Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications

INTERNATIONAL JOURNAL OF CREATIVE RESEARCH THOUGHTS - IJCRT (IJCRT.ORG)

International Peer Reviewed & Refereed Journals, Open Access Journal

IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.

ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013

Call For Paper - Volume 14 | Issue 4 | Month- April 2026

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)

Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 14 | Issue 2

Volume 14 | Issue 2 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: A Study on Facial Skin Types Classification Using Deep Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02010

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02010

  Register Paper ID - 300489

  Title: A STUDY ON FACIAL SKIN TYPES CLASSIFICATION USING DEEP LEARNING

  Author Name(s): Sneha Gaikwad, Vandana Maurya

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 74-78

 Year: February 2026

 Downloads: 79

 Abstract

The need of facial skincare is growing and the market is huge. Skin kinds, skin problems and skin tones can all be used to classify facial skin. For customized skin care, an accurate skin type classification is essential. This paper investigates the classification of facial skin types using Convolutional Neural Networks (CNNs) and makes recommendations for how CNNs can be used to efficiently categorize skin types and provide a useful tool for individualized dermatology and skincare. This study opens the door for further developments in individualized dermatological care by adding deep learning technology into the skincare sector.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Facial Skin Type; Convolutional Neural Network; Dermatology; Deep Learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Exploring Patterns and Architectures for Strengthening IoT Security

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02009

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02009

  Register Paper ID - 300488

  Title: EXPLORING PATTERNS AND ARCHITECTURES FOR STRENGTHENING IOT SECURITY

  Author Name(s): Hemangi Rane

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 71-73

 Year: February 2026

 Downloads: 57

 Abstract

The Internet of Things (IoT) represents a revolutionary shift in the way devices, systems, and people are interconnected, enabling automation and efficiency across various domains, from healthcare to smart cities. However, the massive scale and complexity of IoT networks introduce significant security challenges. In this paper, we explore various security patterns and architectural frameworks designed to address these challenges. The goal is to provide a comprehensive overview of the current state of IoT security, identify critical vulnerabilities, and discuss evolving patterns and architectures that strengthen IoT systems against emerging threats.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Exploring Patterns and Architectures for Strengthening IoT Security

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Disaster Management Frameworks and Role of IoT in Disaster Response

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02008

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02008

  Register Paper ID - 300487

  Title: DISASTER MANAGEMENT FRAMEWORKS AND ROLE OF IOT IN DISASTER RESPONSE

  Author Name(s): Mrs. Prachi Adhiraj, Mrs. Pooja Chettiar, Ms. Vrinda Patil

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 66-70

 Year: February 2026

 Downloads: 56

 Abstract

Modern advancements in technology, such as sensors, satellites, and predictive models, have significantly improved early warning systems for disasters like hurricanes, floods, and tsunamis. These tools enable experts to issue timely alerts and evacuate at-risk populations. The Internet of Things (IoT) plays a crucial role in disaster response by facilitating real-time monitoring of environmental conditions and infrastructure integrity. IoT-driven solutions enhance damage assessment, monitor vulnerable communities, provide real-time data, and predict disaster impacts. By integrating IoT into disaster management frameworks, response times can be improved, coordination between agencies can be strengthened, and recovery efforts can be accelerated. This paper explores IoT-based disaster recovery, highlighting key enabling technologies and proposing an innovative algorithm for establishing temporary network connections in disaster-affected areas. [1].


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Analytics, Coordination, Disaster Response, IOT, Predictive, Sensor, Social Media, Resilient

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CYBERSECURITY IN SMART CITIES: A MULTI-LAYERED APPROACH TO PROTECT CRITICAL URBAN INFRASTRUCTURE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02007

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02007

  Register Paper ID - 300486

  Title: CYBERSECURITY IN SMART CITIES: A MULTI-LAYERED APPROACH TO PROTECT CRITICAL URBAN INFRASTRUCTURE

  Author Name(s): Mr. Rohan Gupta, Ms. Prachi Adhiraj, Ms. Saba Shaikh

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 54-65

 Year: February 2026

 Downloads: 86

 Abstract

Smart cities are rapidly emerging as the backbone of modern urban development, driven by the integration of cutting-edge technologies such as the Internet of Things (IoT), artificial intelligence (AI), and big data. These technologies enhance operational efficiency, improve public services, and contribute to sustainable development. However, they also introduce significant cybersecurity challenges, as the interconnected nature of smart city infrastructure creates vulnerabilities that can be exploited by malicious actors. From transportation systems and energy grids to healthcare and public safety networks, critical urban infrastructure faces a growing risk of cyberattacks that can disrupt essential services, compromise public safety, and lead to significant financial losses. This paper explores the cybersecurity risks facing smart cities, with an emphasis on safeguarding critical infrastructure through a multi-layered defense strategy. It presents a comprehensive analysis of the most common threats, including ransomware attacks, Distributed Denial of Service (DDoS), data breaches, and unauthorized access to IoT devices. The paper proposes a multi-layered approach to security, encompassing network protection, application security, endpoint hardening, data encryption, and real-time monitoring. Each layer serves as a critical component of a holistic defense model, aiming to mitigate risks and enhance resilience against cyber threats. Furthermore, this research highlights the importance of collaboration between public and private sectors, smart city administrators, and cybersecurity professionals. It discusses the necessity of developing proactive incident response plans and implementing advanced technologies such as AI-powered threat detection and blockchain for secure data management. By adopting a multi-layered security strategy, cities can better protect their urban infrastructure and ensure the continued safe operation of smart technologies.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Smart Cities, Cybersecurity, Critical Infrastructure, IoT, Multi-Layered Security, Threat Mitigation, Incident Response

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Comparative Analysis of Data Compression Techniques Using Generative AI Models

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02006

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02006

  Register Paper ID - 300484

  Title: COMPARATIVE ANALYSIS OF DATA COMPRESSION TECHNIQUES USING GENERATIVE AI MODELS

  Author Name(s): JaymalaChavan

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 46-53

 Year: February 2026

 Downloads: 134

 Abstract

The process of compression becomes vital to maximize data storage and transmission optimization and especially applies to big data environments. Digital data continues to expand rapidly thus demanding more effective compression methods to become essential. Many types of complex datasets containing high numbers of dimensions prove incompatible with standard compression methods like Huffman coding and Run-Length Encoding. Generative AI models represent new methods for compression, including Variational Autoencoders (VAEs), Generative Adversarial Networks (GANs), and Vector Quantized Auto encoders (VQ-VAEs), which are emerged as promising alternatives. This study analyzes how generative AI systems develop image and video compression process output and checks their output quality along with resource usage metrics. The main function of compression techniques is to decrease redundant data without compromising crucial information that needs for efficient storage and transmission. The advancement of generative models now enables them to acquire complicated data distributions along with compressed representations which maintain essential aspects from original data. The core purpose of this investigation is to analyze different generative AI models for data compression based on their effectiveness and evaluate their strengths and weaknesses when processing images and video content. In addition the study will identify optimal models for particular applications through performance-based assessments that measure compression effectiveness and reconstructive quality and computational efficiency. Some generative models demonstrate their competence by reaching high compression ratios alongside preserving quality standards in lossy compression operations. These models either present realistic visual reconstructions although they demand increased computational resources. This research into generative model comparison with traditional methods reveals significant findings suitable for various application-related decisions making


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Generative AI, Data Compression, Compression Ratio, Reconstruction Quality, Computational Efficiency

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AUDIO ENCRYPTION USING MODIFIED CHAOTIC MAPS AND DNA ENCODING FOR SECURING AUDIO TRANSMISSION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02005

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02005

  Register Paper ID - 300483

  Title: AUDIO ENCRYPTION USING MODIFIED CHAOTIC MAPS AND DNA ENCODING FOR SECURING AUDIO TRANSMISSION

  Author Name(s): Ms. Lina Nandanwar, Ms. Pooja Rathi, Mrs. Vrushali Limaye

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 34-45

 Year: February 2026

 Downloads: 49

 Abstract

The proposed research is based on a smart strategy for encrypting audio files using Chaotic map and DNA Encoding. It targets the important parts of sound to protect from unethical use. Chaotic map puzzles hackers and DNA adds a layer of mystery, making it very secure indeed. Algorithm is tested for various statistical test like correlation analysis, information entropy analysis, scatter plots diagrams, histogram, mean squared error, PSNR and NIST tests, these show it's strong and dependable. A great thing is, once you decode the audio, it sounds just as good as before. So, if you're into sharing secret tunes, this approach suits you well.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Sound scrambling, DNA encoding, Multimedia data, Henon map, Hybrid chaotic map

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CNN-Based Accident Detection and Emergency Response System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02004

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02004

  Register Paper ID - 300482

  Title: CNN-BASED ACCIDENT DETECTION AND EMERGENCY RESPONSE SYSTEM

  Author Name(s): Tanmay Chavan, Harsh Gharat, Sumed Ingale, Divanshu Sharma, Prof. Anuja Chandane

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 17-33

 Year: February 2026

 Downloads: 67

 Abstract

Road accidents remain a major global challenge, requiring rapid and effective emergency response mechanisms. Traditional accident detection methods rely on manual reports or eyewitness accounts, resulting in delays in response times and increased severity of the consequences. This paper presents a CNN-based accident detection and emergency response system using YOLOv8, an advanced deep learning algorithm for real-time video analysis. The system processes live video surveillance images to detect accidents quickly, records critical details such as location, time, and severity, and triggers immediate alerts to the emergency services. The proposed system automates accident monitoring, integrating machine learning and computer vision technologies to achieve accuracy while minimizing false positives and negatives. It features a user-friendly interface for traffic authorities and emergency responders, a robust detection module powered by convolutional neural networks, and a scalable database for efficient storage and analysis of accident data. The methodology includes data collection, pre-processing, model training, evaluation, and deployment, guaranteeing the adaptability of the system, deployment, and ensuring adaptability in a variety of environments, including urban areas, freeways, and high-traffic areas. The preliminary results from controlled experiments demonstrate the system's potential to significantly reduce emergency response times and coordination between emergency services. By filling the gaps left by traditional detection systems, this study provides a scalable and reliable solution that contributes to intelligent transportation systems and improves public safety through real-time monitoring notifications and effective emergency management.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Accident Detection; Convolutional Neural Networks; Emergency Response; YOLOv8

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A MECHANISM FOR PREVENTING DDoS ATTACK OVER THE IoT NETWORKS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02003

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02003

  Register Paper ID - 300481

  Title: A MECHANISM FOR PREVENTING DDOS ATTACK OVER THE IOT NETWORKS

  Author Name(s): Miss. ANSARI ZUNAIRA BANO MOHAMMAD ANWAR

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 11-16

 Year: February 2026

 Downloads: 66

 Abstract

Nowadays, The Internet of Things (IoT) has made our lives more reliable and efficient in multiple ways. IoT is a rapidly emerging technology in the consumer, business, industrial, and social ecosystems. IoT networks use the communication technologies, such as IoT devices, to share and spread information applications and hardware. As such, Distributed Denial of Service attacks use multiple connected devices executed by botnets and creates many harmful and dangerous threats to the security of IoT networks. Attackers can analyze and attack IoT devices as part of botnets to launch DDoS attacks by taking advantage of their flaws and targeting the server by sending a flood of messages and creating internet traffic then the system halts and reduces the performance of the system. In this research, when an attacker sends a flood of fraud messages, then some alert notifications, warning messages, and alarms are triggered in the victim's machine to avoid data loss. Also includes secondary data (research papers, case studies, and past cybercrime studies) to detect the threats and prevent them in the network. This presenting paper throws light on the prevention and techniques of DDoS attacks in IoT.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Internet of Things (IoT), Alert notification, Internet traffic, Distributed Denial of Service (DDoS) attack, Botnet.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Exploring Ant Colony Optimization: Principles, Applications, and Future Directions

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02002

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02002

  Register Paper ID - 300480

  Title: EXPLORING ANT COLONY OPTIMIZATION: PRINCIPLES, APPLICATIONS, AND FUTURE DIRECTIONS

  Author Name(s): Anjali Balram Bunker, Vimmi Gajbhiye

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 8-10

 Year: February 2026

 Downloads: 60

 Abstract

Ant Colony Optimization (ACO) is a bio-inspired optimization technique based on the foraging behavior of ants. It has been widely applied to complex problems in various domains, including logistics, robotics, and artificial intelligence. This paper provides an overview of ACO, highlighting its principles, applications, and various adaptations. It also discusses the challenges and opportunities for future research in ACO, with a focus on hybrid approaches and emerging technologies. The goal is to shed light on the evolving role of ACO in solving real-world optimization problems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Ant Colony Optimization (ACO), Swarm Intelligence, Ad-hoc Network, TSP, VRP

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Analysing Twitter Conversations on Gender Violence: Clustering, Community Detection, and Sentiment Insights

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBM02001

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBM02001

  Register Paper ID - 300477

  Title: ANALYSING TWITTER CONVERSATIONS ON GENDER VIOLENCE: CLUSTERING, COMMUNITY DETECTION, AND SENTIMENT INSIGHTS

  Author Name(s): Elizabeth Leah George, Subashini Parthasarathy

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 1-7

 Year: February 2026

 Downloads: 68

 Abstract

Social media sites like Twitter have become increasingly important over the past few years in creating awareness and provoking debate around social issues like gender-based violence. Social media sites offer extensive user-generated content reflecting public sentiment and engagement on specialised subjects. This study uses clustering, community detection, and sentiment analysis to analyse public debate around gender violence on Twitter. The research aims at a corpus of 6,799 tweets representing varying gender violence-related discourse. The corpus was initially preprocessed to remove extraneous content such as stopwords, URLs, and uncorrelated tweets. The tweets were then vectorised using TF-IDF (Term Frequency-Inverse Document Frequency) to identify the meaningful attributes. K-Means clustering was employed to group similar tweets, while Louvain's community detection algorithm was employed to identify individual communities of users discussing gender violence. Sentiment analysis was done to classify tweets as positive, negative, or neutral. At the same time, Different evaluation measures, such as Modularity, Silhouette Score, and Davies-Bouldin Index, were used to analyse the efficiency of clustering and community detection. The objective of this study is to create a machine-learning model that classifies gender-related tweets into one of five categories: sexual violence, emotional violence, harmful cultural practices, physical violence, and economic violence. The research indicates that most problems are unreported, and information is filtered through perpetuating mechanisms and consequences for Indian society. The mental well-being of the women and children also impacts the problems in question. With the support of increasing efforts to promote women's empowerment and mainstreaming gender equality, we can create social awareness on social networking sites with actions that favour women's and girls' development and livelihoods.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Gender violence, Women empowerment, Gender equality, Social media activism, Data analysis

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GreenGuard: Cloud-Powered Air Quality and Emission Monitoring in Cities

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02025

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02025

  Register Paper ID - 301031

  Title: GREENGUARD: CLOUD-POWERED AIR QUALITY AND EMISSION MONITORING IN CITIES

  Author Name(s): Suhas Doke, Prof. Sagar Dhawale

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 119-124

 Year: February 2026

 Downloads: 67

 Abstract

Escalating air pollution as a result of urbanization and industrialization is one of the most problematic issues affecting the environment and public health. Urban living requires stringent controls on emissions and effective management of growth trends. In this paper, we propose an emission control system for metropolitan cities called GreenGuard, which is a cloud-based emission monitoring system. This pollution emission control system incorporates IoT (Internet of Things) sensors, cloud computing, and data analytics to enable real-time air quality monitoring along with predictive insights for pollution control. As part of GreenGuard, IoT-empowered sensing devices are deployed throughout the city to monitor critical pollutants, including PM2.5, and PM10, CO, NO?, and SO?. The aforementioned sensors relay data to the cloud where sophisticated machine learning algorithms monitor air quality indicators and identify pollution hotspots. Environmental agencies, politicians, and citizens receive information and alerts through dashboards. Thus, giving them the ability to make decisions in realtime. GreenGuard's predictive analytics component is one of the most remarkable features of the project. It provides the ability to predict the level of pollution based on analyzing historical data along with meteorological conditions. Through this, authorities are able to take preventive measures by restricting traffic, controlling industrial emissions, and issuing public health warnings. It achieves all necessities for metropolitan cities like scalability, enhanced security, and improved accessibility using a cloud based platform. Therefore, making it an ideal solution for larger metropolitan cities. To evaluate the efficiency of the system, GreenGuard was implemented in a metro area through a pilot study. Findings showed successful integration with the environmental systems already in place and a strong ability to accurately calculate pollution levels. The ease of use of the systems interface along with the pollution report automation made pollution management strategies much more sophisticated. GreenGuard's predictive emission monitoring capabilities enable sustainable development within metropolitan areas, which leads to better public health. Addition of AI-powered analytics and wider geographic coverage would improve the results of the proposed system even further.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Emission Monitoring, IoT, Cloud Computing, Air Quality, Pollution Control, Smart City.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Critical Review of Designing Multiple Neural Network based Intelligent Computing Procedures for Solving the Anthrax Disease Model used in Animal

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02024

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02024

  Register Paper ID - 301032

  Title: CRITICAL REVIEW OF DESIGNING MULTIPLE NEURAL NETWORK BASED INTELLIGENT COMPUTING PROCEDURES FOR SOLVING THE ANTHRAX DISEASE MODEL USED IN ANIMAL

  Author Name(s): Vikash Panthi, Dr. Nikita Kashyap, Dr. Manoj Gupta

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 114-118

 Year: February 2026

 Downloads: 72

 Abstract

Anthrax, caused by Bacillus anthracis, is a highly contagious zoonotic infection with important connotations for animal as well as human health. Compartmental epidemiological models and fractional order differential equations are traditionally used models to analyse anthrax dynamics. These models tend to face nonlinearity complexities, so high computational methods are needed for exact solutions. This paper is a critical analysis of various neural network- based intelligent computing processes for the solution of anthrax disease models. Sophisticated techniques like Radial Basis Bayesian Regularization Deep Neural Networks (RB-BRDNN), Mayer Wavelet Neural Networks (MW-NN), and supervised neural networks (SNNs) are investigated in terms of their effectiveness for the solution of nonlinear differential equations. These models, when paired with optimization methods like Particle Swarm Optimization (PSO) and Bayesian regularization, enhance numerical stability and accuracy. The review points out the benefits of neural network- based methods in forecasting anthrax outbreaks and aiding disease control measures. Directions for future research are presented, focusing on hybrid AI models for real-time disease surveillance and intervention planning.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Anthrax disease, Neural network, fractional order, Single or multiple layers optimization schemes

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A Systematic Literature Review: Stock Market Price Prediction Using Reinforcement Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02023

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02023

  Register Paper ID - 301034

  Title: A SYSTEMATIC LITERATURE REVIEW: STOCK MARKET PRICE PREDICTION USING REINFORCEMENT LEARNING

  Author Name(s): Shantanu Dipak Rajmane, Dr. Rupali Bagate, Dr Aparna Joshi

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 110-113

 Year: February 2026

 Downloads: 72

 Abstract

This paper presents a systematic literature review of reinforcement learning (RL) techniques, particularly deep reinforcement learning (DRL), applied to stock market price prediction. Through comprehensive analysis of recent research, we find that advanced algorithms such as Q-Learning, Double DQN, and Dueling DQN, especially when combined with sentiment analysis from news and social media, create powerful frameworks that address financial markets' complexity. Our review indicates that DRL approaches significantly outperform traditional methods in the literature, resulting in more adaptive and dynamic solutions for stock market forecasting. This paper synthesizes current research findings and identifies promising directions for future work in this rapidly evolving field.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

deep reinforcement learning, stock market prediction, Q-learning, Deep Q-Network, financial forecasting, systematic review, sentiment analysis

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Women Safety Night Patrolling Robot in IoT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02022

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02022

  Register Paper ID - 301035

  Title: WOMEN SAFETY NIGHT PATROLLING ROBOT IN IOT

  Author Name(s): Varsha Gorakh Kolhatkar, Dr. Swati Khawate

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 101-109

 Year: February 2026

 Downloads: 82

 Abstract

This document explores the development and implementation of the "Women Safety Night Patrolling Robot in IoT," a cutting-edge solution designed to enhance the safety of women, particularly during nighttime. In light of increasing incidents of violence and harassment, this project leverages advanced technologies such as the Internet of Things (IoT), Raspberry Pi, cameras, and sensors to create an autonomous robotic system capable of patrolling designated areas. The robot is equipped to respond to sounds, providing real-time surveillance and transmitting critical information to a control center for immediate assistance in emergencies. By fostering a sense of security and independence, this initiative addresses the pressing societal challenges surrounding women's safety. Future enhancements may include the integration of artificial intelligence for improved threat detection, the expansion of the robotic network for comprehensive coverage, and adaptations for rural and underserved regions. Ultimately, this project represents a significant advancement towards creating a safer environment for women, empowering them to navigate public spaces confidently.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Women safety, Night patrolling robot, Internet of Things (IoT), Autonomous surveillance, Raspberry Pi, Real-time monitoring, Sound detection, Emergency response, Threat detection, Artificial intelligence (AI), Public safety

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Esp 32 Based Mobile Controlled River Cleaning Robot

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02021

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02021

  Register Paper ID - 301037

  Title: ESP 32 BASED MOBILE CONTROLLED RIVER CLEANING ROBOT

  Author Name(s): Shivam Agrawal, Kanchan Vaidya, Ankush Kadu, Sushma Karke, Ansh Bhale, Suhas Jadhav

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 97-100

 Year: February 2026

 Downloads: 84

 Abstract

This research introduces a mobile-controlled river cleaning robot designed to address the growing challenge of water pollution. The robot, powered by an ESP32 microcontroller, serves a dual purpose: removing floating debris and monitoring water quality through a Total Dissolved Solids (TDS) sensor. By integrating a conveyor belt for waste collection and an IoT-based platform (ThingSpeak) for real-time TDS data visualization, this system offers a cost-effective, scalable solution for environmental protection. The robot operates using L298 motor drivers, DC motors, and a 12V power supply, with manual movement control. The TDS sensor provides continuous monitoring of water pollution levels, ensuring that pollution trends are tracked efficiently. The system's remote monitoring capabilities allow authorities to make informed decisions. This research demonstrates the feasibility of combining waste removal with pollution tracking, paving the way for smarter, automated solutions for cleaner water bodies


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Water Pollution, River, Mobile Controlled, TDS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Xproguard's Portfolio Dynamic Web Application Using NEXT JS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02020

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02020

  Register Paper ID - 301038

  Title: XPROGUARD'S PORTFOLIO DYNAMIC WEB APPLICATION USING NEXT JS

  Author Name(s): Prof. Supriya Agre, Kiran R. Jadhav, Sanika M. Ghugare, Aakanksha N. Chavan, Shubham L. Pataskar

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 94-96

 Year: February 2026

 Downloads: 81

 Abstract

In today's rapidly advancing digital landscape, maintaining a strong online presence is essential for security-centric companies. Xproguard Pvt. Ltd. has developed a portfolio web application that effectively presents its range of security offerings through modern web technologies. Utilizing React.js, Next.js, Tailwind CSS, and Framer Motion, the platform ensures a responsive interface, enhanced SEO capabilities, and smooth user experiences. Key features include dynamic product displays, a real-time ranking mechanism, and personalized privacy policies, all aimed at boosting user interaction and fostering transparency. This paper explores the chosen technology stack, architectural design, and development process of the application, emphasizing its contribution to strengthening Xproguard's brand identity and commitment to digital innovation..


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

React.js, Next.js, Tailwind CSS, Framer Motion, TypeScript, Web Portfolio.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTION OF DAMAGED ROAD AND LANE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02019

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02019

  Register Paper ID - 301039

  Title: DETECTION OF DAMAGED ROAD AND LANE

  Author Name(s): Prof. Supriya Agre, Aishwari DumbrePatil, Chaitanya Chaudhari, Raj Zite, Rohit Suryawanshi

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 91-93

 Year: February 2026

 Downloads: 73

 Abstract

In the context of intelligent transportation systems, the detection of road irregularities like potholes in advance is crucial to improving public safety and maximizing maintenance. This paper introduces the creation of a real-time pothole detection system based on the YOLO (You Only Look Once) object detection algorithm. Utilizing the YOLO model's speed and accuracy, the system extracts video streams from road-facing datasets to detect and localize potholes with great accuracy. The app architecture includes phases like image acquisition, pre-processing, CNN-based detection, and post-processing to refine the results. With performance and scalability in its design, this solution provides a viable solution for municipal authorities and smart city programs to automate road condition monitoring, thereby saving time on manual inspection and enhancing urban mobility.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

YOLO, Pothole Detection, Image Pre-processing, Post-processing, Deep Learning, Python, OpenCV

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Tech-Driven Pollution Control: Intelligent Vehicle Monitoring for Cleaner Air

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02018

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02018

  Register Paper ID - 301040

  Title: TECH-DRIVEN POLLUTION CONTROL: INTELLIGENT VEHICLE MONITORING FOR CLEANER AIR

  Author Name(s): Priyanka Kotnala, Tejas Langhe, Akanksha Malusare, Prof.Prachi Deshpande

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 88-90

 Year: February 2026

 Downloads: 84

 Abstract

Air pollution in urban areas is increasingly driven by vehicle emissions, which release harmful gases include such things as carbon monoxide (CO), nitrogen oxides (NOx), hydrocarbons (HC), and particulate matter (PM). These pollutants pose significant risks to both environmental quality and public health, highlighting the urgent need for effective monitoring and control systems. This project presents the development of an automated Effective Air Pollution Monitoring System for Eco Balance, designed to detect exhaust gas levels in real-time as vehicles pass designated points. The system employs advanced sensors to monitor pollutant concentrations and utilizes a camera- based recognition system to capture the number plates of vehicles that exceed permissible emission levels. The collected data, including pollution metrics and vehicle details, is transmitted to the Regional Transport Office (RTO) for necessary enforcement actions. By promoting compliance with emission standards, this automated system aims to significantly reduce vehicle-related air pollution, fostering a cleaner and healthier urban environment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Air Pollution, Vehicle Emission, Pollution Sensor, Camera-Based Recognition, Vehicle Identification, Regional Transport Office (RTO)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Advancements in E-Waste Management Systems and Pollution Control: A Comprehensive Review in the IT Domain

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02017

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02017

  Register Paper ID - 301041

  Title: ADVANCEMENTS IN E-WASTE MANAGEMENT SYSTEMS AND POLLUTION CONTROL: A COMPREHENSIVE REVIEW IN THE IT DOMAIN

  Author Name(s): Jadish Singh, Mohit Sharma, Preet Kumar, Ramkishan Gupta, Trupti Najan

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 86-87

 Year: February 2026

 Downloads: 84

 Abstract

The rapid expansion of the Information Technology (IT) sector has significantly contributed to the global e-waste crisis. Electronic waste (e-waste) consists of discarded electrical and electronic equipment, which, if improperly managed, poses severe environmental and health hazards. This review paper consolidates insights from various research studies, examining the challenges, technological innovations, circular economy approaches, regulatory frameworks, and socio-environmental impacts associated with e-waste management. It also highlights sustainable solutions, including Artificial Intelligence (AI)-driven recycling, blockchain-based tracking systems, and eco-design strategies, offering a roadmap for future advancements in the domain. By integrating data from multiple sources and case studies, this paper presents a holistic overview of current e-waste management trends and suggests actionable strategies for effective waste mitigation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Advancements in E-Waste Management Systems and Pollution Control: A Comprehensive Review in the IT Domain

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FINGERPRINT BASED SMART ATTENDANCE SYSTEM USING IOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBL02016

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBL02016

  Register Paper ID - 301042

  Title: FINGERPRINT BASED SMART ATTENDANCE SYSTEM USING IOT

  Author Name(s): Dr.Ankush Kadu, Kanchan Vaidya, Shivam Agrawal, Mr.Shambhuraj Chavan, Ms.Sanika Jadhav, Mr.Karan Kanhurkar

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 2

 Pages: 79-85

 Year: February 2026

 Downloads: 91

 Abstract

Proper attendance record-keeping is critical in schools for tracking student participation and performance. Conventional approaches, including manual registers and RFID-based systems, are prone to errors, tampering, and inefficiencies. This research proposes a Fingerprint-Based Smart Attendance Management System Using IoT, which tracks attendance automatically using biometric verification. The system utilizes an ESP32 microcontroller coupled with a fingerprint sensor to scan and authenticate student identities. Attendance records are stored and analyzed in a Python-based system with real-time tracking through a web-based interface. Additionally, when a student has an attendance level of less than 75%, an automatic warning message is sent to their parents. The proposed system improves the accuracy, stops proxy attendance, and enhances overall efficiency in handling attendance. With the integration of IoT and biometric authentication, the system guarantees a secure, scalable, and user-friendly process for tracking attendance


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Attendance Monitoring System (AMS), Automated Attendance Tracking, Cloud-based Systems, Fingerprint Recognition, Internet of Things (IoT).

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 14 | Issue 4 | Month- April 2026)

Call For Paper April 2026
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A digital object identifier by DOI.org How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer