ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: AN EFFICIENT AGING LEADER BASED PARTICLE SWARM OPTIMIZATION TECHNIQUES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892211
Register Paper ID - 186589
Title: AN EFFICIENT AGING LEADER BASED PARTICLE SWARM OPTIMIZATION TECHNIQUES
Author Name(s): Amarjot Kaur , Jagdeep Singh
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1389-1395
Year: April 2018
Downloads: 1097
A fresh watermarking strategy on the basis of discrete wavelet transform in conjunction with aging leader-based particle swarm optimization based SVD has been proposed in this paper. The watermark scrambling has also been done by using the Arnold transform to safeguard it. Arnold transform modify the watermark in such a way that it becomes meaningless for the hackers or crackers. The use of aging leader-based particle swarm optimization based SVD has been improved the speed and security of the watermarking technique further. Extensive analysis reveals that the proposed technique outperforms existing watermarking techniques
Licence: creative commons attribution 4.0
Discrete wavelet transform, Singular value decomposition, Arnold transform, Artificial Bee Colony
Paper Title: AN ANTHROPOMETRIC STUDY ON NORMAL INDIAN FEMALES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892210
Register Paper ID - 186403
Title: AN ANTHROPOMETRIC STUDY ON NORMAL INDIAN FEMALES
Author Name(s): Shabnam Chowdhury, Barnali Mondal, Riya Das, Arup Kumar Sinha, Pradip De and Somnath Bhakat
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1383-1388
Year: April 2018
Downloads: 1122
Body proportions are the significant phenotypic characteristics of human beings. Study of human morphology allowed research to focus on more meaningful biological, medical, social and aesthetic implications. Sixty eight normal Indian females of age ranges from 3 to 49 years of four height groups were studied for data collection. Five different body parts, viz. leg length, foot length, arm span, cephalic diameter and hand length in percentage of height was calculated to determine growth pattern i.e. allometric or isometric. The result showed that hand length and foot length changes isometrically, while, negative allometric growth is observed in arm span and cephalic diameter. Only leg length showed slight positive allometric growth. Regression equations are formulated by using five body parts against height and all these analyses showed positive significant correlation. The fixed ratio of arm span /height in the present study is 1.12 which is different from the unisex value 1.06. Findings of other workers and present study suggested that the ratio varies with age, ethnicity and sex.
Licence: creative commons attribution 4.0
Allometric growth, arm span/height ratio, body parts, height, isometric growth
Paper Title: A COMPREHENSIVE STUDY OF VARIOUS SECURITY-SENSITIVE JOB SCHEDULING TECHNIQUES A COMPREHENSIVE STUDY OF VARIOUS SECURITY-SENSITIVE JOB SCHEDULING TECHNIQUES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892209
Register Paper ID - 186394
Title: A COMPREHENSIVE STUDY OF VARIOUS SECURITY-SENSITIVE JOB SCHEDULING TECHNIQUES A COMPREHENSIVE STUDY OF VARIOUS SECURITY-SENSITIVE JOB SCHEDULING TECHNIQUES
Author Name(s): Amanpreet Kaur
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1374-1382
Year: April 2018
Downloads: 1113
Cloud computing has become popular due to its wide range of applications via internet. The service composition based techniques that are conscious from the server selection from the cloud can progress to the cost and efficiency of cloud computing. This paper has focused on the comprehensive review on security-sensitive scheduling techniques. The comparative analysis indicates that existing techniques suffer from various issues. The overall objective of this paper is to compare and evaluate the various limitations in existing job scheduling techniques. In the end of this paper, suitable future challenges have also been presented
Licence: creative commons attribution 4.0
concurrency ,DAG scheduling
Paper Title: ANALYSIS OF NETWORK LAYER ATTACKS ON SECURE ROUTING PROTOCOL IN MANET
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892208
Register Paper ID - 186273
Title: ANALYSIS OF NETWORK LAYER ATTACKS ON SECURE ROUTING PROTOCOL IN MANET
Author Name(s): Rashmi
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1368-1373
Year: April 2018
Downloads: 1099
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secured routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of attacks and efficiency are primary points of concern in implementing these protocols. Some of the available secure routing protocols and most common network layer attacks against mobile ad hoc networks are evaluated. Secure routing protocols are analysed against the most commonly identified network layer attacks such as: denial-ofservice attack, tunneling, spoofing, blackhole attack and wormhole attack and their comparative analysis is also done
Licence: creative commons attribution 4.0
MANET, Secure Routing Protocols, Network Layer Attacks and Analysis.
Paper Title: VARIOUS WAYS TO ACHIEVE TRUST IN MANET
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892207
Register Paper ID - 186272
Title: VARIOUS WAYS TO ACHIEVE TRUST IN MANET
Author Name(s): Rashmi
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1362-1367
Year: April 2018
Downloads: 1096
Licence: creative commons attribution 4.0
MANET, Trust, Cluster based, Maturity based, PKI, ABED.
Paper Title: STUDY ON SECURITY THREATS IN MANET
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892206
Register Paper ID - 186218
Title: STUDY ON SECURITY THREATS IN MANET
Author Name(s): Rashmi
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1354-1361
Year: April 2018
Downloads: 1106
In this paper the authors will be discussing the security issues in MANET & the methods to protect it. Authors will be talk about related work in securing the network, different type of attacks, how to sense these sorts of attack, what are the features of MANET, then will be describing what the requirements for securing network are. Investigation had been done in past to maintain the network from attacks but due to the feature of MANET, inappropriate infrastructure and due to the disperse network quality it is open to attack. Authors will be tackling the defence against each attack. Solution has been suggested, So that the users can use proper authentication techniques and network resources can be properly utilized.
Licence: creative commons attribution 4.0
Mobile Ad hoc Network MANET, Destination Sequence Distance Vector DSDV, Dynamic Source routing DSR, Ad-hoc on demand distance vector AOD , Truster Mobile Node TrMN, Associated Trusted Mobile Node (ATMn), Trusted Mobile Node (TdMN), Secure temporarily ordered routing Protocol STOP, Cluster based trust aware routing protocol (CBTRP), Intrusion detection system (IDS), Network intrusion detection systems (NIDS), System integrity verifiers (SIV), Log file monitors (LFM).
Paper Title: DESIGN AND FABRICATION OF CNC MILLING MACHINE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892205
Register Paper ID - 186086
Title: DESIGN AND FABRICATION OF CNC MILLING MACHINE
Author Name(s): Amir Khan, Aditya Kumar Shukla, Aashish Singh, Aman Umrao, Nitin Kumar Yadav
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1347-1353
Year: April 2018
Downloads: 1135
The idea of making a compact and low cost 3 axis CNC MILLING MACHINE comes from increase in demand of low cost and Portable machine..As the increase in rapid growth of technology and software available..It is not difficult so we decided to make a machine which can mill the wood, plastics, thin sheet and alloy..Design and Fabrication is done using a Precision Stepper Motor that combined with Belt and Pulley arrangement on the gantry type aluminum structure on which the x and y axis is smoothly slide on rail bearing and for z axis we use Threaded rod and arrangement for up and down motion that increases and more precisely result obtained..It is an Microcontroller (Arduino uno) based embedded system with a standard Pc user interface software for easy drawing..The System also features an offline G code parser and then interpretated on the microcontroller from a USB. Improved procedures are employed in the system to reduce the computational overheads in controlling a 3-axis CNC machine, while avoiding any loss in overall system performance.
Licence: creative commons attribution 4.0
Mini CNC milling,3axis, Arduino
Paper Title: VOICE RECOGNITION BASED WHEELCHAIR ROBOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892204
Register Paper ID - 186023
Title: VOICE RECOGNITION BASED WHEELCHAIR ROBOT
Author Name(s): Punam V. Dambhare, Jyoti R. Vyavhare, Soni S. Doifode, Sandesh D. Wankhede, Prof. Priyanka H. Kadam, Ashish P. Thakare
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1344-1346
Year: April 2018
Downloads: 1088
Licence: creative commons attribution 4.0
Arduinounomicrocontroller, wheelchair, motors, HM2007 voice recognition kit
Paper Title: BIO-ETHANOL FUEL PRODUCTION BY WHITE ROT FUNGI FOR FUTURE ENERGY NEEDS AND ECONOMY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892203
Register Paper ID - 185969
Title: BIO-ETHANOL FUEL PRODUCTION BY WHITE ROT FUNGI FOR FUTURE ENERGY NEEDS AND ECONOMY
Author Name(s): Praveen Kumar Nagadesi *
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1335-1343
Year: April 2018
Downloads: 1109
The energy policy of India is largely defined by the country's expanding energy deficit and increased focus on developing alternative sources of energy. The primary energy consumption in India is the third biggest after China and USA with 5.3% global share in 2015. In 2013, India's net imports are nearly 255.3 Mtone of primary energy which is equal to 42.9% of total primary energy consumption. India is largely dependent on fossil fuel imports to meet its energy demands by 2030. India's dependence on energy imports is expected to exceed 53% of the country's total energy consumption. India's growing energy demands and limited domestic fossil fuel reserves, concerns about climate change from greenhouse gas emissions and the desire to promote domestic rural economies, the country has ambitious plans to expand towards renewable energy resources. The current availability of biomass in India is estimated at about 500 million metric tones. The biomass sources contribute 14% of global energy and 38% of energy in developing countries. Ministry of New and Renewable Energy Sources (MNERS) has proposed to reach total 4324.22 MW of power generation in villages based on biomass power and gasification as well as co-generation. the cost of bio-ethanol was considerably higher than the cost of fossil gasoline supply. lignocellulosic materials are an attractive option for the production of bio-fuels. Lignocellulosic materials serve as a cheap and abundant feedstock, which is required to produce fuel ethanol from Biomass resources at reasonable costs. White-rot fungi are the most effective basidiomycetes for biological pretreatment of lignocellulosic materials. so lignicolous fungi like Pleurotus ostreatus, Phanerochaete sordid, Sporotrichum pulverulentum, Ceriporiopsis subvermispora, Cyathus stercoreus, Phanerochaete chrysosporium, Lenzites betulinus, etc. were used for bioethanol production. The white rot fungi present in Andhra Pradesh also useful for bio ethanol fuel production.
Licence: creative commons attribution 4.0
Bioethanol, Bio fuel, Economy, Energy needs, white rot fungi
Paper Title: PERFORMANCES OF LMS AND RLS ALGORITHMS FOR THE DESIGN OF SMART ANTENNA OF MICROSTRIP ARRAY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892202
Register Paper ID - 185857
Title: PERFORMANCES OF LMS AND RLS ALGORITHMS FOR THE DESIGN OF SMART ANTENNA OF MICROSTRIP ARRAY
Author Name(s): Anwesha Halder, Anupama Senapati, Jibendu Sekhar Roy
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1329-1334
Year: April 2018
Downloads: 1105
Comparative studies on performances of least mean square (LMS) algorithm and recursive least square (RLS) algorithm for the design of adaptive smart antenna of microstrip array are presented in this paper. Microstrip array considered here is E-plane array. Beamforming using RLS algorithm provides reduced side lobe level (SLL) compared to that using LMS algorithm and directivity of radiation beam in RLS algorithm is higher than that obtained using LMS algorithm.
Licence: creative commons attribution 4.0
- Smart antenna, LMS Algorithm, RLS Algorithm, side lobe level
Paper Title: REVIEW ON ETHICAL HACKING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892201
Register Paper ID - 185836
Title: REVIEW ON ETHICAL HACKING
Author Name(s): Danish sharma, Rituraj Chandra, C.K Raina
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1321-1328
Year: April 2018
Downloads: 1189
as we all know web is developing at first speed and the state of security on the internet is poor.all the data is given to everybody in single tick.hacking is process in which,a person or team exploits the weakness in a system for self proceeds or indulgence.ethical hacking is an activity which focus on the vulnerability in a system and discovers the weakness and try to rectify the security weakness of a system.ethical hacker play a vital role of protecting the valuable and sensitive data in a system.he endeavors to copy the expectation and activities of noxious programmers without bringing about mischief.this paper tries to portray thought of ethical hacking,tools and everyone of its angle in general.
Licence: creative commons attribution 4.0
ethical hacking,hacking phases,penetration,hacking tools
Paper Title: REVIEW OF CROWD COMPUTING AS A SOURCING TOOL AND AN INNOVATIVEFIELD OF DATA MINING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892200
Register Paper ID - 185792
Title: REVIEW OF CROWD COMPUTING AS A SOURCING TOOL AND AN INNOVATIVEFIELD OF DATA MINING
Author Name(s): Reena Hooda
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1316-1320
Year: April 2018
Downloads: 1129
Human population is the biggest source that is all time available and easily reachable at low costs. The major concern of data mining technologies is to find the interesting patterns and new scopes of applicability. Crowd computing involves elements like machine learning that is current application of artificial intelligence, electronic systems crowd sourcing and connectivity. By owning a system, internet facility,one can establish a full-fledged business usingcrowd a source to perform certain tasks without any requirements for further infrastructural facilities like buildings, machines etc. Crowd sourcing offers two notions, one is for performing tasks and other for providing data for knowledge discovery or a s training data set for computational systems. Keep in view all sides, present papers highlights the evolution of crowd computing, crowd sourcing, significance for data mining along with problems, and necessities of preprocessing methods.
Licence: creative commons attribution 4.0
Crowd Sourcing, Training Data Set, Data Mining, Preprocessing.
Paper Title: Method for Honeypot Technology
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892199
Register Paper ID - 185210
Title: METHOD FOR HONEYPOT TECHNOLOGY
Author Name(s): DEVIKA PRAKASH
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1310-1315
Year: April 2018
Downloads: 1128
Internet attacks have been increasing in a day to day bases and it cause greatest challenge in the data security. Security of data has to be improved and also it must have the power to detect zero-day attack and deploy them. Firewall is one tool that used to protect the organization from attacks. Intrusion Detection System (IDS) is another tool that is used to discover attacks in an organization. The main disadvantage of these tools is it produces false alarms, it gather only less information about the attacker and fail to identify zero-day attacks. Honeypot is a trap for the one who try to attack the system. Honeypot is designed in such a way that it hooks the attacker who tries to attack the system of any organization. In a honeypot network, attacker may not be aware that they are been tracing by gathering all the relevant information.
Licence: creative commons attribution 4.0
Honeypot, Honeynet, Network security, HoneyTokens, IDS
Paper Title: HOME AUTOMATION USING MICROCONTROLLERS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892198
Register Paper ID - 185209
Title: HOME AUTOMATION USING MICROCONTROLLERS
Author Name(s): Sachin S Srivathsa, Anirudh.S, Vinay.M, Ashwin.R
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1308-1309
Year: April 2018
Downloads: 1142
In this project a remote controlling home automation system is made. A program based microcontroller technology is used in this project, ATmega8 which assists in turning on or off the different load. It is essential to mention that; here we turn on or off different load as example Light, Fan, TV, etc. This mention work by the Microcontroller program and device used ATMega8. The ultimate goal of this project was to create a functional microcontroller & remote based load controlling system. For this project, it was important that the Microcontroller scheme be able to save our time and easy to switch.
Licence: creative commons attribution 4.0
Paper Title: Price Behaviour of Maize and Marketing Challenges of Maize in Davanagere, Karnataka
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892197
Register Paper ID - 184720
Title: PRICE BEHAVIOUR OF MAIZE AND MARKETING CHALLENGES OF MAIZE IN DAVANAGERE, KARNATAKA
Author Name(s): Abdul Rizwan Shariff Assistant Professor, Al_Ameen Institute of Management Studies, Bngaluru-27, Karnataka. Email Id -rizoo.shariff@gmail.com, Contact NO- 7899942126/9538691381, Dr.Ramappa K B Associate Professor, Agricultural Development and Rural Transformation Centre, Institute For Social and Economic Change (ISEC), Bengaluru, Karnataka,
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1303-1307
Year: April 2018
Downloads: 1264
ABSTRACT Maize (Zea mays L) is one of the most versatile emerging crops having wider adaptability under varied agro-climatic conditions. Globally, maize is known as queen of cereals because it has the highest genetic yield potential among the cereals. It is cultivated on nearly 150 m ha in about 160 countries having wider diversity of soil, climate, biodiversity and management practices that contributes 36 % (782 m t) in the global grain production. The primary objective of the current research is to bring out the MSP of maize, price behaviour and the marketing challenges. The study was conducted in the Davanagera District of Karnataka to analyze the MSP and Constraints in Maize marketing and price behaviour. 40 farmers were selected randomly from each different village. The marketing constraints have been measured on the parameters of storage facility, price fluctuations, payment issues and transportation. Key Words: Price Behaviour, agricultural Commodities, Minimum Selling Price, Marketing Constraints
Licence: creative commons attribution 4.0
Key Words: Price Behaviour, agricultural Commodities, Minimum Selling Price, Marketing Constraints
Paper Title: ASSESSMENT OF DROUGHT VULNERABILTY OF ERNAKULAM DISTRICT USING SPI INDEX.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892196
Register Paper ID - 184311
Title: ASSESSMENT OF DROUGHT VULNERABILTY OF ERNAKULAM DISTRICT USING SPI INDEX.
Author Name(s): ANU C PAUL, ELIZABETH POULOSE N, HELEN PETER, MERINA SAJU, GINU S MALAKEEL
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1297-1302
Year: April 2018
Downloads: 1116
Drought is a deceptive risk of nature. It is frequently alluded to as a "creeping phenomenon" and its effects fluctuate from area to district. The SPI calculation for any location is based on the long-term precipitation record for a desired period. This longterm record is fitted to a probability distribution, which is then transformed into a normal distribution so that the mean SPI for the location and desired period is zero. The rainfall data from year 1985 to 2015 was collected from the Indian meteorological department. We had assessed the drought from year 1985 to 2015 using SPI index. Year wise map was prepared separately for the same. Using ARIMA model we had predicted the SPI map of 2030.
Licence: creative commons attribution 4.0
SPI Index,ARIMA,Drought vulnerabilty map
Paper Title: PLC/SCADA BASED MACHINE DATA ENUMERATOR
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892195
Register Paper ID - 183817
Title: PLC/SCADA BASED MACHINE DATA ENUMERATOR
Author Name(s): HARSHIT UPADHYAY, BHUPENDRA SINGH SHEKHAWAT, ISHITA SHARMA, KARAN BARI
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1292-1296
Year: April 2018
Downloads: 1160
The issue of fault analysis is very paramount in any electrical network, therefore we aid in analysis of faults by bringing a continuous parameters analyser of equipment connected in an electrical network. The parameter analyser will help in depicting real time data of the connected machine on to a graph. This graphical representation onto a computer screen will be done with the help of Wonderware SCADA using Intouch software. This software will be connected through a programmable logic controller (PLC). We will be using a Micrologix 1000 series of PLC, with communication software-RS linx 2.4version and programming software- RS logix 500 English. This PLC will acts a linkage between hardware and our Intouch software of SCADA and with the help of parameters detection troubleshooting in the electrical network can be performed. The basic advantage of automated machine data enumerator is to determine and protect the machine from the various faults such as over current, over voltage etc. An additional benefit of this project is to plot various parameters which describe the complete specifications of connected machinery.
Licence: creative commons attribution 4.0
Automation; PLC; SCADA; Applications of PLC/SCADA; Data Enumerator; Fault Analysis.
Paper Title: OPINION MINING USING INCREMENTAL MACHINE LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892194
Register Paper ID - 186530
Title: OPINION MINING USING INCREMENTAL MACHINE LEARNING
Author Name(s): Sagar Agarwal, Aafra Shaikh, Aishwarya sharma, Neetu yadav
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1289-1291
Year: April 2018
Downloads: 1125
Licence: creative commons attribution 4.0
Opinion mining, sentimental analysis;
Paper Title: QUANDARY OVER TEACHING AND LEARNING ENGLISH
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892193
Register Paper ID - 186586
Title: QUANDARY OVER TEACHING AND LEARNING ENGLISH
Author Name(s): Mrs. Tasmin V. Mujawar
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1287-1288
Year: April 2018
Downloads: 1127
Teaching and learning English as a second language has always faced certain amount of problems. Although students spend a long time in English classes they still do not achieve desirable Command over the language. Thus this paper ties to find out the problem areas in teaching learning English.
Licence: creative commons attribution 4.0
Paper Title: APPLYING DCT AND DWT COMBINATION IN IMAGE SEGMENTATION FOR DETECTION OF BENIGN AND MALIGNANT TUMORS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1892192
Register Paper ID - 186598
Title: APPLYING DCT AND DWT COMBINATION IN IMAGE SEGMENTATION FOR DETECTION OF BENIGN AND MALIGNANT TUMORS
Author Name(s): Mr. Santosh V. Vishwakarma, Prof. B.G.Hogade
Publisher Journal name: IJCRT
Volume: 6
Issue: 2
Pages: 1283-1286
Year: April 2018
Downloads: 1092
it is very important to detect brain tumor from MRI images in automated diagnosis of brain tumor images. Therefore it is important to have an algorithm for the treatment of MRI images to detect a tumor. We developed a new approach by using the treatment of image in frequency domain who classifies accurately the brain tumor from the MRI image. We have used the combination of DCT and DWT with SVM to classify tumors. We could classify MRI images automatically in benign and malignant tumors.
Licence: creative commons attribution 4.0
Discrete cosine transform, discrete wavelet transform, Support vector machine, Tumor detection.
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 7 | Month- July 2024)