IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: FROM A SOCIO-ECONOMIC PERSPECTIVE R.K. NARAYAN'S THE GUIDE
Author Name(s): KRISHNAMURTHY NOMULA
Published Paper ID: - IJCRT2303953
Register Paper ID - 233669
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303953 and DOI :
Author Country : Indian Author, India, 506167 , Jangaon, 506167 , | Research Area: Arts1 All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303953 Published Paper PDF: download.php?file=IJCRT2303953 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303953.pdf
Title: FROM A SOCIO-ECONOMIC PERSPECTIVE R.K. NARAYAN'S THE GUIDE
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Arts1 All
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i37-i41
Year: March 2023
Downloads: 441
E-ISSN Number: 2320-2882
This essay discusses the socioeconomic issues raised by R.K. Narayan's book The Guide. The characters are analyzed in light of Post-Independence Indian economic ideas as they are set against this backdrop. The effects of westernization and modernization are also discussed, as well as how the protagonist Raju's idealistic attitude is gradually altered by new philosophies, cultures, and fashions. One of the key elements of R.K. Narayan's writings, the exaltation of human relationships, is the aim of this article. The book and the characters are so critically examined against the backdrop of societal changes because the study deals with socio-economic discourse.
Licence: creative commons attribution 4.0
Indian economic ideas, Westernization and Modernization.
Paper Title: ATOMIC PLATFORM FOR REGULATING CHARITY FUNDS USING BLOCKCHAIN TECHNOLOGY
Author Name(s): R.M Mallika, D. Dharani, D. Ganesh, H. Bhavana, G. Hima Sailaja
Published Paper ID: - IJCRT2303952
Register Paper ID - 233665
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303952 and DOI :
Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303952 Published Paper PDF: download.php?file=IJCRT2303952 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303952.pdf
Title: ATOMIC PLATFORM FOR REGULATING CHARITY FUNDS USING BLOCKCHAIN TECHNOLOGY
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i29-i36
Year: March 2023
Downloads: 454
E-ISSN Number: 2320-2882
Legislators from all over the world are collecting taxes on the profit, but nobody knows where this vast amount of money is going. A significant majority of us must donate those funds in order to support a cause, receive gifts, or secure sponsorships. Everyone is simultaneously unsure of which association to trust and to whom to give their federal tax returns. The crowd funding entrance/local area/non-benefit association/peer-to-peer automatic aiding programme was introduced so that anyone could give/support money to people/startups that need/merit it in order to avoid these numerous uncertainties and questions. This CF application uses block chain innovation for safe financial transactions. Blockchain will be the only medium of exchange. Clients and employees from all around the world have gathered in this entryway to provide a hand and demonstrate humanity. It is an open source platform that is entirely transparent, trustworthy, and focused on the cause as well as how to make it as easy as possible for people to support it. Before funding, the government's income tax division can approve the funding and any appropriate tax exemptions for the charity, so the funding's transparency ensures its accuracy.
Licence: creative commons attribution 4.0
Black Chain, Information Security, Crowd Funding
Paper Title: Implementing Blood Bank Tracking System with Information Security Using Fuzzy Logic
Author Name(s): J. Jerin Jose, J . Keerthi, M . Reddy Asha, T . Ravindra, K . Jayanth
Published Paper ID: - IJCRT2303951
Register Paper ID - 233662
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303951 and DOI :
Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303951 Published Paper PDF: download.php?file=IJCRT2303951 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303951.pdf
Title: IMPLEMENTING BLOOD BANK TRACKING SYSTEM WITH INFORMATION SECURITY USING FUZZY LOGIC
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i24-i28
Year: March 2023
Downloads: 460
E-ISSN Number: 2320-2882
A network-based system called Blood Bank Management is intended to store, process, retrieve, and analyse data related to the administrative and inventory management within a blood bank. This project intends to keep all the data regarding blood donors, the various blood types accessible in each blood bank, and assist them in managing more effectively. The goal is to increase openness in this industry, make it simple and free of corruption to receive blood from a blood bank, and improve the efficiency of the blood bank management system. Instead of storing blood, we are stocking the names of blood donors because our client is not interested in doing so. Blood donors must register in the database if they are interested in giving blood. There are no issues with the idea because there is no blood storage. In order to find the closest and most appropriate donors, the proposal integrates Nearest Neighbor Search with Fuzzy Expert. The need for blood must be expressed, and we provide the donor's information. Whether they are available or not, the donors are allowed to adjust their status.
Licence: creative commons attribution 4.0
fuzzy, neural networks, fuzzy AI, and blood bank management system
Paper Title: Detect and Display the Subterranean Failing of Cables Using IoT
Author Name(s): Miriyala Sailesh, Lanka Padmalatha, Niranjan Karre, Madugula Vamsi, Penumatcha Vikas
Published Paper ID: - IJCRT2303950
Register Paper ID - 233661
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303950 and DOI :
Author Country : Indian Author, India, 521001 , Gudlavalleru, 521001 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303950 Published Paper PDF: download.php?file=IJCRT2303950 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303950.pdf
Title: DETECT AND DISPLAY THE SUBTERRANEAN FAILING OF CABLES USING IOT
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i15-i23
Year: March 2023
Downloads: 446
E-ISSN Number: 2320-2882
This project aims to demonstrate the distance of a Subterranean cable defect from the main station through the internet. The implementation of Subterranean cables has various advantages over an overhead system, but the main disadvantage is that we cannot identify the specific site of the defect. When a defect occurs for whatever reason, the repair process for that individual cable is difficult due to the precise unknown location of the problem within the cable. This Internet of Things technology is used to determine the accurate location of the defect and convey data in graphical format to the website via an IOT module and accordingly in the LCD panel.. The classic idea of Ohms law is used in this paper.,Since resistance is proportional to the distance when a voltage is provided at the end , the current fluctuates depending on the location of defect in the cable. When a fault occurs occurs, the voltage between series resistors fluctuates according to the resistance, which varies with distance. This is then transmitted to generate precise digital data, which the programmed microcontroller detects and displays on the website in kilometres, along with the latitude and longitude
Licence: creative commons attribution 4.0
Fault Detection,ArduinoUno,Esp8266,Relays,GPS Module.
Paper Title: A PERCEPTIVE HYBRID MODEL FOR SPECIALIZED SYSTEM IN MALWARE DETECTION
Author Name(s): K. Sirisha, T. Muni Amala, N. Nikhil Chowdary, Y. Priyanka, K.Karthik
Published Paper ID: - IJCRT2303949
Register Paper ID - 233660
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303949 and DOI :
Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303949 Published Paper PDF: download.php?file=IJCRT2303949 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303949.pdf
Title: A PERCEPTIVE HYBRID MODEL FOR SPECIALIZED SYSTEM IN MALWARE DETECTION
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i7-i14
Year: March 2023
Downloads: 454
E-ISSN Number: 2320-2882
Online social networks have become a popular means of communication for internet users, and as a result, harmful assaults that target these platforms are also on the rise. In this case, our goal is to build a hybrid specialized system that uses artificial intelligence and a fuzzy system technique to identify malware. Malicious assaults can cause harm to people and businesses by allowing crucial data to be completely altered or misrepresented while being transferred or stored on social media platforms. The hybrid model was put through malware detection tests that were made accessible in several public datasets in order to execute the fuzzy rules extraction and to confirm the effectiveness of the hybrid technique. It was contrasted in binary classification tests with artificial neural network models and hybrid models of fuzzy neural networks. The simulation findings show that the fuzzy neural network method to treating malware detection is workable and that it permits the construction of fuzzy rules that can help in the development of specialized systems. Next, utilizing the IPS-MD5 algorithm, we enhance it with the Text Mining and Op code-based learning method to stop the propagation of harmful software in social applications. As a result, the frequency of malicious assaults will decline.
Licence: creative commons attribution 4.0
Fuzzy Neural Networks, Machine Learning, Export Systems
Paper Title: Esther Morgan's "The Lost Word ": A Frantic Quest for a Feminist Identity
Author Name(s): Dr.Sunita Malik
Published Paper ID: - IJCRT2303948
Register Paper ID - 233622
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303948 and DOI :
Author Country : Indian Author, India, 122009 , Gurugram, 122009 , | Research Area: Languages Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303948 Published Paper PDF: download.php?file=IJCRT2303948 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303948.pdf
Title: ESTHER MORGAN'S "THE LOST WORD ": A FRANTIC QUEST FOR A FEMINIST IDENTITY
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Languages
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: i1-i6
Year: March 2023
Downloads: 1162
E-ISSN Number: 2320-2882
Abstract Esther Morgan's poem "The Lost Word" is from her first collection ,Beyond Calling Distance. The very first line sets the theme and tone of the poem - "She's lost a word."The woman is desperately searching for a word she had used once upon a time, but now despite exerting much pressure on her brain, she cannot recall it; a powerful two-letter word the letter referred to here is "No."In a very subtle manner, the poem depicts a woman's powerlessness, even within the domestic space. The poem showcases her inability and inefficacy to say "no" to suggest how women are made to submit to patriarchal authority through gender conditioning. This paper focuses on how, through a short poem, Morgan draws attention to the desperation and helplessness a woman faces because she has lost her ability to say "no." She has forgotten to use the power to say "No" --a woman's struggle to find her tongue and language. The poem points out how women have been subjugated and suppressed everywhere due to patriarchy and its notions about not allowing women to have opinions and the freedom to deny. Gender inequality takes many forms, to fill a woman's mouth with someone else's language;(language is not just words, but within language lies one's nativity, dignity and culture), so much so that she forgets her language and, in the process, loses her capacity to refuse, refute and reject. The paper Esther Morgan's "The Lost Word": A Frantic Quest for a Feminist Identity" attempts to assert the need for a gender-neutral language where women can respond in negation and forging an identity for themselves.
Licence: creative commons attribution 4.0
No ,Inequality, Helplessness, Lost word ,Gender, Feminism
Paper Title: POLYHERBAL SHAMPOO POWDER
Author Name(s): Bhushan R. Pawar, Pooja Bhonde, Dr. Gajanan Sanap
Published Paper ID: - IJCRT2303947
Register Paper ID - 233659
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303947 and DOI :
Author Country : Indian Author, India, 431111 , Aurangabad, 431111 , | Research Area: Pharmacy All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303947 Published Paper PDF: download.php?file=IJCRT2303947 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303947.pdf
Title: POLYHERBAL SHAMPOO POWDER
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Pharmacy All
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: h995-h1003
Year: March 2023
Downloads: 465
E-ISSN Number: 2320-2882
The shampoo sector is probably the largest unit sale among the hair care products since shampoos are one of the cosmetic products used in daily life. Synthetic preservatives and detergents have sometimes been the cause of adverse effects among consumer. A more radical approach in reducing the synthetic ingredients is by incorporating natural extracts whose functionality is comparable with their synthetic ingredients. A shampoo is a cleaning aid for the hair and is counted among the foremost beauty products. Today's shampoo formulations are beyond the stage of pure cleaning of the hair. Additional benefits are expected, e.g. conditioning, smoothing of the hair surface, good health of hair, e.g. hair free of dandruff, dirt, grease and lice and, above all, it is safety benefits are expected. As the scalp is one of the most absorbent part of the body, product applied to the scalp go directly to the blood, without being filtered in any way. Formulation of shampoo must be safe and efficient for long use. The major objective of the present study was to formulate an herbal shampoo powder by means of eliminating harmful synthetic ingredients and substitutes them with natural ingredients. Our formulated herbal shampoo powder consists of fenugreek, hibiscus, ashwagandha , shikakai, amla, neem, reetha,cinnamon, kalonji , and rose petals in appropriate ratio.
Licence: creative commons attribution 4.0
Paper Title: Defending Against DDoS Attacks Using Ant Colony Optimization
Author Name(s): R.M. Mallika, P.Lavanya, M. Peddaiah, K. Lohith, P.Lokeswari
Published Paper ID: - IJCRT2303946
Register Paper ID - 233654
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303946 and DOI :
Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303946 Published Paper PDF: download.php?file=IJCRT2303946 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303946.pdf
Title: DEFENDING AGAINST DDOS ATTACKS USING ANT COLONY OPTIMIZATION
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: h988-h994
Year: March 2023
Downloads: 450
E-ISSN Number: 2320-2882
The importance of the DDoS issue and the rise in the frequency, sophistication, and power of assaults have prompted the development of several prevention techniques. Each suggested preventive measure differs from the others in certain specific benefits and drawbacks. In this study, we categorise the many defences against potential DDoS assaults that have been put forth in the literature and evaluate the advantages and disadvantages of each defence. It is preferred to consider that the number of maximum continuous DoS attacks in both the S-C and the C-A channels is bounded because of the cost effect of attacks. In this project on Distributed denial of service (DoS) attacks in cyber-systems, DoS attacks exist in between the sensor and controller communications and the controller-to-actuator communications. Then, a successful security control technique is developed to counter two-channel DoS attacks, fully utilising the hardware to guarantee that control inputs are periodically captured during each time slot. A security controller that includes both the present and future control inputs is designed at the same time. The addressed CPS can be stable under 2-channel DoS attacks while maintaining control effectiveness under an appropriate security control strategy and security controller. Last but not least, simulations and tests are provided to show the viability of the suggested active security control approach.
Licence: creative commons attribution 4.0
DoS attacks, Security transmission policy, Actively defend, Security control, Experiments, Cyber-physical systems.
Paper Title: Emergence And Growing Potentiality Of Small Tea Cultivators Towards Employment Generation In Assam
Author Name(s): Monali Borah
Published Paper ID: - IJCRT2303945
Register Paper ID - 233658
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303945 and DOI :
Author Country : Indian Author, India, 785004 , Jorhat, 785004 , | Research Area: Medical Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303945 Published Paper PDF: download.php?file=IJCRT2303945 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303945.pdf
Title: EMERGENCE AND GROWING POTENTIALITY OF SMALL TEA CULTIVATORS TOWARDS EMPLOYMENT GENERATION IN ASSAM
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science All
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: h980-h987
Year: March 2023
Downloads: 463
E-ISSN Number: 2320-2882
This paper discusses the emergence and growing potentiality of the small tea cultivators in Assam towards employment generation. The tea industry in Assam has traditionally been dominated by large tea estates, but in recent years, small tea growers have emerged as a significant force in the sector. These small growers, often located in remote and underdeveloped regions, have been able to leverage modern technology and better cultivation practices to increase their yields and quality. As a result, they are contributing significantly to the state's tea production and employment generation. This study examines the factors driving the growth of small tea cultivators in Assam and the challenges they face. It also analyzes the potential of this sector to provide livelihoods for a large number of people in the region and contribute to the state's economic development.
Licence: creative commons attribution 4.0
Small tea growers, development, plantation
Paper Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE
Author Name(s): B. Getthavani, B. Venkat Kethan, K. Vijay Kumar, P. Shanmuga Reddy, G. Santhosh
Published Paper ID: - IJCRT2303944
Register Paper ID - 233653
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2303944 and DOI :
Author Country : Indian Author, India, 517501 , CHITTOOR, 517501 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2303944 Published Paper PDF: download.php?file=IJCRT2303944 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2303944.pdf
Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 3 | Year: March 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 3
Pages: h969-h979
Year: March 2023
Downloads: 420
E-ISSN Number: 2320-2882
Despite the delayed adoption of IoT (Internet of Things) in the healthcare industry compared to other sectors, IoT in medicine is destined to keep the people safe and healthy, with the primary goal being to reduce the cost of health care in the next years. An intelligent medication box linked to sensors and a server for routine health monitoring is suggested as part of a smart Internet of Things-based healthcare system. With the aid of this internet-connected smart pill box, patients can stay on top of their medical regimens and easily communicate with their doctors even when they can't be in the same room at the same time. The suggested medication box has an alert that will remind the patient to take their medication at the prescribed time. Information about the doctor and patient, including medical history, medications, and upcoming appointments, is maintained on a laptop that also serves as a server. The doctor and the patient both have their own login credentials to use on the server. The server also stores the patient's prescription history and body temperature for the convenience of the attending physician. If the doctor decides to make a modification to the patient's prescription, they will be informed via the patient's mobile app. In addition, the doctor is in a position to act quickly in the event of a medical emergency.
Licence: creative commons attribution 4.0
Health Care,Internet of Things (IoT), Body sensor network, LCD

