Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 12 | Issue 12

Volume 12 | Issue 12 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: AUTOMATING FLOWER RECOGNITION: A CONVOLUTIONAL NEURAL NETWORK APPROACH

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02022

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02022

  Register Paper ID - 274201

  Title: AUTOMATING FLOWER RECOGNITION: A CONVOLUTIONAL NEURAL NETWORK APPROACH

  Author Name(s): Mugi Ganesh, Mr. G. Rajasekharam, Tata Narasimha Murthy

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 179-186

 Year: December 2024

 Downloads: 521

 Abstract

The goal of this paper is to identify flower varieties in conjunction with Kaggle Flowers dataset employing Convolutional Neural Networks (CNNs). The dataset contains images of five classes of flowers being, daisy, dandelion, rose, sunflower, and tulip. A classifier based on CNN was developed based on 4323 images and was able to attain a classification accuracy rate of 99.09%. The framework displays an efficient interface where users can upload images of flowers with hopes of obtaining an accurate classification. The model performance was improved by implementing data augmentation and multi-level design of CNN enabling the model to accommodate images variability. This application is useful in areas such as botany, gardening and retail sector because it helps people to use images in identifying and selecting their opportunities faster and more accurately. The project demonstrates the efficiency of CNN networks as applied in image classification and their future use into practice.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: COST-EFFECTIVE DROWSINESS DETECTION WITH ADAPTIVE VISUAL BEHAVIOR ANALYSIS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02021

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02021

  Register Paper ID - 274213

  Title: COST-EFFECTIVE DROWSINESS DETECTION WITH ADAPTIVE VISUAL BEHAVIOR ANALYSIS

  Author Name(s): Vanapalli Likhitha, Mr. Koppala K V P Sekhar, Dr. LekkalaChinnnari

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 172-178

 Year: December 2024

 Downloads: 475

 Abstract

Drowsy driving is one of the major causes of road accident and fatalities. This paper proposes a low-cost, a real-time, driver drowsiness detection system through webcam based behavioral analysis and technologically modified software. Facial features are defined to evaluate anthropometric measures such as eye aspect ratio (EAR) and Mouth Creating Ratio (MAR). Adaptive thresholding is used to identify prolonged eye closure or yawning where drowsiness is likely to set in. It deploys a learning of classification Support Vector Machines (SVM) that detects and recognizes images for later use offline achieving 95.58% sensitivity and 100% specificity. Such a system is non-obtrusive and cost effective thereby reducing the risk of drowsy driving. Future work should involve embedding into car systems and evaluation based on the actual driving experience.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

MAR, Drowsy, SVM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MACHINE LEARNING APPROACH TO IDENTIFYING AND COMBATING CHILD PREDATORS ON SOCIAL MEDIA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02020

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02020

  Register Paper ID - 274214

  Title: MACHINE LEARNING APPROACH TO IDENTIFYING AND COMBATING CHILD PREDATORS ON SOCIAL MEDIA

  Author Name(s): Gudivada Mahesh, Mrs. A. Naga Durga Bhavani, Dasari Karthik Raj

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 165-171

 Year: December 2024

 Downloads: 472

 Abstract

Children are increasingly becoming vulnerable to cyber harassment and predatory behavior on social media. Hence, this project aims to enhance the online safety of children by building a system which uses machine learning algorithms to detect and combat online harassment. The developed system integrates various supervised learning algorithms namely, support vector machine, random forest, naive bayes, k nearest neighbors and decision tree. Upon analyzing user content, the algorithm seeks possible abuse potential regarding posts and messages. Numerous harassing and non-harassing texts are included in the dataset which is used to create algorithms for prediction of such actions in real time. The system will first send alerts to a designated authority within the cyber cell every time, austere patterns are observed. This way, no time is wasted in the intervention. The system further enables providing a quicker and reasonable approach to tackle the issues that come up with young people by ensuring their safety as much as possible.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

K-Nearest Neighbors, SVM, Decision Tree

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HIGH-QUALITY IMAGE RECONSTRUCTION USING DEEP LEARNING TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02019

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02019

  Register Paper ID - 274197

  Title: HIGH-QUALITY IMAGE RECONSTRUCTION USING DEEP LEARNING TECHNIQUES

  Author Name(s): Ayti Shanmukha Sai Vamsi, Dr. T. Ravi Babu, Dr. Chukkala Visweswara Rao

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 158-164

 Year: December 2024

 Downloads: 476

 Abstract

The goal of this paper is to boost the resolution of images using Convolutional Neural Networks (CNN) along with the auto-encoder layers. This method trains the CNN model with pairs of low-resolution and high-resolution images so that it can learn to improve the pixel values of low-quality images. The pixel values of low-intensity pixels are replaced with high-intensity pixels and a high-resolution image is generated. The intention of the system is to provide effective enhanced images that can be used in a variety of fields including medicine, satellite, and surveillance images. We propose our own dataset and code to emphasize the focus on the novelty while ensuring the efficacy. Having conducted a number of tests, the project brings forth enhancement in the quality of the reconstructed image which depicts the superiority of auto-encoders and CNNs as promising tools for further developments in super-resolution imaging technology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, Auto-encoder

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AUTOMATED FORENSIC ANALYSIS OF SCANNED IMAGES VIA ELA AND CNNS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02018

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02018

  Register Paper ID - 274199

  Title: AUTOMATED FORENSIC ANALYSIS OF SCANNED IMAGES VIA ELA AND CNNS

  Author Name(s): Boddeti Nagendra Kumar, Mr. N Mahendra, Maradana Siva

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 151-157

 Year: December 2024

 Downloads: 441

 Abstract

The focus of this work relates to the identification and tampering detection of forensic scanners through deep neural production techniques. Tools built on convolution neural networks (CNNs) and the CASIA dataset are employed to determine which type of scanner was used to create an image and locate portions that were edited. Among others, processes involve transforming the photographs into error level analysis (ELA) images in order to accentuate the inconsistencies and training a CNN in a procedure where the CNN architecture is optimized. The system achieves promising levels of performance and is thus appropriate for distinguishing between images that are or are not altered. As demonstrated by the series of experiments, the model was able to withstand different circumstances and enabled accuracy of over 82% during validation. This work has a considerable contribution to automated media forensics since it solves the problem of scanner identification and digital manipulation detection in an effective and scalable manner.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, ELA, SCANNER

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EFFICIENT ACTIVITY RECOGNITION: A HYBRID CNN-GRU-BIDIRECTIONAL APPROACH

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02017

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02017

  Register Paper ID - 274200

  Title: EFFICIENT ACTIVITY RECOGNITION: A HYBRID CNN-GRU-BIDIRECTIONAL APPROACH

  Author Name(s): Ganteda Roop Kumar, Mrs. P. Sailaja, Dr Surya Narayana Gorle

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 143-150

 Year: December 2024

 Downloads: 423

 Abstract

This paper presents the design of a multiscale convolutional neural network (MCNN) for the task of human behavior recognition, with the aim of increasing accuracy and reducing complexity of the model. Previous models such as CNN2D and LSTM time series modeling relied on a mean global average but neglected other spatial and depth features resulting in inaccuracies. The MCNN model is based on the concept of space-time interaction and depth-separable convolution modules inserted into a CNN3D model in which both the spatial and temporal information are enhanced. The system was trained and evaluated on the UCI HAR dataset which has six activity labels that were recorded using smartphone's sensors. The evaluation showed that the new model offered a 94% accuracy rate while improving learning complexity. An extended hybrid model comprising of a combination of convolutional neural networks, Gated recurrent units, and bidirectional algorithms produced an accuracy of 96% while using less parameters thus showing tremendous effectiveness and capability for real world tasks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

MCNN, GRU,CNN2D

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SECURING DATA COMMUNICATION THROUGH HEBBIAN RULE NEURAL NETWORK ALGORITHMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02016

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02016

  Register Paper ID - 274202

  Title: SECURING DATA COMMUNICATION THROUGH HEBBIAN RULE NEURAL NETWORK ALGORITHMS

  Author Name(s): Pedapati Sai, Mr. N Mahendra, Dr. Bommana Indu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 136-142

 Year: December 2024

 Downloads: 461

 Abstract

Protection of data in digital communication is important to avoid any tampering especially for information of sensitive nature like financial or personal details. The branch of mathematics known as cryptography is concerned with the processes of encryption and decryption which allows secure communication across open and untrustworthy channels. In this project, auto-associative neural networks based on Hebb's rule are proposed to advance cryptographic processes. The system issues keys for encryption, teaches neural networks to encode-decode data streams, and measures the effectiveness of the system in terms of accuracy and time factors. To prevent data from the growing range of threats, the frameworks formulates protection with neural network flexibility. The system also provides the user with a graphical display so that recording and playback is performed automatically. Such method indicates the prospect of use of neural networks for the improvement of ordinary codes and ciphers, and focuses a number of challenges emerging from the contemporary information security.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cryptography, encryption, decryption

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EVALUATING MACHINE LEARNING TECHNIQUES FOR BANKNOTE AUTHENTICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02015

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02015

  Register Paper ID - 274203

  Title: EVALUATING MACHINE LEARNING TECHNIQUES FOR BANKNOTE AUTHENTICATION

  Author Name(s): Puti Deepthi, Dr. A. Arjuna Rao, Jallu Latha

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 127-135

 Year: December 2024

 Downloads: 430

 Abstract

All traditional economic control has been nullified due to the existence of counterfeit currency, everywhere across the globe. Counterfeit detection using Decision Tree, Random Forest, SVM, Naives Bayes, and other approaches have been used by researchers in the recent past to test fake banknotes. A survey of UCI repository showed that some features were missing and a certain amount of data was pre-processed before model training. A number of splits in the training and testing samples were created and the algorithms were assessed and trained on parameters such as accuracy, precision, recall and F1 score. The outcomes have shown the strength of specific models such as Random Forest that almost achieved satisfactory classification accuracy and can be used in real-life applications within banking kiosks and ATMs. The research further highlights with facts, the need for automated systems which can curb financial fraud and the methodologies required to put in place an effective counterfeit detection machine learning system.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTING AND MITIGATING MALICIOUS ATTACKS IN FACIAL AUTHENTICATION SYSTEMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02014

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02014

  Register Paper ID - 274204

  Title: DETECTING AND MITIGATING MALICIOUS ATTACKS IN FACIAL AUTHENTICATION SYSTEMS

  Author Name(s): Therikoti Madhavi, Dr. S. Sridhar, Dr. Chukkala Visweswara Rao

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 116-126

 Year: December 2024

 Downloads: 400

 Abstract

Security concerns have arisen in today's society as a result of using facial recognition systems that use deep learning model due to some feature being artificially manipulated. This paper revisits the question of how image manipulation in the form of social media filters for a facial feature or a facial expression impacts the recognition performance of models such as ResNet, MobileNet and InceptionV3. It was found that the recognition accuracy drops from 75% on unaltered images to 50% on altered images, thereby validating the observed weakness across the three architectures. Furthermore, a more advanced version VGG16 demonstrated to be more effective with 85% accuracy on altered images. This paper investigated these problems and proposed GRADCAM for heatmap analysis demonstrating why certain images with known resistive properties cannot be used to repulse such attacks, while also discussing possible countermeasures for protecting biometric systems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

VGG16, MobileNet, biometric

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: LBP AND CNN FUSION FOR ROBUST FAKE IMAGE DETECTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02013

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02013

  Register Paper ID - 274205

  Title: LBP AND CNN FUSION FOR ROBUST FAKE IMAGE DETECTION

  Author Name(s): Gandreti Krishnaveni, Mr. N Mahendra, Pinninti Suresh Babu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 110-115

 Year: December 2024

 Downloads: 421

 Abstract

Biomedical imaging forgeries pose a challenge to social networks and forensics. It is becoming harder to tell these images apart from the real ones. This project employs a set of machine learning approaches, that CNN uses to solve the problem. A network called LBPNET is built with local binary patterns (LBP) for texture feature extraction. The parameters extracted through the LBP are used to train the CNN which learns the difference between real and fake face images. Advanced image preprocessing and training are integrated into the model in order to ensure high performance in a situation whereby real-time decision making has to occur. This work averts the threat that image forgeries bring to different sectors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, LBP, images

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A HYBRID APPROACH TO REAL-TIME FATIGUE MONITORING IN DRIVERS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02012

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02012

  Register Paper ID - 274206

  Title: A HYBRID APPROACH TO REAL-TIME FATIGUE MONITORING IN DRIVERS

  Author Name(s): Sampadarao Nirosha, Dr. S. Sridhar, Maradana Siva

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 97-109

 Year: December 2024

 Downloads: 266

 Abstract

Driven by exhaustion is one of the leading causes of road accidents across the world which result in many reported deaths each year. This project attempts to mitigate the challenge using machine learning and deep learning techniques for easier and precise detection of fatigue. EEG signals and video images from the DROZY dataset are utilized to train ML and DL models, respectively. SVM, Random Forest, and KNN are some of the machine learning algorithms utilized for the analysis of EEG signals while the images are analyzed through CNN, ConvLSTM, and also a multi-model approach CNN+ConvLSTM. Further accuracy is enhanced by employing ensemble techniques such as Bagging Classifier. PV and PCA methods were applied to obtain superior model performance resulting in all 100% accuracy for all CNN-based approaches. Thus, this system provides strong approaches toward supporting real time driver fatigue assessment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ConvLSTM, EEG, KNN

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PREDICTIVE DRUG RECOMMENDATION BASED ON PATIENT REVIEWS AND DISEASE INPUTS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02011

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02011

  Register Paper ID - 274207

  Title: PREDICTIVE DRUG RECOMMENDATION BASED ON PATIENT REVIEWS AND DISEASE INPUTS

  Author Name(s): Routhu Yeswanth Kumar, Mr. Ch. Kodandaramu, Seera Sitalakshmi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 88-96

 Year: December 2024

 Downloads: 264

 Abstract

The emergence of exotic diseases points out a pressing void for swift medical aid. In this project, the authors focus on the recommendation of drugs utilizing a combination of patient reviews, disease description and machine learning aided sentiment analysis. The methodology incorporates TF-IDF, Bag of Words, and Word2Vec for feature extraction along with Logistic Regression and Multilayer Perceptron (MLP) as algorithms. For training and testing of the models the authors utilized the DRUGREVIEW dataset publicly available in UCI, reviews and drugs with ratings are used to anticipate drug outcomes. It was determined that for predicting drug outcomes MLP shows greater efficiency than the rest, hence it was chosen as the core algorithm in the developed system. Additionally doctors' prescribed medications are supplemented with suggested sentiments so that the chances of self medicine withdrawal are decreased and patients make better choices with regard to the medications.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

MLP, TF-IDF, Logistic Regression

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EVALUATING MACHINE LEARNING MODELS FOR ACCURATE CARDIOVASCULAR PREDICTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02010

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02010

  Register Paper ID - 274208

  Title: EVALUATING MACHINE LEARNING MODELS FOR ACCURATE CARDIOVASCULAR PREDICTION

  Author Name(s): Pydi Lahari, Dr. B. Sreenivasa Rao, Kamath G B S Ramya

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 77-87

 Year: December 2024

 Downloads: 262

 Abstract

Diagnosing heart disease is a medical problem that is both critical and has a time factor which has to be taken into consideration in order to be treated. This project looks into the performance analysis of four machine learning models which are SVM, KNN, Logistic Regression and XGBoost, with and without parameter tuning via GridSearchCV. The analysis set up is based on Hungarians Cleveland data set which has attributes for predicting whether the patient is likely to have heart problems. XGBoost computes higher accuracy among the algorithms but had prolonged computation time. The study therefore extends with Random Forest in that regard which parallels the accuracy of XGboost but decreased computation time. This project underlines the importance of parameter tuning in the improvement of model performance and identifies Random Forest as a low cost method which will result in faster and more accurate predictions for heart diseases.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

XGBoost, KNN, SVM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: OPTIMIZED CYBERSECURITY SOLUTIONS: A MULTI-ALGORITHM RANSOMWARE DETECTION FRAMEWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02009

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02009

  Register Paper ID - 274209

  Title: OPTIMIZED CYBERSECURITY SOLUTIONS: A MULTI-ALGORITHM RANSOMWARE DETECTION FRAMEWORK

  Author Name(s): Tripurapu Bhavya, Dr. T. Ravi Babu, Ravi Nava Ratna

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 66-76

 Year: December 2024

 Downloads: 239

 Abstract

This paper describes a professional system designed to detect cases of ransomware assaults based on data related to processor usage and disk usage. System processes and the activities dealing with files are some of the classical methods used, but at times power effectiveness is compromised and the methods are not very reliable. In order to compensate for these, VMware environment is used in this work in order to obtain HPC as well as I/O events without degrading performance. The machine learning algorithms that were employed in the evaluation of the model included SVM, Random Forest, and XGBoost, where Random Forest and XGBoost achieved 98% accuracy. In addition, other DNN and LSTM deep learning models were applied, and an extension with CNN2D was reported with most accuracy of 98.83%. This self-learning system of detection has changed the way ransomware detection is done without compromising the performance of the system in a big way and is an effective means of dealing with cyber threats.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN2D, DNN, LSTM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MULTI-MODAL PREDICTION OF LIVER DISEASE: INTEGRATING GENE EXPRESSION AND ULTRASOUND IMAGING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02008

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02008

  Register Paper ID - 274212

  Title: MULTI-MODAL PREDICTION OF LIVER DISEASE: INTEGRATING GENE EXPRESSION AND ULTRASOUND IMAGING

  Author Name(s): Nikkala Vasanthi, Dr. A. Arjuna Rao, Katuri Swamy

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 59-65

 Year: December 2024

 Downloads: 259

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPARATIVE ANALYSIS OF ALGORITHMS AND HYBRID APPROACHES: CREDIT CARD FRAUD DETECTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02007

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02007

  Register Paper ID - 274215

  Title: A COMPARATIVE ANALYSIS OF ALGORITHMS AND HYBRID APPROACHES: CREDIT CARD FRAUD DETECTION

  Author Name(s): Tippabhotla Sowmya Sri, Mr. B. Mahendra Roy, Sattaru Suresh Babu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 49-58

 Year: December 2024

 Downloads: 277

 Abstract

Today almost every person uses a credit card, but fraudulent activities are a great concern to both the customers and the financial institutions. This project compares the performance of several machine learning algorithms such as Decision Tree, KNN, Logistic Regression, SVM, Random Forest, and also XGBOOST, as well as a combined approach, which introduces the use of deep learning CNN. The main issue tackled is the problem on dataset which is fairly skewed, and hence, the normal transactions are a majority, while the fraudulent transactions are few. PCA for feature selection and SMOTE for data balancing techniques are applied for this purpose. A combination of the two, wherein CNN is combined with Decision Tree, increases all detection accuracy to 100%. This project offers valuable contributions as it highlights sample solutions to the problem of credit card fraud by using the Canadian Credit Card Dataset in a fast and accurate way.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, XGBOOST, SVM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PRECISION FARMING THROUGH INTELLIGENT CROP AND FERTILIZER PREDICTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02006

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02006

  Register Paper ID - 274216

  Title: PRECISION FARMING THROUGH INTELLIGENT CROP AND FERTILIZER PREDICTION

  Author Name(s): Sirugudu Rajasekhar, Dr. P. Sujatha, Seera Sitalakshmi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 42-48

 Year: December 2024

 Downloads: 241

 Abstract

The accurate prediction of crop is crucial for effective agricultural planning and resource mobilization. This project constructs and enhances the system of predicting crop yield harnessing the features of the agriculture environment. The important environmental features to be focused on includes among other soil type, rainfall and temperature by implementing various feature selection methods including BORUTA and Recursive Feature Elimination (RFE). These features are fed to the ensemble of machine learning algorithms such as Random Forest, SVM and KNN to improve the prediction accuracy. The system also provides fertilizer application and yield prediction. Testing in databases yields promising results in the improvement of precision and decision making. The proposed model proves to be reliable and cost efficient and assists farmers with actionable information to enhance crop productivity and sustainable farming techniques.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BORUTA, SVM, KNN

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ADVANCED EVENT-BASED CYBER THREAT DETECTION WITH CNN AND LSTM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02005

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02005

  Register Paper ID - 274217

  Title: ADVANCED EVENT-BASED CYBER THREAT DETECTION WITH CNN AND LSTM

  Author Name(s): Devarakonda Ramavamsi, Mrs. K Baby Kumari, Panigrahi Asish Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 35-41

 Year: December 2024

 Downloads: 266

 Abstract

In this work, we propose an ANN-based AI cyber security framework for detecting cyber attacks. By converting security incidents into single entities, the architecture takes advantage of advanced learning models including CNN and LSTM to improve the detection rate of the system. The AI-SIEM system decreases the occurrence of false alarms, thus enabling more efficient and faster response to changing cyber attacks. Experiments carried out on benchmark datasets, such as NSLKDD, CISIDS2017, results high values when compared to other machine learning techniques like SVM, k-NN and Decision Trees. The technique in question has been designed with an emphasis on practical scenarios, where issues such as data annotation and overfitting are expected. The results confirm that the elaborated framework is competent enough for intrusion detection, working with large volumes of information and responding to a changing threat landscape, thus providing strong defense in various spheres of cybersecurity.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

LSTM, k-NN, SVM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PREDICTING DISEASES THROUGH FACIAL FEATURES USING VGG16 AND LSTM MODELS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02004

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02004

  Register Paper ID - 274218

  Title: PREDICTING DISEASES THROUGH FACIAL FEATURES USING VGG16 AND LSTM MODELS

  Author Name(s): Robbi Krishna Ramana, Mr. L. Jeevan, Gedela Dhillesu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 26-34

 Year: December 2024

 Downloads: 249

 Abstract

This project applies deep transfer learning to understand facial features and ascertain certain diseases including beta-thalassemia, hyperthyroidism, Down syndrome and leprosy. System incorporates VGG16, ALEXNET and Kernel SVM as advanced models and the Disease Specific Face dataset for training and testing performance evaluations. DLIB along with GABOR is used for the preprocessing to extract features and for facial alignment respectively. Of all the models, VGG16 and LSTM had performed best with accuracy of about 99%. The system also uses other performance metrics including accuracy, precision, recall and F-score to confirm the importance of working systems within the provided scope. It can be concluded based on the results of the project that the combination of transfer learning and feature extraction improves the medical diagnosis process and provides an effective overall scheme of facial recognition-based disease detection system.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DLIB, GABOR, VGG16

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NLP-BASED HAZARD IDENTIFICATION IN CONSTRUCTION REPORTS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAS02003

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAS02003

  Register Paper ID - 274219

  Title: NLP-BASED HAZARD IDENTIFICATION IN CONSTRUCTION REPORTS

  Author Name(s): Jarajapu Appalaraju, Mr. B. Mahendra Roy, Dr. Burada Venkata Rao

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 12

 Pages: 18-25

 Year: December 2024

 Downloads: 253

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 14 | Issue 1 | Month- January 2026)

Call For Paper January 2026
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A digital object identifier by DOI.org How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer