ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: PROTECTED FILE STORAGE ON CLOUD USING CRYPTOGRAPHY
Author Name(s): Vidyashree Akhouri, Dr. Javed Wasim
Published Paper ID: - IJCRT2205437
Register Paper ID - 219870
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205437 and DOI :
Author Country : Indian Author, India, 202146 , Aligarh, 202146 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205437 Published Paper PDF: download.php?file=IJCRT2205437 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205437.pdf
Title: PROTECTED FILE STORAGE ON CLOUD USING CRYPTOGRAPHY
DOI (Digital Object Identifier) :
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d875-d882
Year: May 2022
Downloads: 316
E-ISSN Number: 2320-2882
Cryptography is the study of the various process which are implemented to protect information and communications, through the use of mathematical concepts and rule-based calculations but intruder is able to read our data so we need some method to make this data unreadable by the intruder we do this by encryption (enciphering) is a cryptographic process where we convert plain text or raw data to unintelligible information (cipher) by processing the data with an algorithm . Decryption (deciphering)is a cryptographic process where we convert cipher back to plaintext by processing. the encryption and decryption techniques that we are using should be fast in nature so when it reaches the recipient, the recipient should be able to decrypt that data fast because time is extremely valuable and the recipient cannot sit and decrypt that data for one to two hours it should be decrypted in minutes. Aim of this paper is to use different cryptography algorithm to protect file stored on cloud. The present paper involves some security goals in the process of cryptography we need to absolutely protect the confidentiality of the data so cryptography is the study that helps us deal with that it protect the confidentiality of data , when we are implementing cryptography that means there exist confidentiality. Second goal is integrity means that the data should have its original meaning should have its original structure when it reaches the recipient so if we write something in beginning right and u convert it into cipher ,when we send the cipher over to the recipient and the recipient deciphers it converts it back into plain text the plain text should represent exactly what the sender sent in the first place so the data should have maintained its integrity. Third is availability it means that the people who require that data should have it basically instantly right they should not have any delay with getting that nobody should be able to interrupt to the process of them getting that data right so this particular aspect is called availability. So this another goal of cryptography to maintain integrity to secure and strongly store information into the cloud, by splitting data into several chunks and storing parts of it on cloud in a manner that preserves data confidentiality, integrity and ensures availability. For this purpose we searched different published research articles online on cloud cryptography algorithm. Published research articles were selected from IEEE and Springer nature journals. Total seven articles between the years 2010 to 2021 were taken for the purpose of present paper. Our methodology guarantees the security and protection of customer sensitive data by utilizing AES, DES and RC2 calculation. By using all the encryption techniques a fair unit of confidentiality, authentication, integrity, access control and availability of data is maintained. Using cryptography Electronic Mail Security, Mail Security, IP Security, Web Security can be achieved.
Licence: creative commons attribution 4.0
Key words: cryptography, Algorithm, AES, DESB
Paper Title: SPEECH TO SIGN TRANSLATOR
Author Name(s): Sharun K. Suresh, Aswin K. S., Nikhil Babu P., Sajith Suresh, Nighila Ashok
Published Paper ID: - IJCRT2205436
Register Paper ID - 219904
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205436 and DOI :
Author Country : Indian Author, India, 680684 , Thrissur, 680684 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205436 Published Paper PDF: download.php?file=IJCRT2205436 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205436.pdf
Title: SPEECH TO SIGN TRANSLATOR
DOI (Digital Object Identifier) :
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d864-d874
Year: May 2022
Downloads: 378
E-ISSN Number: 2320-2882
Sign language is a visual language that is mainly used by deaf people and the Hard-of-Hearing community as their primary language. Unlike acoustically expressed sound patterns, sign language uses hand signals, gestures, facial expressions, and body language. Sign language may also help the people with disabilities, namely Autism, Cerebral Palsy, Apraxia of speech and Down Syndrome. The objective of our project is to reduce the communication gap between normal people and disabled people by providing a virtual animation translator for sign language. Speech to sign translator is a user-friendly web application that converts speech/text to sign language animation and also reduces the amount of effort spent on communication. The system consists of both speech and text conversion using natural language processing (NLP) and machine learning techniques. Input speech is captured through a microphone then it is translated to text through Speech recognition using Mel-frequency cepstral coefficients (MFCC) features. The recognized text preprocessed using NLTK and resultant words looks for a word match in ASL dataset. The database contains a certain number of pre-recorded video animation signs using 3D avatar where mainly there is one video clip per each basic word. If a match occurred for a word, then the equivalent ASL translation will be displayed corresponding to that word. Otherwise, the word will be finger spelled.
Licence: creative commons attribution 4.0
Speech recognition, MFCC, Text preprocessing, NLP, ASL
Paper Title: A COMPARATIVE STUDY OF CLOUD DEPLOYMENT MODEL
Author Name(s): Vidyashree Akhouri, Dr. Javed Wasim
Published Paper ID: - IJCRT2205435
Register Paper ID - 219872
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205435 and DOI :
Author Country : Indian Author, India, 202146 , Aligarh, 202146 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205435 Published Paper PDF: download.php?file=IJCRT2205435 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205435.pdf
Title: A COMPARATIVE STUDY OF CLOUD DEPLOYMENT MODEL
DOI (Digital Object Identifier) :
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d856-d863
Year: May 2022
Downloads: 347
E-ISSN Number: 2320-2882
Licence: creative commons attribution 4.0
Cloud computing, cloud deployment model, private cloud, hybrid cloud
Paper Title: STRUCTURE OF MANAGERIAL ORGANIZATIONS IN SUB URBAN AND RURAL EDUCATIONAL/SPORTING INSTITUTIONS
Author Name(s): Manikanta Madala, Dr. Rajesh Dhauta
Published Paper ID: - IJCRT2205434
Register Paper ID - 219740
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205434 and DOI :
Author Country : Indian Author, India, 201313 , Noida, 201313 , | Research Area: Management All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205434 Published Paper PDF: download.php?file=IJCRT2205434 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205434.pdf
Title: STRUCTURE OF MANAGERIAL ORGANIZATIONS IN SUB URBAN AND RURAL EDUCATIONAL/SPORTING INSTITUTIONS
DOI (Digital Object Identifier) :
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Management All
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d846-d855
Year: May 2022
Downloads: 297
E-ISSN Number: 2320-2882
For any organization to run efficiently, a properly laid out structure of the roles and responsibilities should be made. Fundamentally, an organization is composed of different elements and the link between these elements is what matters the most for an organization to function. It is the management which decided the efficiency of the organization and its success in the long run. And when it comes to management, the structure of the lay out is a key aspect which determines the fate of the managing authority. Over the years there have been different structures that have been adopted with trial and error as the organizations got to know which structure suits their type of work the best. A pre planed structure has always been given its due importance in a company in the west and other developed nations and this has slowly spread across. In India, evidently looking from the historic organizations and their set ups, it can be understood that there has always been a void in case of a structure and accountability in organizations, especially in the local and rural organizations. This paper reviews different papers and books presented on this area and aims at bridging the gap from the data collected from sub urban and rural areas about the efficient composition of an organization.
Licence: creative commons attribution 4.0
Management, Organization, Structure
Paper Title: POWER THEFT - A PRIMAL SOLUTION
Author Name(s): Anirban Saha, Arshad Hossain, Debojyoti Hazra, Nirjhar Banerjee, Suparna Pal
Published Paper ID: - IJCRT2205433
Register Paper ID - 220096
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205433 and DOI :
Author Country : Indian Author, India, 741235 , Kalyani, 741235 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205433 Published Paper PDF: download.php?file=IJCRT2205433 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205433.pdf
Title: POWER THEFT - A PRIMAL SOLUTION
DOI (Digital Object Identifier) :
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d842-d845
Year: May 2022
Downloads: 286
E-ISSN Number: 2320-2882
A Control Flow Graph (CFG) is the graphical representation of control flow or computation during the execution of programs or applications. Control flow graphs are mostly used in static analysis as well as compiler applications, as they can accurately represent the flow inside of a program unit
Licence: creative commons attribution 4.0
Power Theft, technical Loss, Electricity Theft
Paper Title: A REVIEW ON SUSTAINED RELEASE MATRIX TABLET
Author Name(s): Nilesh Tonde, Arun Gaikwad, Meghana Raykar
Published Paper ID: - IJCRT2205432
Register Paper ID - 219972
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205432 and DOI :
Author Country : Indian Author, India, 414701 , Ahmednagar, 414701 , | Research Area: Pharmacy All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205432 Published Paper PDF: download.php?file=IJCRT2205432 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205432.pdf
Title: A REVIEW ON SUSTAINED RELEASE MATRIX TABLET
DOI (Digital Object Identifier) :
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Pharmacy All
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d830-d841
Year: May 2022
Downloads: 320
E-ISSN Number: 2320-2882
ABSTRACT: The advantages of using a single dose of an over-the-counter medication instead of multiple dosages are now the day of interest for practicing scientists in the pharmaceutical industry. With most medicines. The basic goal of treatment is to achieve a stable blood level or a level that is medically effective and non-toxic. The continuous release system is considered a smart drug that is short-lived and requires repeated dosing, is easy to form and does not care about the process of absorption in the intestinal tract after oral administration. The main reason for the continued release of the drug delivery system is to improve the biopharmaceutical, pharmacokinetic and pharmacokinetic properties of the drug in such a way that its use is improved, side effects are reduced and treatment of disease is achieved. There are a few benefits of continuous drug delivery (matrix) in addition to standard dosage forms such as improved patient compliance due to regular drug administration, reduced flexibility in drug levels in severe conditions, higher drug use, increased dosage of strong drug safety, improved continuous oral matrix tablet with continuous dose it was a challenge for a medical professional. Many drugs, if not properly formulated, can release the drug very quickly, and may produce toxic effects of the drug in oral administration.
Licence: creative commons attribution 4.0
KEY WORDS: Sustained release, Matrix system, Extended Period of time, short half-life, pharmacokinetic, pharmacodynamics.
Paper Title: DEVELOPMENT AND EVALUATION OF COLON TARGETED DRUG DELIVERY SYSTEM.
Author Name(s): Ketakee A. Nichat, Nishan N. Bobade, Chitralekha G. Therkar, Kajal S. Jumde, Mohd. Vaqqas Quraishi
Published Paper ID: - IJCRT2205431
Register Paper ID - 220064
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205431 and DOI : http://doi.one/10.1729/Journal.30241
Author Country : Indian Author, India, 444602 , Amravati, 444602 , | Research Area: Pharmacy All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205431 Published Paper PDF: download.php?file=IJCRT2205431 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205431.pdf
Title: DEVELOPMENT AND EVALUATION OF COLON TARGETED DRUG DELIVERY SYSTEM.
DOI (Digital Object Identifier) : http://doi.one/10.1729/Journal.30241
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Pharmacy All
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d812-d829
Year: May 2022
Downloads: 324
E-ISSN Number: 2320-2882
In the present investigation, an attempt was made to formulate the time and pH dependent drug delivery system, reduce the frequency of dose administeration, and prevent ulcerative colitis by developing sustained delayed release tablets using a combination of Eudragit S-100 and L-100 as enteric coating. The core tablets of Celecoxib were prepared using the direct compresion method. The aim of the present study is to develop colon specific drug delivery of Celecoxib sustained release enteric coated tablet for ulcerative colitis using HPMC K-4M as a semisynthetic polymer. The impact of polymer concentration and superdisintegrant concentration was also studied. In-vitro drug release research was performed on the enteric coated Celecoxib tablet using simulated gastric fluid (0.1N HCl) for 2 hours, simulated intestinal fluid (pH 7.4) for 3 hours, and the simulated colonic fluid (pH 6.8) for 7 hours as a dissolution fluid. The study showed that the coating had a significant impact on the lag time before medication release. In the treatment of colonic illness and the oral administration of medications that are unstable and vulnerable to enzymatic degradation in the upper GI tract, colon drug delivery is advantageous. The results also showed that a mixture of Eudragit S-100 and L-100 may be used to coat tablets for medication delivery to the colon.
Licence: creative commons attribution 4.0
Colon drug delivery system , Targeted System, Enteric coated tablet , Time and pH dependent system.
Paper Title: ASSESSMENT OF ANXIETY, STRESS AND DEPRESSION IN WOMEN WITH AND WITHOUT PCOS: A COMPARITIVE STUDY
Author Name(s): Gayathri Konduri, Akhila Bollam, Ramya Balaprabha
Published Paper ID: - IJCRT2205430
Register Paper ID - 220062
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205430 and DOI :
Author Country : Indian Author, India, 501401 , Hyderabad, 501401 , | Research Area: Pharmacy All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205430 Published Paper PDF: download.php?file=IJCRT2205430 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205430.pdf
Title: ASSESSMENT OF ANXIETY, STRESS AND DEPRESSION IN WOMEN WITH AND WITHOUT PCOS: A COMPARITIVE STUDY
DOI (Digital Object Identifier) :
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Pharmacy All
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d807-d811
Year: May 2022
Downloads: 304
E-ISSN Number: 2320-2882
The prevalence of depression among PCOS women is high and varies from 28% to 64% and Anxiety is another disturbance in PCOS suffering women, varies from 34% to 57%. PCOS is mainly diagnosed based on presence of atleast two out of three diagnostic criteria, such as ovulatory dysfunction,hyperandrogenism(clinical or biochemical), and polycystic ovaries as identified by ultrasound. Methodology: This is a cross sectional survey which involved 100 responses from age group 18-28. The main aim of this study is to assess the levels of anxiety, stress, depression among PCOS and Non PCOS. Pain during periods was assessed using DVPRS 2.0 and mood was assessed using mood analysis scale. DASS 21 scale was used to assess the anxiety, depression, stress. Results and discussion: In the present study, a total of 100 responses were recorded in which 30 responses were from PCOS affected individuals and 70 were from non PCOS individuals. 46.6% of PCOS individuals has normal, 6.6% has mild, 33.3% has moderate 10% has severe, 3.3% has extremely severe levels of anxiety. In PCOS individuals, 73.3% has normal, 20% has mild, and 6.6% has moderate and 0 severe and extremely severe levels of stress.56.6% has normal, 33.3% has mild, 10% has moderate, 0 severe and extremely severe levels of depression. The levels of anxiety, depression, and stress were higher for PCOS individuals compared to Non PCOS individuals Conclusion: Mental health is of utmost importance in young women with or without PCOS. It is important to educate young women on necessity of physical activity and healthy diet in young women. The levels of anxiety, stress and depression are high in women with PCOS. Assessment of mental health in women with PCOS is crucial.
Licence: creative commons attribution 4.0
PCOS, Anxiety, Depression, Stress, Mental health.
Paper Title: CONTRIBUTION OF WOMEN FREEDOM FIGHTERS FROM BIHAR, IN INDIA�S INDEPENDENCE MOVEMENT
Author Name(s): Junny Kumari
Published Paper ID: - IJCRT2205429
Register Paper ID - 220052
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205429 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205429 Published Paper PDF: download.php?file=IJCRT2205429 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205429.pdf
Title: CONTRIBUTION OF WOMEN FREEDOM FIGHTERS FROM BIHAR, IN INDIA�S INDEPENDENCE MOVEMENT
DOI (Digital Object Identifier) :
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d802-d806
Year: May 2022
Downloads: 479
E-ISSN Number: 2320-2882
Bihar is a land of rich culture and heritage. Bihar has its significant role in Indian history from Vedic age to modern India. Patna the capital, situated on the bank of river Ganga has seen many emperors and rulers ruling the state dynamically. Women has also special mark in the history. They have actively participated in each and every scenario. The same happened in the time of independence movement of India. The power of women actively participated in the free struggle, and at the request of Mahatma Gandhi, assumed social responsibility. In the 19th century, several schools were opened in Bihar to educate women. Many educated families allow women to participate in public events. During his Bihar tour, the woman began attending Gandhiji's public conference. The natural consequence of this was the participation of women in political and social reforms. This acknowledged the momentum.
Licence: creative commons attribution 4.0
Freedom movement, Bihar, India, Women, Independence movement
Paper Title: WINDOWS REGISTRY ACCESS FOR ENHANCED SECURITY IN DISTRIBUTED SYSTEM ENVIRONMENTS
Author Name(s): Mr.Jibin N, Dr. E.J. Thomson Fredrik
Published Paper ID: - IJCRT2205428
Register Paper ID - 220085
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2205428 and DOI :
Author Country : Indian Author, India, 680008 , Thrissur, 680008 , | Research Area: Science All Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2205428 Published Paper PDF: download.php?file=IJCRT2205428 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2205428.pdf
Title: WINDOWS REGISTRY ACCESS FOR ENHANCED SECURITY IN DISTRIBUTED SYSTEM ENVIRONMENTS
DOI (Digital Object Identifier) :
Pubished in Volume: 10 | Issue: 5 | Year: May 2022
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science All
Author type: Indian Author
Pubished in Volume: 10
Issue: 5
Pages: d796-d801
Year: May 2022
Downloads: 298
E-ISSN Number: 2320-2882
In this era of fourth industrial revolution everything is moving to digital, and the Cyber security has become a major challenge in this scenario. In this paper we present an intrusion detection mechanism using windows registry access. Microsoft windows operating system is one of extensively used operating system and is every so often attacked. Windows uses registry as database to store its low-level settings for the operating system. All the applications that run on windows will use the windows registry. For a forensic investigator the windows registry is a vital source for the evidence. In this paper we discuss an anomalous behaviour dictator for windows registry. The paper further discuss about here will learn attacks on host machine by looking in the anomalous behavior in windows registry access.
Licence: creative commons attribution 4.0
Windows Registry Access, Registry anomaly detection, MAC Address, Motherboard ID, Registry keys