ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: HOUSEHOLD WASTES: AN OPPURTUNITY TO MINIMIZE MALNUTRITION
Author Name(s): Nikky Khan
Published Paper ID: - IJCRT2010165
Register Paper ID - 199474
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010165 and DOI :
Author Country : Indian Author, 208021, India , Kanpur, India , | Research Area: LifeSciences Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010165 Published Paper PDF: download.php?file=IJCRT2010165 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010165.pdf
Title: HOUSEHOLD WASTES: AN OPPURTUNITY TO MINIMIZE MALNUTRITION
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: LifeSciences
Author type: Indian Author
Pubished in Volume: 8
Issue: 10
Pages: 1236-1242
Year: October 2020
Downloads: 1287
E-ISSN Number: 2320-2882
Abstract- Background: Vegetables and fruits skin are high in nutrition and by the use of these skins we could minimize malnutrition. Malnutrition has been a serious problem , so many children still suffer from malnutrition and it should be eradicated. This study explores economical sources (which are often considered as industrial and household wastes) like skin of vegetables and fruits that are high in nutrition. For example, peels of potatoes , oranges , mangoes etc. could be a great source of carbohydrates , proteins , lipids , vitamins and minerals. By the use of these industrial and household wastes a food could be prepared. These products will be affordable for large population and could be an extraordinary opportunity to minimize malnutrition. Conclusion: Use of these household and industrial wastes [peels, eggshells] And converting it, making it ready for consuming as a meal and will be affordable for large population could be an extraordinary opportunity to Minimize malnutrition.
Licence: creative commons attribution 4.0
Food Industries , Household wastes, peels , seed, eggshell, minimize malnutrition.
Paper Title: ANALYSIS OF RATING METHODOLOGY OF CREDIT RATING RATING AGENCIES IN INDIA
Author Name(s): DR.PAVAN MISHRA, DIKSHA DUBEY
Published Paper ID: - IJCRT2010164
Register Paper ID - 199640
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010164 and DOI :
Author Country : Indian Author, 462039, India , Bhopal, India , | Research Area: Management Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010164 Published Paper PDF: download.php?file=IJCRT2010164 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010164.pdf
Title: ANALYSIS OF RATING METHODOLOGY OF CREDIT RATING RATING AGENCIES IN INDIA
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Management
Author type: Indian Author
Pubished in Volume: 8
Issue: 10
Pages: 1228-1235
Year: October 2020
Downloads: 1349
E-ISSN Number: 2320-2882
The credit rating is a process of assigning a symbol with specific reference to the instrument being rated, that acts as an indicator of the Current opinion on relative capability on the borrower to meet its debt obligation in a timely manner is known as credit rating. Credit rating is a metric used by borrowers to assess how much they can trust a borrower, whether the borrower is an individual, a company, or a country. The research focuses primarily on the firmness of the rating criteria of the rating agencies by evaluating some of the variables of the NSE-listed firms.The paper's main purpose is to determine the Consistency of rating agency procedures by Verification of some of the important determining factors Ratings on the equity and bond. Consistency in assessment methodology each rating agency is evaluated by taking the companies of same ranking group which includes AAA, AA/A and BBB as study sample. Corporate credit rating methodology is used for the study including some variables .It has been concluded that all credit rating agencies use identical methodologies when determining individual rating ratings, since there is no substantial variation in the valuation of all ratios that apply to separate sets of related classified firms.
Licence: creative commons attribution 4.0
Key words:-Credit rating, credit rating agencies, financial ratios, corporate credit rating methodology.
Paper Title: A REVIEW ON THE POZZOLANIC PERFORMANCE OF SUGARCANE BAGASSE ASH
Author Name(s): FATHIMA SHAHIN, SANGEETHA S
Published Paper ID: - IJCRT2010163
Register Paper ID - 199588
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010163 and DOI :
Author Country : Indian Author, 682024, INDIA , ERNAKULAM, INDIA , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010163 Published Paper PDF: download.php?file=IJCRT2010163 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010163.pdf
Title: A REVIEW ON THE POZZOLANIC PERFORMANCE OF SUGARCANE BAGASSE ASH
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 8
Issue: 10
Pages: 1225-1227
Year: October 2020
Downloads: 1301
E-ISSN Number: 2320-2882
Sugarcane bagasse ash is a resultant waste product from cogeneration combustion boilers in sugar industries The disposal of this causes environmental problems surrounding the factories, therefore its consumption for fruitful purpose is necessary. It is rich in silica, place the role of effective pozzolana and also considered as an effective mineral admixture. The utilization of bagasse ash has been considered uneasy because of the lack of suitable processing methodology. Based on processing method of sugarcane bagasse ash the pozzolanic activity of the material varies. Processing methods significantly influence the pozzolanic activity of any supplementary cementitious material. This study involves pozzolanic performance evaluation of sugarcane bagasse ash for using as pozzolanic material in concrete. An evaluation of pozzolanic activity of sugarcane bagasse ash based on different processing methods like burning, grinding, complete removal of coarse fibrous particles by sieving and combinations of these methods are presented in this seminar. All the process above shows different characteristics of sugarcane bagasse
Licence: creative commons attribution 4.0
Pozzolanic material, Sugarcane bagasse ash, Processing
Paper Title: DEVELOPMENT OF IOT BASED HEART ATTACK MONITORING SYSTEM WITH SMART GLOVE CONTROL
Author Name(s): Chandni Mariann thomas, Ashni M V
Published Paper ID: - IJCRT2010162
Register Paper ID - 199560
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010162 and DOI :
Author Country : Indian Author, 686662, India , Ernakulam, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010162 Published Paper PDF: download.php?file=IJCRT2010162 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010162.pdf
Title: DEVELOPMENT OF IOT BASED HEART ATTACK MONITORING SYSTEM WITH SMART GLOVE CONTROL
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 8
Issue: 10
Pages: 1210-1224
Year: October 2020
Downloads: 1283
E-ISSN Number: 2320-2882
In recent days copious persons are mislaying their life owing to heart attack and shortage of medical attention to the patient at the correct stage. Hence in this paper we are projecting development of heart rate monitoring and heart attack recognition system using IoT. The patient will accompany hardware unit having sensors with android application. The heart beat sensor will allow checking heart beat readings and transmit them over internet using cloud open source platform. The user will set low and high level of heart beat. Once these level limits are set the system will start monitoring the patient's heartbeat and as soon as the heartbeat readings goes above or below the level set ,the system will alert about the chances of heart attack. In this system a smart hand glove is also included that helps disabled people to live among normal spaces. The main objective of this smart hand glove is to develop a reliable, easy to use, light weight system which can curtail the obstacles for disabled people .
Licence: creative commons attribution 4.0
AD8232, Arduino, IoT, LabVIEW, LM35, ThingSpeak
Paper Title: DESIGN AND IMPLEMENTATION OF SHORTEST PATH LINE FOLLOWING MAZE SOLVING ROBOT
Author Name(s): A CHOKALINGAM, N RAMU
Published Paper ID: - IJCRT2010161
Register Paper ID - 199638
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010161 and DOI :
Author Country : Indian Author, 600015, india , chennai, india , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010161 Published Paper PDF: download.php?file=IJCRT2010161 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010161.pdf
Title: DESIGN AND IMPLEMENTATION OF SHORTEST PATH LINE FOLLOWING MAZE SOLVING ROBOT
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 8
Issue: 10
Pages: 1200-1209
Year: October 2020
Downloads: 1367
E-ISSN Number: 2320-2882
Maze solving problem is a very old problem, but still now it is considered as an important field of robotics. This field is based on decision making algorithms. The main aim of this project is to make an Ardunio based efficient autonomous maze solver robot. To implement in real time hardware development, software development and maze construction had been done. Capability of finding the shortest path is also verified. A maze solving robot is quite similar to a line follower which has just to follow a predetermined row is not known beforehand. However, this robot is designed to be autonomous, they basically perform different tasks. For that, it is equipped with an IR sensor array and a motor driver circuit. Both the sensor circuit as well as motor driver circuit controlling the robot has the following building blocks. The most common algorithm for maze solving robot is white line following algorithm.
Licence: creative commons attribution 4.0
Arduino controller, IR Sensors, DC Motor etc.,
Paper Title: THE INVISIBLE PHENOMENON OF EMOTIONAL INTELLIGENCE IN ATHLETES
Author Name(s): GARIMA SHARMA, NAVLEEN KAUR
Published Paper ID: - IJCRT2010160
Register Paper ID - 199538
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010160 and DOI :
Author Country : Indian Author, 160014, INDIA , Chandigarh, INDIA , | Research Area: Medical Science Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010160 Published Paper PDF: download.php?file=IJCRT2010160 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010160.pdf
Title: THE INVISIBLE PHENOMENON OF EMOTIONAL INTELLIGENCE IN ATHLETES
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science
Author type: Indian Author
Pubished in Volume: 8
Issue: 10
Pages: 1191-1199
Year: October 2020
Downloads: 1325
E-ISSN Number: 2320-2882
An enumerate determinant can either facilitate or obstruct sport performance. Performance in sports depends on various factors physical, social, spiritual psychological. Emotions may perform as a dominant role in sport. Relinquish the correlative dearth in research analyze to understand the role of emotional intelligence in athletes frame of mind and it�s on their performance. How emotional intelligent athletes deliver their peal performances and cope with failures. People with higher emotionally intelligent have an ability to use their emotions wisely, and they appear to have a deeper understanding of their emotional lives. Emotionally intelligent is associated with an ability to accurately read the emotions of other people, a practical knowledge of how to manage one�s own feelings and impulses, as well as a deeper sensitivity to the emotional implication that lie behind many social interactions. In an athlete�s functioning whether individual and team sports emotional intelligence is vital and key dynamic which often �makes or breaks� a team.
Licence: creative commons attribution 4.0
Emotional Intelligence, Sports psychology, Athletes, Sports performance
Paper Title: HIGH PERFORMANCE AND SECURITY TECHNIQUES FOR PROTECTING DATA IN CLOUD COMPUTING
Author Name(s): N. Pradheep, M. Venkatachalam, M. Saroja , V. Sivasooriya
Published Paper ID: - IJCRT2010159
Register Paper ID - 197742
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010159 and DOI :
Author Country : Indian Author, 636007, India , Salem, India , | Research Area: Science Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010159 Published Paper PDF: download.php?file=IJCRT2010159 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010159.pdf
Title: HIGH PERFORMANCE AND SECURITY TECHNIQUES FOR PROTECTING DATA IN CLOUD COMPUTING
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science
Author type: Indian Author
Pubished in Volume: 8
Issue: 10
Pages: 1183-1190
Year: October 2020
Downloads: 1337
E-ISSN Number: 2320-2882
From the past few years, there has been a fast growth in Cloud Computing. With the increasing number of companies resorting to use resources in the Cloud, there is a requirement for protecting the data of some users using centralized resources. Some major tasks that are being faced by Cloud Computing are to secure, protect and process the data which is the property of the user. The foremost aim of this study is to understand the security threats and identify the suitable security techniques used to mitigate them in Cloud Computing. The main objectives of this study are: To recognize the security issues and the techniques used in the present world of Cloud Computing. To recognize the security challenges, those are expected in the future of Cloud Computing. To suggest counter process for the future challenges to be faced in Cloud Computing. In this study, we have used two study methods. As a outcome we have recognized the total of 43 security challenges and 43 security techniques. The majority measured attribute is confidentiality (31%) followed by integrity (24%) and availability (19%). The impact of identified mitigation techniques is mainly on security (30%), followed by performance (22%) and efficiency (17%). Also we have recognized 17 future challenges and 8 mitigation training. The identification of security experiments and mitigation methods in large number of services of Cloud Computing is a very challenging task. In the method of identification from study methods (SLR and Survey), we had identified a satisfactory number of challenges and mitigation methods which are being used at current and also in upcoming Cloud Computing.
Licence: creative commons attribution 4.0
Challenges, Big Data, Cloud Computing, Privacy, Security, Techniques
Paper Title: SHOULDER SURFING WITH HONEY WORD
Author Name(s): Pavan Patil, Dr.Tripti Arjariya
Published Paper ID: - IJCRT2010158
Register Paper ID - 199059
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010158 and DOI :
Author Country : Indian Author, 411035, India , Pune, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010158 Published Paper PDF: download.php?file=IJCRT2010158 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010158.pdf
Title: SHOULDER SURFING WITH HONEY WORD
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: Indian Author
Pubished in Volume: 8
Issue: 10
Pages: 1175-1182
Year: October 2020
Downloads: 1332
E-ISSN Number: 2320-2882
When customers add their passwords to a public room, they may risk stealing their password by attackers. By a direct observation or by capturing authentication, an intruder may catch the password. This is called shoulder-surfing and a hazard of specific concern is detected when it is authenticated in public areas. Until recently, the alertness on the user part was the only way to defend against shoulder-surfing. The surfing shoulder-resistant password authentication mechanism promises user-resistant shoulder-surfing authentication. This helps users to authenticate by graphically using their password at unknown places so users never have to click on password icons right away. The nice word function to identify an adversary who wants to log into the network using broken passwords can be described. The combination of existing user passwords known as slutty words is a new password. False password is basically nothing but the sweet words are designed for and username with sweet words, so that even the right password is an exacting feature, and certain people are sweet words. Then a warrant is activated to notify the manager about the password leakage when an opponent is attempting to enter in the system with a honey phrase. Nice term for hash password database attack. attack detection. The real password stored as a sweet word for any user account. For this analysis, the program should analyze the honey word extensively and make a statement on the use of weak points to focus. Reflect on realistic passwords, raising password storage costs, and swap new passwords from existing user passwords.
Licence: creative commons attribution 4.0
Paper Title: THE DECENTRALIZED PROCUREMENT SYSTEM: A COMPARATIVE SCENARIO OF TAA WITH OTHER PROCURING ENTITIES IN TANZANIA MAINLAND
Author Name(s): Mohammed Saheb Hussain, Moh`d Masoud Khartoum
Published Paper ID: - IJCRT2010157
Register Paper ID - 198480
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010157 and DOI :
Author Country : Indian Author, 500 008, India , Hyderabad, India , | Research Area: Medical Science Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010157 Published Paper PDF: download.php?file=IJCRT2010157 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010157.pdf
Title: THE DECENTRALIZED PROCUREMENT SYSTEM: A COMPARATIVE SCENARIO OF TAA WITH OTHER PROCURING ENTITIES IN TANZANIA MAINLAND
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science
Author type: Indian Author
Pubished in Volume: 8
Issue: 10
Pages: 1161-1174
Year: October 2020
Downloads: 1614
E-ISSN Number: 2320-2882
Abstract: This article examines the decentralized procurement system in Tanzania Mainland. It indicates a comparative scenario of TAA with other procuring entities. It further covers on the legal necessity of having a uniform decentralized procurement system in Tanzania Mainland. As noted, the article also examines current scenario of TAA as compared to other procuring entities in Tanzania Mainland. It is believed that, and from findings of other researchers, decentralized system of procurement brings effective, efficient and helps creating a robust procurement system comparable to centralized system of procurement. The decentralized system of procurement also enhances accountability and transparency in procurement. It is on such a note that, this article examines two comparable procurement systems in view of TAA as an example for Tanzania Mainland and ends with conclusion.
Licence: creative commons attribution 4.0
Keywords: Decentralized- Procurement System � Entities - Tanzania Airports Authority - Tanzania Mainland.
Paper Title: AN INVESTIGATION OF CLASS IMBALANCE NATURE ON TWITTER SPAM DETECTION
Author Name(s): Syed Aamiruddin
Published Paper ID: - IJCRT2010156
Register Paper ID - 198867
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2010156 and DOI :
Author Country : N, 110019, India , New Delhi, India , | Research Area: Science & Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2010156 Published Paper PDF: download.php?file=IJCRT2010156 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2010156.pdf
Title: AN INVESTIGATION OF CLASS IMBALANCE NATURE ON TWITTER SPAM DETECTION
DOI (Digital Object Identifier) :
Pubished in Volume: 8 | Issue: 10 | Year: October 2020
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science & Technology
Author type: N
Pubished in Volume: 8
Issue: 10
Pages: 1151-1160
Year: October 2020
Downloads: 1496
E-ISSN Number: 2320-2882
In recent years, the ever-increasing popularity of social networks like Twitter have become an important source for real-time information which offers unprecedented opportunities to aggregate people and news dissemination, since it is so rapidly updating which makes it easy to fall into the trap of believing everything as truth which opens new modalities for cyber-crime perpetrations and people become a prime target of spammers. The paper proposes the various classification learning techniques methods for the detection of the Twitter- spammers by using Support Vector Machine, Na�ve Bayes, extreme gradient boosting, Random Forest and neural network. The paper mainly focusses on the crispy set and not on the fuzzy set because the problem is to detect whether a tweet is a spam or not, so the annotation which is used to classify the tweets, �0� for the non-spam and �1� for spam thus it is a binary classification problem which is included in the crispy set. Initially, the tweets were first extracted manually and extracting features for classification. After selection of the features, five machine learning algorithms were cross-validated to determine the best base classifier for spam detection. Followed by handling class imbalance problem in which the proportion of the positive class is very small in comparison to the negative class which is very large. This problem is dealt with techniques which helps in improving the performance of the classifier even with the imbalanced dataset. Results showed that the proposed approach has Random Forest base classifier as the best traditional algorithm along with this data sampling technique Random undersampling showed the best sensitivity value of 93.4%.
Licence: creative commons attribution 4.0
Twitter Spam, Class imbalance, Machine learning, social network security