IOSR Journal of Computer Engineering (IOSR-JCE)

International Conference On Recent Advances In Computer Science, Engineering And Technology

Volume 2

Paper Type : Research Paper
Title : Detection and Classification of Breast Mass Using Support Vector Machine
Country : India
Authors : Lothe Savita A || Telgad Rupali L || Siddiqui Almas || Dr. Deshmukh Prapti D

Abstract: Accurately detecting the breast cancer disease in the early stage is extremely essential for fast recovery or to avoid the death probability. Breast cancer can be detected by various imaging modalities such as ultrasonography, magnetic resonance imaging, breast self-examination and mammography. Out of mammography is more used. Breast lesions are mass and microcalcification. In this paper we introduce the concept of mammography with its use to early detect the breast cancer, followed by CAD system including..........

Keywords - CAD, DFT, Enhancement,Mammogram, Segmentation, Seed region growing, SVM, Texture feature.

[1]. Prof. Samir Kumar Bandyopadhyay, IndraKanta Maitra, Souvik Banerjee, "Digital Imaging in Pathology Towards Detection and Analysis of Human Breast Cancer", IEEE Second International Conference on Computational Intelligence, Communication Systems and Networks, July-2010, pp. 295-300, doi: 10.1109/CICSyN.2010.43.
[2]. American Cancer Society, "What is Cancer", [Online], Available: http://www.cancer.org/Cancer/CancerBasics/what-is-cancer, American Cancer Society, ACS.
[3]. Yanfeng Li, Hougin Chen, Yongyi Yang, Lin Cheng, Lin Cao, "A bilateral analysis scheme for false positive reduction in mammogram mass detection", Computers in Biology and Medicine, vol. 57, pp. 84-95, Elsevier, 2015.
[4]. U.S. Breast Cancer Statistics, Breastcancer.org, http://www.breastcancer.org/symptoms/understand_bc/statistics
[5]. K. P. Lochanambal, M. Karnan, R. Sivakumar, "Identifying Masses in Mammograms Using Template Matching", Second International Conference on Communication Software and Networks, IEEE, 2010.


Paper Type : Research Paper
Title : Detection of Epileptic Seizures using Wearable Devices: A Review
Country : India
Authors : Shubhashree Savant || Anjum Shaikh || Mukta Dhopeshwarkar

Abstract: Epilepsy is a brain disorder affecting people of all ages mainly seen in many developing countries. Till date many sufferers do not get proper diagnosis and treatment for the same because of its unpredictability. People with epilepsy and their families suffers from stigma Seizure disorder would not be nearly so distressful if the time of seizure occurrence were predictable. Unpredicted and unattended seizures can have life threatening complications. This paper reveals the detection of epileptic seizure using wearable devices developed in the last decade.
Keywords: Epilepsy, epileptic seizure, devices, EEG, detection

[1] Viglione S, Ordon V, Martin W, Kesler C, inventors; US government, assignee. Epileptic seizure warning system. US patent 3 863 625. November 2, 1973.
[2] Lehnertz K, Litt B. The First International Collaborative Workshop on Seizure Prediction: summary and data description. Clin Neurophysiol. 2005;116(3):493-505.
[3] World Health Organization, 2011.Available: http://www.who.int/mediacentre/factsheets/fs999/en/
[4] A. Dalton, S. Patel, A.R. Chowdhury, M. Welsh, T. Pang, S. Schachter, G. ´ Olaighin, P. Bonato, "Detecting epileptic seizures using wearable sensor technologies," In Proc. of the First AMA-IEEE Medical Technology Conference on Individualized Healtcare, 2010.
[5] Robert S. Fisher "Therapeutic Devices for Epilepsy" NIH Ann Neurol. 2012 February ; 71(2): 157–168. doi:10.1002/ana.22621


Paper Type : Research Paper
Title : Development of an Iris Feature Extraction system by using Wavelet
Country : India
Authors : Rupali L. Telgad || Almas Siddiqui || Savita A. Lothe || Dr. Prapti Deshmukh

Abstract: Biometric system is used for Identification as well as verification purpose. This paper presents the comparative of feature extraction of Iris. Iris Biometric system has image Acquisition, Image preprocessing, Feature extraction and matching. The features are extracted from the pre-processed images of iris images by using Gaussian filter as well as by using Gabor wavelet. The quality measures of the images are calculated. The Gabor wavelet improves the performance of the system.

Keywords- Feature Extraction, pre-processing, pupil, LDA

[1]. Sudipta Roy, Abhijit Biswas, ―A Personal Biometric Identification Technique based on Iris Recognition,‖ (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (4) , 2011, 1474-1477 .
[2]. Maheswari, P.Anbalagan and T.Priya, ―Efficient Iris Recognition through Improvement in Iris Segmentation Algorithm‖, ICGST-GVIP Journal, ISSN: 1687-398X, Vol 8, Issue 2, pp. 29-35, 2008.
[3]. Wildes R. Iris recognition: An emerging biometric technology. Proc. of the IEEE, 85(9):1348 -1363, September 1997.
[4]. Siddi Bhale, Uttam Chaska ,‖ comparative approach to the use of wavelet Transform and Filter Bank for IRIS feature extraction‖, Proceedings of 6th IRF International Conference, Chennai, India, 10th May. 2014, ISBN: 978-93-84209-16-2
[5]. Gupta, P., Mehrotra, H., Rattani, A., Chatterjee, A. and Kaushik, A.K. 2006.‖ Iris recognition using corner detection‖ Proceedings of the 23rd International Biometric Conference, Montreal, Canada, July 16-21, 2006, 1-5.


Paper Type : Research Paper
Title : Hurdles in Cyber Forensic Investigation in India
Country : India
Authors : Kirankumar Akate Patil || Shrinivas Vyawahare || Kiran Shejul || Madhuri Girase

Abstract: This current era can be called as era of science and technology. With the access use of computers and technology, Criminals have changed their modus operandi. This paper reveals the issues which are faced while handling Cybercrime investigations and which unknowingly slows down the investigation and conviction process at par.

Keywords: Cybercrime, documentation, hurdles, Investigation, Pre processing

[1]. Crime in India 2015 Statics. – national crime record bureau (NCRB)
[2]. Cyber crime – a growing challenge for government.- July 2014
[3]. Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
[4]. H. Marshall Jarrett Director, EOUSA . Michael W. Bailie Director, OLE
[5]. ACPO computer evidences and guidelines. (www.acpo.police.uk)


Paper Type : Research Paper
Title : Ear Recognition Techniques for Biometrics Using Digital Image Processing: A Review
Country : India
Authors : Dayanand B.Gore || Seema S. Kawthekar || Vipin Y. Borole

Abstract: Nowadays Biometrics security is very essential technology used in India as well as foreign countries. Biometrics is analysis of physical or behavioral modalities of the human body to solving such type of problems. Ear Recognition is widely used in government, medical, robotics, telecommunication, healthcare, traffic, university, etc. Last few years the researchers are follows the ear recognition techniques............

Keywords:- Ear Recognition, Biometric, Ear Identification, verification, validation.

[1]. Yashomati Dhumal,Madhuri Karkud,Pooja Shinde,Varsha Alhat "The Human Identification System Using Geometrical Feature Extraction Of Ear ", IJARCSSE, Vol.6, Issue 3,ISSN:2277 128X,March 2016, pg.298-303.
[2]. Asmaa Sabet Anwar, Kareem Kamal A.Ghany, Hesham ElMahdy "Human Ear Recognition Using SIFTS Features", 2015 IEEE
[3]. Lin Zhang,Lida Li,Hongyu Li,Meng Yang "3D Ear Identification Using Block-Wise Statistics based Features and LC-KSVD",IEEE TRANSACTION ON MULTIMEDIA ,2015
[4]. Gopal Singh Tandel,"Ear Recognition", Proceedings of ICIRT 2012 pg. 171-173
[5]. Samuel Adebayo Daramola,Oladejo Daniel Oluwaninyo"Automatic Ear Recognition system using Back Propagation Neural Network.", IJVIPNS-IJENS,Vol:11,No.1,pg.26-29.


Paper Type : Research Paper
Title : Fingerprint Biometric Based Online Cashless Payment System
Country : India
Authors : Manjiri A. Lavadkar || Pallavi K. Thorat || Ankita R. Kasliwal || Jaya S. Gadekar || Dr. Prapti Deshmukh

Abstract: This paper proposes a model Online Cashless Payment Systems which is based on Biometrics in Aadhaar Card. Today's current big issue in e-payment system is providing security to the users banking transaction. Traditional techniques always suffer from a common problem of inability to differentiate between an authorized person and a person who fraudulently acquires the access privilege of the authorized person. Biometric easily identify authorized person and fake person due to human's physiological or behavioral characteristics..............

Keywords: Aadhaar, Biometrics, Cashless transaction, Fingerprint, Password.

[1]. Cashless Society, http://www.civilsdaily.com/story/cashless-society
[2]. What are the benefits of a cashless economy? Are there any disadvantages too? , by RanjanDubey, Economics Student Written on nov 29/2016, Retrieved From,https://www.quora.com/What-are-the-benefits-of-a-cashless-economy-Are-there-any-disadvantages-too. [3]. A Cashless Future Is The Real Goal Of India's Demonetization Move ,by Wade Shepard , written on DEC 14, 2016 @ 01:37 PM, Retrieved From, http://www.forbes.com/sites/wadeshepard/2016/12/14/inside-indias-cashless revolution/#6ff276af18c7.

[4]. Debit card, Retrieved from,https://en.wikipedia.org/wiki/Debit_card

[5]. Credit card, Retrieved from,https://en.wikipedia.org/wiki/Credti_card


Paper Type : Research Paper
Title : Fingerprint Recognition System for Person Identification Using Termination And Bifurcation Minutiae
Country : India
Authors : Almas M. N. Siddiqui || Rupali Telgad || Savita Lothe || Dr. P. D. Deshmukh

Abstract: Growing concern the world over, related to personal and property safety has propelled rapid growth of security and surveillance of the related technologies. Biometrics is an effective technology for personnel identity authentication. It has the capability to reliably distinguish between an authorized people. There are various types of applications for fingerprint recognition which is used for different purposes. This paper presents the well-known minutiae feature extraction method and Neural Network approach is used for Fingerprint Recognition System for Person Identification............

Keywords— Fingerprint, Termination, Bifurcation, Minutiae, Feature level, Neural Network.

[1]. Anil K. Jain, Arun Ross and Salil Prabhakar, "An Introduction to Biometrics", IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004.
[2]. A. Ross and A. Jain, "Information Fusion in Biometrics," Journal of Pattern Recognition Letters, vol. 24, 2003 pp. 15-21.
[3]. Anil Jain, Sharath Pankanti, 1988, "Automated Fingerprint Identification and Imaging Systems". Technical Report 500-89, National Bureau of Standards.
[4]. Md. Mamunur Rashid and Aktar Hossain, A. K. M., 2006, "Fingerprint Verification System Using Artificial Neural Network". (ISSIN 1812-5638)Information Technology Journal 5(6):1063-1067.haur-Chin Chen and Yaw-Yi Wang, 2003, An AFIS Using Fingerprint Classification (Palmerston North, November 2003).
[5]. Jain, A.K., and et al, 2004, "An Introduction to Biometric Recognition", IEEE Tran. On Circuits and Systems for Video Technology, vol.14 No.1, PP. 4-20.


Paper Type : Research Paper
Title : Forensic Analysis of Social Applications
Country : India
Authors : Ambreen F.A.H || C.N. Kayte

Abstract: The increased use of social networking applications on smartphones makes these devices a goldmine for forensic investigators. Potential evidence can be held on these devices and recovered with the right tools and examination methods. This paper focuses on conducting forensic analysis on widely used social networking applications on smartphones such as Facebook, WhatsApp, etc. The forensic analysis consisted of determining whether activities conducted through these applications were stored on the device's internal memory................

Keywords - Digital Forensics, Social Media Forensics, Mobile Forensics, Facebook Artifacts, WhatsApp Artifacts

[1]. Burnette MW. Forensic examination of a RIM (BlackBerry) wireless device http://www.mandarino70.it/Documents/Blackberry%20Forensics.pdf.2002.
[2]. Parsons, A. "Windows 10 Forensics: Conclusion" - Computer & Digital Forensics Blog, April 30. http://computerforensicsblog.champlain.edu/2015/04/30/windows- 10-forensics-conclusion 2015.
[3]. Punja SG., Mislan RP. Mobile device analysis. Small Scale Digital Device Forensics Journal June;2008 2(1).
[4]. Cellebrite LTD. Cellebrite Android Forensics. Available at http://www.cellebrite.com/mobileforensics/ capabilities/android forensics.2013
[5]. D. Cortjens., A. Spruyt., and W.F.C. Wieringa. WhatsApp Database Encryption Project Report. Available at https://www.os3.nl/ media/2011-2012/students/ssn project report.pdf. [6] Don Ho. Notepad++ Home, 2013. Available at http://notepad-plus-plus.org.


Paper Type : Research Paper
Title : Soft Computing Techniques for Software Effort Estimation Comparative Study Using Cocomo Ii Model
Country : India
Authors : Mr. Azade Sanjay Y || Dr. Lomte S. S || Mr. Aqueel Ahmed A. Jalil

Abstract: Software effort estimation is the key success factor for the success of software because the complex and multidependent character of software makes the software effort estimation a challenging task. An estimation which provides the clear enough view of the software and provides a decision making view is referred as a good estimation. An estimate is considered as a deterministic terms i.e. as a single value but due to an inherent estimation uncertainty range estimates are alternatively proposed. Traditionally software effort estimation is associated with planning the amount of resources required to completing project activities but now a days...........

[1]. L. Schroeder, D. L. Sjoquist, and P. E. Setphan (1996), Understanding Regression Analysis: An Introductory Guide. Sage Publications, Inc.The book provides a basic introduction to regression analysis. It aims at beginners in this topic and provides background knowledge for understanding.
[2]. B.W. Boehm, C. Abts, A.W. Brown, S. Chulani, B.K. Clark, E. Horowitz, R. Madachy, D. Reifer, and B. Steece (2000), Software Cost Estimation with COCOMO II, Upper Saddle river, New Jersey: Prentice-Hall
[3]. Handbook of software cost estimation Karen Lum, Michael Bramble, et.al. JPL may 30 2003
[4]. Software development effort estimation using soft computing by Sandeep kad and VINAY Chopra IJML&C Vol 2 No. 5 October 2012.
[5]. "Analytical structure of fuzzy logic controller for software development effort estimation " Rama Sree p 978-1-4799- 2/15 @ 2015 IEEE


Paper Type : Research Paper
Title : HADOOP: Solution for Big Data Challenges in Bioinformatics and its Prospective in India
Country : India
Authors : Akshay Ware || Ganesh Janvale || Faiyaz Shaikh || Sanjay Harke

Abstract: Data becomes big data while its volume, variety, and velocity exceed abilities of our systems architecture and algorithm. Data volume is increasingly triggered by recent advancements in high-throughput technologies like Next Generation Sequencing (NGS), the discovery of gene expression and personalized medicine. Hadoop open source platform is magnificent to obtain information from raw biological big data with providing massive storage, advanced security, and fast data processing platform. In this review, comprehensive applicability of Hadoop being an open source platform is discussed with its global status to overcome big data challenges and its perspective in India.

Keywords – Bioinformatics, Hadoop, Open Source

[1] Vivekananth.P, Leo John Baptist.A. An Analysis of Big Data Analytics Techniques. International Journal of Engineering and Management Research. October-2015,Volume-5, Issue-5,
[2] Hirak Kashyap, Hasin Afzal Ahmed, Nazrul Hoque, Swarup Roy, and Dhruba Kumar Bhattacharyya. Big Data Analytics in Bioinformatics: A Machine Learning Perspective. JOURNAL OF LATEX CLASS FILES, Sepetember 2014, Vol. 13, NO. 9.
[3] Lin Dai, Xin Gao, Yan Guo, Jingfa Xiao and Zhang Zhang. Bioinformatics clouds for big data manipulation. Biology Direct 2012.


Paper Type : Research Paper
Title : Opinion Mining from Multi-domain User Reviews Using Sentiment Analysis
Country : India
Authors : Ashish A. Bhalerao || Sachin N. Deshmukh

Abstract: The key aspect of sentiment analysis is to identify opinion or sentiment words in reviews. Important solutions of sentiments are sentiment lexicons that are the words present in review dataset called as opinion or sentiment words. These words are helps to identify positive or negative opinion or sentiments. There are huge number of opinion reviews are available online. Opinion mining focus on these to generate differentiate between positive, negative and neutral. Today movie reviews and micro blogging website are very popular like IMDB and twitter on which user post their views, opinion etc.......

Keywords:- Opinion mining, sentiment analysis, sentiment classification, twitter.

[1]. M. Hu and B. Liu, "Mining and summarizing customer reviews," 2004 presented the Proceedings of the tenth ACM.
[2]. Richa Sharma, Shweta Nigam and Rekha Jain, "Opinion mining of Movie Reviews at Document Level" International Journal on Information Theory (IJIT) Vol 3, No. 3 , July 2014
[3]. Singh, V.K ; Piryani, R ; Uddin, A., "Sentiment Analysis of movie reviews: A new feature based heuristic for aspect-level sentiment classification", IEEE, Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on Jan 2013 ;
[4]. P. Turney, "Thumbs up or thumbs down? Semantic orientation applied to unsupervised classification of reviews", Proceedings of ACL-02, 40th Annual Meeting of the Association for Computational Linguistics, pp. 417-424, Philadelphia, US, 2002


Paper Type : Research Paper
Title : Hyper Spectral Face Recognition using Gabor + KPCA
Country : India
Authors : Siddharth Dabhade || Majharoddin Kazi || Yogesh Rode || Nagsen Bansod || Prapti Deshmukh || Karbhari Kale

Abstract: Biometric security is challenging task in day to day life because it is difficult to avoid the fraud. In this research paper emerging biometric trait, i.e. Hyper Spectral Face is considered for human authentication system. There are various visible spectrum of electromagnetic spectral bands are considered for face recognition instead of only three RGB bands. Hyper Spectral gives band wise more finite detail information of face. It is very novel and more accurate than ordinary face recognition system. Hong Kong PolyU Hyper Spectral Face Database used for Face recognition. Kernel Principle Component Analysis (KPCA) algorithm gives prominent features of the Hyperspectral Face Dataset. Gabor + KPCA + Mahalabonis distance on the verification rate at 1% FAR on the evaluation set 89.74%.

Keywords: Hyperspectral, Face, Gabor, KPCA, Distance Measures

[1] Seong G. Kong, Jingu Heo, Besma R. Abidi, Joonki Paik, and Mongi A. Abidi, ―Recent advances in visual and infrared face recognition—a review‖, Elsevier, Computer Vision and Image Understanding 97 (2005) 103–135, 2005
[2] Wei Di, Lei Zhang, David Zhang, and Quan Pan, ―Studies on Hyperspectral Face Recognition in Visible Spectrum With Feature Band Selection‖, IEEE Transactions On Systems, Man, And Cybernetics—Part A: Systems And Humans, Vol. 40, No. 6, November 2010
[3] A.F. Abate, M. Nappi, D. Riccio, G. Sabatino, 2D and 3D face recognition: a survey, Pattern Recognition Letters 2 (14) (2007) 1885–1906.W. Zhao, R. Chellappa, P.J. Phillips, A. Rosenfeld, Face recognition: a literature survey, ACM Computing Surveys 35 (4) (2003) 399–458
[4] S.J. Raudys, A.K. Jain, Small sample size effects in statistical pattern recognition: recommendations for practitioners, IEEE Transactions on Pattern Analysis and Machine Intelligence 13 (3) (1991) 252–264
[5] A. Jain, D. Zongker, Feature selection: evaluation, application, and small sample performance, IEEE Transactions on Pattern Analysis and Machine Intelligence 19 (2) (1997) 153–158


Paper Type : Research Paper
Title : Development of Fracture Detection System using Classification Technique
Country : India
Authors : Deshmukh M.P. || Revate S.S. || Telgad R L. || Deshmukh P.D.

Abstract: We are highlighting in this paper on longitudinal bone femurs texture based feature combinations, BPNN classification method to for the fracture detection system. As the need in medical diagnosis features day by day new solutions are designed for solving fracture classification and other issue in bones. In this work we have used the femur bone x-ray images for classification. Feature combinations of texture based MRF and Gabor features are used. The combinations of these features are used in classification process. Finally, Back propagation neural network (BPNN) was used to classify the database.

Keywords: BPNN, Diagnosis, Femur bone, Fracture.

[1] Medical author: Benjamin C. Wedro, MD, FAAEM, http:// www.medicinnet.Com/fracture/article.htm
[2] Koval, Kenneth J., and Joseph D. Zuckerman. Handbook of fractures, 2nd ed. Philadelphia: Lippincott, 2001.
[3] Resser, Johnathan C., MD, PhD. (2004, October, 1), "Stress fracture. eMedicine". Retived April 29, 2005, http:// www.emedicine.com/pmr/topic134.htm
[4] Harvinder S. Sandhu, MD, and Mary Clarie Walsh, "Osteoporosis and compression fractures", http:// www.sineuniverse.com/displayarticle.h/article323.html
[5] American Academy of Orthopedic Surgeons.6300 North River Road, Rosemont, Illinios 60018-4262.http://www.aaos.org/.


Paper Type : Research Paper
Title : Sentiment Analysis of Indian Government Schemes Using Twitter Datasets
Country : India
Authors : Bharat R.Naiknaware || Seema Kawathekar || Sachin N.Deshmukh

Abstract: The Social media monitoring has been growing day by day so analyzing of social data plays an important role in knowing peoples behavior. So we are analyzing Social data such as Twitter Tweets using sentiment analysis which checks the opinion of peoples related government schemes that are announced by Central Government. This paper develops based on social media twitter datasets of particular schemes and its polarity of sentiments. Popularity of Internet has been rapidly increased. Sentiment analysis and opinion mining is the field of study that analyses people's opinions, sentiments, evaluations, attitudes, and emotions from written language. User generated contents are highly generated by users............

Keywords: Sentiment Analysis and Opinion mining, Natural language processing.

[1]. Rajkumar S. Jagdale, Vishal S. Shirsat, Sachin N. Deshmukh," Sentiment Analysis of Events from Twitter Using Open Source Tool International Journal of Computer Science and Mobile Computing ISSN 2320–088X IMPACT FACTOR: 5.258 IJCSMC, Vol. 5, Issue. 4, April 2016, pg.475 – 485
[2]. Xing Fang and Justin Zhan."Sentiment analysis using product review data". Journal of Big Data 2015. DOI: 10.1186/s40537-015-0015-2
[3]. Seyed-Ali Bahrainian, Andreas Dengel, "Sentiment Analysis and Summarization of Twitter Data", CSE, 2013, 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE), 2013 IEEE 16th International Conference on Computational Science and Engineering (CSE) 2013, pp. 227-234, doi:10.1109/CSE.2013.44
[4]. Prashant Raina, "Sentiment Analysis in News Articles Using Sentic Computing", ICDMW, 2013, 2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW), 2013 IEEE 13th International Conference on Data Mining Workshops (ICDMW) 2013, pp. 959-962, doi:10.1109/ICDMW.2013.27.


Paper Type : Research Paper
Title : Study of Web Content Management System
Country : India
Authors : Kale Suhas B

Abstract: Content management systems offer prime result by consolidating information, developed and maintaining user's data. Web based directory examine tool and professional intellect tools have evolved to simplify more effective access and quest tools. The large volume of content to be formation and conceptualization of new developments of Content Management Systems particularly for e-Learning arrangements. Joomla is used for e-commerce or social networking websites, but needs a basic accepting of methodological assistances. Drupal is the problematic, but the most powerful. It requires a acquainted considerate of HTML, CSS and PHP.

Keywords: Content, CMS, database, WCMS, Drupal, Joomla.

[1] http://image.slidesharecdn.com/wcms2009-090409080703-phpapp02/95/wcms2009open-source-web-contentmanagement-system-18-728.jpg?cb=1239264458
[2] http://www.bccfalna.com/ebooks/wp-content/uploads/ebooks/2014/04/How-WordPress-Works-0.png
[3] http://www.aiim.org/What-is-Web-CMS-WCM-System-Content-Management.
[4] Web Development Using Content Management System Rushabhkumar H. Baldaniya, Prof. H.J.Baldaniya, International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-3, Issue-4)
[5] https://en.wikipedia.org/wiki/Web_content_management_system


Paper Type : Research Paper
Title : Remote Sensing and Data Mining Techniques Applied on Soil Characteristics Data Classification
Country : India
Authors : Miss. Bhise Pratibha.R || Dr.Kulkarni Sonali.B

Abstract: Recently we see the rapid development in Remote Sensing and Data Mining .It has free various real life applications in several domains such as Urbanization &transportation, National Resource Management, National Security and Agriculture is one of them. This review highlights the precedence of Remote Sensing, and Data Mining techniques for examining the soil properties .As we know soil is a vital part of the environment, survival and humanistic welfare .Soil is formed by minerals, organic matter and living organism components. Soil prediction is dependent on the soil substances...............

Keywords: Data Mining, Heavy Metals, Remote Sensing, VIS/NIR

[1]. http://www.cropnutrition.com/efficient-fertilizer-use-guide
[2]. A. Morón & D. Cozzolino," Measurement of Phosphorus in Soils by Near Infrared Reflectance Spectroscopy: Effect of Reference Method on Calibration", Communications in Soil Science and Plant Analysis,2007, ISSN 0010-3624 print/1532-2416.
[3]. C. Gomez , Y. Le Bissonnais , M. Annabi , H. Bahri , D. Raclot,"Laboratory Vis–NIR spectroscopy as an alternative method for estimating the soil aggregate stability indexes of Mediterranean soils",ELSEVIER,Geoderma 209–210 (2013) 86–97.



IOSR Journals are published both in online and print versions.