ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Diagnostic Revolution: WeCare for PCOS
Author Name(s): Prof. Hemlata Mane, Shruti Mahajan, Bhakti Kate, Sayali Birje
Published Paper ID: - IJCRTAF02039
Register Paper ID - 261101
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02039 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02039 Published Paper PDF: download.php?file=IJCRTAF02039 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02039.pdf
Title: DIAGNOSTIC REVOLUTION: WECARE FOR PCOS
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 194-200
Year: May 2024
Downloads: 27
E-ISSN Number: 2320-2882
This research study presents a novel approach that integrates state-of-the-art Convolutional Neural Networks, algorithms to transform the management of women's health. This project intends to employ artificial intelligence to build a comprehensive manual that is unique to the health requirements of women, given the increasing prevalence of modern technology in healthcare. The suggested method covers a broad range of health-related topics, such as illness prevention, mental health, dietary counseling, and reproductive health, among others. CNN algorithms are used to provide real-time insights and recommendations based on lifestyle choices, medical history, and demographic details. This allows the guide to adapt to each user's individual health profile. The freedom of women to take proactive measures to optimize their health outcomes is at the heart of this research. Through intuitive design, the resource guide promotes self-care habits and educated decision-making. By giving users access to peer networks, professional guidance, and related information, it also helps users feel more supportive of one another and connected to each other.
Licence: creative commons attribution 4.0
CNN algorithm, personalized healthcare, disease prevention, wellness management, artificial intelligence, women's health, and community support
Paper Title: DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
Author Name(s): Vaishnavi Bhoyar, Komal Dharak, Dipali Gawali, Prof.Deepali Patil
Published Paper ID: - IJCRTAF02038
Register Paper ID - 261102
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02038 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02038 Published Paper PDF: download.php?file=IJCRTAF02038 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02038.pdf
Title: DETECTION OF PHISHING WEBSITE USING MACHINE LEARNING
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 186-193
Year: May 2024
Downloads: 29
E-ISSN Number: 2320-2882
Phishing, a prevalent cybercrime, involves deceiving individuals into disclosing personal or confidential information under the guise of legitimate websites or emails. Recognizing phishing websites is challenging due to their similarity to authentic ones. Our study focuses on employing machine learning techniques for efficient phishing website detection. We detail the approach encompassing data gathering, preprocessing steps, extracting features, and employing Support Vector Machine (SVM) for classification. SVM stands out due to its capacity to handle high-dimensional data and non-linear relationships, making it robust to overfitting. SVM offers understandable detection capabilities by optimizing the margin between classes to its maximum extent. Our research aligns with broader cybersecurity objectives, aiming to safeguard individuals and organizations against online deception. Through the development of robust detection systems, we contribute to enhancing cybersecurity measures and empowering users with more secure online experiences. This endeavor underscores the importance of proactive measures in combatting evolving cyber threats
Licence: creative commons attribution 4.0
Phishing, Support Vector Machine, high- dimensional, Feature extraction
Paper Title: Detecting Malicious Twitter Bot using Machine Learning and URL analysis
Author Name(s): Bhavika Talele, Kuntal Rane, Abhishek Pohare, Prof.Satyajit Sirsat
Published Paper ID: - IJCRTAF02037
Register Paper ID - 261103
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02037 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02037 Published Paper PDF: download.php?file=IJCRTAF02037 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02037.pdf
Title: DETECTING MALICIOUS TWITTER BOT USING MACHINE LEARNING AND URL ANALYSIS
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 180-185
Year: May 2024
Downloads: 28
E-ISSN Number: 2320-2882
Social media platforms like Twitter face a growing challenge with the proliferation of malicious Twitter bots. These bots spread disinformation, manipulate public opinion, and engage in fraudulent activities, undermining trust in online spaces. To address this issue, our project focuses on detecting malicious Twitter bots using advanced machine learning techniques and URL analysis. By examining various features, including URL characteristics, we've developed a robust framework. We've trained models like Logistic Regression, Random Forest, Naive Bayes, and Decision Trees to classify Twitter accounts as malicious or benign. Our work contributes to enhancing social media security, protecting user trust, and combating fake accounts. Keywords-- Malicious Twitter bots, Machine learning, URL analysis, Social media security, Classification, Logistic Regression, Random Forest, Naive Bayes, Decision Trees, User trust, Fake accounts.
Licence: creative commons attribution 4.0
Detecting Malicious Twitter Bot using Machine Learning and URL analysis
Paper Title: Deep Learning and Machine Learning Models for Breast Cancer Prediction: CNN and SVM Perspectives
Author Name(s): Prof. Hemlata Mane, Sujay Patil, Sayali Pachpute, Somesh Sinha
Published Paper ID: - IJCRTAF02036
Register Paper ID - 261104
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02036 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02036 Published Paper PDF: download.php?file=IJCRTAF02036 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02036.pdf
Title: DEEP LEARNING AND MACHINE LEARNING MODELS FOR BREAST CANCER PREDICTION: CNN AND SVM PERSPECTIVES
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 175-179
Year: May 2024
Downloads: 30
E-ISSN Number: 2320-2882
The purpose of this paper is to develop and evaluate a breast cancer prediction system using Convolutional Neural Networks (CNN) and Support Vector Machines (SVM). Within the wake of a breast cancer diagnosis, the project presents a comprehensive web-based platform created to meet the interrelated demands of administrators, healthcare providers, and patients. Patients are empowered to contribute to their healthcare journey by seamlessly uploading mammographic images. Through the integration of AI-driven algorithms, including CNN and SVM, the system predicts whether an individual has breast cancer or not can be determined by using the features that were taken from the images. For patients, a dedicated dashboard provides insights into diagnostic results, alongside some precautions. This paper examines the intricate integration of CNN and SVM algorithms, alongside patient- centric features and administrative controls, highlighting the potential impact on enhancing breast cancer diagnosis accessibility, efficiency, and overall user experience.
Licence: creative commons attribution 4.0
Support Vector Machine, Convolutional Neural Network, Machine Learning, Deep Learning, Cancer Prediction, Predictive Model.
Paper Title: Data Duplication Removal by MD5 Using Random Forest Algorithm
Author Name(s): Mrs. Kavyashree H. N, Mr. Himanshu T Sarode., Mr. Mohanish K Sarode, Mr. Yash S Pawar
Published Paper ID: - IJCRTAF02035
Register Paper ID - 261105
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02035 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02035 Published Paper PDF: download.php?file=IJCRTAF02035 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02035.pdf
Title: DATA DUPLICATION REMOVAL BY MD5 USING RANDOM FOREST ALGORITHM
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 168-174
Year: May 2024
Downloads: 29
E-ISSN Number: 2320-2882
In many domains, data duplication is a major problem that results in inefficient processing, storage, and analysis. In this work, we investigate the use of machine learning methods for tasks related to data duplication and deduplication, with a particular emphasis on textual and image data. This project provides preparation pipeline for textual data that includes tokenizing text, addressing missing values, and standardizing formats. Then, feature extraction techniques like word embeddings and TF-IDF are used to mathematically represent text. These attributes can be used to train machine learning models, such as Support Vector Machines (SVM) or clustering methods like K- means, which are used to efficiently identify and eliminate duplicate entries. These models are capable of identifying duplicate photos because they learn hierarchical representations of images. To successfully recognize duplicates, this entails creating hybrid models that integrate textual and visual information.
Licence: creative commons attribution 4.0
Data security, Deduplication, Authorization, Authentication, Access control, Cloud Security, Cipher Technology, Data synchronization
Paper Title: Data Duplication Removal and Image, Text Deduplication Using ML
Author Name(s): Mrs. Kavyashree H N, Mr. Himanshu T. Sarode, Mr. Yash S. Pawar, Mr. Mohanish K. Sarode
Published Paper ID: - IJCRTAF02034
Register Paper ID - 261106
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02034 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02034 Published Paper PDF: download.php?file=IJCRTAF02034 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02034.pdf
Title: DATA DUPLICATION REMOVAL AND IMAGE, TEXT DEDUPLICATION USING ML
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 164-167
Year: May 2024
Downloads: 30
E-ISSN Number: 2320-2882
In the era of information development, information transfer is far more practical. However, there is always a chance that the transmission method may be compromised, stolen, or assaulted, raising questions about the accuracy of the data source. Several academics suggested using passwords to secure sensitive data because of this. Proposed 3D-Playfair Cipher with Message Integrity Using MD5. The encryption used in this study is 3D-Playfair. Nevertheless, basic 3D-playfair encryption is unable to ensure the integrity of data while it is being sent, thus the author suggests In addition to using MD5 to guarantee data integrity, this study employs XOR calculation techniques to further confirm the data's legitimacy because there are concerns over the reliability of the data source.
Licence: creative commons attribution 4.0
Data security, Deduplication, Authorization, Authentication, Access control, Cloud Security, Cipher Technology, Data synchronization.
Paper Title: Cyclone Weather Estimation System
Author Name(s): Vaibhav Jadhao, Aditya Garudkar, Yash Dhekne, Prof. Neha Bhagwat
Published Paper ID: - IJCRTAF02033
Register Paper ID - 261107
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02033 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02033 Published Paper PDF: download.php?file=IJCRTAF02033 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02033.pdf
Title: CYCLONE WEATHER ESTIMATION SYSTEM
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 159-163
Year: May 2024
Downloads: 28
E-ISSN Number: 2320-2882
The diagnostic tropical cyclone intensity estimation system presented in this paper represents a novel approach to objective and automated intensity assessment using satellite imagery and deep learning techniques. Leveraging data from the National Hurricane Centre (NHC) and the National Oceanic and Atmospheric Administration (NOAA), the system integrates real- time storm outlooks with corresponding Geostationary Operational Environmental Satellite (GOES) imagery to provide accurate and timely predictions of cyclone intensity levels. The implementation involves web scraping for data retrieval, preprocessing of satellite imagery, and deployment of a convolutional neural network (CNN) model for intensity estimation. Results demonstrate the system's effectiveness in providing objective intensity assessments, with promising performance metrics such as Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). Furthermore, the system's scalability and potential impact on disaster preparedness and response efforts are discussed, highlighting its role as a valuable decision support tool for meteorological agencies and emergency responders. Overall, this implementation paper contributes to advancing the field of cyclone intensity estimation and underscores the importance of integrating technology and data-driven approaches in disaster management.
Licence: creative commons attribution 4.0
Deep learning, wind speed estimation, Convolutional neural network, Estimation, Cyclone, Disaster management
Paper Title: Cyclone Forecasting System
Author Name(s): Aditya Garudkar, Vaibhav Jadhao, Yash Dhekne, Prof. Neha Bhagwat
Published Paper ID: - IJCRTAF02032
Register Paper ID - 261111
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02032 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02032 Published Paper PDF: download.php?file=IJCRTAF02032 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02032.pdf
Title: CYCLONE FORECASTING SYSTEM
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 155-158
Year: May 2024
Downloads: 33
E-ISSN Number: 2320-2882
Tropical cyclones (TCs) stand as dynamic and complex atmosphere-sea interaction phenomena, their behavior contingent upon a delicate interplay of oceanic and atmospheric conditions. Their emergence, dissipation, or intensification presents a challenge for accurate prediction, and as such, the development of precise diagnostic models holds immense potential for saving lives and safeguarding property. Existing techniques for diagnosing tropical cyclone wind speeds have displayed varying degrees of success, often limited by their reliance on specific points in time and satellite data. This paper introduces a groundbreaking paradigm shift by presenting a deeplearning-based objective diagnostic estimation of tropical cyclone intensity. Leveraging the power of deep learning, the model promises to transcend the limitations of traditional methods, offering a more nuanced and accurate representation of cyclonic behavior. A key innovation lies in the integration of an infrared satellite imagery-based diagnostic system. This method represents a new visualization gateway in addition to improving intensity estimation accuracy. This portal is not merely a scientific tool; it stands as one of the first systems to seamlessly translate deep learning results into a user-friendly interface, presenting not only raw data but also contextual information to end users. This move towards user accessibility marks a significant stride in bridging the gap between advanced scientific methodologies and practical, realworld applications
Licence: creative commons attribution 4.0
Deep learning, wind speed estimation, Convolutional neural network, Estimation, Cyclone, Disaster management
Paper Title: Crypto Price Prediction System using Latest Deep Learning Models
Author Name(s): Prof. Hemlata Mane, Daksh Wadhwa, Harsh Kumar, Saad Attar
Published Paper ID: - IJCRTAF02031
Register Paper ID - 261112
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02031 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02031 Published Paper PDF: download.php?file=IJCRTAF02031 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02031.pdf
Title: CRYPTO PRICE PREDICTION SYSTEM USING LATEST DEEP LEARNING MODELS
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 151-154
Year: May 2024
Downloads: 29
E-ISSN Number: 2320-2882
The behaviors of cryptocurrency markets are dynamic and complicated, with high volatility and a wide range of influencing factors. In order to anticipate bitcoin prices, this study investigates the use of deep learning techniques, particularly recurrent neural networks (RNNs) and long short- term memory networks (LSTMs). For well-known cryptocurrencies, the study makes use of past price data, trade volumes, and extra technical indicators. The methodology includes feature engineering, training the model, evaluation, and preprocessing of the data. Measures like Mean Absolute Error (MAE) and Mean Squared Error (MSE) are used to evaluate the performance of the deep learning model. The results shed light on how well deep learning captures patterns and temporal relationships in cryptocurrency price data. The conversation explores how the findings could affect real-world trading tactics, points out its shortcomings, and suggests directions for further study. This study adds to the expanding corpus of research on the prediction of cryptocurrency prices by providing a sophisticated knowledge of the potential benefits and difficulties of using deep learning in this field.
Licence: creative commons attribution 4.0
Cryptocurrency, Price Prediction, Deep Learning, LSTM, Neural Networks, Financial Forecasting
Paper Title: CrediGuard: An AI Driven Fraud Detection Solution
Author Name(s): Rutvik Dnyanoba Patil, Suraj Jotiram Shinde, Prof. Tushar Waykole
Published Paper ID: - IJCRTAF02030
Register Paper ID - 261114
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRTAF02030 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRTAF02030 Published Paper PDF: download.php?file=IJCRTAF02030 Published Paper PDF: http://www.ijcrt.org/papers/IJCRTAF02030.pdf
Title: CREDIGUARD: AN AI DRIVEN FRAUD DETECTION SOLUTION
DOI (Digital Object Identifier) :
Pubished in Volume: 12 | Issue: 5 | Year: May 2024
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 12
Issue: 5
Pages: 146-150
Year: May 2024
Downloads: 28
E-ISSN Number: 2320-2882
In this day and age the Mastercard extortion is the greatest issue and presently there is need to battle against the Visa misrepresentation. "Visa extortion is the most common way of cleaning messy cash, accordingly making the wellspring of assets as of now not recognizable." On consistent schedule, the monetary exchanges are made on gigantic sum in worldwide market and subsequently identifying charge card misrepresentation movement is testing task. As prior (Against Mastercard extortion Suite) is acquainted with distinguish the dubious exercises yet it is relevant just on individual exchange not for other financial balance exchange. To Conquers issues of we propose AI technique utilizing 'Underlying Closeness', to recognize normal credits and conduct with other financial balance exchange. Location of charge card misrepresentation exchange from huge volume dataset is troublesome, so we propose case decrease strategies to lessens the information dataset and afterward find sets of exchange with other financial balance with normal ascribes and conduct.
Licence: creative commons attribution 4.0
credit card fraud, fraudulent activities, SVM (SUPPORT VECTOR MACHINE), Harr cascade Algorithm, Face Recognition.