Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 10 | Issue 5 |

Volume 10 | Issue 5 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6)OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: PROTECTED FILE STORAGE ON CLOUD USING CRYPTOGRAPHY

  Author Name(s): Vidyashree Akhouri, Dr. Javed Wasim

  Published Paper ID: - IJCRT2205437

  Register Paper ID - 219870

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205437 and DOI :

  Author Country : Indian Author, India, 202146 , Aligarh, 202146 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205437
Published Paper PDF: download.php?file=IJCRT2205437
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205437.pdf

  Your Paper Publication Details:

  Title: PROTECTED FILE STORAGE ON CLOUD USING CRYPTOGRAPHY

 DOI (Digital Object Identifier) :

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d875-d882

 Year: May 2022

 Downloads: 316

  E-ISSN Number: 2320-2882

 Abstract

Cryptography is the study of the various process which are implemented to protect information and communications, through the use of mathematical concepts and rule-based calculations but intruder is able to read our data so we need some method to make this data unreadable by the intruder we do this by encryption (enciphering) is a cryptographic process where we convert plain text or raw data to unintelligible information (cipher) by processing the data with an algorithm . Decryption (deciphering)is a cryptographic process where we convert cipher back to plaintext by processing. the encryption and decryption techniques that we are using should be fast in nature so when it reaches the recipient, the recipient should be able to decrypt that data fast because time is extremely valuable and the recipient cannot sit and decrypt that data for one to two hours it should be decrypted in minutes. Aim of this paper is to use different cryptography algorithm to protect file stored on cloud. The present paper involves some security goals in the process of cryptography we need to absolutely protect the confidentiality of the data so cryptography is the study that helps us deal with that it protect the confidentiality of data , when we are implementing cryptography that means there exist confidentiality. Second goal is integrity means that the data should have its original meaning should have its original structure when it reaches the recipient so if we write something in beginning right and u convert it into cipher ,when we send the cipher over to the recipient and the recipient deciphers it converts it back into plain text the plain text should represent exactly what the sender sent in the first place so the data should have maintained its integrity. Third is availability it means that the people who require that data should have it basically instantly right they should not have any delay with getting that nobody should be able to interrupt to the process of them getting that data right so this particular aspect is called availability. So this another goal of cryptography to maintain integrity to secure and strongly store information into the cloud, by splitting data into several chunks and storing parts of it on cloud in a manner that preserves data confidentiality, integrity and ensures availability. For this purpose we searched different published research articles online on cloud cryptography algorithm. Published research articles were selected from IEEE and Springer nature journals. Total seven articles between the years 2010 to 2021 were taken for the purpose of present paper. Our methodology guarantees the security and protection of customer sensitive data by utilizing AES, DES and RC2 calculation. By using all the encryption techniques a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained. Using cryptography Electronic Mail Security, Mail Security, IP Security, Web Security can be achieved.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Key words: cryptography, Algorithm, AES, DESB

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: SPEECH TO SIGN TRANSLATOR

  Author Name(s): Sharun K. Suresh, Aswin K. S., Nikhil Babu P., Sajith Suresh, Nighila Ashok

  Published Paper ID: - IJCRT2205436

  Register Paper ID - 219904

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205436 and DOI :

  Author Country : Indian Author, India, 680684 , Thrissur, 680684 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205436
Published Paper PDF: download.php?file=IJCRT2205436
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205436.pdf

  Your Paper Publication Details:

  Title: SPEECH TO SIGN TRANSLATOR

 DOI (Digital Object Identifier) :

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d864-d874

 Year: May 2022

 Downloads: 378

  E-ISSN Number: 2320-2882

 Abstract

Sign language is a visual language that is mainly used by deaf people and the Hard-of-Hearing community as their primary language. Unlike acoustically expressed sound patterns, sign language uses hand signals, gestures, facial expressions, and body language. Sign language may also help the people with disabilities, namely Autism, Cerebral Palsy, Apraxia of speech and Down Syndrome. The objective of our project is to reduce the communication gap between normal people and disabled people by providing a virtual animation translator for sign language. Speech to sign translator is a user-friendly web application that converts speech/text to sign language animation and also reduces the amount of effort spent on communication. The system consists of both speech and text conversion using natural language processing (NLP) and machine learning techniques. Input speech is captured through a microphone then it is translated to text through Speech recognition using Mel-frequency cepstral coefficients (MFCC) features. The recognized text preprocessed using NLTK and resultant words looks for a word match in ASL dataset. The database contains a certain number of pre-recorded video animation signs using 3D avatar where mainly there is one video clip per each basic word. If a match occurred for a word, then the equivalent ASL translation will be displayed corresponding to that word. Otherwise, the word will be finger spelled.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Speech recognition, MFCC, Text preprocessing, NLP, ASL

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: A COMPARATIVE STUDY OF CLOUD DEPLOYMENT MODEL

  Author Name(s): Vidyashree Akhouri, Dr. Javed Wasim

  Published Paper ID: - IJCRT2205435

  Register Paper ID - 219872

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205435 and DOI :

  Author Country : Indian Author, India, 202146 , Aligarh, 202146 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205435
Published Paper PDF: download.php?file=IJCRT2205435
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205435.pdf

  Your Paper Publication Details:

  Title: A COMPARATIVE STUDY OF CLOUD DEPLOYMENT MODEL

 DOI (Digital Object Identifier) :

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d856-d863

 Year: May 2022

 Downloads: 347

  E-ISSN Number: 2320-2882

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cloud computing, cloud deployment model, private cloud, hybrid cloud

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: STRUCTURE OF MANAGERIAL ORGANIZATIONS IN SUB URBAN AND RURAL EDUCATIONAL/SPORTING INSTITUTIONS

  Author Name(s): Manikanta Madala, Dr. Rajesh Dhauta

  Published Paper ID: - IJCRT2205434

  Register Paper ID - 219740

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205434 and DOI :

  Author Country : Indian Author, India, 201313 , Noida, 201313 , | Research Area: Management All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205434
Published Paper PDF: download.php?file=IJCRT2205434
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205434.pdf

  Your Paper Publication Details:

  Title: STRUCTURE OF MANAGERIAL ORGANIZATIONS IN SUB URBAN AND RURAL EDUCATIONAL/SPORTING INSTITUTIONS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Management All

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d846-d855

 Year: May 2022

 Downloads: 297

  E-ISSN Number: 2320-2882

 Abstract

For any organization to run efficiently, a properly laid out structure of the roles and responsibilities should be made. Fundamentally, an organization is composed of different elements and the link between these elements is what matters the most for an organization to function. It is the management which decided the efficiency of the organization and its success in the long run. And when it comes to management, the structure of the lay out is a key aspect which determines the fate of the managing authority. Over the years there have been different structures that have been adopted with trial and error as the organizations got to know which structure suits their type of work the best. A pre planed structure has always been given its due importance in a company in the west and other developed nations and this has slowly spread across. In India, evidently looking from the historic organizations and their set ups, it can be understood that there has always been a void in case of a structure and accountability in organizations, especially in the local and rural organizations. This paper reviews different papers and books presented on this area and aims at bridging the gap from the data collected from sub urban and rural areas about the efficient composition of an organization.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Management, Organization, Structure

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: POWER THEFT - A PRIMAL SOLUTION

  Author Name(s): Anirban Saha, Arshad Hossain, Debojyoti Hazra, Nirjhar Banerjee, Suparna Pal

  Published Paper ID: - IJCRT2205433

  Register Paper ID - 220096

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205433 and DOI :

  Author Country : Indian Author, India, 741235 , Kalyani, 741235 , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205433
Published Paper PDF: download.php?file=IJCRT2205433
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205433.pdf

  Your Paper Publication Details:

  Title: POWER THEFT - A PRIMAL SOLUTION

 DOI (Digital Object Identifier) :

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d842-d845

 Year: May 2022

 Downloads: 286

  E-ISSN Number: 2320-2882

 Abstract

A Control Flow Graph (CFG) is the graphical representation of control flow or computation during the execution of programs or applications. Control flow graphs are mostly used in static analysis as well as compiler applications, as they can accurately represent the flow inside of a program unit


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Power Theft, technical Loss, Electricity Theft

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: A REVIEW ON SUSTAINED RELEASE MATRIX TABLET

  Author Name(s): Nilesh Tonde, Arun Gaikwad, Meghana Raykar

  Published Paper ID: - IJCRT2205432

  Register Paper ID - 219972

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205432 and DOI :

  Author Country : Indian Author, India, 414701 , Ahmednagar, 414701 , | Research Area: Pharmacy All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205432
Published Paper PDF: download.php?file=IJCRT2205432
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205432.pdf

  Your Paper Publication Details:

  Title: A REVIEW ON SUSTAINED RELEASE MATRIX TABLET

 DOI (Digital Object Identifier) :

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Pharmacy All

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d830-d841

 Year: May 2022

 Downloads: 320

  E-ISSN Number: 2320-2882

 Abstract

ABSTRACT: The advantages of using a single dose of an over-the-counter medication instead of multiple dosages are now the day of interest for practicing scientists in the pharmaceutical industry. With most medicines. The basic goal of treatment is to achieve a stable blood level or a level that is medically effective and non-toxic. The continuous release system is considered a smart drug that is short-lived and requires repeated dosing, is easy to form and does not care about the process of absorption in the intestinal tract after oral administration. The main reason for the continued release of the drug delivery system is to improve the biopharmaceutical, pharmacokinetic and pharmacokinetic properties of the drug in such a way that its use is improved, side effects are reduced and treatment of disease is achieved. There are a few benefits of continuous drug delivery (matrix) in addition to standard dosage forms such as improved patient compliance due to regular drug administration, reduced flexibility in drug levels in severe conditions, higher drug use, increased dosage of strong drug safety, improved continuous oral matrix tablet with continuous dose it was a challenge for a medical professional. Many drugs, if not properly formulated, can release the drug very quickly, and may produce toxic effects of the drug in oral administration.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

KEY WORDS: Sustained release, Matrix system, Extended Period of time, short half-life, pharmacokinetic, pharmacodynamics.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: DEVELOPMENT AND EVALUATION OF COLON TARGETED DRUG DELIVERY SYSTEM.

  Author Name(s): Ketakee A. Nichat, Nishan N. Bobade, Chitralekha G. Therkar, Kajal S. Jumde, Mohd. Vaqqas Quraishi

  Published Paper ID: - IJCRT2205431

  Register Paper ID - 220064

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205431 and DOI : http://doi.one/10.1729/Journal.30241

  Author Country : Indian Author, India, 444602 , Amravati, 444602 , | Research Area: Pharmacy All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205431
Published Paper PDF: download.php?file=IJCRT2205431
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205431.pdf

  Your Paper Publication Details:

  Title: DEVELOPMENT AND EVALUATION OF COLON TARGETED DRUG DELIVERY SYSTEM.

 DOI (Digital Object Identifier) : http://doi.one/10.1729/Journal.30241

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Pharmacy All

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d812-d829

 Year: May 2022

 Downloads: 324

  E-ISSN Number: 2320-2882

 Abstract

In the present investigation, an attempt was made to formulate the time and pH dependent drug delivery system, reduce the frequency of dose administeration, and prevent ulcerative colitis by developing sustained delayed release tablets using a combination of Eudragit S-100 and L-100 as enteric coating. The core tablets of Celecoxib were prepared using the direct compresion method. The aim of the present study is to develop colon specific drug delivery of Celecoxib sustained release enteric coated tablet for ulcerative colitis using HPMC K-4M as a semisynthetic polymer. The impact of polymer concentration and superdisintegrant concentration was also studied. In-vitro drug release research was performed on the enteric coated Celecoxib tablet using simulated gastric fluid (0.1N HCl) for 2 hours, simulated intestinal fluid (pH 7.4) for 3 hours, and the simulated colonic fluid (pH 6.8) for 7 hours as a dissolution fluid. The study showed that the coating had a significant impact on the lag time before medication release. In the treatment of colonic illness and the oral administration of medications that are unstable and vulnerable to enzymatic degradation in the upper GI tract, colon drug delivery is advantageous. The results also showed that a mixture of Eudragit S-100 and L-100 may be used to coat tablets for medication delivery to the colon.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Colon drug delivery system , Targeted System, Enteric coated tablet , Time and pH dependent system.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: ASSESSMENT OF ANXIETY, STRESS AND DEPRESSION IN WOMEN WITH AND WITHOUT PCOS: A COMPARITIVE STUDY

  Author Name(s): Gayathri Konduri, Akhila Bollam, Ramya Balaprabha

  Published Paper ID: - IJCRT2205430

  Register Paper ID - 220062

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205430 and DOI :

  Author Country : Indian Author, India, 501401 , Hyderabad, 501401 , | Research Area: Pharmacy All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205430
Published Paper PDF: download.php?file=IJCRT2205430
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205430.pdf

  Your Paper Publication Details:

  Title: ASSESSMENT OF ANXIETY, STRESS AND DEPRESSION IN WOMEN WITH AND WITHOUT PCOS: A COMPARITIVE STUDY

 DOI (Digital Object Identifier) :

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Pharmacy All

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d807-d811

 Year: May 2022

 Downloads: 304

  E-ISSN Number: 2320-2882

 Abstract

The prevalence of depression among PCOS women is high and varies from 28% to 64% and Anxiety is another disturbance in PCOS suffering women, varies from 34% to 57%. PCOS is mainly diagnosed based on presence of atleast two out of three diagnostic criteria, such as ovulatory dysfunction,hyperandrogenism(clinical or biochemical), and polycystic ovaries as identified by ultrasound. Methodology: This is a cross sectional survey which involved 100 responses from age group 18-28. The main aim of this study is to assess the levels of anxiety, stress, depression among PCOS and Non PCOS. Pain during periods was assessed using DVPRS 2.0 and mood was assessed using mood analysis scale. DASS 21 scale was used to assess the anxiety, depression, stress. Results and discussion: In the present study, a total of 100 responses were recorded in which 30 responses were from PCOS affected individuals and 70 were from non PCOS individuals. 46.6% of PCOS individuals has normal, 6.6% has mild, 33.3% has moderate 10% has severe, 3.3% has extremely severe levels of anxiety. In PCOS individuals, 73.3% has normal, 20% has mild, and 6.6% has moderate and 0 severe and extremely severe levels of stress.56.6% has normal, 33.3% has mild, 10% has moderate, 0 severe and extremely severe levels of depression. The levels of anxiety, depression, and stress were higher for PCOS individuals compared to Non PCOS individuals Conclusion: Mental health is of utmost importance in young women with or without PCOS. It is important to educate young women on necessity of physical activity and healthy diet in young women. The levels of anxiety, stress and depression are high in women with PCOS. Assessment of mental health in women with PCOS is crucial.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

PCOS, Anxiety, Depression, Stress, Mental health.

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: CONTRIBUTION OF WOMEN FREEDOM FIGHTERS FROM BIHAR, IN INDIA�S INDEPENDENCE MOVEMENT

  Author Name(s): Junny Kumari

  Published Paper ID: - IJCRT2205429

  Register Paper ID - 220052

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205429 and DOI :

  Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205429
Published Paper PDF: download.php?file=IJCRT2205429
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205429.pdf

  Your Paper Publication Details:

  Title: CONTRIBUTION OF WOMEN FREEDOM FIGHTERS FROM BIHAR, IN INDIA�S INDEPENDENCE MOVEMENT

 DOI (Digital Object Identifier) :

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science and Technology

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d802-d806

 Year: May 2022

 Downloads: 479

  E-ISSN Number: 2320-2882

 Abstract

Bihar is a land of rich culture and heritage. Bihar has its significant role in Indian history from Vedic age to modern India. Patna the capital, situated on the bank of river Ganga has seen many emperors and rulers ruling the state dynamically. Women has also special mark in the history. They have actively participated in each and every scenario. The same happened in the time of independence movement of India. The power of women actively participated in the free struggle, and at the request of Mahatma Gandhi, assumed social responsibility. In the 19th century, several schools were opened in Bihar to educate women. Many educated families allow women to participate in public events. During his Bihar tour, the woman began attending Gandhiji's public conference. The natural consequence of this was the participation of women in political and social reforms. This acknowledged the momentum.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Freedom movement, Bihar, India, Women, Independence movement

  License

Creative Commons Attribution 4.0 and The Open Definition


  Paper Title: WINDOWS REGISTRY ACCESS FOR ENHANCED SECURITY IN DISTRIBUTED SYSTEM ENVIRONMENTS

  Author Name(s): Mr.Jibin N, Dr. E.J. Thomson Fredrik

  Published Paper ID: - IJCRT2205428

  Register Paper ID - 220085

  Publisher Journal Name: IJPUBLICATION, IJCRT

  DOI Member ID: 10.6084/m9.doi.one.IJCRT2205428 and DOI :

  Author Country : Indian Author, India, 680008 , Thrissur, 680008 , | Research Area: Science All

Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205428
Published Paper PDF: download.php?file=IJCRT2205428
Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205428.pdf

  Your Paper Publication Details:

  Title: WINDOWS REGISTRY ACCESS FOR ENHANCED SECURITY IN DISTRIBUTED SYSTEM ENVIRONMENTS

 DOI (Digital Object Identifier) :

 Pubished in Volume: 10  | Issue: 5  | Year: May 2022

 Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882

 Subject Area: Science All

 Author type: Indian Author

 Pubished in Volume: 10

 Issue: 5

 Pages: d796-d801

 Year: May 2022

 Downloads: 298

  E-ISSN Number: 2320-2882

 Abstract

In this era of fourth industrial revolution everything is moving to digital, and the Cyber security has become a major challenge in this scenario. In this paper we present an intrusion detection mechanism using windows registry access. Microsoft windows operating system is one of extensively used operating system and is every so often attacked. Windows uses registry as database to store its low-level settings for the operating system. All the applications that run on windows will use the windows registry. For a forensic investigator the windows registry is a vital source for the evidence. In this paper we discuss an anomalous behaviour dictator for windows registry. The paper further discuss about here will learn attacks on host machine by looking in the anomalous behavior in windows registry access.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Windows Registry Access, Registry anomaly detection, MAC Address, Motherboard ID, Registry keys

  License

Creative Commons Attribution 4.0 and The Open Definition



Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer