IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Enhanced Criminal Face Detection Using Haar Cascade Algorithm
Author Name(s): Prof.Kavitha.G, Vidhyaa Shree C S, Sujatha K
Published Paper ID: - IJCRT2404895
Register Paper ID - 256513
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404895 and DOI :
Author Country : Indian Author, India, 600124 , Chennai , 600124 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404895 Published Paper PDF: download.php?file=IJCRT2404895 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404895.pdf
Title: ENHANCED CRIMINAL FACE DETECTION USING HAAR CASCADE ALGORITHM
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h818-h822
Year: April 2024
Downloads: 195
E-ISSN Number: 2320-2882
Abstract-- Confront discovery innovation has gotten to be progressively crucial in different security applications, especially in the distinguishing proof and following of offenders. This paper presents an upgraded approach to criminal confront discovery leveraging the Haar Cascade calculation. The proposed strategy points to make strides the exactness and effectiveness of recognizing criminal faces in observation symbolism. The Haar Cascade calculation is a well known strategy for confront location due to its vigor and speed. Be that as it may, ordinary usage frequently battle with precisely recognizing faces beneath challenging conditions such as shifting lighting, occlusions, and posture varieties. To address these restrictions, our upgraded approach consolidates a few key upgrades. Firstly, we present a refined preparing dataset particularly custom-made to capture a differing run of criminal facial characteristics. This dataset incorporates commented on pictures of people with known criminal records, guaranteeing the demonstrate is prepared on pertinent information for progressed execution in criminal confront location errands. Furthermore, we utilize highlight designing procedures to improve the discriminative control of the Haar Cascade classifier. By extricating more instructive highlights from the input pictures, our approach can superior separate between criminal and non-criminal faces, indeed in complex scenarios. Moreover, we coordinated post-processing steps such as non-maximum concealment to refine the discovery comes about and decrease wrong positives. This guarantees that as it were the most sure location are held, improving the unwavering quality of the framework in real-world applications. Test assessments conducted on benchmark datasets illustrate the adequacy of the proposed approach compared to pattern strategies. Our strategy accomplishes prevalent precision and vigor in identifying criminal faces over different challenging conditions, exhibiting its potential for arrangement in security frameworks and law requirement applications. Generally, the improved criminal confront location framework displayed in this paper offers a promising arrangement for moving forward open security and security through the exact recognizable proof and following of people with criminal records. This venture executes a confront acknowledgment framework which to begin with identifies the confront and then identifies the individual by comparing the identified confront with picture database. It will offer assistance to keep up a solid security in that environment. To begin with the information sets are made and prepared them with the offer assistance of calculations which experiences include extraction, normalization and at that point pre- handled. The prepared information sets are compared with the input facial picture, it to begin with identifies and perceives the individual and shows the title of the work force. We got confront acknowledgment rate of 77% and its false-positive rate is 28%. This framework is recognizing faces indeed when there are glasses or developed a whisker. Confront Acknowledgment of obscure people is about 60% for both with and without applying limit esteem. Its false-positive rate is 14% and 30% with and without applying limit respectively.
Licence: creative commons attribution 4.0
LBPH Recognizer, Confront Datasets, Histogram, Haar Cascade Algorithm.
Paper Title: INSUFFICIENT SALARY PROBLEMS FACED BY SALARIED PERSON IN BPO SECTOR
Author Name(s): Dr.SANTHINI.S
Published Paper ID: - IJCRT2404894
Register Paper ID - 256759
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404894 and DOI :
Author Country : Indian Author, India, 641015 , Coimbatore, 641015 , | Research Area: Commerce All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404894 Published Paper PDF: download.php?file=IJCRT2404894 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404894.pdf
Title: INSUFFICIENT SALARY PROBLEMS FACED BY SALARIED PERSON IN BPO SECTOR
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Commerce All
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h813-h817
Year: April 2024
Downloads: 211
E-ISSN Number: 2320-2882
The Business Process Outsourcing (BPO) sector has long grappled with the persistent challenge of insufficient salaries for its employees. This issue significantly impacts the lives of salaried individuals within this industry. Despite being an integral part of the global economy, BPO employees often face compensation packages that fail to match the demanding nature of their roles.The work in the BPO sector involves handling critical operations, customer service, and complex tasks requiring round-the-clock availability. However, the compensation structure frequently falls short in reflecting the skill set and dedication these employees bring to their roles. Low salaries often lead to financial stress, impacting the overall well-being and motivation of workers.
Licence: creative commons attribution 4.0
Employees, BPO, Salary, Financial Stress
Paper Title: DNA SEQUENCING OF GENOME AND GENETICS USING MACHINE LEARNING
Author Name(s): Deepa Bendigeri, Leena Sakri, Adarsh Hosamani, Prabhakar Kulkarni, Spoorthi D P,Swathi A S
Published Paper ID: - IJCRT2404893
Register Paper ID - 256053
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404893 and DOI :
Author Country : Indian Author, India, 580002 , Dharwad, 580002 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404893 Published Paper PDF: download.php?file=IJCRT2404893 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404893.pdf
Title: DNA SEQUENCING OF GENOME AND GENETICS USING MACHINE LEARNING
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h809-h812
Year: April 2024
Downloads: 174
E-ISSN Number: 2320-2882
Genomics has been revolutionized by DNA sequencing technologies, generating an avalanche of data that necessitates sophisticated analysis techniques. Machine learning (ML) has emerged as a powerful tool in harnessing this data deluge, unlocking new frontiers in our understanding of genomes and their role in genetics. This review delves into the transformative applications of ML across the DNA sequencing workflow, encompassing tasks like genome assembly, variant calling, and functional annotation. We explore how ML algorithms are employed to decipher genetic variations associated with diseases, paving the way for personalized medicine. Additionally, the potential of ML in drug discovery and accelerating research in various genetic disorders is investigated. We culminate by addressing the ethical considerations surrounding the use of genomic data and the future directions of this burgeoning field.
Licence: creative commons attribution 4.0
Machine learning(ML), DNA, Genome, genetics
Paper Title: SOCIO ECONOMIC DEVELOPMENT OF SUGALI TRIBE IN ANDHRA PRADESH: A STUDY
Author Name(s): Dr. M. VENKATESULU
Published Paper ID: - IJCRT2404892
Register Paper ID - 256612
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404892 and DOI :
Author Country : Indian Author, India, 517502 , Tirupati, 517502 , | Research Area: Arts1 All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404892 Published Paper PDF: download.php?file=IJCRT2404892 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404892.pdf
Title: SOCIO ECONOMIC DEVELOPMENT OF SUGALI TRIBE IN ANDHRA PRADESH: A STUDY
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Arts1 All
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h799-h808
Year: April 2024
Downloads: 337
E-ISSN Number: 2320-2882
This study is aimed to examine the socio economic development of sugali tribe in Andhra Pradesh. The survey was conducted in ten villages spread over three Mandals of Anathapur district in Andhra Pradesh by using purposive random sampling method. Anathapur district has 63 Mandals, out of these mandals three rural mandals were selected purposively. They are Mudigubba, Gorantla, and Uravakonda Mandals. Four Villages were selected from each mandal and from each village selected 40 respondents. In the present study 400 sample sizes were selected randomly. Data were collected from respondents belonged to sugalies.
Licence: creative commons attribution 4.0
Socio Economic, Development, Sugali Tribe, Andhra Pradesh.
Paper Title: Comparative Analysis Of Special Economic Zones(SEZs) In India With China Within International Trade Law
Author Name(s): Shreeti Dhanuka, Dr. Shilpa ML
Published Paper ID: - IJCRT2404891
Register Paper ID - 255649
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404891 and DOI :
Author Country : Indian Author, India, 560043 , BANGALORE, 560043 , | Research Area: Other area not in list Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404891 Published Paper PDF: download.php?file=IJCRT2404891 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404891.pdf
Title: COMPARATIVE ANALYSIS OF SPECIAL ECONOMIC ZONES(SEZS) IN INDIA WITH CHINA WITHIN INTERNATIONAL TRADE LAW
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Other area not in list
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h793-h798
Year: April 2024
Downloads: 190
E-ISSN Number: 2320-2882
Special Economic Zones have been built to foster the economic growth of the country, attract foreign investment and promote international trade. These areas are governed by unique regulatory frameworks that catalyze economic growth, and technological advancement and create job opportunities. SEZs have evolved from Export Processing Zones(EPZs) and Free Trade Zones and have been tailored in such a way to meet the needs of the host country. These zones have played a pivotal role in shaping investment policies and enhancing the competitiveness of the country hosting them. The methodology used in this article is doctrinal research. The research gap in the topic is that a comparative analysis can be done to understand the shortcomings in the present regulatory system of India and will help in the effective implementation of SEZs. In the present article, a comparative study of SEZs in India and China has been conducted. A comparative analysis of SEZs in India and China within trade law has provided insights into the economic, trade, export dynamics of these two powerful nations. The analysis helps explore the legal framework, regulatory environments and trade law implications in India and China.
Licence: creative commons attribution 4.0
Special Economic Zone(SEZ), Free-Trade Zones, Export Processing Zones, Industrial Parks, Specialised Zones.
Paper Title: Fake Biometric Detection Using Blockchain and Thermal Imaging For Voting System
Author Name(s): Sadhana R, Indhumathi P, Jayasuriya J, Chandana J
Published Paper ID: - IJCRT2404890
Register Paper ID - 256559
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404890 and DOI :
Author Country : Indian Author, India, 635117 , Shoolagiri, 635117 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404890 Published Paper PDF: download.php?file=IJCRT2404890 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404890.pdf
Title: FAKE BIOMETRIC DETECTION USING BLOCKCHAIN AND THERMAL IMAGING FOR VOTING SYSTEM
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h784-h792
Year: April 2024
Downloads: 167
E-ISSN Number: 2320-2882
The integration of fake biometric detection using blockchain and thermal imaging technology presents a pioneering approach to bolstering the security and transparency of voting systems. By leveraging Convolutional Neural Networks (CNNs) in thermal image recognition, alongside the immutable ledger of blockchain, this innovative solution ensures the integrity of biometric data. Multi-CNNs use multiple channels as input, allowing the network to process different types of data or features simultaneously. Each thermal image, along with associated data, is securely stored on the blockchain, employing cryptographic hashes to link consecutive blocks, thereby preventing tampering or manipulation. The voting process becomes inherently transparent and traceable, fostering trust among stakeholders. Furthermore, smart contracts play a pivotal role in automating processes and enforcing predefined rules within the voting system. These self-executing contracts, encoded with the terms of the agreement, can trigger alerts or execute predetermined actions if anomalies are detected in the thermal image data, such as temperature breaches beyond acceptable limits. This proactive approach enhances the security posture of the voting system, mitigating potential risks and ensuring the authenticity of each vote cast. By combining fake biometric detection, thermal imaging technology, and blockchain-enabled transparency, this novel solution sets a new standard for secure and trustworthy electoral processes, safeguarding the democratic foundation of societies. SHA-256 is considered to be secure against collision attacks, where two different inputs produce the same hash output, and pre-image attacks, where the original input is derived from the hash output, when used correctly.
Licence: creative commons attribution 4.0
Convolutional Neural Networks, Blockchain, Thermal Imaging, Cryptographic Hashes, Biometric Data,SHA-256.
Paper Title: Seed Thought on Religious Harmony through Philosophy of Science and Religion / Spirituality module in Dr. Vishwanath Karad MIT-World Peace University Students; a quantitative analysis
Author Name(s): Prof Rasika Beohar, Dr Sachin Gadekar
Published Paper ID: - IJCRT2404889
Register Paper ID - 256174
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404889 and DOI :
Author Country : Indian Author, India, 411041 , Pune, 411041 , | Research Area: Medical Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404889 Published Paper PDF: download.php?file=IJCRT2404889 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404889.pdf
Title: SEED THOUGHT ON RELIGIOUS HARMONY THROUGH PHILOSOPHY OF SCIENCE AND RELIGION / SPIRITUALITY MODULE IN DR. VISHWANATH KARAD MIT-WORLD PEACE UNIVERSITY STUDENTS; A QUANTITATIVE ANALYSIS
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science All
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h777-h783
Year: April 2024
Downloads: 212
E-ISSN Number: 2320-2882
Technological advancements have significant implications for society and emphasizes the need for a well - rounded education that goes beyond technical skills. The focus on global awareness, environmental impact, social and political considerations, and professional ethics reflects the growing recognition of the interconnectedness between various disciplines and the need for a comprehensive understanding of the world's challenges. By incorporating these aspects into the curriculum, Dr. Vishwanath Karad MIT-World Peace University aims to prepare students to navigate complex societal issues and contribute to sustainable and inclusive progress. MIT WPU's vision of "Powering the future" through education, innovation, and culture indicates a commitment to creating a positive impact on society. By equipping students with the necessary knowledge and skills and fostering a sense of social responsibility, the university aims to drive sustainable and progressive transformation. The first part of the paper focuses on the teaching and learning of the core concept of Religious Harmony through Philosophy of Science and Religion / Spirituality. Statistics and components of the module being taught at UG and PG level at Dr. Vishwanath Karad MIT-World Peace University, Pune are presented. The quantitative analysis would be based on a questionnaire. This part focuses on collecting data, circulating the questionnaire to a minimum of 300 students who had studied the module in the recent past. The quantitative analysis of the data shows that the module's comprehension of religious correlations, instilment, and understandability is underscored by a significant positivity rate.
Licence: creative commons attribution 4.0
Religious Harmony, Science, Spirituality, Seed thought
Paper Title: Examining the factors influencing Investment Decisions of investors: Insights from a Review of Literature
Author Name(s): Nisha Kumari, Aditi Sharma
Published Paper ID: - IJCRT2404888
Register Paper ID - 255721
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404888 and DOI :
Author Country : Indian Author, India, 123401 , Rewari, 123401 , | Research Area: Commerce All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404888 Published Paper PDF: download.php?file=IJCRT2404888 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404888.pdf
Title: EXAMINING THE FACTORS INFLUENCING INVESTMENT DECISIONS OF INVESTORS: INSIGHTS FROM A REVIEW OF LITERATURE
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Commerce All
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h770-h776
Year: April 2024
Downloads: 193
E-ISSN Number: 2320-2882
This paper examines the factors that shape investment decisions, providing a comprehensive review of existing literature on investor behavior. Central to the review are the influences of financial goals, risk tolerance, and market knowledge on individual investment choices. While traditional finance theory posits rational decision-making, this paper highlights the role of emotions, biases, and heuristics in shaping investment decisions, drawing on insights from behavioral finance research. Additional factors, such as return on investment, financial literacy, social influences, and market conditions, are also found to impact investment behavior. Given the importance of informed decision-making for investors and financial institutions, a nuanced understanding of these factors is crucial for building prosperous economies. This paper acknowledges limitations, including reliance on secondary data, more in-depth analysis, and consideration of regional differences. Future research may explore specific factors using primary data and examine the impact of technological advancements on investment behavior.
Licence: creative commons attribution 4.0
Keywords: Investment decision, factors influencing, individual investors.
Paper Title: Real World Applications of Artificial Intelligence
Author Name(s): Mrs.J.Dhivya, Mrs.A.V.Anuja
Published Paper ID: - IJCRT2404887
Register Paper ID - 256662
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404887 and DOI :
Author Country : Indian Author, India, 641044 , COIMBATORE, 641044 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404887 Published Paper PDF: download.php?file=IJCRT2404887 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404887.pdf
Title: REAL WORLD APPLICATIONS OF ARTIFICIAL INTELLIGENCE
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h765-h769
Year: April 2024
Downloads: 199
E-ISSN Number: 2320-2882
Artificial Intelligence (AI) is one of the most important innovations that has permeated both our daily lives and industrial processes. Its quick development portends revolutionary effects in a number of areas, from cutting-edge businesses to regular people's lives. AI is continuously improving human experiences by modifying interactions and enhancing capacities. For example, modern educational institutions use facial recognition technology to track attendance using AI algorithms. In the future, autonomous vehicles will be the ultimate application of AI, with cars depending solely on AI systems to navigate roads, detect traffic signals, and navigate.
Licence: creative commons attribution 4.0
higher education, covid pandemic, virtual classrooms, and online communication tools
Paper Title: Detecting Phishing Website using Machine Learning
Author Name(s): Mr.Pratharv Surve, Mr.Ayush Singh, Ms.Khushboo Yadav, Mr.Aman Yadav
Published Paper ID: - IJCRT2404886
Register Paper ID - 256492
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2404886 and DOI :
Author Country : Indian Author, India, 400101 , Mumbai, 400101 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2404886 Published Paper PDF: download.php?file=IJCRT2404886 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2404886.pdf
Title: DETECTING PHISHING WEBSITE USING MACHINE LEARNING
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 4 | Year: April 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 4
Pages: h760-h764
Year: April 2024
Downloads: 216
E-ISSN Number: 2320-2882
Phishing assaults, which include content injection phishing, social engineering, online social networks, and mobile applications, employ advanced tactics and technologies to obtain sensitive information. To stop and reduce the chances of these attacks, a number of phishing detection methods were developed; deep learning algorithms were one of them that showed potential. The application of deep learning algorithms to phishing detection lacks a comprehensive overview, and the findings and related lessons are scattered throughout multiple publications. We carried out a systematic literature review (SLR) to find, assess, and condense the research results on deep learning algorithms for phishing detection as offered by the selected academic publications. The phishing website may be recognized in the final phishing detection rate depending on a number of important features, including the URL and Domain Identity, security and encryption specifications, and other elements. When a consumer completes an online transaction and pays through a website, our technology employs deep learning algorithms to identify whether or not the website is a phishing website.
Licence: creative commons attribution 4.0

