ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Genocide - A Legal Prespective
Author Name(s): T. ROSHINI
Published Paper ID: - IJCRT2312066
Register Paper ID - 246886
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312066 and DOI :
Author Country : Indian Author, India, 605401 , Villupuram, 605401 , | Research Area: Others area Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312066 Published Paper PDF: download.php?file=IJCRT2312066 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312066.pdf
Title: GENOCIDE - A LEGAL PRESPECTIVE
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Others area
Author type: Indian Author
Pubished in Volume: 11
Issue: 12
Pages: a567-a570
Year: December 2023
Downloads: 65
E-ISSN Number: 2320-2882
Life..! The Right to Life is one of the Supreme rights. Moreover, it is the belief that a human being or animal has the right to live and in particular should not be killed by another entity or nation or ethnic group. No one could be held in servitude for any reason along with everyone having an obligation not to end up another life. One of the supreme crime under international as well as national regime is Genocide. It may true that the "fact of genocide is as old as humanity" but as an legal concept of genocide is a rather recent arrival. We have to to be noted that 'killing' is not necessary to hold on with genocide, somewhat a deliberate and systematic destruction of a people who belong to peculiar race or cultural or religious group. . We analysis the historical background and an legal regime of genocide. "Right is right, even if everyone is against it, and wrong is wrong, even if everyone is for it."
Licence: creative commons attribution 4.0
Genocide, Right to Life, Killing, Destruction, Humanity, Supreme Rights.
Paper Title: GEOSPATIAL TECHNOLOGY EDIFICATION: CAPACITY BUILDING FOR VIABLE EVOLUTION
Author Name(s): DR. ABHISHEK SHARMA
Published Paper ID: - IJCRT2312065
Register Paper ID - 246563
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312065 and DOI :
Author Country : Indian Author, India, 243001 , BAREILLY, 243001 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312065 Published Paper PDF: download.php?file=IJCRT2312065 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312065.pdf
Title: GEOSPATIAL TECHNOLOGY EDIFICATION: CAPACITY BUILDING FOR VIABLE EVOLUTION
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 12
Pages: a559-a566
Year: December 2023
Downloads: 75
E-ISSN Number: 2320-2882
Practical improvement requires sensible utilization of assets which can cook for present need and furthermore makes arrangement for what's in store. Geospatial innovation works at a territorial level as well as miniature level by giving a system to information representation and investigation which is pivotal to the dynamic cycle. Such a stage gives instruments that assist leaders with breaking down complex circumstances and complete the undertaking with productivity. Research shows that Geospatial believing is basic to make due and work in the present digitized world. Research has additionally shown that schooling in Geospatial innovation will be urgent to make labor force skillful across all areas of the economy and it will be especially essential for accomplishing feasible improvement objectives. Geospatial training in India is lingering behind the remainder of the world because of the imperatives of the College structure in running Interdisciplinary subject. Geology schooling to a great extent confines to four-year certification with practically zero innovative establishing. This paper is an endeavor to basically break down Geospatial schooling situation in India with unique reference to the encounters of the showing Geospatial educational plan at Advantageous interaction Foundation of Geoinformatics. This paper additionally endeavors to assess the endeavors of incorporating research on supportable advancement with the main subjects.
Licence: creative commons attribution 4.0
Feasible turn of events, Geospatial Innovation, Advanced education, educational plan Improvement, Topography Training.
Paper Title: TAX EVASION AND TAX AVOIDANCE - IMPACT OF INDIAN ECONOMY
Author Name(s): Ishwarya.S
Published Paper ID: - IJCRT2312064
Register Paper ID - 247268
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312064 and DOI :
Author Country : Indian Author, India, 641-605 , Tiruppur , 641-605 , | Research Area: Others area Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312064 Published Paper PDF: download.php?file=IJCRT2312064 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312064.pdf
Title: TAX EVASION AND TAX AVOIDANCE - IMPACT OF INDIAN ECONOMY
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Others area
Author type: Indian Author
Pubished in Volume: 11
Issue: 12
Pages: a540-a558
Year: December 2023
Downloads: 338
E-ISSN Number: 2320-2882
Tax evasion and tax avoidance are two practices that have significant effects on the Indian economy. Tax evasion includes engaging in illegal activities to avoid paying taxes in full. Both tax avoidance and tax evasion cause a loss of government revenue, which may restrict governmental spending on infrastructure, social welfare, and development programmers. Tax avoidance refers to the legal exploitation of tax law loopholes to minimize tax liability. Income disparity is also worsened by tax avoidance and evasion, which also damages public trust in the tax system. In the past, the tax evasion and tax avoidance of a large informal sector, poor tax administration, and complicated tax laws have allowed tax evaders to thrive, resulting in significant revenue losses that have made it difficult for the government to fund public services. The Indian government has implemented a number of measures that target tax avoidance and evasion in the current situation. These include improving tax legislation, enhancing tax administration, and utilizing technology to increase compliance and transparency. Tax evasion is being battled and a tax system that is more equitable is being promoted through initiatives such as demonetization, the implementation of the Goods and Services Tax (GST), and the creation of the Direct Tax Code. This paper explores multi dimensions of tax avoidance and tax evasion in the view of current government laws, policies and preventive measures, how it has affected the Indian economy and the judicial interpretation of tax evasion and avoidance.
Licence: creative commons attribution 4.0
Tax payer, Tax evasion, Tax avoidance, Impact of economy, penalties.
Paper Title: The Strategic Importance Of Network Security In 21st Century Warfare
Author Name(s): Fnu Ziauddin
Published Paper ID: - IJCRT2312063
Register Paper ID - 247038
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312063 and DOI :
Author Country : Foreign Author, United States of America, 75035 , Frisco, 75035 , | Research Area: Others area Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312063 Published Paper PDF: download.php?file=IJCRT2312063 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312063.pdf
Title: THE STRATEGIC IMPORTANCE OF NETWORK SECURITY IN 21ST CENTURY WARFARE
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Others area
Author type: Foreign Author
Pubished in Volume: 11
Issue: 12
Pages: a529-a539
Year: December 2023
Downloads: 68
E-ISSN Number: 2320-2882
This article explores the crucial role that network security plays in contemporary warfare, with an emphasis on how the US might use its strong network security infrastructure to gain an advantage. With the growing integration of digital and physical battlefields, protecting communication links, conducting intelligence operations, and preserving operational continuity are critical in today's world. From its beginnings in protecting early communication networks to its present condition as a crucial component of military strategy and national defense, the paper charts the development of network security in combat. The study illustrates how network security has influenced recent wars via several case studies, including the Stuxnet assault and cyber-operations in conflicts in North Korea, Georgia, Russia, and Ukraine. After that, it looks at how secure the US military's network is right now, evaluating its advantages and disadvantages against new online dangers. The study also examines emerging cybersecurity technologies and evaluates how they may affect combat in the future. These technologies include artificial intelligence (AI), machine learning, and quantum-resistant encryption. There is a discussion of difficulties including new threats, holes in existing systems, and moral and legal issues with cyberwarfare. The article suggests methods to improve network security, with a focus on international collaboration, training, and best practices. The study concludes by projecting the future of cyber warfare and emphasizing the critical role that network security plays in guaranteeing the safety and effectiveness of military operations. It also argues that the United States should continue to have a strategic advantage in this dynamic field.
Licence: creative commons attribution 4.0
Cyber Warfare, Network Security Infrastructure, Military Cyber Defense, Cybersecurity Technology Advancements, Strategic Cyber Dominance.
Paper Title: Effectiveness Of Offline Versus Online Classes On Learning Of B.Sc. Nursing Part III Students
Author Name(s): Sunita Thakur, Dr Reena Thakur
Published Paper ID: - IJCRT2312062
Register Paper ID - 247253
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312062 and DOI : http://doi.one/10.1729/Journal.37176
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312062 Published Paper PDF: download.php?file=IJCRT2312062 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312062.pdf
Title: EFFECTIVENESS OF OFFLINE VERSUS ONLINE CLASSES ON LEARNING OF B.SC. NURSING PART III STUDENTS
DOI (Digital Object Identifier) : http://doi.one/10.1729/Journal.37176
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 12
Pages: a522-a528
Year: December 2023
Downloads: 116
E-ISSN Number: 2320-2882
Background: Online classes emerged as a game-changer during COVID-19 pandemic. In this difficult period, online classes grabbing the attention of the whole world. This study assess the effectiveness of offline versus online classes on learning of B.Sc. Nursing Part III students. The present study also compares whether online classes is as effective as offline classes. Objective: The objective was to assess the effectiveness of offline versus online classes on learning of B.Sc. Nursing Part III students. Methodology: A quasi experimental post-test only design was used in this study. The study was conducted at 6 private nursing colleges of Kota Rajasthan. Total 300 nursing students were chosen by purposive sampling technique for the study, 150 students for offline classes and 150 for online classes. Regular 5 days offline and online classes were taken with lectures and power point presentations. Offline classes were taken in class room of colleges and online classes were taken by zoom platform. On the 6th day post-test was taken by using structured knowledge questionnaire and data were gathered by both modes of classes. Results: Offline classes scores in this study showed that 8.7% of students reporting moderate effectiveness and 91.3% reporting very effective level of learning as compare to the online classes with 77.3% of students reporting moderate effectiveness and 22.7% reporting very effective level of learning. The t-test showed that there is a significant difference between the Online and Offline classes (df = 298, t = -17.212, p < .001). The results findings showed that offline classes were significantly effective than online classes. Conclusion: The study's findings indicated that offline classes is more effective than online classes on learning of B.Sc. Nursing Part III students.
Licence: creative commons attribution 4.0
Effectiveness, offline classes, online classes, learning
Paper Title: Electricity theft detection in smart grids based on deep neural network
Author Name(s): Dr K VIJAYA BHASKAR, M.Jamuna, P.Venkata Suresh Babu, T.Chandana
Published Paper ID: - IJCRT2312061
Register Paper ID - 245763
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312061 and DOI :
Author Country : Indian Author, India, 600001 , Chennai, 600001 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312061 Published Paper PDF: download.php?file=IJCRT2312061 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312061.pdf
Title: ELECTRICITY THEFT DETECTION IN SMART GRIDS BASED ON DEEP NEURAL NETWORK
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 12
Pages: a507-a521
Year: December 2023
Downloads: 188
E-ISSN Number: 2320-2882
Electricity theft is a significant challenge in the operation of smart grids, leading to revenue loss for utility companies and increased costs for consumers. Detecting electricity theft is crucial to maintaining the integrity of smart grid systems. In this study, we propose a novel approach for electricity theft detection in smart grids based on deep neural networks (DNNs). Our method leverages the power consumption data collected from smart meters, utilizing the temporal and spatial patterns in electricity usage. We design a DNN architecture capable of learning and identifying abnormal consumption patterns indicative of theft. The model is trained on historical data, enabling it to distinguish between legitimate variations in electricity usage and unauthorized consumption. The effectiveness of our approach is evaluated using real-world smart grid data, demonstrating its ability to accurately detect instances of electricity theft. By harnessing the power of deep learning, our method offers a proactive and efficient solution to identify and mitigate electricity theft in smart grids, ultimately contributing to the stability and sustainability of modern energy distribution systems.
Licence: creative commons attribution 4.0
deep learning, energy distribution systems, smart grids
Paper Title: CONTROL OF ROOT-KNOT NEMATODE Meloidogyne incognita USING LEAF POWDER OF MEDICINAL PLANT ON OKRA
Author Name(s): Naresh Kumar Nayak, Mridula Khandelwal
Published Paper ID: - IJCRT2312060
Register Paper ID - 247210
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312060 and DOI :
Author Country : Indian Author, India, 324001 , Kota, 324001 , | Research Area: Life Sciences All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312060 Published Paper PDF: download.php?file=IJCRT2312060 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312060.pdf
Title: CONTROL OF ROOT-KNOT NEMATODE MELOIDOGYNE INCOGNITA USING LEAF POWDER OF MEDICINAL PLANT ON OKRA
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Life Sciences All
Author type: Indian Author
Pubished in Volume: 11
Issue: 12
Pages: a502-a506
Year: December 2023
Downloads: 81
E-ISSN Number: 2320-2882
Abstract: Experiment was set up by using pots having one Kg. steam sterilizedsoil. Twenty one day old okra (Abelmoschus esculentus) plant were transplanted in each pots. Leaf powder of five medicinal plant Viz. Asperagus asparagoides, Catharenthus roseus, Solanum nigrum, Occimum sanctum, Aegle marmelos were used to control root knot nematode, M. incognita in okra. There was markedincreased in root-shoot length, root-shoot weight of fresh and dry plant. Number of leaves, number of fruit and size increased. Leaf powder (LP) + Nematode (N)treatment as compare to Nematode (N) alone treatment. Leaf powder (LP) +Nematode (N) treatment was also characterized by reduction in root knot index incomparison to nematode alone. Leaf powder (LP) of Asperagus (Asp)+Nematode (N) combination was found to be more effective to reduce root knot index. It was alsoobserved that applied doze of 20 gm. Leaf powder was more effective than 10 gram doze. Keywords:- M. Incognita, Nematode, Okra, Leaf Powder
Licence: creative commons attribution 4.0
Keywords:- M. Incognita, Nematode, Okra, Leaf Powder
Paper Title: A Review article on Needle free injection technology
Author Name(s): Bhagyashree Chavan, Nitin Kolhe, Sameeksha Mhatre, Shah Kashif
Published Paper ID: - IJCRT2312059
Register Paper ID - 247232
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312059 and DOI :
Author Country : Indian Author, India, 400037 , Mumbai, 400037 , | Research Area: Pharmacy All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312059 Published Paper PDF: download.php?file=IJCRT2312059 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312059.pdf
Title: A REVIEW ARTICLE ON NEEDLE FREE INJECTION TECHNOLOGY
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Pharmacy All
Author type: Indian Author
Pubished in Volume: 11
Issue: 12
Pages: a492-a501
Year: December 2023
Downloads: 66
E-ISSN Number: 2320-2882
NFIT i.e., Needle-free injection technology is a comprehensive concept that covers an array of drug delivery systems designed to transport medications through the skin without the need for hypodermic needles. These systems utilize different forces, including Lorentz forces, shock waves, gas pressure or electrophoresis, to eliminate the necessity of using needles for drug administration. This method offers benefits not limited to the pharmaceutical sector, the emerging nations also finds it extremely helpful in mass vaccination campaigns by diminishing the likelihood of needle-related injuries and averting additional associated repercussions, such as those brought on by the repeated use of a single needle. Based on how they operate, the kind of load they carry, how drugs are delivered, and where they are delivered, NFIT devices can be categorized. The key considerations for ensuring a reliable, secure, and efficient drug delivery using NFIT are the drug's viscosity, sterility and shelf life of the medication. Another notable advantage of this technology is its capability to deliver highly viscous medication formulations that are challenging to administer using traditional needle and syringe systems, particularly when employing advanced needle-free injection systems. Needle-free injection technology devices are Produced using various techniques; however, the most used method is the injection molding technique. This technology is being offered in a variety of forms, including Vitajet 3, Tev-Tropin, Bioject ZetaJetTM and others. Numerous devices are already on the market as a result of greater investment in its development and FDA approval.
Licence: creative commons attribution 4.0
Bioject ZetaJetTM, Needle free injection technology, Molding technique, Tev-Tropin etc.
Paper Title: Intrusion Detection System Using Machine Learning
Author Name(s): Deshpande G. R., Patil Shravani Mahesh, Sondare Priya Prakash, Shinde Akanksha Ganesh
Published Paper ID: - IJCRT2312058
Register Paper ID - 247088
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312058 and DOI :
Author Country : Indian Author, India, 431606 , Nanded, 431606 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312058 Published Paper PDF: download.php?file=IJCRT2312058 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312058.pdf
Title: INTRUSION DETECTION SYSTEM USING MACHINE LEARNING
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 12
Pages: a487-a491
Year: December 2023
Downloads: 70
E-ISSN Number: 2320-2882
A machine learning-based intrusion detection system is a security tool that utilizes advanced algorithms to automatically detect and respond to suspicious activities within a computer network. It employs machine learning techniques to analyze network traffic patterns, identify anomalies, and distinguish between normal and abnormal behavior, thereby enhancing the network's security and threat detection capabilities. A machine learning-based intrusion detection system is a security tool that utilizes advanced algorithms to automatically detect and respond to suspicious activities within a computer network. It employs machine learning techniques to analyze network traffic patterns, identify anomalies, and distinguish between normal and abnormal behavior, thereby enhancing the network's security and threat detection.
Licence: creative commons attribution 4.0
Paper Title: “Mitigating Cyber Threats: Legal Remedies For Victims Of Phishing Attacks As A Social Engineering In India And Worldwide”-A Comparative Study
Author Name(s): LEENA.S.B, PREETHI.S.M
Published Paper ID: - IJCRT2312057
Register Paper ID - 247168
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2312057 and DOI :
Author Country : Indian Author, India, 620005 , Trichy , 620005 , | Research Area: Others area Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2312057 Published Paper PDF: download.php?file=IJCRT2312057 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2312057.pdf
Title: “MITIGATING CYBER THREATS: LEGAL REMEDIES FOR VICTIMS OF PHISHING ATTACKS AS A SOCIAL ENGINEERING IN INDIA AND WORLDWIDE”-A COMPARATIVE STUDY
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 12 | Year: December 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Others area
Author type: Indian Author
Pubished in Volume: 11
Issue: 12
Pages: a469-a486
Year: December 2023
Downloads: 92
E-ISSN Number: 2320-2882
The proliferation of phishing attacks and email scams has emerged as a critical concern in the digital landscape, posing significant threats to individuals and businesses alike. In an era dominated by digital communication, phishing attacks and email scams have become pervasive threats, causing substantial financial and emotional distress to individuals and businesses in India. People's inability to recognise social engineering assaults is the reason why the number of them is growing daily. Thus, there is a pressing need for resources to aid in the understanding of social engineering methods and crimes. This research paper delves into the landscape of phishing attacks and email scams, specifically examining the legal avenues available to victims in the context of India and various countries' jurisdictions. Through a comprehensive and comparitive analysis of relevant legislation, case law, and regulatory frameworks, this paper aims to elucidate the legal remedies accessible to victims in India. It explores the roles of various stakeholders including law enforcement agencies, regulatory bodies, and financial institutions in mitigating the impact of such cybercrimes. Furthermore, this study provides practical insights and recommendations to enhance the efficacy of legal recourse for victims, fostering a safer digital environment in India. The findings of this research are instrumental in augmenting the existing legal framework and strengthening the mechanisms to combat cyber threats effectively.
Licence: creative commons attribution 4.0
Keywords: Phishing attacks, legal remedies, awareness, comparative study.