Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 6 | Issue 1

Volume 6 | Issue 1 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: INFORMATION SECURED STEELTH STEGANOGRAPHY USING MMS (SSS IN MMS)

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES087

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES087

  Register Paper ID - 180584

  Title: INFORMATION SECURED STEELTH STEGANOGRAPHY USING MMS (SSS IN MMS)

  Author Name(s): N.V.L.Neelima, D.Himabindu, Rambabu M

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 495-504

 Year: March 2018

 Downloads: 2783

 Abstract

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography is the word derived from Greek. Stego means hiding, graphy means writing. It is the science of embedding information into the cover image viz., text, video and image without causing statistically significant modification to the cover image. If the selected image is color image, then convert the image into pixels and the pixels into cells. Read each pixel and generate the color code for that pixel. Here we use LSB(least significant bit) technique to hide the message into the image. LSB data hiding technique does not affect the visible properties of the image. For using LSB technique, we first convert the color code into binary language. Now by using LSB technique, we change the least significant bit value for the binary code generated before. So after changing the least significant bit value whatever value we get, for that number we see the color code and then we hide our text in that pixel which will contain that particular color code. Repeat this process until we hide our full message.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Steganography, Cover image, Pixels, Cells, LSBTechnique, Binary code

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EVALUATING THE IMPACT OF STEMMING ACCURACY ON INFORMATION RETRIEVAL

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES086

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES086

  Register Paper ID - 180596

  Title: EVALUATING THE IMPACT OF STEMMING ACCURACY ON INFORMATION RETRIEVAL

  Author Name(s): MD.Afzal, Khaza.K.B.Vali Basha.SK

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 491-494

 Year: December - 2017

 Downloads: 2780

 Abstract

In the present years, Text mining is a developing examination issue in Data Mining. Stemming is to discover stop of specific word. Stemming method is utilized to reduce words length to their resource structure, by expelling derivational and inflectional suffix. Various analysts have proposed the procedures for evaluating the quality and closeness of stemming calculations in various ways. This information the measure of the content quantity reduces by the stemming procedure however couldn't be valuable to numeral the exactness of the stemmer. In this paper, we have utilized one of them to evaluate the quality and proposed one basis for measuring the strength(WSF) and two criteria for measuring the accuracy(CSF and AWCF) of stemming calculation. The examination assesses the quality and exactness of four distinctive closes migration stemming calculations what's more, discovered that every one of the calculations allowed. in this paper are solid and heavier, yet are less precise. In any case, the precision of accurately stemmed words and conflating variation expressions of same gathering to medication source word is great, yet not edible, in Paice/Husk stemmer than alternate stemmers


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Data Mining, stemming

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: --

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES085

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES085

  Register Paper ID - 180595

  Title: --

  Author Name(s): M. Muni Babu, K. Mamatha

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 486-490

 Year: December - 2017

 Downloads: 2968

 Abstract

The usage of buffer cache improves the system performance and throughput when buffer cache utilized very effectively. For effective use of buffer cache having many techniques in those pattern based methodology works very efficiently and enhance the system performance. Future block reference is identified from the detected pattern. Marginal gain functions are used for managing the partitions. This proposed methodology main aim is improve the buffer cache hit ratio used to enhance the performance


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Buffer Cache, Cache Partition, Replacement policies

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TWO- FACTOR DATA SECURITY PROTECTION FOR DATA STORED IN THE CLOUD STORAGE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES084

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES084

  Register Paper ID - 180594

  Title: TWO- FACTOR DATA SECURITY PROTECTION FOR DATA STORED IN THE CLOUD STORAGE

  Author Name(s): CH.Sangeetha, P.Prashanth Kumar, A.Ravi Kumar

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 482-485

 Year: December - 2017

 Downloads: 2717

 Abstract

This Scheme proposed an upgrade information security system for cloud the use of two Components. In this framework sender sends an encoded message to a recipient with the help of cloud component. The sender requires to catch distinguishing proof of collector however no need of different data which joins declaration or open key. To decode the outline content, recipient wants components. The main information or is an exceptional non-open security device or some tools associated with the tablet framework. Second one is close to home key or discharge key put away inside the PC. Without having those issues outline message in no way, nature or form decoded. The critical part is the security apparatus lost or stolen, at that point form content can't be decoded and equipment device is rejected out to decode outline fictional matter. The execution and security assessment show that the device is secure not resisted for all reasons and purposes connected. The device makes utilization of another equipment tool. This paper proposes Identity Based and characteristic based encryption approach of distributed storage which might be implementable On cloud stage. The record investigations the attainability of the applying encryption set of arrangements for information security and privacy in distributed storage with all sort of present day calculations.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Two- Factor Data Security Protection

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SECURE AND EFFICIENT KEYWORD SEARCH IN MULTIPLE CLOUD SERVERS WITH USING PKE & SSE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES083

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES083

  Register Paper ID - 180593

  Title: SECURE AND EFFICIENT KEYWORD SEARCH IN MULTIPLE CLOUD SERVERS WITH USING PKE & SSE

  Author Name(s): Nagarapu Urmila, P.Prashanth Kumar, A.Ravi Kumar

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 478-481

 Year: December - 2017

 Downloads: 2680

 Abstract

we explore the security of an outstanding cryptographic primitive, in particular Public Key Encryption with Keyword Search which is exceptionally valuable in numerous uses of distributed storage. Unfortunately, it has been demonstrated that the normal PEKS structure experiences a natural weakness called inside Keyword Guessing Attack forced by the harmful server. Distributed computing, huge scope of clients and measurements administrators are affected to outsource their realities to cloud servers for enormous accommodation and diminished cost required for data administration. In any case, vital actualities should be scrambled sooner than outsourcing for security necessities, which utilizes records use method like catchphrase fundamentally, based record recovery. Accessible encryption is of expanding excitement for ensuring the information insurance in quiet accessible circulated carport. In this paper, we thinks about the security of a remarkable cryptographic primitive, especially, Public Key Encryption with Keyword Search (PEKS) that is very profitable in a few usages of distributed storage. The customary PEKS structure reports an unavoidable precariousness known as inside Brute Force catchword guesses attack moved through the cruel server. To address this security helplessness, we recommend some other PEKS framework named Dual Server PEKS (DS-PEKS). Through this propose framework, we can enhance the security for distributed storage frameworks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMAGE PROCESSING IN DATA MINING BY USING COLOR K-MEANS CLUSTERING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES082

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES082

  Register Paper ID - 180592

  Title: IMAGE PROCESSING IN DATA MINING BY USING COLOR K-MEANS CLUSTERING

  Author Name(s): KRISHNA MOORTHY, KANNEDARI GOPIKRISHNA, RAMBABU M

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 473-477

 Year: December - 2017

 Downloads: 2884

 Abstract

Now-a-days people are interested in using digital images. There is a great need for developing an efficient technique for finding an image. Image mining is a vital technique which is used to mine knowledge straight forwardly from image. Image segmentation is the primary phase in image mining. It has been a difficult task in computer vision. The role of image segmentation is to decompose an image into parts that are meaningful with respect to the particular applications. The goal of data mining process is to extract information from a data set and transform it into an understandable structure for further use. The pixel discovery is critical issue for any specialists. In this work a strategy to recognize pixels by utilizing picture preparing methods with incorporates picture pre-handling , picture division, extraction, morphological operations and grouping system is used. Abnormal pixels are identified in filtered image by using marker controlled watershed segmentation and gradient magnitude. This present work proposes a technique to identify the pixel point adequately from the filter pictures. It will minimize blunder made by the human exposed eye. MATLAB is broadly utilized programming for the investigation of data mining identification from filtered pictures. We utilized MATLAB 2017b for building up this anticipate.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

picture identification, Gaussian mixture, watershed transform, morphological functions, L*a*b color based, k-means clustering, Thresholding, MATLAB 2017b

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ENHANCING THE BUG TOSSING GRAPHS AND CHARACTERISTICS OF BUG SIMILARITIES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES081

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES081

  Register Paper ID - 180591

  Title: ENHANCING THE BUG TOSSING GRAPHS AND CHARACTERISTICS OF BUG SIMILARITIES

  Author Name(s): T.L.N.Varaprasad, Rambabu M

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 467-472

 Year: December - 2017

 Downloads: 2725

 Abstract

A bug report is typically assigned to a single developer who is then responsible for fixing the bug. Development a new bug firstly is found by developers or users. Then the bug is described as a bug report, which is submitted to a bug repository. Finally the bug trigger checks the bug report and typically assigns a developer to fix the bug. The assignment process is time-consuming and error-prone. Furthermore, a large number of bug reports are tossed (reassigned) to other developers, which increases bug-fix time. In order to quickly identify the fixer to bug reports we present an approach based on the bug tossing history and textual similarities between bug reports. This proposed approach is evaluated on Eclipse and Mozilla. The results show that our approach can significantly improve the efficiency of bug assignment: the bug fixer is often identified with fewer tossing events.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

bug assignment, bug reports, bug tossing, information retrieval, software engineering

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPARATIVE STUDY ON BIGDATA WITH DTA MINING AND ITS APPLICATIONS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES080

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES080

  Register Paper ID - 180590

  Title: A COMPARATIVE STUDY ON BIGDATA WITH DTA MINING AND ITS APPLICATIONS

  Author Name(s): Ganga Patur

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 462-466

 Year: December - 2017

 Downloads: 2728

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Big data, big data architecture, Data mining issues

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPROVING DATA SECURITY IN AUDIO STEGANOGRAPHY WITH PADDING LSB TECHNIQUES AND AUDIO FILES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES079

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES079

  Register Paper ID - 180589

  Title: IMPROVING DATA SECURITY IN AUDIO STEGANOGRAPHY WITH PADDING LSB TECHNIQUES AND AUDIO FILES

  Author Name(s): G.Srikanth, K.Ganesh Kumar, K.Shivangini Reddy, Rambabu M

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 456-461

 Year: December - 2017

 Downloads: 2756

 Abstract

The project entitled Audio Steganography is the application developed to embed an audio file in another audio signal. It is concerned with embedding information in an innocuous cover Speech in a secure and robust manner. This system makes the Files more secure by using the concepts Steganography and Cryptography. Steganography, poor cousin of Cryptography is the art of hiding messages inside other messages such that the very existence of the message is unknown to third party. The goal of cryptography is to make data unreadable by a third party, the goal of stenography is to hide the data from a third party Through the use of advanced computer software, authors of images and software can place a hidden trademark in their product, allowing them to keep a check on piracy. This is commonly known as watermarking. Hiding serial numbers or a set of characters that distinguishes an object from a similar object is known as finger printing. Together, these two are intended to fight piracy. The latter is used to detect copyright violators and the former is used to prosecute them. But these are only examples of the much wider field of stenography.The cover data should not be significantly degraded by the embedded data, and the embedded data should be as imperceptible as possible. The embedded data should be as immune as possible to modifications from intelligent attacks or anticipated manipulations .Thus it is necessary that the hidden message should be encrypted.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Audio Steganography , Padding LSB Techniques

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGNING OF CONTENT BASED IMAGE RETRIEVAL USING BOTH COLOR AND SHAPE FEATURES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES078

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES078

  Register Paper ID - 180587

  Title: DESIGNING OF CONTENT BASED IMAGE RETRIEVAL USING BOTH COLOR AND SHAPE FEATURES

  Author Name(s): Raghu Kumar Lingamallu

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 451-455

 Year: December - 2017

 Downloads: 2662

 Abstract

Content-Based image acts to get back (CBIR) uses the seeing what is in of an image such as color, form, feeling of a material, and spatial general design to represent and list of words in a book the image. action-bound make observations in CBIR is geared in the direction of the development of methodologies for getting at details, interpreting price listing and giving pointer image knowledge-bases. In addition to their development, efforts are also being made to value the operation of image acts to get back systems. The quality of move is heavily dependent on the good quality of the careful way used to produce point gives directions to be taken and likeness measure for comparison of points. In this paper we offered an algorithm which makes into company the more chances of different other algorithms to get well the having no error and doing a play of acts to get back. The having no error of color histogram based matching can be increased by using Color soundness guide (CCV) for coming one after another polish. The rate of motion of form based acts to get back can be gave greater value to by giving thought to as rough form rather than the certain, errorless form. In addition to this a mix of color and form based acts to get back is also included to get well the having no error of the outcome


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CBIR, Shape, Color Coherence Vector, Centroid

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ONLINE PAYMENT SOLUTIONS FULLY OFF-LINE FUNCTIONS ON FRODO

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES077

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES077

  Register Paper ID - 180586

  Title: ONLINE PAYMENT SOLUTIONS FULLY OFF-LINE FUNCTIONS ON FRODO

  Author Name(s): Bala koti Reddy Putluri

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 447-450

 Year: December - 2017

 Downloads: 2681

 Abstract

Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. perused by the gadget. In that capacity, in situations where client and merchant are relentlessly or irregularly separated from the system and there is no safe amid on-line installment. We proposed work is to give secure completely disconnected work is intelligence between various customer - server. This server is recognized from legitimate to unlawful control is given to client key approach. When gather the points of interest at client side are client record is debilitate consequently by erasable PUFs . It incorporate that restricted movement is guaranteed alluded as server to customer exchange is secured. Promote, a comprehensive examination of FRODO utilitarian and security properties is given, showing its feasibility and credibility.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Secure payments, PoS system, erasable PUFs , fraud resilience, cybercrime

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ENHANCED HONEY CIPHER STRUCTURE WITH MULTIPLE CIPHER STRUCTURES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES076

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES076

  Register Paper ID - 180585

  Title: ENHANCED HONEY CIPHER STRUCTURE WITH MULTIPLE CIPHER STRUCTURES

  Author Name(s): M.RAMBABU, N. Ramana, Dr. M. Sadanandam

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 441-446

 Year: December - 2017

 Downloads: 2682

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Honey Structure, Honey Cipher Structure, ASCII Values, ASCII Character Representation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MODE CONVERTOR

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES074

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES074

  Register Paper ID - 180582

  Title: MODE CONVERTOR

  Author Name(s): S CHANDANA, RAMBABU M

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 436-440

 Year: December - 2017

 Downloads: 2687

 Abstract

Now a day, all people are very familiar with mobiles. To make them free from work tensions, they will keep their mobile in silent. When they keep their mobiles in silent they may miss some important calls. Which will make them regret in future? So, to avoid this situation we came up with MODE CONVERTOR. By using this, if a mobile is in silent and a same mobile number is calling continuously 5 times then at the 6-time call of the same mobile number will automatically convert into ring mode. By this a person will not lose their valuable information. Mobile learning management systems are very important for training purpose. But considering the present scenario, the learners are equipped with a number of mobile devices that run by different operating systems with diverse device features. Therefore, developing a mobile application for different platforms is a cumbersome task if appropriate tools and techniques are not practiced. There are three categories of mobile application namely native, web based and hybrid. For mobile learning system, hybrid is an appropriate choice. In order to avoid re-implementation of the same hybrid application for different platform separately, several tools are proposed for example: Phone Gap, Adobe Air, Sencha Touch and QT, each with their own strength. With proper use of the strength of individual framework or the combination of frameworks, more compatible and more stable, cross-platform mobile learning application specifically for quizzes and assignments can be developed


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

cross-platform; mobile devices; framework; mobile learning; hybrid mobile app

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AUTHENTICATION PRIVACY POLICY PRESERVING OF USER UPLOADED IMAGES ON SOCIAL MEDIA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES073

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES073

  Register Paper ID - 180581

  Title: AUTHENTICATION PRIVACY POLICY PRESERVING OF USER UPLOADED IMAGES ON SOCIAL MEDIA

  Author Name(s): BBTS MRUNALINI, C Venkatesh, G. Sneha

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 432-435

 Year: December - 2017

 Downloads: 2709

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

privacy policies, authentication, A3P, Social network, policy prediction

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EFFECTIVE DATA MINING ASSOCIATION RULES AND CLASSIFICATION TECHNIQUES FOR HEART DISEASE PREDICTION SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES071

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES071

  Register Paper ID - 180579

  Title: EFFECTIVE DATA MINING ASSOCIATION RULES AND CLASSIFICATION TECHNIQUES FOR HEART DISEASE PREDICTION SYSTEM

  Author Name(s): K. Sudheer Kumar, MD Afzal

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 428-431

 Year: December - 2017

 Downloads: 2702

 Abstract

In a Human Life Span Heart disorder is a significant reason for spitefulness also, humanity in the advanced society. Beneficial study is a critical yet complicated responsibility that must to be performed precisely and productively and its robotization would be extremely helpful. All specialists are shockingly not similarly able in each sub declare to fame and they are in many spots a rare benefit. A framework for computerized medicinal determination would improve beneficial mind and reduce costs. This paper expects a study of current procedures of information disclosure in databases utilizing information mining procedures that are being used in the present therapeutic seem into especially in Heart Disease Prediction. The human services industry gathers massive measures of social assurance information, which are not mined to find profitable data for effective basic leadership. The medicinal services segment is still data prosperous yet learning poor. Although, there is an absence of productive examination tools to find hidden examples and patterns in medicinal dataset. In the medical services industry, the information mining Procedures is principally utilized for grouping and anticipating the difficulties from medicinal datasets.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Heart disease prediction system

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NOVEL AND TIME EFFICIENT INDEX AT SEARCH NEAR-OPTIMAL QUERY RESULTS WITH BETTER EFFICIENCY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES070

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES070

  Register Paper ID - 180578

  Title: NOVEL AND TIME EFFICIENT INDEX AT SEARCH NEAR-OPTIMAL QUERY RESULTS WITH BETTER EFFICIENCY

  Author Name(s): A. Rajya Lakshmi

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 424-427

 Year: December - 2017

 Downloads: 2698

 Abstract

An increasing number of uses need the productive execution of nearest neighbor (NN) queries thankful by the properties of the spatial objects. Because of the significance of key-word hunt, mainly at the Internet, a widespread lot of these applications permit the purchaser to give a rundown of key phrases that the spatial objects (from this time forward alluded to simply as items) must include, in their portrayal or other pleasant. We targeted on multi-dimensional dataset in which each information factor has set of key phrases in function space allows for the development of latest gear to question and explore these multidimensional dataset. Here we observe nearest key-word set Queries on textual content rich multidimensional dataset. We recommend a brand new approach known as ProMiSH (Projection and Multi scale Hashing) that uses random projection and hash-primarily based index shape. Our experimental result shows that ProMiSH has Speedup over nation-of-art-tree-primarily based techniques


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

multi-dimensional dataset, ProMiSH

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: --

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES069

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES069

  Register Paper ID - 180577

  Title: --

  Author Name(s): Jayabharathi Gaddale

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 419-423

 Year: December - 2017

 Downloads: 2722

 Abstract

Nowadays the field of Big Data plays a vital role in various spheres. Big data is a term for massive data sets having a huge volume of data from different organizations, enterprises, and other businesses; healthcare data is continued data which has more varied and complex structure with the difficulties of data privacy, security, transformation, storing, analyzing, knowledge extraction, and visualization. In this paper our proposed work focuses on big data analytics to evaluate the quality of the research evidence on the smarter healthcare system using an augmented big data analytics with Outsmart-FGAC Cloud framework, which addresses the challenges with smart health care system and proves that how such information impacts the quality of attention on the smarter health care system.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Big Data Analytics, Smarter healthcare, Outsmart FGAC Cloud Framework, Cloud Computing

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A SECURE PUBLIC KEY BROADCAST ENCRYPTION (PKBE) FOR COOPERATIVE GROUPS IN MANET

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES068

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES068

  Register Paper ID - 180569

  Title: A SECURE PUBLIC KEY BROADCAST ENCRYPTION (PKBE) FOR COOPERATIVE GROUPS IN MANET

  Author Name(s): Krushima Soma

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 414-418

 Year: December - 2017

 Downloads: 2668

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Broadcast encryption; Group key agreement; Public key broadcast encryption (PKBE)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A GRID SYSTEM FOR NEVER ENDING LOCATION-BASED SERVICES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES067

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES067

  Register Paper ID - 180568

  Title: A GRID SYSTEM FOR NEVER ENDING LOCATION-BASED SERVICES

  Author Name(s): Shaik Shakeera, Shaik Asha

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 408-413

 Year: December - 2017

 Downloads: 2698

 Abstract

The major aim of Location Based Services (LSB) is based on the location, it is used to provide services like food ordering system, Google map and some kind of e-shopping websites are completely based on locations. Based on the user location LSB provide continuous report to the un trusted server to obtain the services which can avoid privacy risks.LBS have existing privacy-preserving techniques as requiring a fully-trusted third party, it offers limited privacy guarantees and incurring high communication overhead. In this paper, we propose a user-defined privacy grid system which is called as dynamic grid system (DGS). Privacy-preserving snapshot and continuous LBS have four effective requirements. . (1) A semi-trusted third party is responsible for matching operations correctly and it does not have any information about a user's location. (2) Secure snapshot and continuous location privacy is guaranteed to defined adversary models. (3) The communication cost for the user does not depend on the user's desired privacy level; it depends on the number of relevant points of interest in the domain of the user. (4) The system can be easily enlarged to support other spatial queries without changing the algorithms run by the semi-trusted third party and the database server. Experimental results show that the DGS is more efficient than the state-of-the-art privacy-preserving technique for continuous LBS.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Grid system, Location Based services (LBS), Location privacy, Dynamic Grid system

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A BIG IMAGE DATA DISTRIBUTED PROCESSING FRAME WORK IN STATIC AND DYNAMIC IMAGE CLOUD PROCESSING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTNCES066

  Your Paper Publication Details:

  Published Paper ID: - IJCRTNCES066

  Register Paper ID - 180567

  Title: A BIG IMAGE DATA DISTRIBUTED PROCESSING FRAME WORK IN STATIC AND DYNAMIC IMAGE CLOUD PROCESSING

  Author Name(s): Shaik Asha, Shaik Shakeera

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 1

 Pages: 402-407

 Year: December - 2017

 Downloads: 2795

 Abstract

In this paper suggesting a functional processing frame work nominated Image Cloud processing (ICP) to powerfully subsist with the data in Image processing field. The image processing algorithms to increase greater proficiency, it focuses on giving a general structure to the algorithms that can be executed in parallel to achieve the goal The ICP framework consist of two processing systems i.e.; Static ICP (SICP) and Dynamic ICP (DICP). SICP is handling the image information pre-stored in the distributed system; DICP is initiate for dynamic information. To Manage SICP, two new data representations named as P-Image and Big-Image are implemented to coordinate with Map Reduce to attain more optimized marshalling and higher coherence. DICP is enact into a parallel processing schedule working with the standard technique of the proper framework. Image Net dataset are used to authorize the capacity of ICP framework over the traditional state-of-the-art methods, both in time efficiency and quality of results.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Big data, Image processing, MapReduce, Distributed system, Cloud computing

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 13 | Issue 11 | Month- November 2025)

Call For Paper November 2025
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A digital object identifier by DOI.org How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer