Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 6 | Issue 2

Volume 6 | Issue 2 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: AN EFFICIENT AGING LEADER BASED PARTICLE SWARM OPTIMIZATION TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892211

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892211

  Register Paper ID - 186589

  Title: AN EFFICIENT AGING LEADER BASED PARTICLE SWARM OPTIMIZATION TECHNIQUES

  Author Name(s): Amarjot Kaur , Jagdeep Singh

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1389-1395

 Year: April 2018

 Downloads: 1097

 Abstract

A fresh watermarking strategy on the basis of discrete wavelet transform in conjunction with aging leader-based particle swarm optimization based SVD has been proposed in this paper. The watermark scrambling has also been done by using the Arnold transform to safeguard it. Arnold transform modify the watermark in such a way that it becomes meaningless for the hackers or crackers. The use of aging leader-based particle swarm optimization based SVD has been improved the speed and security of the watermarking technique further. Extensive analysis reveals that the proposed technique outperforms existing watermarking techniques


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Discrete wavelet transform, Singular value decomposition, Arnold transform, Artificial Bee Colony

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AN ANTHROPOMETRIC STUDY ON NORMAL INDIAN FEMALES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892210

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892210

  Register Paper ID - 186403

  Title: AN ANTHROPOMETRIC STUDY ON NORMAL INDIAN FEMALES

  Author Name(s): Shabnam Chowdhury, Barnali Mondal, Riya Das, Arup Kumar Sinha, Pradip De and Somnath Bhakat

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1383-1388

 Year: April 2018

 Downloads: 1122

 Abstract

Body proportions are the significant phenotypic characteristics of human beings. Study of human morphology allowed research to focus on more meaningful biological, medical, social and aesthetic implications. Sixty eight normal Indian females of age ranges from 3 to 49 years of four height groups were studied for data collection. Five different body parts, viz. leg length, foot length, arm span, cephalic diameter and hand length in percentage of height was calculated to determine growth pattern i.e. allometric or isometric. The result showed that hand length and foot length changes isometrically, while, negative allometric growth is observed in arm span and cephalic diameter. Only leg length showed slight positive allometric growth. Regression equations are formulated by using five body parts against height and all these analyses showed positive significant correlation. The fixed ratio of arm span /height in the present study is 1.12 which is different from the unisex value 1.06. Findings of other workers and present study suggested that the ratio varies with age, ethnicity and sex.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Allometric growth, arm span/height ratio, body parts, height, isometric growth

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPREHENSIVE STUDY OF VARIOUS SECURITY-SENSITIVE JOB SCHEDULING TECHNIQUES A COMPREHENSIVE STUDY OF VARIOUS SECURITY-SENSITIVE JOB SCHEDULING TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892209

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892209

  Register Paper ID - 186394

  Title: A COMPREHENSIVE STUDY OF VARIOUS SECURITY-SENSITIVE JOB SCHEDULING TECHNIQUES A COMPREHENSIVE STUDY OF VARIOUS SECURITY-SENSITIVE JOB SCHEDULING TECHNIQUES

  Author Name(s): Amanpreet Kaur

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1374-1382

 Year: April 2018

 Downloads: 1113

 Abstract

Cloud computing has become popular due to its wide range of applications via internet. The service composition based techniques that are conscious from the server selection from the cloud can progress to the cost and efficiency of cloud computing. This paper has focused on the comprehensive review on security-sensitive scheduling techniques. The comparative analysis indicates that existing techniques suffer from various issues. The overall objective of this paper is to compare and evaluate the various limitations in existing job scheduling techniques. In the end of this paper, suitable future challenges have also been presented


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

concurrency ,DAG scheduling

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANALYSIS OF NETWORK LAYER ATTACKS ON SECURE ROUTING PROTOCOL IN MANET

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892208

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892208

  Register Paper ID - 186273

  Title: ANALYSIS OF NETWORK LAYER ATTACKS ON SECURE ROUTING PROTOCOL IN MANET

  Author Name(s): Rashmi

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1368-1373

 Year: April 2018

 Downloads: 1099

 Abstract

An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secured routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of attacks and efficiency are primary points of concern in implementing these protocols. Some of the available secure routing protocols and most common network layer attacks against mobile ad hoc networks are evaluated. Secure routing protocols are analysed against the most commonly identified network layer attacks such as: denial-ofservice attack, tunneling, spoofing, blackhole attack and wormhole attack and their comparative analysis is also done


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

MANET, Secure Routing Protocols, Network Layer Attacks and Analysis.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: VARIOUS WAYS TO ACHIEVE TRUST IN MANET

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892207

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892207

  Register Paper ID - 186272

  Title: VARIOUS WAYS TO ACHIEVE TRUST IN MANET

  Author Name(s): Rashmi

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1362-1367

 Year: April 2018

 Downloads: 1096

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

MANET, Trust, Cluster based, Maturity based, PKI, ABED.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STUDY ON SECURITY THREATS IN MANET

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892206

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892206

  Register Paper ID - 186218

  Title: STUDY ON SECURITY THREATS IN MANET

  Author Name(s): Rashmi

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1354-1361

 Year: April 2018

 Downloads: 1106

 Abstract

In this paper the authors will be discussing the security issues in MANET & the methods to protect it. Authors will be talk about related work in securing the network, different type of attacks, how to sense these sorts of attack, what are the features of MANET, then will be describing what the requirements for securing network are. Investigation had been done in past to maintain the network from attacks but due to the feature of MANET, inappropriate infrastructure and due to the disperse network quality it is open to attack. Authors will be tackling the defence against each attack. Solution has been suggested, So that the users can use proper authentication techniques and network resources can be properly utilized.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Mobile Ad hoc Network MANET, Destination Sequence Distance Vector DSDV, Dynamic Source routing DSR, Ad-hoc on demand distance vector AOD , Truster Mobile Node TrMN, Associated Trusted Mobile Node (ATMn), Trusted Mobile Node (TdMN), Secure temporarily ordered routing Protocol STOP, Cluster based trust aware routing protocol (CBTRP), Intrusion detection system (IDS), Network intrusion detection systems (NIDS), System integrity verifiers (SIV), Log file monitors (LFM).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN AND FABRICATION OF CNC MILLING MACHINE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892205

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892205

  Register Paper ID - 186086

  Title: DESIGN AND FABRICATION OF CNC MILLING MACHINE

  Author Name(s): Amir Khan, Aditya Kumar Shukla, Aashish Singh, Aman Umrao, Nitin Kumar Yadav

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1347-1353

 Year: April 2018

 Downloads: 1135

 Abstract

The idea of making a compact and low cost 3 axis CNC MILLING MACHINE comes from increase in demand of low cost and Portable machine..As the increase in rapid growth of technology and software available..It is not difficult so we decided to make a machine which can mill the wood, plastics, thin sheet and alloy..Design and Fabrication is done using a Precision Stepper Motor that combined with Belt and Pulley arrangement on the gantry type aluminum structure on which the x and y axis is smoothly slide on rail bearing and for z axis we use Threaded rod and arrangement for up and down motion that increases and more precisely result obtained..It is an Microcontroller (Arduino uno) based embedded system with a standard Pc user interface software for easy drawing..The System also features an offline G code parser and then interpretated on the microcontroller from a USB. Improved procedures are employed in the system to reduce the computational overheads in controlling a 3-axis CNC machine, while avoiding any loss in overall system performance.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Mini CNC milling,3axis, Arduino

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: VOICE RECOGNITION BASED WHEELCHAIR ROBOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892204

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892204

  Register Paper ID - 186023

  Title: VOICE RECOGNITION BASED WHEELCHAIR ROBOT

  Author Name(s): Punam V. Dambhare, Jyoti R. Vyavhare, Soni S. Doifode, Sandesh D. Wankhede, Prof. Priyanka H. Kadam, Ashish P. Thakare

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1344-1346

 Year: April 2018

 Downloads: 1088

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduinounomicrocontroller, wheelchair, motors, HM2007 voice recognition kit

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BIO-ETHANOL FUEL PRODUCTION BY WHITE ROT FUNGI FOR FUTURE ENERGY NEEDS AND ECONOMY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892203

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892203

  Register Paper ID - 185969

  Title: BIO-ETHANOL FUEL PRODUCTION BY WHITE ROT FUNGI FOR FUTURE ENERGY NEEDS AND ECONOMY

  Author Name(s): Praveen Kumar Nagadesi *

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1335-1343

 Year: April 2018

 Downloads: 1109

 Abstract

The energy policy of India is largely defined by the country's expanding energy deficit and increased focus on developing alternative sources of energy. The primary energy consumption in India is the third biggest after China and USA with 5.3% global share in 2015. In 2013, India's net imports are nearly 255.3 Mtone of primary energy which is equal to 42.9% of total primary energy consumption. India is largely dependent on fossil fuel imports to meet its energy demands by 2030. India's dependence on energy imports is expected to exceed 53% of the country's total energy consumption. India's growing energy demands and limited domestic fossil fuel reserves, concerns about climate change from greenhouse gas emissions and the desire to promote domestic rural economies, the country has ambitious plans to expand towards renewable energy resources. The current availability of biomass in India is estimated at about 500 million metric tones. The biomass sources contribute 14% of global energy and 38% of energy in developing countries. Ministry of New and Renewable Energy Sources (MNERS) has proposed to reach total 4324.22 MW of power generation in villages based on biomass power and gasification as well as co-generation. the cost of bio-ethanol was considerably higher than the cost of fossil gasoline supply. lignocellulosic materials are an attractive option for the production of bio-fuels. Lignocellulosic materials serve as a cheap and abundant feedstock, which is required to produce fuel ethanol from Biomass resources at reasonable costs. White-rot fungi are the most effective basidiomycetes for biological pretreatment of lignocellulosic materials. so lignicolous fungi like Pleurotus ostreatus, Phanerochaete sordid, Sporotrichum pulverulentum, Ceriporiopsis subvermispora, Cyathus stercoreus, Phanerochaete chrysosporium, Lenzites betulinus, etc. were used for bioethanol production. The white rot fungi present in Andhra Pradesh also useful for bio ethanol fuel production.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Bioethanol, Bio fuel, Economy, Energy needs, white rot fungi

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PERFORMANCES OF LMS AND RLS ALGORITHMS FOR THE DESIGN OF SMART ANTENNA OF MICROSTRIP ARRAY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892202

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892202

  Register Paper ID - 185857

  Title: PERFORMANCES OF LMS AND RLS ALGORITHMS FOR THE DESIGN OF SMART ANTENNA OF MICROSTRIP ARRAY

  Author Name(s): Anwesha Halder, Anupama Senapati, Jibendu Sekhar Roy

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1329-1334

 Year: April 2018

 Downloads: 1105

 Abstract

Comparative studies on performances of least mean square (LMS) algorithm and recursive least square (RLS) algorithm for the design of adaptive smart antenna of microstrip array are presented in this paper. Microstrip array considered here is E-plane array. Beamforming using RLS algorithm provides reduced side lobe level (SLL) compared to that using LMS algorithm and directivity of radiation beam in RLS algorithm is higher than that obtained using LMS algorithm.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

- Smart antenna, LMS Algorithm, RLS Algorithm, side lobe level

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW ON ETHICAL HACKING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892201

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892201

  Register Paper ID - 185836

  Title: REVIEW ON ETHICAL HACKING

  Author Name(s): Danish sharma, Rituraj Chandra, C.K Raina

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1321-1328

 Year: April 2018

 Downloads: 1189

 Abstract

as we all know web is developing at first speed and the state of security on the internet is poor.all the data is given to everybody in single tick.hacking is process in which,a person or team exploits the weakness in a system for self proceeds or indulgence.ethical hacking is an activity which focus on the vulnerability in a system and discovers the weakness and try to rectify the security weakness of a system.ethical hacker play a vital role of protecting the valuable and sensitive data in a system.he endeavors to copy the expectation and activities of noxious programmers without bringing about mischief.this paper tries to portray thought of ethical hacking,tools and everyone of its angle in general.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ethical hacking,hacking phases,penetration,hacking tools

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW OF CROWD COMPUTING AS A SOURCING TOOL AND AN INNOVATIVEFIELD OF DATA MINING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892200

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892200

  Register Paper ID - 185792

  Title: REVIEW OF CROWD COMPUTING AS A SOURCING TOOL AND AN INNOVATIVEFIELD OF DATA MINING

  Author Name(s): Reena Hooda

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1316-1320

 Year: April 2018

 Downloads: 1129

 Abstract

Human population is the biggest source that is all time available and easily reachable at low costs. The major concern of data mining technologies is to find the interesting patterns and new scopes of applicability. Crowd computing involves elements like machine learning that is current application of artificial intelligence, electronic systems crowd sourcing and connectivity. By owning a system, internet facility,one can establish a full-fledged business usingcrowd a source to perform certain tasks without any requirements for further infrastructural facilities like buildings, machines etc. Crowd sourcing offers two notions, one is for performing tasks and other for providing data for knowledge discovery or a s training data set for computational systems. Keep in view all sides, present papers highlights the evolution of crowd computing, crowd sourcing, significance for data mining along with problems, and necessities of preprocessing methods.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Crowd Sourcing, Training Data Set, Data Mining, Preprocessing.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Method for Honeypot Technology

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892199

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892199

  Register Paper ID - 185210

  Title: METHOD FOR HONEYPOT TECHNOLOGY

  Author Name(s): DEVIKA PRAKASH

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1310-1315

 Year: April 2018

 Downloads: 1128

 Abstract

Internet attacks have been increasing in a day to day bases and it cause greatest challenge in the data security. Security of data has to be improved and also it must have the power to detect zero-day attack and deploy them. Firewall is one tool that used to protect the organization from attacks. Intrusion Detection System (IDS) is another tool that is used to discover attacks in an organization. The main disadvantage of these tools is it produces false alarms, it gather only less information about the attacker and fail to identify zero-day attacks. Honeypot is a trap for the one who try to attack the system. Honeypot is designed in such a way that it hooks the attacker who tries to attack the system of any organization. In a honeypot network, attacker may not be aware that they are been tracing by gathering all the relevant information.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Honeypot, Honeynet, Network security, HoneyTokens, IDS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HOME AUTOMATION USING MICROCONTROLLERS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892198

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892198

  Register Paper ID - 185209

  Title: HOME AUTOMATION USING MICROCONTROLLERS

  Author Name(s): Sachin S Srivathsa, Anirudh.S, Vinay.M, Ashwin.R

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1308-1309

 Year: April 2018

 Downloads: 1142

 Abstract

In this project a remote controlling home automation system is made. A program based microcontroller technology is used in this project, ATmega8 which assists in turning on or off the different load. It is essential to mention that; here we turn on or off different load as example Light, Fan, TV, etc. This mention work by the Microcontroller program and device used ATMega8. The ultimate goal of this project was to create a functional microcontroller & remote based load controlling system. For this project, it was important that the Microcontroller scheme be able to save our time and easy to switch.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

home automation, IOT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Price Behaviour of Maize and Marketing Challenges of Maize in Davanagere, Karnataka

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892197

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892197

  Register Paper ID - 184720

  Title: PRICE BEHAVIOUR OF MAIZE AND MARKETING CHALLENGES OF MAIZE IN DAVANAGERE, KARNATAKA

  Author Name(s): Abdul Rizwan Shariff Assistant Professor, Al_Ameen Institute of Management Studies, Bngaluru-27, Karnataka. Email Id -rizoo.shariff@gmail.com, Contact NO- 7899942126/9538691381, Dr.Ramappa K B Associate Professor, Agricultural Development and Rural Transformation Centre, Institute For Social and Economic Change (ISEC), Bengaluru, Karnataka,

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1303-1307

 Year: April 2018

 Downloads: 1264

 Abstract

ABSTRACT Maize (Zea mays L) is one of the most versatile emerging crops having wider adaptability under varied agro-climatic conditions. Globally, maize is known as queen of cereals because it has the highest genetic yield potential among the cereals. It is cultivated on nearly 150 m ha in about 160 countries having wider diversity of soil, climate, biodiversity and management practices that contributes 36 % (782 m t) in the global grain production. The primary objective of the current research is to bring out the MSP of maize, price behaviour and the marketing challenges. The study was conducted in the Davanagera District of Karnataka to analyze the MSP and Constraints in Maize marketing and price behaviour. 40 farmers were selected randomly from each different village. The marketing constraints have been measured on the parameters of storage facility, price fluctuations, payment issues and transportation. Key Words: Price Behaviour, agricultural Commodities, Minimum Selling Price, Marketing Constraints


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Key Words: Price Behaviour, agricultural Commodities, Minimum Selling Price, Marketing Constraints

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ASSESSMENT OF DROUGHT VULNERABILTY OF ERNAKULAM DISTRICT USING SPI INDEX.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892196

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892196

  Register Paper ID - 184311

  Title: ASSESSMENT OF DROUGHT VULNERABILTY OF ERNAKULAM DISTRICT USING SPI INDEX.

  Author Name(s): ANU C PAUL, ELIZABETH POULOSE N, HELEN PETER, MERINA SAJU, GINU S MALAKEEL

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1297-1302

 Year: April 2018

 Downloads: 1116

 Abstract

Drought is a deceptive risk of nature. It is frequently alluded to as a "creeping phenomenon" and its effects fluctuate from area to district. The SPI calculation for any location is based on the long-term precipitation record for a desired period. This longterm record is fitted to a probability distribution, which is then transformed into a normal distribution so that the mean SPI for the location and desired period is zero. The rainfall data from year 1985 to 2015 was collected from the Indian meteorological department. We had assessed the drought from year 1985 to 2015 using SPI index. Year wise map was prepared separately for the same. Using ARIMA model we had predicted the SPI map of 2030.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SPI Index,ARIMA,Drought vulnerabilty map

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PLC/SCADA BASED MACHINE DATA ENUMERATOR

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892195

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892195

  Register Paper ID - 183817

  Title: PLC/SCADA BASED MACHINE DATA ENUMERATOR

  Author Name(s): HARSHIT UPADHYAY, BHUPENDRA SINGH SHEKHAWAT, ISHITA SHARMA, KARAN BARI

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1292-1296

 Year: April 2018

 Downloads: 1160

 Abstract

The issue of fault analysis is very paramount in any electrical network, therefore we aid in analysis of faults by bringing a continuous parameters analyser of equipment connected in an electrical network. The parameter analyser will help in depicting real time data of the connected machine on to a graph. This graphical representation onto a computer screen will be done with the help of Wonderware SCADA using Intouch software. This software will be connected through a programmable logic controller (PLC). We will be using a Micrologix 1000 series of PLC, with communication software-RS linx 2.4version and programming software- RS logix 500 English. This PLC will acts a linkage between hardware and our Intouch software of SCADA and with the help of parameters detection troubleshooting in the electrical network can be performed. The basic advantage of automated machine data enumerator is to determine and protect the machine from the various faults such as over current, over voltage etc. An additional benefit of this project is to plot various parameters which describe the complete specifications of connected machinery.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Automation; PLC; SCADA; Applications of PLC/SCADA; Data Enumerator; Fault Analysis.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: OPINION MINING USING INCREMENTAL MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892194

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892194

  Register Paper ID - 186530

  Title: OPINION MINING USING INCREMENTAL MACHINE LEARNING

  Author Name(s): Sagar Agarwal, Aafra Shaikh, Aishwarya sharma, Neetu yadav

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1289-1291

 Year: April 2018

 Downloads: 1125

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Opinion mining, sentimental analysis;

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: QUANDARY OVER TEACHING AND LEARNING ENGLISH

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892193

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892193

  Register Paper ID - 186586

  Title: QUANDARY OVER TEACHING AND LEARNING ENGLISH

  Author Name(s): Mrs. Tasmin V. Mujawar

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1287-1288

 Year: April 2018

 Downloads: 1127

 Abstract

Teaching and learning English as a second language has always faced certain amount of problems. Although students spend a long time in English classes they still do not achieve desirable Command over the language. Thus this paper ties to find out the problem areas in teaching learning English.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: APPLYING DCT AND DWT COMBINATION IN IMAGE SEGMENTATION FOR DETECTION OF BENIGN AND MALIGNANT TUMORS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1892192

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1892192

  Register Paper ID - 186598

  Title: APPLYING DCT AND DWT COMBINATION IN IMAGE SEGMENTATION FOR DETECTION OF BENIGN AND MALIGNANT TUMORS

  Author Name(s): Mr. Santosh V. Vishwakarma, Prof. B.G.Hogade

 Publisher Journal name: IJCRT

 Volume: 6

 Issue: 2

 Pages: 1283-1286

 Year: April 2018

 Downloads: 1092

 Abstract

it is very important to detect brain tumor from MRI images in automated diagnosis of brain tumor images. Therefore it is important to have an algorithm for the treatment of MRI images to detect a tumor. We developed a new approach by using the treatment of image in frequency domain who classifies accurately the brain tumor from the MRI image. We have used the combination of DCT and DWT with SVM to classify tumors. We could classify MRI images automatically in benign and malignant tumors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Discrete cosine transform, discrete wavelet transform, Support vector machine, Tumor detection.

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 7 | Month- July 2024)

Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer