IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Implementing A Technique To Enhance The Logistic System Privacy And Traceability Using Blockchain
Author Name(s): Sushant Buche, Prathamesh misal, Sahil Halmare, Gaurav Divtelwar
Published Paper ID: - IJCRT2304565
Register Paper ID - 234172
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304565 and DOI :
Author Country : Indian Author, India, 441106 , Ramtek, 441106 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304565 Published Paper PDF: download.php?file=IJCRT2304565 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304565.pdf
Title: IMPLEMENTING A TECHNIQUE TO ENHANCE THE LOGISTIC SYSTEM PRIVACY AND TRACEABILITY USING BLOCKCHAIN
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e623-e627
Year: April 2023
Downloads: 275
E-ISSN Number: 2320-2882
To ensure the security of logistics information and to query information quickly and efficiently using searchable encryption algorithms and blockchain characteristics, a searchable and encrypted logistics information blockchain data query algorithm is proposed. The logistical data is initially divided into numerous data files before being deposited in the cloud server.The data is encrypted and stored using an asymmetric searchable encryption mechanism. The keyword index value of each data file is extracted and submitted to the blockchain. This solution can be applied at any time. Updates and inquiries on data. Next, assess the article's plan's correctness, completeness, and security, which proves its feasibility.
Licence: creative commons attribution 4.0
Blockchain, searchable encryption, asymmetric encryption, logistics information, data query.
Paper Title: Manik Bandopadhyay's 'The Final Solution': A Study in the Perspective of Partition
Author Name(s): Binoy Dangar
Published Paper ID: - IJCRT2304564
Register Paper ID - 234745
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304564 and DOI :
Author Country : Indian Author, India, 742101 , BERHAMPORE, 742101 , | Research Area: Medical Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304564 Published Paper PDF: download.php?file=IJCRT2304564 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304564.pdf
Title: MANIK BANDOPADHYAY'S 'THE FINAL SOLUTION': A STUDY IN THE PERSPECTIVE OF PARTITION
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Medical Science All
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e619-e622
Year: April 2023
Downloads: 1461
E-ISSN Number: 2320-2882
Following the two-nation theory propounded by Muhammad Ali Jinnah and others, Bengal suffered partition and its aftermath. The nationalist discourse suppressed the real suffering of the people faced in two provinces in Punjab and Bengal. On the other hand the independence was glorified in such a way that the trauma and sufferings of the millions of refugees got suppressed. As alternative history we can look at contemporary literature. Manik Bandopadhyay's 'The Final Solution' depicts the inhuman suffering of a woman along with many families and her ultimate resisting spirit that she shows at the end of the story. The purpose of this paper is to analyse the story from the perspective of Partition and to show how women suffered in multifaceted ways during and after the partition. The paper aims to point out the sexual exploitation that women had to face through even in their distressful situation as refugees. The character of Mallika in the story 'The Final Solution' fell in the trap of Pramatha, a dishonest man who tried to exploit her sexually and commercially. But she proves that she is no less strong than a man in fighting against him and winning over him.
Licence: creative commons attribution 4.0
Partition, women, exploitation, refugees, Bengal
Paper Title: Malicious URL Detection
Author Name(s): R. Indu, M. Bhavya, V. Pardhasaradhi, Y. Sri Ram, Dr. Y. Suresh
Published Paper ID: - IJCRT2304563
Register Paper ID - 234603
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304563 and DOI : http://doi.one/10.1729/Journal.33800
Author Country : Indian Author, India, 521212 , Vijayawada, 521212 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304563 Published Paper PDF: download.php?file=IJCRT2304563 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304563.pdf
Title: MALICIOUS URL DETECTION
DOI (Digital Object Identifier) : http://doi.one/10.1729/Journal.33800
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e612-e618
Year: April 2023
Downloads: 371
E-ISSN Number: 2320-2882
The importance of the World Wide Web has grown. Unfortunately, technical advancements have led to the emergence of new, highly complex techniques for user exploitation. In these attempts, users' computers may be infected with malware or utilize unfriendly websites to sell fake items or disclose private data that can be used to steal money and commit financial fraud. Malicious URLs can be particularly damaging to potential victims because they host a wide variety of unwanted content. So, a quick and efficient detection technique is needed. In this thesis, we focus on the problem of identifying dangerous URLs utilizing data from URLs and machine learning technology. We'll employ a variety of machine-learning techniques, including XGBoost, LightGBM, and Random Forest.
Licence: creative commons attribution 4.0
The importance of the World Wide Web has grown. Unfortunately, technical advancements have led to the emergence of new, highly complex techniques for user exploitation. In these attempts, users' computers may be infected with malware or utilize unfriendly websites to sell fake items or disclose private data that can be used to steal money and commit financial fraud. Malicious URLs can be particularly damaging to potential victims because they host a wide variety of unwanted content. So, a q
Paper Title: A Review On - Genetic Technologies
Author Name(s): Kale Rutuja Balasaheb, Mr.Wamane Vikas Bhausaheb
Published Paper ID: - IJCRT2304562
Register Paper ID - 234288
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304562 and DOI :
Author Country : Indian Author, India, 413709 , Shrirampur, 413709 , | Research Area: Pharmacy All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304562 Published Paper PDF: download.php?file=IJCRT2304562 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304562.pdf
Title: A REVIEW ON - GENETIC TECHNOLOGIES
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Pharmacy All
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e589-e611
Year: April 2023
Downloads: 336
E-ISSN Number: 2320-2882
The rapid developments in the field of genetic engineering have given a new motivation to biotechnology. Molecular cloning is the collection of experimental procedures required to isolate and expand a specific fragment of DNA into a host organism in order to create a large number of identical copies. Genetics is the scientific study of inherited variation. Human genetics is the scientific study of inherited human variation. This field has been energized in recent years by the Human Genome Project. Scientists expect that the project will lead to the development of new drugs targeted to specific genetic disorders. Increasingly, modern genetics involves genetic engineering; a technique used to manipulate genes and has produced many advances in medicine. The development of techniques used to transfer foreign DNA into new host cells proved successful and nowadays is commonly implemented in different areas of knowledge, such as microbiology, biochemistry and immunology. The genetic technologies involved the different technique. these are recombinant DNA technologies, cloning, PCR (polymerase chain reaction), in-vitro fertilization. Every technology involved the very complex process. Now a days the genetic technologies is very important. various type of diseases can be treated by using the gene therapy.
Licence: creative commons attribution 4.0
Keywords: Genetic Technologies, DNA, Biotechnology, Genome
Paper Title: Authenticated Voice Assistant for Desktop Applications
Author Name(s): Prof. Dr. Yogita D. Bhise, Evangeline S. Rebello, Ruchika A. Kahane, Samruddhi S. Badgujar, Kranti P. Sonawane
Published Paper ID: - IJCRT2304561
Register Paper ID - 234557
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304561 and DOI :
Author Country : Indian Author, India, 422003 , Nashik, 422003 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304561 Published Paper PDF: download.php?file=IJCRT2304561 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304561.pdf
Title: AUTHENTICATED VOICE ASSISTANT FOR DESKTOP APPLICATIONS
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e585-e588
Year: April 2023
Downloads: 262
E-ISSN Number: 2320-2882
In today's exponentially growing data-centric industry security is the most important factor. Considering that, authentication that is based on biometrics traits is more secure for many applications. The aim is to build a model based on voice authentication which would recognize the verbal commands of the respective user to perform tasks on desktop applications, for example - sending emails and WhatsApp messages, performing file operations, etc. just like present systems, but there would be an additional layer of security in which it will only recognize the specific voice and thus follow the commands of the authenticated user. As the existing systems have the drawback of not authenticating the user's voice and directly functioning on any input voice, so to add a security aspect and maintain confidentiality we have proposed this model which would authenticate the user's voice and also address the issues where the existing voice-based systems fail such as authenticating pre-recorded voice of authenticated user. The main focus would be on increasing the security level and accuracy of biometric authentication. The phases involved in this system are Voice authentication and Desktop voice assistance. The implementation will consist of feature extraction, model building, and model evaluation. Next part is the Voice Assistant on Desktop Applications. This includes listening to spoken words and identifying them. The system takes voice and converts spoken words into text. This text is then fed as a query or the result is obtained and the system generates a reply. It uses a speech recognition library for performing speech recognition. This project would be the first step leading toward an era of secured voice-based assistance where confidentiality is a major requirement.
Licence: creative commons attribution 4.0
Machine Learning, Communication, Voice Recognition, Speech Recognition, Security and Biometric Authentication
Paper Title: Data Leakage Detection Strategy in Cloud Computing Environment
Author Name(s): MYLAPILLI AJAY KUMAR, KUTCHU PRASANNA, MAJJI SAI KRISHNA PAWAN, MALLADA SRI NIKHIL, SALINA ADINARAYANA
Published Paper ID: - IJCRT2304560
Register Paper ID - 234698
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304560 and DOI :
Author Country : Indian Author, India, 531162 , Visakhapatnam, 531162 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304560 Published Paper PDF: download.php?file=IJCRT2304560 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304560.pdf
Title: DATA LEAKAGE DETECTION STRATEGY IN CLOUD COMPUTING ENVIRONMENT
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e577-e584
Year: April 2023
Downloads: 285
E-ISSN Number: 2320-2882
Anxiety is a useful technique that modifies data and makes it "less sensitive" before sending it to the agent. For example, some products can be added to random popularity or the amount of money can be changed by many factors. But sometimes it is important not to change the original data of the distributor. For example, if a professional pays us, he must have a salary and a bank account. Medical researchers will need accurate data about patients (as opposed to statistical calculations) if they are to treat patients. Watermark detection is traditionally done by watermark, that is, by placing a watermark on each printed document. If this document is later found in the hands of an unauthorized person, the leaker can be identified. The watermark can be useful in some cases, but again there are some changes to the original file. Additionally, watermarks can sometimes be affected if the recipient receives the information of poor quality. In this article, we explore non-invasive methods for detecting leaks in products or materials. Specifically, we examine cases where, after the broker has been given a set of goods, the seller finds some of the original goods in an illegal location.
Licence: creative commons attribution 4.0
Data leakage, audit server, integrity, unauthorized, optimization
Paper Title: RESEARCH ON DEVELOPING TAMIL VOWELS AS TOYS
Author Name(s): Mr. G. Boopathy Vijay, K.E.Poornima
Published Paper ID: - IJCRT2304559
Register Paper ID - 234750
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304559 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304559 Published Paper PDF: download.php?file=IJCRT2304559 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304559.pdf
Title: RESEARCH ON DEVELOPING TAMIL VOWELS AS TOYS
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e572-e576
Year: April 2023
Downloads: 317
E-ISSN Number: 2320-2882
Language development is important during the early years of a child's life. It can help children learn to communicate effectively and develop their cognitive abilities. One of the best ways to develop language skills is through play, and what better way to engage children in play than through toys Soft toys, in particular, have always been popular with children, and they are a great tool for language development. Learning Tamil, one of the oldest classical languages in the world, can be an intimidating task for many. Developing Tamil vowels as soft toys with letters embossed on the backside can prove to be an effective and exciting way for children to learn the language. Not only will it make learning more engaging and fun, but it will also create a strong foundation for future learning.
Licence: creative commons attribution 4.0
Tamil vowels , Learning purpose , Soft toys , Embossed letters
Paper Title: COMPARISON OF NATIONAL EDUCATIONAL POLICY 2020 AND NATIONAL POLICY ON EDUCATION 1986
Author Name(s): BASANTI MAHANTA
Published Paper ID: - IJCRT2304558
Register Paper ID - 234685
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304558 and DOI :
Author Country : Indian Author, India, 741235 , KALYANI, 741235 , | Research Area: Social Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304558 Published Paper PDF: download.php?file=IJCRT2304558 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304558.pdf
Title: COMPARISON OF NATIONAL EDUCATIONAL POLICY 2020 AND NATIONAL POLICY ON EDUCATION 1986
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Social Science All
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e563-e571
Year: April 2023
Downloads: 453
E-ISSN Number: 2320-2882
The NEP 2020 was approved by the Union Cabinet of India on 29 July 2020. The Ministry of Human Resource Development formed a committee headed by former ISRO Chairman Dr. K Kasturirangan, who outlined the vision of India's new education system. The New Education Policy addresses challenges the current education system faces such as Quality, Affordability, Equity, Access, and Accountability. NEP 2020 envisions an India-centric education system that contributes directly to transforming our nation sustainably into an equitable and vibrant society filled with knowledge and by providing high-quality education to all. The National Policy on Education (NPE) is a policy formulated by the Government of India to promote and regulate education in India. The policy covers elementary education to higher education in both rural and urban India. NPE 1986 was promulgated by the Government of India by Prime Minister Rajiv Gandhi. This article emphasizes the major differences between the current education policy i.e., the New Education Policy of 2020 and the New Policy on Education 1986. An attempt had been also made to figure out the challenges in the existing policy that led to the emergence of NEP 2020. The data has been collected through various sources, i.e., journals, reports, print media, and other government websites. This article is purely based on secondary data. Though NEP 2020 has new targets to be achieved by 2035, nevertheless it has its own merits and limitations the efforts have been made to highlight them. As NEP 2020 is one of the most promising policies introduced, the question relies on to what extent the policy's objectives will be achieved.
Licence: creative commons attribution 4.0
Education policy, Development, Higher education, Comparison, Teachers, Drawbacks, Challenges.
Paper Title: Conserving Plant Biodiversity Based on Traditional Knowledge in Magadh Region of Bihar, India.
Author Name(s): Rajeev Ranjan Singh, V K PRABHAT, Anil Kumar
Published Paper ID: - IJCRT2304557
Register Paper ID - 234724
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304557 and DOI :
Author Country : Indian Author, India, 823001 , Gaya, 823001 , | Research Area: Life Sciences All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304557 Published Paper PDF: download.php?file=IJCRT2304557 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304557.pdf
Title: CONSERVING PLANT BIODIVERSITY BASED ON TRADITIONAL KNOWLEDGE IN MAGADH REGION OF BIHAR, INDIA.
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Life Sciences All
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e553-e562
Year: April 2023
Downloads: 303
E-ISSN Number: 2320-2882
The present communication deals with Conserving Plant Biodiversity Based on Traditional Knowledge in Magadh Region, Bihar.They have been frequently associated with gods and goddesses as their incarnation, symbols, abode, offering, sacrificial rites and rituals, religious ceremonies and for different celestial components. Traditional knowledge was used in ancient India as a tool to protect nature and natural resources. Several plants, such as Aegle marmelos ('bel'), Calotropis procera ('akwan'), Coconut nucifera ('nariyal'), Curcuma longa ('haldi'), Cynodon dactylon ('dub'), Datura metel ('dhatura'), Desmostachya bipinnata ('kusha'), Ficus benghalensis ('bargad'), Ficus religiosa ('pipal'), Mangifera indica ('aam'), Musa paradisiaca ('kela'),Nelumbo nucifera ('kamal'), Ocimum sanctum ('tulsi'), Oryza sativa ('dhan'), Piper betel ('pan') and many others are considered sacred and used in Hindu and Buddhist religious rites. These beliefs and practices continue to be the elements of modern Indian traditions. Consequently, many plant species of ecological, economical, medicinal and social importance in this area i.e., Magadh region of Bihar area have been saved. Magadh region of Bihar occupies a unique place in the religious and cultural history of India.
Licence: creative commons attribution 4.0
Religious beliefs, Traditional cultures, Conserved plants.
Paper Title: Influencer Marketing and Its Impact on H&M
Author Name(s): Ujwal HG, Gourav HM, Abheek P
Published Paper ID: - IJCRT2304556
Register Paper ID - 234637
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2304556 and DOI :
Author Country : Indian Author, India, 560104 , Bengaluru , 560104 , | Research Area: Commerce All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304556 Published Paper PDF: download.php?file=IJCRT2304556 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304556.pdf
Title: INFLUENCER MARKETING AND ITS IMPACT ON H&M
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 4 | Year: April 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Commerce All
Author type: Indian Author
Pubished in Volume: 11
Issue: 4
Pages: e544-e552
Year: April 2023
Downloads: 457
E-ISSN Number: 2320-2882
Social media is one of the most sought-after mediums for the transmission of information these days, let alone for advertising and promotion. It has become like "there is no media without social media" and the most important aspects of this system is influencer marketing. Using the example of the fashion brand H and M (Hennes and Mauritz), this case study focuses on how this brand uses social media and especially influencer marketing to promote its brand and gain communication about its brand from our perspective. The main goal here is to address influencer marketing as a more than reliable marketing strategy, especially for fashion brands. This study also highlights how H and M use arguably the 2 most popular social media for the common man, Facebook and Instagram, to effectively utilize the large base they provide for marketing strategies. With the latest trends in social media, such as the popularity of Instagram reels in particular, this is nothing but icing on the cake when it comes to H and M's interests. We see that the main role of marketing in the fashion industry is to make designs visible and successfully sell them to customers, and what better platform than social media to do this. It is also no wonder that consumer habits, let alone shopping habits, have changed since the birth of social networks. It is also important to note that the fashion buying cycle of the average customer is 6 weeks, which is a very short period of time. In fast fashion companies like H and M, the cycle is even shorter. In addition, it is worth noting the commitments that H and M provide to their loyal customers. This study also provides recommendations on how H and M can increase their chances of future development. This study also provides detailed notes on some of the influencers that H and M worked with and how they did it, and of course the success mantra when it comes to social media, especially influencer marketing.
Licence: creative commons attribution 4.0
Influencer Marketing , Social Media

