for communication between the societies. Social Media plays a vital role in the context of drought risk management system. This paper focuses on the significance of social media in drought risk management. We analyzed the tweets polarity by using the R Tool and Python and compared the results. We tries to extract the opinion of users on drought in social media and its impact.

Keywords: Drought, drought impact, R Tool, Python.

[1]. Nigam, A., Gujja, B., Bandyopadhyay, J. and Talbot, R. 1997. Fresh Water for India's Children and Nature: A draft report based on local level studies. WWF/UNICEF, India
[2]. (2015) [Online].Available:http://www.india- wris.nrsc.gov.in/wrpinfo/index.php?title=India%27s_Water_Wealth.
[3]. (2016)homepage[Online].Available:http://www.environmentalleader.com/category/water-management/
[4]. Sit Rep 5 - Uttarakhand Floods and Landslides – 01 July2013 [Online] http://peoplesscienceinstitute.org/PDF's/Uttarakhand%
[5]. 20Disaster/SIT%20REP%20%205%20Uttarakhand%20Floods%2001%20July%202013%20(UNDMT).pdf


Paper Type : Research Paper
Title : Big Data In Banking: Opportunities And Challenges Post Demonetisation in India
Country : India
Authors : Ayesha Anam Siddiqui || Dr. Riyazuddin Qureshi

Abstract: India's Demonetisation followed by digitization of its economy is substantially adding to the high volumes of data being generated by global social media and the growing number of smart phones. Big data refers to datasets that are not only big, but also high in variety and velocity. Big data deals with the information management strategy with many new types of data and data management along with traditional data. Studies suggest that 90% of the world's data was generated in the last few years. Big data is a key trend for many industries, including financial services in general and banking in particular. Demonetisation-to-digitization is playing significant role in revolutionizing the banking sector resulting into more avenues for Big Data industry in India. This paper addresses the prospects for big data industry in India particularly in banking sector; its risk and solutions.

Keywords— Demonetisation, banking, e-payments, online frauds, Big Data, security, Privacy, employment opportunities in India.

[1]. "The force awakens: Big Data in banking", (2016, March 1) retrieved on Dec. 16, 2016, https://www.finextra.com/newsarticle/28541/the-force-awakens-big-data-in-banking
[2]. Linda Bustos, 'The Big 9 Big Data Sources [Infographic]', June 13th, 2014, http://www.getelastic.com/big-data-infographic/ retrieved on 22-12-2016
[3]. Dr. Riyazuddin Qureshi, "Big Data: Growing pressure on global storage by data created on Social Networking Sites" International Journal of Computer Science and Management Research, Vol.2 Issue 3 March 2013, Page 1876-1881, ISSN: 2278-733X http://www.ijcsmr.org/vol2issue3/paper286.pdf
[4]. Michael Kanellos, "Amount of Data Created Annually to Reach 180 Zettabytes in 2025, What‟s The Big Data?‟, March 7, 2016, https://whatsthebigdata.com/2016/03/07/amountofdatacreatedannuallytoreach180zettabytesin2025/ retrieved on 22-12-2016
[5]. Jaimin Virpura, Oct. 27, 2015, "10 Best Mobile Payment Apps in India‟, http://infocreeds.com/10-best-mobile-payment-apps-in-india/ retrieved on 22-12-2016 and "Best 5 Mobile Wallets for Online Payments in India‟ http://www.ampercent.com/best-5-mobile-wallets-for-online-payments-in-india/16425/ retrieved on 22-12-2016


Paper Type : Research Paper
Title : Issues & Solution of SAAS Model in Cloud Computing
Country : India
Authors : Ms. Pushpa B. Rajegore || Ms. Swapna G. kadam

Abstract: Cloud computing of is an Internet-based computing, where shared resources, software and information, are provided to computers and devices on-demand. It provides people the way to share distributed resources and services that belong to different organization. Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. Security is one of the major issues which hamper the growth of cloud. in This paper we introduce what is cloud computing in saas model. And also provide the security issues & solution of cloud computing. And detail description of what are the security issues & Solution in SAAS model. And also define the Solution on that issue.

Keywords - Cloud Computing, Software as a Service, Challenges, Issues, solution.

[1]. ijceronline.com/papers/Vol4_issue06/version-2/J3602068071.pdf ISSN (e): 2250 – 3005 || Vol, 04 || Issue, 6 || June – 2014 || International Journal of Computational Engineering Research (IJCER).
[2]. scribd.com/document/228266788/Survey-on-Security-Issues-and-Solutions-in-Cloud-Computing.International Journal of Computer Trends and Technology (IJCTT) – volume 8 number 3– Feb 2014
[3]. essay.uk.com/essays/computer-science/essay-cloud-computing
[4]. ijetae.com/files/Volume2Issue8/IJETAE_0812_53.pdf. International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 8, August 2012)
[5]. arxiv.org/ftp/arxiv/papers/1309/1309.2426.pdf. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol.3, No.4, August 2013


Paper Type : Research Paper
Title : PDP Resolution of "IT" For Proper Identification of Gender Using Rule Based Approach
Country : India
Authors : Priyanka Gaikwad || Kalpana Khandale || C. Namrata Mahender

Abstract: Resolution of anaphora is most important concept in the linguistic research area. The present research is focused on pronoun ambiguity problem. The major concern in this research is on "it" issue. We cannot identify the antecedent of pronoun "it" is either feminine, masculine or neutral. For resolving "it" issue the rule-based approach is applied. The process of tokenization POS tagging are applied as preprocessing stage for designing the rules. The overall system performance of pleonastic "it" is around 73%.

Keywords: Natural Language Processing (NLP), Ambiguity, Anaphora, Pronoun Disambiguation Problem.

[1]. Bird, S., Klein, E., & Loper, E. Natural language processing with Python. "O‟Reilly Media, Inc." (2009).
[2]. Wilkinson, D. J. (2006). The Nature of Ambiguity. In The Ambiguity Advantage (pp. 9-41). Palgrave Macmillan UK.
[3]. Bhattacharyya, P. (2012). Natural language processing: A perspective from computation in presence of ambiguity, resource constraint and multilinguality. CSI journal of computing, 1(2), 1-13.
[4]. Tiwary, U. S., & Siddiqui, T. (2008). Natural language processing and information retrieval. Oxford University Press, Inc...
[5]. Pardeep Singh, Kamlesh Dutta (July 2015) Analysis of Anaphora, Cataphora and Exaphora for Demonstrative Pronoun of Hindi International Journal of Advanced Research in Computer Science and Software Engineering


Paper Type : Research Paper
Title : Similarities in words Using Different Pos Taggers
Country : India
Authors : Kalpana B. Khandale || Ajitkumar Pundage || C. Namrata Mahender

Abstract: In the research area of the computational linguistic, there are the vast varieties of text data available and there is need to sort out it. Part-of-speech tagging is one of the most important part of the natural language processing which help us to identify the proper tag for the given text or sentences. This paper presents the basic techniques using four different part-of-speech tagger (POS tagger). With these tools we have found the differences among the tagged word in different way. From the four tools we have seen the different result for the same word.

Keywords – Question Answering System, NLTK, Freeling, Cognitive POS tagger, NLP tagger

[1]. Rodrigo, Á, Perez-Iglesias, J., Peñas, A., Garrido, G., & Araujo, L. (2010). A Question Answering System based on Information Retrieval and Validation. In CLEF (Notebook Papers/LABs/Workshops).
[2]. Dhokrat, A., Gite, H. R., & Mahender, C. N. (2012). Computation Linguistic: Online Subjective Examination Modeling. Advances in Computational Research, ISSN, 0975-3273.
[3]. Fleischman, M., Hovy, E., & Echihabi, A. (2003, July). Offline strategies for online question answering: Answering questions before they are asked. In Proceedings of the 41st Annual Meeting on Association for Computational Linguistics-Volume 1 (pp. 1-7).
[4]. Association for Computational Linguistics. Gupta, P., & Gupta, V. (2012).A survey of text question answering techniques. International Journal of Computer Applications, 53(4).
[5]. Espana-Bonet, C., & Comas, P. R. (2012, April).Full machine translation for factoid question answering. In Proceedings of the Joint


Paper Type : Research Paper
Title : Morphometric Analysis of Godavari River-Sub-Drainage in Marathwada Region by Using Srtm Data Set
Country : India
Authors : Ashok S. Sangle || Prapti D. Deshmukh

Abstract: Urbanization and heavy industrial growth has made its impact on the ecosystem and also potentially affected on environment balance. Therefore, its need to increase the watersheds conservation area as the water drought affected area has being in existence so it's a primary goal of government to reduce the water stressed area for sustainable development. The natural resources management in a country where 70-75 % population is based on agriculture related Practices has an immense important role to play not only in providing the economic goods but also maintaining and improving productivity of agricultural fields.......

Keywords:- SRTM, RS, GIS, Morphometric Parameters.

[1]. D. Buckeye, "Bio Diversity GIS," 22-Apr-2014. [Online]. Available: http://bgis.sanbi.org/GIS-primer/page_10.htm. [Accessed: 25-Nov-2014].
[2]. Joewheaton, "Watershed Delineation - Advanced GIS Courses: WATS USU."[Online]. Available: http://gis.joewheaton.org/assignments/labs/lab-8---choice/lab08a/task-1---watershed-delineation. [Accessed: 25-Nov-2014].
[3]. Joe, "Grades - Advanced GIS Courses: WATS USU."[Online]. Available: http://gis.joewheaton.org/about/grades. [Accessed: 25-Nov-2014].
[4]. D. Tarboton, M. David, and O. Robayo, "Watershed Delineation from Digital Elevation Models," 07-Aug-2004. [Online]. Available: http://www.crwr.utexas.edu/gis/gishydro04/Introduction/Exercises/Ex4.htm. [Accessed: 26-Nov-2014].
[5]. D. Maidment, "Arc Hydro: GIS for Water Resources Workshop,"Arc Hydro Exercise 2: Upper Pearl, 03-Aug-2006. [Online]. Available: http://www.crwr.utexas.edu/gis/gishydro06/ArcHydro/UpperPearl/Exercise2/ArcHydroExercise2.htm. [Accessed: 26-Nov-2014].


Paper Type : Research Paper
Title : Early Detection of Glaucoma Using Eye Tracker Metrics
Country : India
Authors : Ms.Pramodini A. Punde || Dr. Mukti E.Jadhav || Ms. Ganga Bedke

Abstract: Glaucoma is one of the main reasons for irreversible blindness in developing countries including India. Early detection of Glaucoma is important to save the vision loss due to Glaucoma. Here, we propose how eye tracker metrics analysis may help us to detect glaucomatous changes in high-risk groups. This paper presents the use of eye tracker data for early detection of glaucoma. Continuous eye movements are the part of our visual perception. Whenever we look at any scene, saccadic eye movements are generated...........

Keywords: Eye Tracker, fixations, saccades, scan path

[1]. Ekstrom C. Risk factors for incident open-angle glaucoma: a population based 20-year follow-up study. Acta Ophthalmology. Published online July 9, 2010.

[2]. Boland M, Quigley H. Risk factors and open-angle glaucoma: classification and application. J Glaucoma. 2007; 16:406–418.

[3]. Sommer A. Intraocular pressure and glaucoma. Am J Ophthalmol1989;107:186–188.

[4]. Phillip J. Benson, Sara A. Beedie, Elizabeth Shephard, Ina Jigling, Dan Rujescu, David St. Clair, " Simple viewing tests can detect Eye Movement abnormalities that distinguish Schrezophenia cases from controls with exceptional accuracy‟, ELSEVIER, Journal of Psychiatric Neuroscience and Therapeutics, doi:10.1016/j.biopsych.2012.04.019, May 2012


Paper Type : Research Paper
Title : A Review on Hadoop MapReduce using image processing and cloud computing
Country : India
Authors : Minakshi M. sonawane || Santosh D. Pandure || Seema S. Kawthekar

Abstract: Hadoop is an open source framework that allows distributed processing of large data set across clusters of computers. Big data describes technology to capture, store, distribute and manage the large size data set. Data is generated by different sources such as from a web site or click streams (e.g. net ix, Face book, Google), Sensors (energy monitoring, application monitoring, telescope) and biomedical diagnosis. Image processing is perform important function in various research areas such as biomedical imaging, remote sensing, astronomy, internet etc...........

Keywords: Hadoop, Big data, Image processing, Map reduce, HDFS, Cloud computing.

[1] Jyoti S.Patil,G.Pradeepani,"Two Dimensional Medical Images Diagnosis using MapReduce",pp 1-5, Vol 9 (17), May 2016.
[2] Wang Zhongye,Yang Xiaohui,Niu Hongjuan",Brushlet domainretrival algorithum based on complex computer simulation of image texture characteristics, pp 263-266 ,2011.
[3] ZHANGJ,LIUXL,LUOWJW,BOLTN,"Distributed image retrival system based on mapreduce", pp 93-98, 2010.
[4] Nilesh lohar, dipankar chavan, sanjay arade, amol jadhav,deepti chikmurge,"Content Based Image Retrieval System over Hadoop Using MapReduce ",Vol 2, Issue 1, pp. 123-125, January-February 2016.
[5] Fay C,JEFFEREY D,SANYJAY G,"A distributed storage system or structured data proceedings The symposium on operating system design and implement", pp 276-290, 2006.


Paper Type : Research Paper
Title : Internet of Things (IOT)
Country : India
Authors : Ms. Swapna G. Kadam || Ms.Pushpa B. Rajegore

Abstract: The Internet of Things (IoT) is a system which is related to computing devices, mechanical, digital machines, objects, animals or people and having the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS), micro services and the internet. Internet of Things (IoT) used to create smart environments that make energy, transport, cities and many other areas more intelligent. The goal of the internet of things is new revolution of internet. According to industry analyst from IDC, the installed base for the internet of Things will be grow to approximately 212 billion devices by 2020, a number that includes 30 billion connected devices.

Keywords: Internet of Things (IoT), RFID, Big data, GPS.

[1]. Ovidiu Vermesan Peter Friess, River Publishers 2.10 Real World Applications of Internet of Things (IoT) –Explained in ... of Internet of Things (IoT) –Aug 26, 2016 [2]. D Bandyopadhyay - 2011 - Technology and Standardization. De basisn Bandyopadhyay · Jay dip Sen. Journals
[3]. Lianos, M. and Douglas, M. (2000) Dangerization and the End of Deviance: The Institutional Environment. British Journal of Criminology, 40, 261-278.
[4]. Butler, D. (2020) Computing: Everything, Everywhere. Nature, 440, 402-405. http://dx.doi.org/10.1038/440402a
[5]. S Madakam - 2015, 5. D Miorandi, S Sicari, F De Pellegrini, I Chlamtac - Ad Hoc Networks, 2012 – Elsevier Volume10, Issue 7, September 2012, Pages 1497–1516. Cover image Cover image. Survey Paper. Internet of things: Vision, applications and research challenges.


Paper Type : Research Paper
Title : Techniques of Content Based Image Retrieval: A Review
Country : India
Authors : Sheetal A. Wadhai || Seema S. Kawathekar

Abstract: The abstract should summarize the content of the paper. Try to keep the abstract below nowadays, computer vision and digital image processing are useful for content based image retrieval. Basically, computer vision systems try to retrieve an image to a user-defined specification or pattern (e.g., shape sketch, image color etc.). The goal of computer vision is to support image retrieval based on content properties like; shape, color, textures usually en coded in the form of feature vectors. Content based image retrieval (CBIR) considers the characteristics of the image itself, for example its shapes, colors and textures. In this study various techniques are used for feature extractions of CBIR images.

Keywords: Content Based Image Retrieval (CBIR), Shape, Feature Extraction.

[1] Swapnalini Pattanaik, D.G.Bhalke, "Beginners to Content Based Image Retrieval",International Journal of Scientific Research Engineering &Technology (IJSRET),Volume 1 Issue2, pp 040-044, May 2012.
[2] A.J. Afifi, and W.M. Ashour, "Content-Based Image Retrieval Using Invariant Color and Texture Features," Published in:Digital Image Computing Techniques and Applications (DICTA), 2012 IEEE International Conference, Fremantle, WA.
[3] A. Vellaikal and C. C. J. Kuo, "Content Based Image Retrieval using Multiresolution Histogram Representation", SPIE - Digital Image Storage and Archiving Systems, Vol. 2606, pp. 312-323, 1995.
[4] ChiKuo Chang, "Image Information Systems," Proc. Of IEEE Pattern Recognition, vol. 73, no 4, pp. 754 - 766, April 1985.
[5] A. J. M. Traina, A. G. R. Balan, L. M. Bortolotti, and C. Traina Jr., "Content- based Image Retrieval Using Approximate Shape of Objects", Proceedings of the 17th IEEE Symposium on Computer- Based Medical Systems, pp. 91-96, 2004.


Paper Type : Research Paper
Title : Leaf Image Processing for Venation Extraction For Plant Classification
Country : India
Authors : Amlekar M. M. || Gaikwad A. T.

Abstract: The plant classification is challenging research area. Plant classification using leaf features is demanding as leaves are readily available. This paper presents the leaf image processing by using morphological operation and image processing techniques for segmentation of leaf images. This experiment extracts the leaf venation pattern from the leaf image sample and then with morphological operations venation patterns are enhanced for plant classification. This paper is arranged with the steps, Preprocessing the leaf image, Morphological operation, Leaf venation enhancement.

Keywords: Canny, Gaussian filter, image segmentation, leaf venation, morphological operation, plant classification.

[1] M. Amlekar, A. Gaikwad, P. Yannawar, R. Manza, 2015. Leaf Shape Extraction for Plant Classification. Pervasive Computing (ICPC) IEEE International Conference on.
[2] M. Rahmadhani and Y. Herdiyani, 2010. Shape and Vein Extraction on Plant Leaf Images Using Fourier and B-Spline Modeling. In International Conference the Quality Information for Competitive Agricultural Based Production System and Commerce. AFITA
[3] H. Fu, Z. Chi, 2006. Combined thresholding and neural network approach for vein pattern extraction from leaf. In proceeding Visual Image Signal Process. IEE vol153 No. 6.
[4] A. Roth-Nebelsick, D. Uhl, V. Mosbrugger and H. Kerp , 2001, Evolution and Function of Leaf Venation Architecture: A Review, Annals of Botany 87: 553±566, doi:10.1006/anbo.2001.1391, available online at http://www.idealibrary.com
[5] X. Zheng , X. Wang., 2010, Leaf Vein Extraction Based on Gray-scale Morphology, I.J. Image, Graphics and Signal Processing, 2, 25-31 Online on http://www.mecs-press.org/



IOSR Journals are published both in online and print versions.