ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: The Use of Machine Learning to Spot Counter feit Currency
Author Name(s): G. SRI HARSHA, Dr.Jayarajan
Published Paper ID: - IJCRT2308776
Register Paper ID - 243496
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308776 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308776 Published Paper PDF: download.php?file=IJCRT2308776 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308776.pdf
Title: THE USE OF MACHINE LEARNING TO SPOT COUNTER FEIT CURRENCY
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g992-g996
Year: August 2023
Downloads: 139
E-ISSN Number: 2320-2882
It's no wonder that criminals would want to take advantage of the financial system by flooding it with counterfeit notes that seem very comparable to the genuine thing, given that bank cash is our country's greatest asset. When demonetization takes place, counterfeit banknotes flood the economy. A genuine banknote and a counterfeit one have numerous characteristics, making it difficult, if not impossible, to tell them apart without special equipment or training. It is a challenging task to distinguish real banknotes from fake ones. Therefore, a completely automated system is essential, and it must be available through tellers at banks and ATMs. Because counterfeit banknotes may now be made with such high quality, it is crucial that a reliable algorithm be created to evaluate whether or not a
Licence: creative commons attribution 4.0
The Use of Machine Learning to Spot Counter feit Currency
Paper Title: AN IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGY IN FORENSIC EVIDENCE MANAGEMENT
Author Name(s): G.Vasavi, Dr. G Kalpana
Published Paper ID: - IJCRT2308775
Register Paper ID - 243495
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308775 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308775 Published Paper PDF: download.php?file=IJCRT2308775 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308775.pdf
Title: AN IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGY IN FORENSIC EVIDENCE MANAGEMENT
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g987-g991
Year: August 2023
Downloads: 191
E-ISSN Number: 2320-2882
Evidence management is highly valued in the field of forensic science. In order to solve crimes and bring perpetrators to justice, evidence gathered at the site of the crime is essential. Therefore, it is essential to keep these goods protected from any kind of manipulation. Chain of custody is a method used to ensure that evidence is kept secure. If the chain if custody is broken, the evidence cannot be used in court, which might lead to an automatic dismissal of the proceeding. Because the standard practice for handling forensic evidence is so wasteful, moving toward a digital system is crucial. Blockchains are public, digitally distributed ledgers comprising transactions that have been signed cryptographically and divided into blocks. The Linux Foundation created Hyperledger Fabric, a blockchain platform designed specifically for enterprise use cases. Based on the concepts of Hyperledger Fabric, this study aimed to provide a framework for implementing Blockchain Technology into the criminal records administration system while maintaining the Chain of Custody.
Licence: creative commons attribution 4.0
AN IMPLEMENTATION OF BLOCKCHAIN TECHNOLOGY IN FORENSIC EVIDENCE MANAGEMENT
Paper Title: TO DETERMINE BANDWIDTH AND RESOLUTION QUALITY FOR AN AMAZON PRIME VIDEO USING WIRESHARK ANALYSER TOOL
Author Name(s): C.GAZALA AKHTAR, KARAMSETTY SHOURYADHAR, Sanjeevani
Published Paper ID: - IJCRT2308774
Register Paper ID - 243497
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308774 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308774 Published Paper PDF: download.php?file=IJCRT2308774 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308774.pdf
Title: TO DETERMINE BANDWIDTH AND RESOLUTION QUALITY FOR AN AMAZON PRIME VIDEO USING WIRESHARK ANALYSER TOOL
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g982-g986
Year: August 2023
Downloads: 176
E-ISSN Number: 2320-2882
Among many types of web-based applications, real-time streaming footage has become the standard broadcast standard. In this paper, we investigate Amazon Prime Video, which is an online video-on-demand service that allows us to view sporting activities, motion pictures, and other events. Each component of the video that streams online is then further broken into various bit rate variants. The quantity of bits sent in a specific amount of time is known as the rate of transmission for videos. Utilizing the wireless network analysis programme Wire shark, we quantify the bit rates modulated throughput of Amazon Prime Video Streaming. The rate of modulation depends on a pair of factors, like traffic rate and video resolution; the latter is used to gauge a video's capacity and network capacity, which takes into account the higher bandwidth requirement, the better the quality must be.
Licence: creative commons attribution 4.0
Wireshark, Amazon Prime, Bandwidth, Resolution, Streaming
Paper Title: Classification of Satellite Images Using Deep Learning
Author Name(s): G.VedaPravallika, Dr K .Smitha
Published Paper ID: - IJCRT2308773
Register Paper ID - 243494
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308773 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308773 Published Paper PDF: download.php?file=IJCRT2308773 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308773.pdf
Title: CLASSIFICATION OF SATELLITE IMAGES USING DEEP LEARNING
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g976-g981
Year: August 2023
Downloads: 116
E-ISSN Number: 2320-2882
Satellite photos are widelyusedinfieldsincludingemergencymanagement,security,andenvironmentalmonitoring.Thesegoalscan'tbeachievedwithout the help of humans and the ability toproperlyidentifyobjects.Withsomanypossiblesearchspaces and so few analystson hand, automation is essential. However,owingtotheirfocusonaccuracyandprecision,conventionaltechniquestoidentifyitemsandcategorizationareconstrainedintheircapacitytodeliverasolution.Automatingthesestepsusingsupervised neural class ML algorithms hasshownsomesuccess.Thereissomeevidence that convolutional neural networks,akindofartificialneuralnetwork,mayenhancebothpictureidentificationandunderstanding. In this case, we use them tolearnhowtoidentifyartificialfeaturesinhigh-resolution,multispectralsatelliteimagery.Weprovideadeeplearningapproachtoclassifyingfeaturesor
Licence: creative commons attribution 4.0
Classification of Satellite Images Using Deep Learning
Paper Title: MANAGINGS TOP AND GO TRAFFIC WITH AI
Author Name(s): Neerati Rachana, Shivakumaran A R
Published Paper ID: - IJCRT2308772
Register Paper ID - 243493
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308772 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308772 Published Paper PDF: download.php?file=IJCRT2308772 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308772.pdf
Title: MANAGINGS TOP AND GO TRAFFIC WITH AI
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g969-g975
Year: August 2023
Downloads: 104
E-ISSN Number: 2320-2882
Congestioninbigcitiesisbecomingmoreproblematicas urban populations & automobileownership both grow. Everyone suffers inconvenient delays when traffic is backed up. motorists,but it does increase fuel consumption and pollution. Despite its apparent global prevalence, bigurbancentersare especially at risk. Therefore, it is becoming more vital to calculate trafficdensityinrealtimeinorder to optimize signal timing and manage traffic flow. The trafficcontroller plays a crucial role in the smooth flow of traffic. Therefore, there is an urgent need forenhanced traffic management to fulfill the expanding demands of the public. To measure trafficlevels, our system would utilize artificial intelligence and processing of images to examine livefeeds via cameras installed at crossings. The algorithm for adjusting the timing of traffic lights inresponse to traffic volumes is also highlighted in an effort to make travel more efficient forpassengers and reduce pollution.
Licence: creative commons attribution 4.0
MANAGINGS TOP AND GO TRAFFIC WITH AI
Paper Title: An Ensemble Multiple-Keyword Search with Data Security in Cloud Environment
Author Name(s): Afsha Jabeen, Dr. C.V.P.R.Prasad
Published Paper ID: - IJCRT2308771
Register Paper ID - 243492
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308771 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308771 Published Paper PDF: download.php?file=IJCRT2308771 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308771.pdf
Title: AN ENSEMBLE MULTIPLE-KEYWORD SEARCH WITH DATA SECURITY IN CLOUD ENVIRONMENT
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g961-g968
Year: August 2023
Downloads: 112
E-ISSN Number: 2320-2882
With the increasing adoption of cloud computing, data security has become a significant concern for organizations and individuals. In this context, efficient and secure keyword search techniques are essential to retrieve relevant information from encrypted data stored in the cloud. This paper proposes an ensemble multiple-keyword search approach with enhanced data security in a cloud environment. The proposed system combines the strengths of multiple keyword search techniques to achieve better search accuracy and efficiency. The ensemble method leverages various algorithms, such as inverted index, bloom filters, and homomorphic encryption, to overcome the limitations of individual techniques and provide robust search capabilities. The proposed approach employs encryption mechanisms to protect sensitive information to ensure data security. The data is encrypted before being uploaded to the cloud, ensuring only authorized users can access and retrieve the information. Homomorphic encryption enables the cloud server to perform search operations on the encrypted data without decrypting it, preserving the privacy of the stored information.
Licence: creative commons attribution 4.0
Cloud computing, Symmetric-key, homomorphic, and Attribute-based Encryption (ABE).
Paper Title: Cycle-GANs for Blind Electrocardiogram Restoration
Author Name(s): M.Pavani, Dr.DBK Kamesh
Published Paper ID: - IJCRT2308770
Register Paper ID - 243491
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308770 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308770 Published Paper PDF: download.php?file=IJCRT2308770 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308770.pdf
Title: CYCLE-GANS FOR BLIND ELECTROCARDIOGRAM RESTORATION
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g954-g960
Year: August 2023
Downloads: 111
E-ISSN Number: 2320-2882
Grecordingsoftenincludeseveralartifactsofvaryingtypes,magnitudes,anddurations,whichmakesaccurateautomatedorhumandiagnosischallenging, if not impossible. The real ECGsignal, which has been tainted by artifacts,cannotberestoredusingany oftheECGdenoising algorithms established by variousresearchers.WeofferanewmethodforblindECGrecoveryutilizingloopadversarialgenerativenetworks(Loop),where reliability of signals may be enhancedtothelevelofclinicalECGdespiteanumberofartifactsofvariedformsandintensities.Byusingagenerativebrainmodel to improve restoration performance,weprovidefullyoperational1DCycle-GANs. The suggested method (CPSC-2020)wasrigorouslytestedusingoneofthebiggestbaselineelectrocardiogram(ECG)dataset ever produced as a component of theChinesePhysiologyDataChallenge.Agroupofcardiologistsexaminedthepatient toensurethequalityanduseoftherecovered ECG, especially in establishing anaccurate arrhythmias diagnosis. This studyprovesthatdegradedECGsignalscanberestoredtoclinicallyacceptablelevels,making it a watershed moment in the field ofECGrestoration.
Licence: creative commons attribution 4.0
Cycle-GANs for Blind Electrocardiogram Restoration
Paper Title: THE EVALUATION OF THE THREATS AND CHALLENGES IMPACTING THE GLOBAL FINANCIAL CYBER SECURITY MARKET
Author Name(s): Dr.K.Deepika, Dr.Kolli Nithin Sai, Dr.Pullarao Kota
Published Paper ID: - IJCRT2308769
Register Paper ID - 243489
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308769 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308769 Published Paper PDF: download.php?file=IJCRT2308769 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308769.pdf
Title: THE EVALUATION OF THE THREATS AND CHALLENGES IMPACTING THE GLOBAL FINANCIAL CYBER SECURITY MARKET
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g948-g953
Year: August 2023
Downloads: 127
E-ISSN Number: 2320-2882
Success in digital marketing, an online business, depends on solving cyberspace security issues. More people are choosing to work online and launch technology and digital businesses as the Digital Age develops. One well-known example is marketing. In recent years, a brand-new marketing genre called "digital marketing" has evolved. Given that it may help practically every organisation, digital marketing is a lucrative and important industry. They must be knowledgeable about how to safeguard their businesses against cybercrime as more people enter or develop in digital marketing. Cybercrime can involve the theft, misuse, and tampering of personal information and internet accounts. This article examines ways to protect a digital marketing company's success in light of the ongoing cyber threats. Data was gathered from people interested in digital marketing using online websites. There are opportunities to improve the efficiency and safety of financial transactions by integrating digital technology into the operation of national financial systems.
Licence: creative commons attribution 4.0
Digital marketing, Cyber security, Digital fraud, digital economy, financial security
Paper Title: AI Shopper
Author Name(s): Ms. Mansi Kore, Mr. Sahil Vangari, Mr. Hitesh Reddy, Mr. Ajinkya Patil, Mrs. Rizwana Shaikh
Published Paper ID: - IJCRT2308768
Register Paper ID - 243577
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308768 and DOI :
Author Country : Indian Author, India, 400706 , Navi Mumbai, 400706 , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308768 Published Paper PDF: download.php?file=IJCRT2308768 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308768.pdf
Title: AI SHOPPER
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g940-g947
Year: August 2023
Downloads: 183
E-ISSN Number: 2320-2882
E-commerce App with AI Voice Assistant
Licence: creative commons attribution 4.0
E-commerce, AI Voice Assistant, Voice Search, Mobile application
Paper Title: CRIMINALSATION IN POLITICS: BIHAR PERSPECTIVE
Author Name(s): Mr. SIMAL KUMAR SINGH
Published Paper ID: - IJCRT2308767
Register Paper ID - 243570
Publisher Journal Name: IJPUBLICATION, IJCRT
DOI Member ID: 10.6084/m9.doi.one.IJCRT2308767 and DOI :
Author Country : Indian Author, India, - , -, - , | Research Area: Science and Technology Published Paper URL: http://ijcrt.org/viewfull.php?&p_id=IJCRT2308767 Published Paper PDF: download.php?file=IJCRT2308767 Published Paper PDF: http://www.ijcrt.org/papers/IJCRT2308767.pdf
Title: CRIMINALSATION IN POLITICS: BIHAR PERSPECTIVE
DOI (Digital Object Identifier) :
Pubished in Volume: 11 | Issue: 8 | Year: August 2023
Publisher Name : IJCRT | www.ijcrt.org | ISSN : 2320-2882
Subject Area: Science and Technology
Author type: Indian Author
Pubished in Volume: 11
Issue: 8
Pages: g935-g939
Year: August 2023
Downloads: 120
E-ISSN Number: 2320-2882
The nexus of legislative issues and wrongdoing has consistently made the genuine reason for legislative issues unessential. In the foundations of decentralization of governmental issues, fundamentally in the get together races, panchayat decisions, civil races, applicants with expanding criminal picture have clarified that governmental issues (battle for power) was accomplished by involving popularity based implies for the government assistance of its residents. It is known that, presently the rising number of up-and-comers and pioneers with criminal picture, even crook picture, utilize political power just for their futile advantages. Heads of any ideological group don't focus on foster incredible political qualities and standards of citizenship. They don't advance positive energy and country building responsibility. Legislative issues or the utilization of political power is the same old thing. The crazy circumstance is that the most common way of expanding criminalization of governmental issues in Bihar has prompted the politicization of wrongdoing instead of criminalization of legislative issues and has turned into a noticeable element of the legislative issues culture of the present decision class. Criminalization of governmental issues is an intense issue in Bihar, which has proactively arrived at perilous levels. This evil of criminalization of governmental issues draws in unique consideration of individuals as the subject spins around the personal stakes of all party legislators on the grounds that such individuals can never trust that lawmakers will show any drive to correct this fiendishness. In this exploration paper, an endeavor has been made to break down the rising predominance of hoodlums in Bihar governmental issues and its healing measures
Licence: creative commons attribution 4.0
Criminal, Criminalisation, Politics, Winn ability, Bihar