Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 6 | Issue 2

Volume 6 | Issue 2 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: MOBILE AD HOC NETWORKING FOR PERVASIVE COMPUTING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS077

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS077

  Register Paper ID - 188775

  Title: MOBILE AD HOC NETWORKING FOR PERVASIVE COMPUTING

  Author Name(s): Sangeeta Mishra

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 519-527

 Year: APRIL 2018

 Downloads: 1289

 Abstract

ABSTRACT: In the current scenario where we are using 3G and 4G technologies for communication purposes the Mobile Ad Hoc Networks (MANETs) are generating a lot of interests. The next generation of mobile communications will include both prominent infrastructure wireless networks (3G, 4G) and novel mobile ad hoc networks. It is a collection of portable wireless nodes that can dynamically form a network to exchange information without using any pre-existing fixed network infrastructure. This allows portable mobile devices to establish a communication path without having any central infrastructure. Since there is no centralized infrastructure in the MANET and the mobile devices are moving randomly, they may give rise to various kinds of problems, such as energy efficient and multicast congestion control. This paper describes the primary problems of ad hoc networking by giving its related research background. Some of the technical challenges it poses are also presented, based on which the paper points out some of the key research issues for ad hoc networking technology that are expected to promote the development and accelerate the commercial applications of the MANET technology. Special attention is paid on network layer routing strategy and key research issues include new X-cast routing algorithms, security & reliability schemes, QoS model, and mechanisms for interworking with outside IP networks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

KEYWORDS: Mobile Communications, Wireless Networks, QoS, Ad-hoc Networking, Pervasive Computing, Routing Algorithm, Multicast, Unicast, congestion

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ONLINE ANTI-OPINION SPAM: SPOTTING FAKE REVIEWS FROM THE REVIEW SEQUENCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS076

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS076

  Register Paper ID - 188774

  Title: ONLINE ANTI-OPINION SPAM: SPOTTING FAKE REVIEWS FROM THE REVIEW SEQUENCE

  Author Name(s): Pankaj Chaudhary, Rajat Shahni

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 515-518

 Year: APRIL 2018

 Downloads: 1311

 Abstract

Abstract-Detecting review spam is important for current e-commerce applications. However, the posted order of review has been neglected by the former work. In this paper, we explore the issue on fake review detection in review sequence, which is crucial for implementing online anti-opinion spam. We analyze the characteristics of fake reviews firstly. Based on review contents and reviewer behaviours, six time sensitive features are proposed to highlight the fake reviews. And then, we devise supervised solutions and a threshold-based solution to spot the fake reviews as early as possible. The experimental results show that our methods can identify the fake reviews orderly with high precision and recall


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Spotting Fake Reviews

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW ON POWER QUALITY MITIGATION TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS075

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS075

  Register Paper ID - 188772

  Title: REVIEW ON POWER QUALITY MITIGATION TECHNIQUES

  Author Name(s): Ritu, Sweeti Saini, Saurabh, Sunil Singh

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 508-514

 Year: APRIL 2018

 Downloads: 1263

 Abstract

Abstract: Besides quantity, the quality of power is also equally important. Poor power quality decreases the efficiency and misoperation of electrical and electronic devices, this may result interrupted electrical power supply. Due to recent development of electronics and computer based automated and smart devices in every field e.g. medical, bank, industry, quality of power becomes more and more important as these devices require best power quality. Power quality mitigation becomes very important as we cannot avoid the nonlinear loadings and many more issues which is responsible for poor power quality. In this paper various power quality mitigation techniques are discussed such as Distribution Static Synchronous Compensator (DSTATCOM), Static VAR Compensator (SVC), Dynamic Voltage Restorer (DVR) and Unified Power Quality Compensator (UPQC) for the improvement of power quality in manufacturing industries. Recent developments in mitigation techniques are also discussed. Different techniques are explained in chronological order. Impacts of different techniques for different disturbances are also mentioned


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Index Terms: Dynamic Voltage Restorer (DVR), Unified Power Quality Conditioner (UPQC), Distribution Static Compensator (DSTATCOM), Transient Voltage Surge Suppressors (TVSS), Voltage Regulators, Uninterruptible Power Supply (UPS) Solid State Breaker, Static Current Limiter

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CLOUD COMPUTING APPLICATIONS IN MULTITENANCY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS074

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS074

  Register Paper ID - 188770

  Title: CLOUD COMPUTING APPLICATIONS IN MULTITENANCY

  Author Name(s): Sukhwinder Kaur

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 504-507

 Year: APRIL 2018

 Downloads: 1289

 Abstract

Abstract: Cloud computing has enabled businesses to infinitely scale services based on demand while reducing the total cost of ownership. It provides a multitenant feature that enables an IT asset to host multiple tenants, improving its utilization rate. The feature provides economic benefits to both users and service providers since it reduces the management cost and thus lowers the subscription price. Security concerns are mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing and its associated risks where confidentiality and/or integrity could be violated. As a result, security concerns may harness the advancement of Cloud Computing in the market. So, in order to propose effective security solutions and strategies a good knowledge of the current Cloud implementations and practices, especially the public Clouds, must be understood by professionals. To cope with that, this paper introduces techniques, with which it identifies technical issues on enabling multitenancy


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANALYSIS OF IMAGE RETRIEVAL BASED ON COALESCENE OF HISTOGRAMS FROM TEXTURE FEATURE AND SHAPE FEATURE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS073

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS073

  Register Paper ID - 188769

  Title: ANALYSIS OF IMAGE RETRIEVAL BASED ON COALESCENE OF HISTOGRAMS FROM TEXTURE FEATURE AND SHAPE FEATURE

  Author Name(s): Pravendra Singh, Wajahat Gh Mohd

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 493-503

 Year: APRIL 2018

 Downloads: 1293

 Abstract

Abstract : In this paper, color histograms, texture using wavelet transform and shape feature using thresholding is used to retrieve images from the database .The database includes 500 images of five different categories. Moreover success of this content based image retrieval depends on the method used to create feature vector and relativity measure, the accuracy of wavelet transform engaged. Retrieving images can be increases the accuracy of the system based on color, feature and shape relativity. For relativity measure between the database images and query image Mahalanobis, Minkowiski, Chebyshev, Cosine Relativity, Spearman correlation are used ,at the end aggregation of mean and relative deviation is done and aggregation is then arranged in increasing order i.e. minimum to maximum. This Arranging order shows images having minimum values are more accurate retrieved image. The Proposed system can better the retrieval accuracy that has been shown by the experimental results. The system is tested on 500 images of five different categories downloaded from the internet.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Index Terms - Histograms, Support Vector Machine; Mahalanobis, Minkowiski, Chebyshev, Cosine Relativity, Spearman correlation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A STUDY OF WIRELESS NETWORK: 6G TECHNOLOGY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS072

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS072

  Register Paper ID - 188768

  Title: A STUDY OF WIRELESS NETWORK: 6G TECHNOLOGY

  Author Name(s): Ashish Kr. Gupta, Madan Pal Singh

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 489-492

 Year: APRIL 2018

 Downloads: 1370

 Abstract

Abstract: Wireless communications is the transferring of information between two or more points which are not physically connected. Wireless mobile communication is being used from many years, but day by day Need of facilities on mobile is increasing, so time to time next integrated Versions of network is introduced. Distances can be short, which is used for television remote control and even far distance which is used for deep-space radio communications. Latest version is 5G, but only some countries are using 5G wireless network. 5G network is strong and very fast wireless communication network, it is and it will fulfill most of the requirement of users. But it is not end of the desires, the paper deals with the evolutions of technologies and its advantages and meet desires of user next generation of mobile network also introduced 6G. This paper is about introduction and advancement of 6G & 7G for future.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords: 1G, 2G, 3G, 4G, 5G, 6G, Handover, TDMA, CDMA, GSM, smart antenna

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANALYSIS AND PERFORMANCE EVALUATIONOF HIGH SPEED NETWORK WITH DISCRETIONARY PRIORITY JUMPS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS071

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS071

  Register Paper ID - 188767

  Title: ANALYSIS AND PERFORMANCE EVALUATIONOF HIGH SPEED NETWORK WITH DISCRETIONARY PRIORITY JUMPS

  Author Name(s): Sanjay Sharma, Dr Anil K Kapil

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 479-488

 Year: APRIL 2018

 Downloads: 1273

 Abstract

ABSTRACT In the present study the main emphasis is on performance measures of computer network giving prime importance to average packet delay and packet loss occurring in delivering a packet from source to destination in high speed traffic, the prominent factors in data communication. The study focuses on developing models employing queuing theory as a tool for the integrated digital networks, which are used to integrate multiple input channels (like voice, data, images, video etc.) into single transmission line and make the Network as high- speed data network. The queuing theory is applied as a primary tool for analyzing the network delay. The use of queuing models for delay analysis provides a basis for adequate delay approximations, as well as valuable qualitative results worthwhile insights for the performance evaluation of high speed data networks


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords : ATM, BISDN, Queuing Model, Cell Loss Ratio, Weighted Fair Queuing.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DATA MINING: A WORTH FOR CUSTOMER RELATIONSHIP MANAGEMENT MS.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS070

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS070

  Register Paper ID - 188766

  Title: DATA MINING: A WORTH FOR CUSTOMER RELATIONSHIP MANAGEMENT MS.

  Author Name(s): Ms. Mandeep Kaur, Dr. Ranjeet Verma

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 473-478

 Year: APRIL 2018

 Downloads: 1255

 Abstract

ABSTRACT: Data mining has gained popularity in various CRM applications in recent years and classification model is an important data mining technique useful in the field. The model is used to predict the behaviour of customers to enhance the decision-making processes for retaining valued customers. This paper presents the frameworks of data mining in relations with the customer relationship management, the computer-assisted application process of digging through and analyzing enormous sets of data that have either been compiled by the computer or have been inputted into the computer gain attentions of the industrial houses. In data mining, the computer will analyze the data and extract the meaning from it. It will also look for hidden patterns within the data and try to predict future behavior. In this paper we will be discussing the relationship of data mining and CRM and Data mining framework and CRM and how it reveals benefit for better CRM practices


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords: Data Mining, Model, Customer Relationship Management

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DATA HIDING IN ENCRYPTED IMAGES USING BLOCK SMOOTHNESS & SCAN TECHNIQUE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS069

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS069

  Register Paper ID - 188765

  Title: DATA HIDING IN ENCRYPTED IMAGES USING BLOCK SMOOTHNESS & SCAN TECHNIQUE

  Author Name(s): Kamal Kishor Joshi, Santosh Kumar Mishra, Asheesh Kumar, Vinod Nirala, Vaibhav Bansal

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 467-472

 Year: APRIL 2018

 Downloads: 1260

 Abstract

Abstract: Reversible information covering up is a strategy that is utilized to shroud information inside a picture. The information is covered up such that the correct or unique information isn't obvious. The concealed information can be recovered as and when required. There are a few strategies that are utilized as a part of reversible information concealing methods like Watermarking, Lossless inserting and encryption. In the information covering up in encoded pictures we implanted the information in the scrambled picture and afterward after we utilize a few calculations for instance Randomized XOR system, Flipping bit procedure, Bit length exhausting strategy, Modified SCAN calculation. By utilizing every one of these systems we accomplish the lossless picture and the first information. We likewise utilize the pixel rearranging strategy for enhancing the security of our information and we utilize the idea of piece smoothness for enhancing the entropy of the picture or we can state the irregularity of the picture. So we can state that we accomplish the reversible information


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Index Terms -Flipping bit technique, Bit length expanding technique, SCAN algorithm, Stenography, Cryptography, Watermarking

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PERFORMANCE ANALYSIS OF SEVERAL CLUSTERING TECHNIQUES USED FOR ENORMOUS DATASETS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS068

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS068

  Register Paper ID - 188764

  Title: PERFORMANCE ANALYSIS OF SEVERAL CLUSTERING TECHNIQUES USED FOR ENORMOUS DATASETS

  Author Name(s): Mr.Abhijit kumar

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 463-466

 Year: APRIL 2018

 Downloads: 1269

 Abstract

Abstract: Data Mining is the process of extracting hidden knowledge, valuable trends and pattern from enormous databases which is used in organization for decision- making determination. There are numerous data mining techniques like clustering, prediction, outlier analysis, classification and association rule mining. Clustering shows a significant role in data mining process. This paper emphasis about clustering approaches. There are various applications where clustering approaches is used. Clustering is the method of assigning data sets into different groups so that data sets in same group having similar behaviour as compared to data sets in other groups. This paper deliberates about various clustering approaches. It also describes about various pros and cons of these approaches. This paper also emphases on comparative analysis of various clustering approaches.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords: Clustering, Density based Methods (DBM), Data Mining (DM), Grid Based Methods (GBM), Partition Methods (PM), Hierarchical Methods (HM),

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STUDY ON USE OF STEEL FIBER AS REINFORCEMENT MATERIAL WITH CONCRETE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS067

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS067

  Register Paper ID - 188763

  Title: STUDY ON USE OF STEEL FIBER AS REINFORCEMENT MATERIAL WITH CONCRETE

  Author Name(s): Atul Uniyal, Navneet Singh Rawat

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 455-462

 Year: APRIL 2018

 Downloads: 1293

 Abstract

ABSTRACT Fiber Reinforced Concrete can be defined as a composite material consisting of mixtures of cement, mortar or concrete and discontinuous, discrete, uniformly dispersed suitable fibers. . It contains short discrete fibers that are uniformly distributed and randomly oriented. In order to achieve the desired goal, different dosages of steel fiber (0.5%, 1%, 1.5% & 2%) in the concrete grade of M-40.According to the results of experimental study, it is concluded that with the addition of steel fibers, The concrete mix M2, M3 M4 and M-5 shows percentage increment in compressive strength by 4.86%, 9.34%, 11.64% and 18.76% at 7 days of curing period with respect to concrete mix M1. The compressive strength by CTM (destructive testing technique) is found to increase with increase in percentage of steel fibers in the conventional concrete. The concrete mix M2, M3 M4 and M-5 showed increment in compressive strength by 4.54%, 7.32%, 9.08% and 11.72% at 28 day of curing period with respect to concrete mix M1. Tensile strength of cylinder specimen is maximum at 2% of steel fibers which having strength of 3.18 and 4.69 Mpa after 14 and 28 days respectively. Percentage increase for 2% steel fiber of 14 and 28 days is 25.19% and 18.43% respectively.Maximum flexural strength after 28 days is 10.43 MPa. Percentage increase for 2% of steel fiber is 13.36% as comparison to M-1 mix so it can be analyse that this variation of steel fiber is good for flexural strength of concrete. This experimental study shows that the steel fibers improve the properties of the conventional concrete and it enhances the tensile strength of concrete. 1. INTRODUCTION


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Steel Fibre CTM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CLONE ATTACK IN WIRELESS SENSOR NETWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS066

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS066

  Register Paper ID - 188762

  Title: CLONE ATTACK IN WIRELESS SENSOR NETWORK

  Author Name(s): Mr.Wajahat Gh Mohd, Ms Sakshi Gautam, Mr. Mohammad Anis

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 450-454

 Year: APRIL 2018

 Downloads: 1266

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Index Terms - Index Terms: - clone attack, RED, witness distribution, oblivious, performance, WSN

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ADAPTIVE CLUSTERING IN WIRELESS SENSOR NETWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS065

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS065

  Register Paper ID - 188760

  Title: ADAPTIVE CLUSTERING IN WIRELESS SENSOR NETWORK

  Author Name(s): Ms Sakshi Gautam, Mr Wajahat Gh Mohd, Mr Pravendra Singh

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 444-449

 Year: APRIL 2018

 Downloads: 1307

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Index Terms - Wireless Sensor Network, Residual Energy, Clustering & Neighbour Weight

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMAGE RETRIEVAL BASED ON UNIFICATION OF HISTOGRAMS WITH TEXTURE FEATURE AND SHAPE FEATURE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS064

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS064

  Register Paper ID - 188759

  Title: IMAGE RETRIEVAL BASED ON UNIFICATION OF HISTOGRAMS WITH TEXTURE FEATURE AND SHAPE FEATURE

  Author Name(s): Pradeep Kumar Kaushik, Santosh Kumar Mishra

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 434-443

 Year: APRIL 2018

 Downloads: 1354

 Abstract

Abstract : In this paper, color histograms, texture using wavelet transform and shape feature using thresholding is used to retrieve images from the database .The database includes 500 images of five different categories. Moreover success of this content based image retrieval depends on the method used to create feature vector and relativity measure, the accuracy of wavelet transform engaged. Retrieving images can be increases the accuracy of the system based on color, feature and shape relativity. For relativity measure between the database images and query image Mahalanobis, Minkowiski, Chebyshev, Cosine Relativity, Spearman correlation are used ,at the end aggregation of mean and relative deviation is done and aggregation is then arranged in increasing order i.e. minimum to maximum. This Arranging order shows images having minimum values are more accurate retrieved image. The Proposed system can better the retrieval accuracy that has been shown by the experimental results. The system is tested on 500 images of five different categories downloaded from the internet


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Index Terms - Histograms, Support Vector Machine; Mahalanobis, Minkowiski, Chebyshev, Cosine Relativity, Spearman correlation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: OBJECT TRACKING BASED ON JOINT COLOR TEXTURE HISTOGRAM USING LOCAL BINARY PATTERN (LSB) TECHNIQUE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS063

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS063

  Register Paper ID - 188758

  Title: OBJECT TRACKING BASED ON JOINT COLOR TEXTURE HISTOGRAM USING LOCAL BINARY PATTERN (LSB) TECHNIQUE

  Author Name(s): Santosh Kumar Mishra, Asheesh Kumar

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 428-433

 Year: APRIL 2018

 Downloads: 1349

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Index Terms: Computer Vision, MS Tracker, Local Binary Pattern (LBP), Object Tracking, Histogram, Intensity, Edge, Color, Uniform Pattern (Up)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FAKE REVIEW DETECTION THROUGH SUPERVISED CLASSIFICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS062

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS062

  Register Paper ID - 188757

  Title: FAKE REVIEW DETECTION THROUGH SUPERVISED CLASSIFICATION

  Author Name(s): Pankaj Chaudhary, Abhimanyu Tyagi, Santosh Mishra

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 417-427

 Year: APRIL 2018

 Downloads: 1362

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Textual Features Rating Features

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EOQ MODEL WITH SELLING PRICE & TIME DEPENDENT DEMAND AND CONSTANT DETERIORATION RATE WITH INVENTORY DEPENDENT HOLDING COST

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS061

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS061

  Register Paper ID - 188756

  Title: EOQ MODEL WITH SELLING PRICE & TIME DEPENDENT DEMAND AND CONSTANT DETERIORATION RATE WITH INVENTORY DEPENDENT HOLDING COST

  Author Name(s): Dr. SANDEEP KUMAR CHAUDHARY

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 407-416

 Year: APRIL 2018

 Downloads: 1277

 Abstract

Abstract: In this paper we consider EOQ model with constant deterioration rate and selling price & time dependent demand. We considered holding cost as inventory dependent. Shortages are not allowed. Mathematical formulation is provided to find the optimal solution. We show total profit is a convex function with respect to cycle time. Numerical examples and sensitivity analysis are given to validate the proposed model in the paper.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Key words: Selling price, Deterioration rate, EOQ model, holding cost, Time dependent, Inventory

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NETWORK LIFE TIME OPTIMIZATION IN WIRELESS SENSOR NETWORKS THROUGH ROBUST ENERGY MANAGEMENT ROUTING WITH ARTIFICIAL NEURAL NETWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS060

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS060

  Register Paper ID - 188754

  Title: NETWORK LIFE TIME OPTIMIZATION IN WIRELESS SENSOR NETWORKS THROUGH ROBUST ENERGY MANAGEMENT ROUTING WITH ARTIFICIAL NEURAL NETWORK

  Author Name(s): Dr. Vishant Kumar, Dr. Joginder Singh Chauhan, Mr Ankit Kumar

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 398-406

 Year: APRIL 2018

 Downloads: 1241

 Abstract

Abstract: Energy efficiency is one of most important parameter to consider while designing the wireless sensor networks. In this paper, we proposed robust energy management routing scheme based on two methods using artificial neural network (ANN). First is Most Significant Sensor Node prediction and another is Group Head selection. We discuss both of these problems in any WSN and seek possible solutions using neural networks, which will actually use to determine the shortest routing path in any WSN for minimizing the energy consumption. Usually WSNs life-time ends by having a single sensor node which uses all its energy and the other sensors consuming the remaining energy. This sensor (which is the cause of the networks end of lifetime) is most likely located in a very significant sensor node which always is in the routing path of many nodes to the base station. By predicting these significant nodes, it is possible to allocate tasks to the nodes in a more efficient way and thus increase the lifetime of the network. Selecting Group Heads amongst all the nodes is also energy conserving scheme for a WSN is proposed herewith. Sensor nodes are initially powered by batteries with full capacities. Each sensor collects data which are typically associated with other sensors in its neighborhood, and then the associated data is sent to the Base Station through Group Head for evaluating the tasks more efficiently. The following sections describe briefly energy saving scheme for network life time optimization, the experiments performed and results achieved in this work, and the main conclusions drawn from our experimental results.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Index Terms- Wireless Sensor Network (WSN), Artificial Neural Network (ANN), Feed Forward Network (FFN), Base Station (BS)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ESTIMATION OF OPTIMUM AREA OF SOLAR POND (5MW)

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS059

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS059

  Register Paper ID - 188752

  Title: ESTIMATION OF OPTIMUM AREA OF SOLAR POND (5MW)

  Author Name(s): Shankar Singh Adhikari, Ashish joshi

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 379-397

 Year: APRIL 2018

 Downloads: 1519

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Key words- Design, Estimation, source, renewable and radiations

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FRACTURE BEHAVIOUR OF WALNUT PARTICLE (JUGLANS REGIA L.) AND COCONUT FIBRE REINFORCED BIOCOMPOSITE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTRIETS058

  Your Paper Publication Details:

  Published Paper ID: - IJCRTRIETS058

  Register Paper ID - 188750

  Title: FRACTURE BEHAVIOUR OF WALNUT PARTICLE (JUGLANS REGIA L.) AND COCONUT FIBRE REINFORCED BIOCOMPOSITE

  Author Name(s): Dr Dinesh Kumar Rao

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 370-378

 Year: APRIL 2018

 Downloads: 1338

 Abstract

Abstract In this paper, an edge cracked rectangular specimen subjected to symmetric three-point bending and asymmetric four point bending were used to determine the mode I and mode II fracture toughness of walnut particulate and coconut fibre reinforced biocomposite. Epoxy resin was used as matrix material and 10 wt % of coconut fibre and 20 wt % of walnut shell content were as reinforcing material. Scanning electron microscopy (SEM) shows that the walnut particles were well dispersed in the epoxy resin matrix. Addition of walnut particles increased the modulus of elasticity of the bio biocomposite. The fracture toughness (KIC) and mechanical test were conducted in a servo hydraulic universal testing machine and the results were analysed and discussed.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords: Fracture Toughness, Biocomposites, Walnut particle, Coconut fibre, SEM

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 7 | Month- July 2024)

Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer