Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 12 | Issue 2

Volume 12 | Issue 2 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: TEACHER EFFECTIVENESS AMONG HIGH SCHOOL TEACHERS: THE ROLE OF EMOTIONAL INTELLIGENCE, SELF-EFFICACY AND SCHOOL ENVIRONMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402541

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402541

  Register Paper ID - 251610

  Title: TEACHER EFFECTIVENESS AMONG HIGH SCHOOL TEACHERS: THE ROLE OF EMOTIONAL INTELLIGENCE, SELF-EFFICACY AND SCHOOL ENVIRONMENT

  Author Name(s): B. Ravi, Dr.K. Subramanyam

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e621-e627

 Year: February 2024

 Downloads: 181

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Emotional Intelligence, Self-Efficacy, School Environment, Teacher Effectiveness and High School Teachers.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Review Paper on Text-to-SQL Generation Systems

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402540

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402540

  Register Paper ID - 251618

  Title: REVIEW PAPER ON TEXT-TO-SQL GENERATION SYSTEMS

  Author Name(s): Sravan Reddy, Dr.Ch.Mallikarjuna Rao, P.Chakradhar, P. Abhinay, S.Pavan Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e614-e620

 Year: February 2024

 Downloads: 200

 Abstract

Several text-to-SQL systems have been created to bridge the gap between users and data, enabling individuals without SQL expertise to ask questions in natural language and interact with databases effectively. The progress observed in text-to-SQL tasks has contributed to advancements in deep learning methods. In order to truly advance the development of text-to-SQL systems, prior research needs to be deconstructed to comprehend the applicability and challenges of various strategies. The review paper's main goal is to give an overview of text-to-sql techniques that query data using natural language. This paper can help serve as a reference for researchers and practitioners interested in developing and applying natural language interfaces for data interaction in the era of large language models.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Text-to-SQL ,NLP, GPT-3.5,SQL ,LLM ,Database

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402539

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402539

  Register Paper ID - 251366

  Title: FOG COMPUTING: MITIGATING INSIDER DATA THEFT ATTACKS IN THE CLOUD

  Author Name(s): Ms. Regulavalasa Deekya, Mr. K. Venkatesh Babu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e609-e613

 Year: February 2024

 Downloads: 167

 Abstract

Cloud computing significantly alters the way we use computers and guarantees access and storage of our personal and business information. These new computing and communication models face new data security challenges. Existing data conservation procedures such as encryption fail to prevent data from the attacks of theft, especially in the cloud provider. So to overcome these problems we are proposing a new technology called Fog Computing. We propose a different approach in Fog computing to obtain data in the cloud using aggressive decoy technology and user behavior profiling. The users using the Cloud are trapped and their access patterns are recorded. Every User has a unique profile which is monitored and updated. We monitor data access in the cloud by the users and detect abnormal data entry patterns. When unauthorized access is suspected and challenged by challenge questions, we begin the wrong attack by returning the bulk of the information to the attacker. This protects users' real data from being misused. Experiments in a local file setting give evidence that this approach can provide an unprecedented level of user security in the cloud environment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cloud Computing,Fog Computing,Data Security,Abnormal Data.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: KED: A Symmetric Key Algorithm for Secured Information Exchange Using Modulo-69

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402538

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402538

  Register Paper ID - 251365

  Title: KED: A SYMMETRIC KEY ALGORITHM FOR SECURED INFORMATION EXCHANGE USING MODULO-69

  Author Name(s): Ms. Hima Bindu Rangala, Mrs. G. Jyothi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e599-e608

 Year: February 2024

 Downloads: 161

 Abstract

Securing information flow has emerged as a critical component of communication in the current digital era. It is crucial to have a strong encryption technique that can shield critical data from unwanted access given the rising number of cyber threats. Therefore, cryptography is essential for ensuring security. Symmetric Key and Asymmetric Key cryptography are the two fundamental types. Instead, then using many keys for encryption and decryption like Asymmetric Key does, Symmetric Key uses just one key.The most extensively used algorithms are those using symmetric keys. The difficulty of deciphering the original messages is what gives these algorithms their strength. Modulo69-based KED-A symmetric key is a cutting-edge encryption technique that offers secure data transfer. In this project data deduplication is a technique used to improve storage utilization by eliminating duplicate data. The technique of encoding plain information into an unintelligible format termed cipher text is known as encryption. Decryption is the procedure of turning encrypted text to plain text. Asymmetric key cryptography and symmetric key cryptography are the two forms of cryptography. Asymmetric key cryptography uses different keys, one for encryption and the other for decryption, as opposed to symmetric key cryptography, which uses the same key for both operations.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Symmetric Key , Asymmetric Key Cryptography,De-ciphering,Encryption,Decryption.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AIR POLLUTION PREDICTION USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402537

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402537

  Register Paper ID - 251364

  Title: AIR POLLUTION PREDICTION USING MACHINE LEARNING

  Author Name(s): Mr. Pinku Padhy, Mr. CH. Srinivasa Reddy

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e593-e598

 Year: February 2024

 Downloads: 168

 Abstract

The amount of pollution caused by humans on the planet has increased dramatically since the industrial revolution. Many of the pollutants in the environment are visible, such as those in the air, water, and soil. Some people, particularly those who reside in big industrial cities, will be aware of air pollution. Since air quality is becoming one of the main factors affecting human health. Air pollution has become a major concern worldwide due to its detrimental effects on human health and the environment. Accurate prediction of air quality is crucial for implementing effective mitigation strategies and safeguarding public health. This study focuses on employing machine learning techniques, specifically the Long Short-Term Memory (LSTM) algorithm, for air quality prediction. The LSTM algorithm, a type of recurrent neural network, is known for its ability to capture temporal dependencies in sequential data. The methodology involves collecting historical air quality data, including pollutant concentrations, meteorological variables, and other relevant factors. These data are preprocessed and used to train the LSTM model, which learns the complex relationships between the input variables and the air quality outcomes. The trained model is then used to make predictions for future air quality conditions. The performance of the LSTM model is evaluated using various evaluation metrics, such as mean absolute error (MAE) and root mean square error (RMSE), to assess its accuracy in predicting air quality.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Long Short-Term Memory (LSTM) algorithm,Air Pollution,Quality Outcomes,Human Health,Environment

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Heart Attack Prediction and Health Suggestion AI-Bot

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402536

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402536

  Register Paper ID - 251363

  Title: HEART ATTACK PREDICTION AND HEALTH SUGGESTION AI-BOT

  Author Name(s): Mr. Pinapala Likhith, Mr. Ch. Dinesh

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e586-e592

 Year: February 2024

 Downloads: 170

 Abstract

In the contemporary world, the surge in the number of daily patients is evident, propelled by the swift evolution of lifestyles. The queues at hospitals and local doctor's residences are consequently experiencing a steep incline. For individuals with packed schedules, the significant waiting time to consult with a doctor becomes a considerable inconvenience. Some ailments demand prolonged periods for recovery, and heart disease, a widespread concern globally, claims lives on a daily basis, affecting both the young and the elderly. Addressing the escalating healthcare challenges of today and tomorrow necessitates a shift toward remote data collection by care providers, accurate diagnoses irrespective of distances, leveraging AI for data analysis to enhance both business and health outcomes, and more.In this transformative landscape, chatbots, also known as conversational interfaces, emerge as a novel means for individuals to engage with computer systems. The introduction of chatbots revolutionizes the user experience by allowing them to pose questions in a manner akin to conversing with a human. Notably, chatbots are rapidly gaining traction on computer chat platforms, harnessing artificial intelligence to comprehend human inputs effectively. This technological integration facilitates a more intuitive and user-friendly interaction, marking a pivotal advancement in healthcare and beyond. As the reliance on such innovative solutions grows, the intersection of AI, healthcare, and conversational interfaces holds the promise of reshaping how we approach and experience medical care in our increasingly dynamic world.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Hospitals,Doctors,Artificial Intelligence,Chatbots..

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Adhoc Expertise in the Field of Information Technology

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402535

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402535

  Register Paper ID - 251362

  Title: ADHOC EXPERTISE IN THE FIELD OF INFORMATION TECHNOLOGY

  Author Name(s): Mr. P. Chaithanya Varma, Mrs. G.Mani

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e580-e585

 Year: February 2024

 Downloads: 175

 Abstract

The goal of the Improvisational Capability program is to introduce the fundamentals of improvisation mainly with Entrepreneur to promote innovative thinking and teamwork, enhance performance abilities, and boost team effectiveness. As an alternative to conventional coaching methods, the curriculum can be applied in a different field. The first part of each session is a review of the previous module, followed by a discussion that provides a more thorough explanation of how improvisation functions, its benefits, and risks, as well as how we may utilize it most efficiently. We will use the idea of freelancing in IT services in our business. There are many similarities between freelancers and businesses in the IT industry. When it comes to finding and keeping employees, creating a business culture, both groups have experience with managing projects and people similar difficulties. However, there are several important differences in how they approach business planning that might help you decide if your company will benefit more from a freelancer or corporation model. Some people find success working as a freelancer, while others find it difficult. Finding clients, keeping them, and getting the appropriate remuneration are the key obstacles to generating money as a freelancer. Additionally, self-employment calls for ongoing attempts to generate income through the investment in systems and infrastructure for ongoing success. Especially if you operate from home or other remote locations, being a freelancer frequently requires full-time dedication. To succeed as a freelancer in the IT business, you need to be persistent and patient when it comes to finding clients and making payment deadlines. There are numerous web services available if you're seeking for freelance work, and they can all help you quickly get your ideal position. The Naive Bayes machine learning algorithm, which is based on the Bayes theorem, is utilized for various classification functions. Gaussian Naive Bayes is the name given to the Naive Bayes generalization. Although there are numerous functions used to estimate data distribution, the Gaussian or normal distribution is the most straightforward to employ.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Naive Bayes, Self-Employement,IT Business, Improvisational Capability

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: LICENSE PLATE DETECTION METHODS BASED ON OPENCV

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402534

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402534

  Register Paper ID - 251361

  Title: LICENSE PLATE DETECTION METHODS BASED ON OPENCV

  Author Name(s): Ms. Peddina Sruthi, Mr.K.Venkatesh Babu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e573-e579

 Year: February 2024

 Downloads: 250

 Abstract

The realm of license plate detection methods, grounded in OpenCV, stands as a well-explored domain within computer vision, boasting applications in diverse fields such as traffic management, vehicle surveillance, and law enforcement. This project introduces an innovative license plate detection methodology rooted in OpenCV, leveraging a spectrum of computer vision techniques to adeptly extract and recognize characters embedded within license plates. The systematic approach of this proposed system unfolds through multiple phases. Initially, the input image of a vehicle undergoes meticulous preprocessing steps, encompassing grayscale conversion, contrast adjustment, and adaptive thresholding. Subsequently, contours emerge from the thresholded image, and potential license plate characters are sieved based on criteria like size and aspect ratio. Precision in grouping these potential characters is achieved through the implementation of a contour arrangement algorithm, ensuring the accurate formation of a license plate region. Post-extraction of this region, further preprocessing is applied to enhance character visibility. Individual character segmentation within the license plate region is accomplished using contour detection. Finally, the optical character recognition (OCR) prowess of Tesseract is harnessed to recognize the segmented characters and extract alphanumeric information from the license plate. The system's development unveils promising results in license plate recognition, affirming the efficacy of the applied computer vision techniques. Nonetheless, it is imperative to acknowledge that the system's performance is contingent on factors such as input image quality, character segmentation accuracy, and the OCR engine's performance, introducing a dimension of variability that necessitates attention and potential refinement.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Opencv, License Plate Recognition,Segmentation,OCR.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FACE RECOGNITION USING DEEP LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402533

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402533

  Register Paper ID - 251360

  Title: FACE RECOGNITION USING DEEP LEARNING

  Author Name(s): Ms. Mediboina Jayalakshmi, Mrs. G.Jyoyhi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e568-e572

 Year: February 2024

 Downloads: 198

 Abstract

The relevance of security concerns has increased with the ongoing advancement of computer technology and the increasing reliance of humans on network technology. To prevent attacks and security flaws, user authentication is essential. There are several forms of authentication, including facial recognition, voice recognition, SMS one-time passcodes, and fingerprint scanning. One of the key uses for image processing in still photos is face recognition. Making an automated system that can recognize faces as well as a person is a real task. This paper's primary goals are to examine the value of CNN, describe the many datasets used in face recognition systems, and assess the various CNN models. The deep learning CNN may be applied to facial recognition to boost authentication security. Here we are collecting the dataset of different faces. Once after preprocessing it we train the data with the CNN algorithm. After training, we will test the results using the OpenCV and also can upload the image for recognition of faces.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

OpenCV, CNN Algorithm,Facial Recognition,Deep Learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Road Accident Detection Using Data Science Technology

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402532

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402532

  Register Paper ID - 251359

  Title: ROAD ACCIDENT DETECTION USING DATA SCIENCE TECHNOLOGY

  Author Name(s): Ms. Sevika Madasu, Mr. Somasundara Rao

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e564-e567

 Year: February 2024

 Downloads: 182

 Abstract

The system is designed to work with live video feeds from cameras installed in strategic locations. It employs object detection algorithms to identify and track vehicles in real-time, allowing for accurate traffic analysis. The system incorporates speed violation detection by defining speed limit lines and calculating the speed of vehicles passing through those lines. Violation instances are flagged, and images or videos of the violations are captured for further analysis or evidence purposes. The project also includes a user-friendly interface that provides real-time traffic statistics, including the total number of vehicles, traffic congestion levels, and detected violations. Additionally, the system offers configurable settings for road-specific parameters, such as speed limits and the number of allowed vehicles. The proposed system aims to enhance traffic management and improve road safety by providing timely and accurate information to authorities. It can aid in monitoring traffic patterns, identifying congested areas, and enforcing speed limits. The system has the potential to reduce accidents, enhance traffic flow, and contribute to efficient transportation management.Overall, the project showcases the effective utilization of computer vision and deep learning algorithms to develop a comprehensive traffic monitoring and violation detection system that can significantly impact road safety and traffic management.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic Management,Traffic Flow,Deep Learning Algorithms,Traffic Monitoring,Computer Vision.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Virtual Health Diagnosis Using Computer Vision Technology

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402531

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402531

  Register Paper ID - 251358

  Title: VIRTUAL HEALTH DIAGNOSIS USING COMPUTER VISION TECHNOLOGY

  Author Name(s): Ms. Korubilli Harshini, Dr B.Prasad

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e560-e563

 Year: February 2024

 Downloads: 169

 Abstract

One of the most common problems faced by people suffering from common ailments or may be even major ones is the lack of immediate first aid consultation or a centralized service to a clinical database. Due to this lack of the knowledge of the standard operating procedure in such cases, these ailments might aggravate. This results in either physical or mental tension for the person suffering from such ailments. In some cases, the patient suffers from intense mental stress as they try to figure out the reason for their condition.The proposed system tries to eliminate their need to figure out their disease by giving them access to a centralized clinical repository in a much interactive way, just like in a virtual assistant, hence Virtual Health Assistant(VHA).The user gets asked several questions, each one contextually aware of the previous one. The user selects the ailments or their condition and thus a conclusion is reached.This project aims to develop a web service that can present information regarding the health issues and ailments & their history. At the end a precise prescription is generated. What this project can't ensure is the accuracy of the health condition that the service arrived at, and thus in such cases a physician must be contacted. These features thus eliminate the need to search for symptoms online.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Virtual Health Assistant,Centralized Service,Health Issues,Mental Stress.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Image to Live Video Transmission using GAN

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402530

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402530

  Register Paper ID - 251357

  Title: IMAGE TO LIVE VIDEO TRANSMISSION USING GAN

  Author Name(s): Mr.Korada Hemanth kumar, Mr.M.Somasundara Rao

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e555-e559

 Year: February 2024

 Downloads: 181

 Abstract

The use of deepfake techniques in the area of converting images into live video has attracted a lot of attention recently. The term "deepfake," which combines the terms "deep learning" and "fake," describes the process of creating artificial content that is convincing and realistic, usually with the use of Generative Adversarial Networks (GANs). Based on a single input image, this method enables the synthesis of a video sequence that mimics the appearance of a target individual. This project shows how to make a movie of a person's facial driver using a first-order motion model.The algorithm can predict the movements of the head and face during driving after being trained on a dataset of driving videos and facial photos. The finished video is realistic and suitable for a range of objectives, including developing virtual reality experiences or instructing autonomous vehicle training programs. The imageio and matplotlib libraries are used in the project's Python implementation.The First Order Motion Model (FOMM) library is used to implement the first-order motion model. Using the first-order motion model, new techniques for face tracking and animation can be created. Video games and other applications could benefit from the increased realism provided by this technology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

First Order Motion Model,Generative Adversarial Networks,Facial Driver,Vehicle Training Program.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Greedy Hub Routing Service with LEQ

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402529

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402529

  Register Paper ID - 251356

  Title: GREEDY HUB ROUTING SERVICE WITH LEQ

  Author Name(s): Ms. Kare Deepika Madhuri, Mrs. G.Mani

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e550-e554

 Year: February 2024

 Downloads: 162

 Abstract

There is a vast increase in broadband access due to which this new generation netizens are spawned. In today's situation consumers mainly use the network as a interactive medium for multimedia entertainment and communication purpose. It includes interactive network applications such as teleconferencing, network gaming and online trading which are gaining popularity. We propose a latency equalization service (LEQ), which equalizes the perceived latency for all clients participating in an interactive network application. LEQ is used in variety of applications like gaming, video streaming and real-time communication systems. To effectively implement the proposed LEQ service, network support is essential. LEQ is a process used in data communication networks to ensure that all devices on the network experiences the same delay when transmitting and receiving the data. The LEQ architecture uses a few routers in the network as hubs to redirect packets of interactive applications along paths with similar end-to-end delay. We first formulate the hub selection problem, prove its NP-hardness, and provide a greedy algorithm to solve it.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Latency Equalization Service (LEQ),NP-Hardness,End-to-End Delay,Greedy Algorithm.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Fraud Application Detection Using Sentimental Analysis

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402528

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402528

  Register Paper ID - 251355

  Title: FRAUD APPLICATION DETECTION USING SENTIMENTAL ANALYSIS

  Author Name(s): Mr. Dhiraj Navik, Mrs. G. Mani

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e544-e549

 Year: February 2024

 Downloads: 199

 Abstract

The problem of fraudulent mobile applications has grown significantly in importance as a result of the quick development of mobile technology and the rising popularity of mobile applications. These malicious apps not only endanger user's devices but also steal personal information. To safeguard users from potential harm, it is crucial to track down and identify fraudulent mobile applications. With the help of sentiment analysis and the Naive Bayes classifier, SVM etc.., this project is developed for identifying fraudulent applications based on user reviews. The goal is to create a framework that uses data mining and sentiment analysis to analyse user reviews and find review-based evidence of fraud. This projectseek to evaluate the authenticity and dependability of mobile applications before users download them by utilizing sentiment analysis. The suggested method involves gathering user reviews from the Google Play store and classifying them as positive or negative using sentiment analysis. Based on the opinions expressed in the reviews, the Naive Bayes classifier, SVM etc.., is used to categorize applications as either legitimate or fraudulent. By giving users a tool to make educated decisions about the applications they download, this strategy empowers users. Users will be able to recognize fraudulent applications and steer clear of any risks involved with downloading them by putting this framework into place. While giving users a trustworthy way to distinguish between fraudulent and legitimate applications, the system will help to ensure the security and integrity of the mobile application market.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Fruit Ripeness Detection Using Deep Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402527

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402527

  Register Paper ID - 251354

  Title: FRUIT RIPENESS DETECTION USING DEEP LEARNING

  Author Name(s): Ms. K.Prasanna Ambica, Mrs. P. Sri Jyothi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e537-e543

 Year: February 2024

 Downloads: 176

 Abstract

The agricultural industry has been facing challenges in traditional and manual visual grading of fruits due to its laborious nature and inconsistent inspection and classification process. To accurately estimate yield and automate harvesting, it is crucial to classify the fruits based on their ripening stages. However, it can be difficult to differentiate between the ripening stages of the same fruit variety due to high similarity in their images during the ripening cycle. To address these challenges, we plan to develop an accurate, fast, and reliable fruit detection system using deep learning techniques. The modernization of crops offers opportunities for better quality harvests and significant cost savings. Our approach involves adapting the state-of-the art object detector faster R-CNN, using transfer learning, to detect fruits from images obtained through model colour (RGB). Spectroscopy analysis to predict the quality of fruit and categorization by using AS7265x Spectrophotometer. Our system's robustness will enable us to differentiate between fruit varieties and determine the ripening stage of a particular fruit with effectiveness and accuracy. The system will also efficiently segment multiple instances of fruits from an image and accurately grade individual objects


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

RGB,Spectrophotometer,Spectroscopy,Transfer Learning,R-CNN.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IOT Based Tyre Pressure Monitoring System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402526

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402526

  Register Paper ID - 251353

  Title: IOT BASED TYRE PRESSURE MONITORING SYSTEM

  Author Name(s): Mr. Surya Jillidimudi, Dr.B.Prasad

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e531-e536

 Year: February 2024

 Downloads: 243

 Abstract

This project introduces an Internet of Things (IoT) based pressure monitoring system utilizing the BMP085 sensor. The primary objective is to measure and monitor atmospheric pressure, offering real-time data visualization through the Blynk IoT platform. The Adafruit BMP085 sensor is employed for measuring temperature, pressure, and altitude, with an Arduino microcontroller and an ESP8266 Wi-Fi module facilitating wireless connectivity.The system leverages the Blynk library to establish a connection between the Arduino and the Blynk platform. Through the Blynk app, users gain remote access to pressure readings and receive alerts based on predefined thresholds. Additionally, the system controls an output pin, enabling the activation of a buzzer or external device in response to detected pressure levels.The implementation involves initializing the BMP085 sensor, configuring Wi-Fi credentials, and establishing a seamless connection with the Blynk platform. Sensor readings are then acquired and transmitted to the Blynk app, where they are visually displayed on a virtual terminal. Continuous monitoring of pressure levels provides visual feedback on both the Blynk app and the serial monitor.The proposed IoT-based pressure monitoring system boasts various advantages. It offers real-time data visualization, allowing users to remotely monitor atmospheric conditions. Integration with the Blynk platform enables the customization of alerts and notifications based on user-defined pressure thresholds. Moreover, the system exhibits flexibility for expansion, accommodating additional sensors or actuators to cater to more complex applications.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Blood Pressure Monitoring System,Internet of Things(IoT),Blynk Platform,Data Visualization,Pressure Thresholds.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Classifying Data with Suggestive Causes and Flexible Solution

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402525

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402525

  Register Paper ID - 251352

  Title: CLASSIFYING DATA WITH SUGGESTIVE CAUSES AND FLEXIBLE SOLUTION

  Author Name(s): Ms.Gulla Tusharika, Dr.P.Praveen Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e525-e530

 Year: February 2024

 Downloads: 174

 Abstract

This project is an effective technique to categorize data on specific requirements and conditions for the majority of marine species. To determine which species are all threatened or endangered, depending on the situation. Not only is the bulk of the data being classified here, but also the causes of and fixes for the classification of the data. The actual process of decision-making and branching based on the qualities of the data is carried out using a set of algorithms and tools. It facilitates the creation of efficient machine learning models that are capable of making precise predictions. Logistic regression is used to estimate discrete values (typically binary values like 0/1) from a collection of independent variables. The logic function is changed to match the data,It helps in estimating how likely an event is to occur. These algorithms function on this application well. Since there are just two outcomes in this project, logistic regression is employed as a binary classifier. It will also explain the causes and a fix for that here.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Machine Learning Models,Logistic Regression,Logic Function,Binary Classifier,Precise Prediction

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A Broad Review On Various Drug Evaluation Methods

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402524

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402524

  Register Paper ID - 251594

  Title: A BROAD REVIEW ON VARIOUS DRUG EVALUATION METHODS

  Author Name(s): Pooja Shivaji Shinde, Sakshi Balu Pise, Mahadevi M. Bhosale, Rupali R. Bendgude

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e518-e524

 Year: February 2024

 Downloads: 168

 Abstract

Adult and pediatric populations have distinct medication pharmacokinetics and pharmacodynamics with the latter being more variable. While these variations in pharmacokinetics and pharmacodynamics support particular research, they also bring up a variety of moral and practical concerns. The invasiveness of the procedures and the barriers to patient recruitment are the main practical challenges to overcome while conducting clinical research in children. The Classical pharmacokinetic studies cannot often be performed on children due to the invasiveness associated with pain/anxiety and blood loss, especially in neonates and infants. Pharmacokinetic , pharmacodynamic modeling-based population techniques are especially attractive for pediatric populations due to their ability to handle sparse data. It has previously been highlighted how important population techniques are for examining dose-concentration-effect correlations and for qualitatively and quantitatively evaluating variables that could account for interindividual variability.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Screening methods , Drug studies, In vivo-vitro studies, Animal cell culture Technique

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Image Generation and Captioning Application

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402523

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402523

  Register Paper ID - 251641

  Title: IMAGE GENERATION AND CAPTIONING APPLICATION

  Author Name(s): Sammed Mahavir Karav, Suyash Saxena, Suyog Shewale

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e512-e517

 Year: February 2024

 Downloads: 178

 Abstract

The Image Generation and Captioning Application project represents a groundbreaking fusion of artificial intelligence and creative expression, revolutionizing content creation. This innovative application leverages AI and computer vision to deliver a user-friendly platform for generating high-quality images with contextually relevant captions. Key objectives include developing resilient models, creating an intuitive interface, ensuring scalability, and maintaining ethical content generation. With applications spanning marketing, advertising, social media, and education, the project aims to redefine content creation by efficiently pairing compelling visuals with informative captions. The accompanying comprehensive review explores state-of-the-art techniques, emphasizing multimodal approaches, ethical considerations, and diverse applications. Addressing technical challenges and ethical guidelines, this project stands at the forefront of reshaping how we interact with visual information in the digital age.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Image Generation, Captioning Application, User-Friendly Interface, Deep Learning, Generative Adversarial Networks (GANs)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MINDFULNESS AND COGNITIVE BEHAVIORAL THERAPIES IN SCHIZOPHRENIA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2402522

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2402522

  Register Paper ID - 251457

  Title: MINDFULNESS AND COGNITIVE BEHAVIORAL THERAPIES IN SCHIZOPHRENIA

  Author Name(s): Vidya Walunj, Mayuresh Bhondiwale, Yash Chaudhari, Tanmay Gharat, Utkarsha Ghanwat

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 2

 Pages: e497-e511

 Year: February 2024

 Downloads: 174

 Abstract

Schizophrenia is a psychiatric disorder affecting 1% of the population, characterized by a split mind disorder affecting emotions, thoughts, reasoning, and behaviour. It is a genetically influenced neurodevelopmental illness, with symptoms appearing after a 1-3% latency period. The disorder is characterized by delusions, hallucinations, illogical conclusions, and withdrawal from social interactions. The term "schizophrenia" was coined in 1908 by Swedish psychiatrist Eugen Bleuler, and its symptoms were first documented in Haslam and Pinel's 1809 publication. Mindfulness is a meta-cognitive exercise that involves focusing on the present moment while reducing emotional and cognitive reactivity. It originated from Buddhist vipassana meditation and has been applied to various health issues, particularly those with psychopathological profiles and somatic disorders. Mindfulness-based interventions (MBIs) have been shown to be effective in treating various mental health disorders. MBIs have shown moderate to strong effect sizes on depression and anxiety, and have been found to be beneficial during pregnancy. However, the benefits of mindfulness practices as stand-alone interventions are unclear. MBIs have also been found to improve insomnia and sleep quality, with effects lasting 3 months postintervention. They have also been found to have a positive effect on eating disorders, addiction, psychosis, post-traumatic stress disorder, and autism spectrum disorders. MBIs have also been shown to improve physical health outcomes for cancer patients, particularly in reducing cancer-related fatigue (CRF) scores. Furthermore, contemplative movement has been suggested to improve lung function and physical activity in COPD patients.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Schizophrenia, Mindfulness-based interventions, addiction, psychosis, post-traumatic stress disorder, and autism spectrum disorders

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 14 | Issue 1 | Month- January 2026)

Call For Paper January 2026
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A digital object identifier by DOI.org How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer