Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications

INTERNATIONAL JOURNAL OF CREATIVE RESEARCH THOUGHTS - IJCRT (IJCRT.ORG)

International Peer Reviewed & Refereed Journals, Open Access Journal

IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.

ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013

Call For Paper - Volume 14 | Issue 4 | Month- April 2026

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)

Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 11 | Issue 4 |

Volume 11 | Issue 4 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6)OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: Implementing A Technique To Enhance The Logistic System Privacy And Traceability Using Blockchain

  Author Name(s): Sushant Buche, Prathamesh misal, Sahil Halmare, Gaurav Divtelwar

  Published Paper ID: - IJCRT2304565

  Register Paper ID - 234172

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304565 and DOI :

  Author Country : Indian Author, India, 441106 , Ramtek, 441106 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304565
Published Paper PDF: download.php?file=IJCRT2304565
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304565.pdf

  Your Paper Publication Details:

  Title: IMPLEMENTING A TECHNIQUE TO ENHANCE THE LOGISTIC SYSTEM PRIVACY AND TRACEABILITY USING BLOCKCHAIN

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e623-e627

 Year: April 2023

 Downloads: 275

  E-ISSN Number: 2320-2882

 Abstract

To ensure the security of logistics information and to query information quickly and efficiently using searchable encryption algorithms and blockchain characteristics, a searchable and encrypted logistics information blockchain data query algorithm is proposed. The logistical data is initially divided into numerous data files before being deposited in the cloud server.The data is encrypted and stored using an asymmetric searchable encryption mechanism. The keyword index value of each data file is extracted and submitted to the blockchain. This solution can be applied at any time. Updates and inquiries on data. Next, assess the article's plan's correctness, completeness, and security, which proves its feasibility.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Blockchain, searchable encryption, asymmetric encryption, logistics information, data query.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Manik Bandopadhyay's 'The Final Solution': A Study in the Perspective of Partition

  Author Name(s): Binoy Dangar

  Published Paper ID: - IJCRT2304564

  Register Paper ID - 234745

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304564 and DOI :

  Author Country : Indian Author, India, 742101 , BERHAMPORE, 742101 , | Research Area: Medical Science All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304564
Published Paper PDF: download.php?file=IJCRT2304564
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304564.pdf

  Your Paper Publication Details:

  Title: MANIK BANDOPADHYAY'S 'THE FINAL SOLUTION': A STUDY IN THE PERSPECTIVE OF PARTITION

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Medical Science All

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e619-e622

 Year: April 2023

 Downloads: 1461

  E-ISSN Number: 2320-2882

 Abstract

Following the two-nation theory propounded by Muhammad Ali Jinnah and others, Bengal suffered partition and its aftermath. The nationalist discourse suppressed the real suffering of the people faced in two provinces in Punjab and Bengal. On the other hand the independence was glorified in such a way that the trauma and sufferings of the millions of refugees got suppressed. As alternative history we can look at contemporary literature. Manik Bandopadhyay's 'The Final Solution' depicts the inhuman suffering of a woman along with many families and her ultimate resisting spirit that she shows at the end of the story. The purpose of this paper is to analyse the story from the perspective of Partition and to show how women suffered in multifaceted ways during and after the partition. The paper aims to point out the sexual exploitation that women had to face through even in their distressful situation as refugees. The character of Mallika in the story 'The Final Solution' fell in the trap of Pramatha, a dishonest man who tried to exploit her sexually and commercially. But she proves that she is no less strong than a man in fighting against him and winning over him.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Partition, women, exploitation, refugees, Bengal

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Malicious URL Detection

  Author Name(s): R. Indu, M. Bhavya, V. Pardhasaradhi, Y. Sri Ram, Dr. Y. Suresh

  Published Paper ID: - IJCRT2304563

  Register Paper ID - 234603

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304563 and DOI : http://doi.one/10.1729/Journal.33800

  Author Country : Indian Author, India, 521212 , Vijayawada, 521212 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304563
Published Paper PDF: download.php?file=IJCRT2304563
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304563.pdf

  Your Paper Publication Details:

  Title: MALICIOUS URL DETECTION

 DOI (Digital Object Identifier) : http://doi.one/10.1729/Journal.33800

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e612-e618

 Year: April 2023

 Downloads: 371

  E-ISSN Number: 2320-2882

 Abstract

The importance of the World Wide Web has grown. Unfortunately, technical advancements have led to the emergence of new, highly complex techniques for user exploitation. In these attempts, users' computers may be infected with malware or utilize unfriendly websites to sell fake items or disclose private data that can be used to steal money and commit financial fraud. Malicious URLs can be particularly damaging to potential victims because they host a wide variety of unwanted content. So, a quick and efficient detection technique is needed. In this thesis, we focus on the problem of identifying dangerous URLs utilizing data from URLs and machine learning technology. We'll employ a variety of machine-learning techniques, including XGBoost, LightGBM, and Random Forest.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

The importance of the World Wide Web has grown. Unfortunately, technical advancements have led to the emergence of new, highly complex techniques for user exploitation. In these attempts, users' computers may be infected with malware or utilize unfriendly websites to sell fake items or disclose private data that can be used to steal money and commit financial fraud. Malicious URLs can be particularly damaging to potential victims because they host a wide variety of unwanted content. So, a q

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: A Review On - Genetic Technologies

  Author Name(s): Kale Rutuja Balasaheb, Mr.Wamane Vikas Bhausaheb

  Published Paper ID: - IJCRT2304562

  Register Paper ID - 234288

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304562 and DOI :

  Author Country : Indian Author, India, 413709 , Shrirampur, 413709 , | Research Area: Pharmacy All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304562
Published Paper PDF: download.php?file=IJCRT2304562
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304562.pdf

  Your Paper Publication Details:

  Title: A REVIEW ON - GENETIC TECHNOLOGIES

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Pharmacy All

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e589-e611

 Year: April 2023

 Downloads: 336

  E-ISSN Number: 2320-2882

 Abstract

The rapid developments in the field of genetic engineering have given a new motivation to biotechnology. Molecular cloning is the collection of experimental procedures required to isolate and expand a specific fragment of DNA into a host organism in order to create a large number of identical copies. Genetics is the scientific study of inherited variation. Human genetics is the scientific study of inherited human variation. This field has been energized in recent years by the Human Genome Project. Scientists expect that the project will lead to the development of new drugs targeted to specific genetic disorders. Increasingly, modern genetics involves genetic engineering; a technique used to manipulate genes and has produced many advances in medicine. The development of techniques used to transfer foreign DNA into new host cells proved successful and nowadays is commonly implemented in different areas of knowledge, such as microbiology, biochemistry and immunology. The genetic technologies involved the different technique. these are recombinant DNA technologies, cloning, PCR (polymerase chain reaction), in-vitro fertilization. Every technology involved the very complex process. Now a days the genetic technologies is very important. various type of diseases can be treated by using the gene therapy.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords: Genetic Technologies, DNA, Biotechnology, Genome

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Authenticated Voice Assistant for Desktop Applications

  Author Name(s): Prof. Dr. Yogita D. Bhise, Evangeline S. Rebello, Ruchika A. Kahane, Samruddhi S. Badgujar, Kranti P. Sonawane

  Published Paper ID: - IJCRT2304561

  Register Paper ID - 234557

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304561 and DOI :

  Author Country : Indian Author, India, 422003 , Nashik, 422003 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304561
Published Paper PDF: download.php?file=IJCRT2304561
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304561.pdf

  Your Paper Publication Details:

  Title: AUTHENTICATED VOICE ASSISTANT FOR DESKTOP APPLICATIONS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e585-e588

 Year: April 2023

 Downloads: 262

  E-ISSN Number: 2320-2882

 Abstract

In today's exponentially growing data-centric industry security is the most important factor. Considering that, authentication that is based on biometrics traits is more secure for many applications. The aim is to build a model based on voice authentication which would recognize the verbal commands of the respective user to perform tasks on desktop applications, for example - sending emails and WhatsApp messages, performing file operations, etc. just like present systems, but there would be an additional layer of security in which it will only recognize the specific voice and thus follow the commands of the authenticated user. As the existing systems have the drawback of not authenticating the user's voice and directly functioning on any input voice, so to add a security aspect and maintain confidentiality we have proposed this model which would authenticate the user's voice and also address the issues where the existing voice-based systems fail such as authenticating pre-recorded voice of authenticated user. The main focus would be on increasing the security level and accuracy of biometric authentication. The phases involved in this system are Voice authentication and Desktop voice assistance. The implementation will consist of feature extraction, model building, and model evaluation. Next part is the Voice Assistant on Desktop Applications. This includes listening to spoken words and identifying them. The system takes voice and converts spoken words into text. This text is then fed as a query or the result is obtained and the system generates a reply. It uses a speech recognition library for performing speech recognition. This project would be the first step leading toward an era of secured voice-based assistance where confidentiality is a major requirement.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Machine Learning, Communication, Voice Recognition, Speech Recognition, Security and Biometric Authentication

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Data Leakage Detection Strategy in Cloud Computing Environment

  Author Name(s): MYLAPILLI AJAY KUMAR, KUTCHU PRASANNA, MAJJI SAI KRISHNA PAWAN, MALLADA SRI NIKHIL, SALINA ADINARAYANA

  Published Paper ID: - IJCRT2304560

  Register Paper ID - 234698

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304560 and DOI :

  Author Country : Indian Author, India, 531162 , Visakhapatnam, 531162 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304560
Published Paper PDF: download.php?file=IJCRT2304560
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304560.pdf

  Your Paper Publication Details:

  Title: DATA LEAKAGE DETECTION STRATEGY IN CLOUD COMPUTING ENVIRONMENT

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e577-e584

 Year: April 2023

 Downloads: 285

  E-ISSN Number: 2320-2882

 Abstract

Anxiety is a useful technique that modifies data and makes it "less sensitive" before sending it to the agent. For example, some products can be added to random popularity or the amount of money can be changed by many factors. But sometimes it is important not to change the original data of the distributor. For example, if a professional pays us, he must have a salary and a bank account. Medical researchers will need accurate data about patients (as opposed to statistical calculations) if they are to treat patients. Watermark detection is traditionally done by watermark, that is, by placing a watermark on each printed document. If this document is later found in the hands of an unauthorized person, the leaker can be identified. The watermark can be useful in some cases, but again there are some changes to the original file. Additionally, watermarks can sometimes be affected if the recipient receives the information of poor quality. In this article, we explore non-invasive methods for detecting leaks in products or materials. Specifically, we examine cases where, after the broker has been given a set of goods, the seller finds some of the original goods in an illegal location.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Data leakage, audit server, integrity, unauthorized, optimization

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: RESEARCH ON DEVELOPING TAMIL VOWELS AS TOYS

  Author Name(s): Mr. G. Boopathy Vijay, K.E.Poornima

  Published Paper ID: - IJCRT2304559

  Register Paper ID - 234750

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304559 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304559
Published Paper PDF: download.php?file=IJCRT2304559
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304559.pdf

  Your Paper Publication Details:

  Title: RESEARCH ON DEVELOPING TAMIL VOWELS AS TOYS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e572-e576

 Year: April 2023

 Downloads: 317

  E-ISSN Number: 2320-2882

 Abstract

Language development is important during the early years of a child's life. It can help children learn to communicate effectively and develop their cognitive abilities. One of the best ways to develop language skills is through play, and what better way to engage children in play than through toys Soft toys, in particular, have always been popular with children, and they are a great tool for language development. Learning Tamil, one of the oldest classical languages in the world, can be an intimidating task for many. Developing Tamil vowels as soft toys with letters embossed on the backside can prove to be an effective and exciting way for children to learn the language. Not only will it make learning more engaging and fun, but it will also create a strong foundation for future learning.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Tamil vowels , Learning purpose , Soft toys , Embossed letters

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: COMPARISON OF NATIONAL EDUCATIONAL POLICY 2020 AND NATIONAL POLICY ON EDUCATION 1986

  Author Name(s): BASANTI MAHANTA

  Published Paper ID: - IJCRT2304558

  Register Paper ID - 234685

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304558 and DOI :

  Author Country : Indian Author, India, 741235 , KALYANI, 741235 , | Research Area: Social Science All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304558
Published Paper PDF: download.php?file=IJCRT2304558
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304558.pdf

  Your Paper Publication Details:

  Title: COMPARISON OF NATIONAL EDUCATIONAL POLICY 2020 AND NATIONAL POLICY ON EDUCATION 1986

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Social Science All

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e563-e571

 Year: April 2023

 Downloads: 453

  E-ISSN Number: 2320-2882

 Abstract

The NEP 2020 was approved by the Union Cabinet of India on 29 July 2020. The Ministry of Human Resource Development formed a committee headed by former ISRO Chairman Dr. K Kasturirangan, who outlined the vision of India's new education system. The New Education Policy addresses challenges the current education system faces such as Quality, Affordability, Equity, Access, and Accountability. NEP 2020 envisions an India-centric education system that contributes directly to transforming our nation sustainably into an equitable and vibrant society filled with knowledge and by providing high-quality education to all. The National Policy on Education (NPE) is a policy formulated by the Government of India to promote and regulate education in India. The policy covers elementary education to higher education in both rural and urban India. NPE 1986 was promulgated by the Government of India by Prime Minister Rajiv Gandhi. This article emphasizes the major differences between the current education policy i.e., the New Education Policy of 2020 and the New Policy on Education 1986. An attempt had been also made to figure out the challenges in the existing policy that led to the emergence of NEP 2020. The data has been collected through various sources, i.e., journals, reports, print media, and other government websites. This article is purely based on secondary data. Though NEP 2020 has new targets to be achieved by 2035, nevertheless it has its own merits and limitations the efforts have been made to highlight them. As NEP 2020 is one of the most promising policies introduced, the question relies on to what extent the policy's objectives will be achieved.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Education policy, Development, Higher education, Comparison, Teachers, Drawbacks, Challenges.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Conserving Plant Biodiversity Based on Traditional Knowledge in Magadh Region of Bihar, India.

  Author Name(s): Rajeev Ranjan Singh, V K PRABHAT, Anil Kumar

  Published Paper ID: - IJCRT2304557

  Register Paper ID - 234724

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304557 and DOI :

  Author Country : Indian Author, India, 823001 , Gaya, 823001 , | Research Area: Life Sciences All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304557
Published Paper PDF: download.php?file=IJCRT2304557
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304557.pdf

  Your Paper Publication Details:

  Title: CONSERVING PLANT BIODIVERSITY BASED ON TRADITIONAL KNOWLEDGE IN MAGADH REGION OF BIHAR, INDIA.

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Life Sciences All

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e553-e562

 Year: April 2023

 Downloads: 303

  E-ISSN Number: 2320-2882

 Abstract

The present communication deals with Conserving Plant Biodiversity Based on Traditional Knowledge in Magadh Region, Bihar.They have been frequently associated with gods and goddesses as their incarnation, symbols, abode, offering, sacrificial rites and rituals, religious ceremonies and for different celestial components. Traditional knowledge was used in ancient India as a tool to protect nature and natural resources. Several plants, such as Aegle marmelos ('bel'), Calotropis procera ('akwan'), Coconut nucifera ('nariyal'), Curcuma longa ('haldi'), Cynodon dactylon ('dub'), Datura metel ('dhatura'), Desmostachya bipinnata ('kusha'), Ficus benghalensis ('bargad'), Ficus religiosa ('pipal'), Mangifera indica ('aam'), Musa paradisiaca ('kela'),Nelumbo nucifera ('kamal'), Ocimum sanctum ('tulsi'), Oryza sativa ('dhan'), Piper betel ('pan') and many others are considered sacred and used in Hindu and Buddhist religious rites. These beliefs and practices continue to be the elements of modern Indian traditions. Consequently, many plant species of ecological, economical, medicinal and social importance in this area i.e., Magadh region of Bihar area have been saved. Magadh region of Bihar occupies a unique place in the religious and cultural history of India.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Religious beliefs, Traditional cultures, Conserved plants.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: Influencer Marketing and Its Impact on H&M

  Author Name(s): Ujwal HG, Gourav HM, Abheek P

  Published Paper ID: - IJCRT2304556

  Register Paper ID - 234637

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2304556 and DOI :

  Author Country : Indian Author, India, 560104 , Bengaluru , 560104 , | Research Area: Commerce All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2304556
Published Paper PDF: download.php?file=IJCRT2304556
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2304556.pdf

  Your Paper Publication Details:

  Title: INFLUENCER MARKETING AND ITS IMPACT ON H&M

 DOI (Digital Object Identifier) :

 Pubished in Volume: 11  | Issue: 4  | Year: April 2023

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Commerce All

 Author type: Indian Author

 Pubished in Volume: 11

 Issue: 4

 Pages: e544-e552

 Year: April 2023

 Downloads: 457

  E-ISSN Number: 2320-2882

 Abstract

Social media is one of the most sought-after mediums for the transmission of information these days, let alone for advertising and promotion. It has become like "there is no media without social media" and the most important aspects of this system is influencer marketing. Using the example of the fashion brand H and M (Hennes and Mauritz), this case study focuses on how this brand uses social media and especially influencer marketing to promote its brand and gain communication about its brand from our perspective. The main goal here is to address influencer marketing as a more than reliable marketing strategy, especially for fashion brands. This study also highlights how H and M use arguably the 2 most popular social media for the common man, Facebook and Instagram, to effectively utilize the large base they provide for marketing strategies. With the latest trends in social media, such as the popularity of Instagram reels in particular, this is nothing but icing on the cake when it comes to H and M's interests. We see that the main role of marketing in the fashion industry is to make designs visible and successfully sell them to customers, and what better platform than social media to do this. It is also no wonder that consumer habits, let alone shopping habits, have changed since the birth of social networks. It is also important to note that the fashion buying cycle of the average customer is 6 weeks, which is a very short period of time. In fast fashion companies like H and M, the cycle is even shorter. In addition, it is worth noting the commitments that H and M provide to their loyal customers. This study also provides recommendations on how H and M can increase their chances of future development. This study also provides detailed notes on some of the influencers that H and M worked with and how they did it, and of course the success mantra when it comes to social media, especially influencer marketing.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Influencer Marketing , Social Media

  License

Creative Commons Attribution 4.0 and The Open Definition



Call For Paper April 2026
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A digital object identifier by DOI.org How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer