IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Trademark protection for the signature poses/moves of celebrities
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403895
Register Paper ID - 253866
Title: TRADEMARK PROTECTION FOR THE SIGNATURE POSES/MOVES OF CELEBRITIES
Author Name(s): Sherin Mathew
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h513-h517
Year: March 2024
Downloads: 224
One uncharted territory in the realm of trademarks is the trademarks protection of the signature poses of celebrities or famous personalities. Most of the celebrities have a pose or a move and the public identifies it with them. Celebrities are known for their unique identities, including their names and recognizable traits such as mannerisms, speech patterns, and voices, which can be considered a form of intellectual property. Their popularity and public recognition often stem from their talents and skills. In today's media-driven world, there is considerable value attached to utilizing a celebrity's image, characteristics, and behaviour, as these aspects contribute to their marketable appeal. They have personality rights protection as a common law remedy but the problem arises when the celebrities want to commercialize that pose or move,by making it a brand logo or mark, that is when the question of the trademark protection of the pose arises.Celebrity rights encompass various aspects such as advertising, personality, privacy, reproduction, and merchandising rights, among others. While there aren't specific laws dedicated solely to protecting these rights, they are typically safeguarded under trademark and copyright laws.When celebrities begin to commercialize their unique appearances or distinctive bodily features by incorporating them into merchandise, a strong argument can be made for establishing trademark rights for those specific goods.
Licence: creative commons attribution 4.0
Signature poses, personality rights, celebrities, trademark, publicity rights
Paper Title: DEVELOPMENT OF HUMAN RESOURCES BSNL'S RECENT STRUGGLES AND THE CURRENT CLIMATE: AN EXAMINATION OF THE ASSAM TELECOM CIRCLE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403894
Register Paper ID - 253867
Title: DEVELOPMENT OF HUMAN RESOURCES BSNL'S RECENT STRUGGLES AND THE CURRENT CLIMATE: AN EXAMINATION OF THE ASSAM TELECOM CIRCLE
Author Name(s): Fazlul Karim, Prof. N. Rokendro Singh
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h504-h512
Year: March 2024
Downloads: 248
Abstract The Indian Telecom Sector has become one of the fastest-growing areas of development, and it has recently seen significant expenditures from both the government and commercial companies alike. Assam's telecom sector has seen several good chances during the previous decade. Assam Telecom Circle has achieved a lot in this sector in terms of accessibility and connectivity throughout the state. For a nation's wealth and income to grow, neither any resource can be used to its fullest potential without the active engagement of human resources. Accordingly, the study focused on how BSNL has been able to cope with recent challenges and the existing organizational climate by taking into consideration the Assam Telecom circle. The review study focused on the positive and negative effects of human resource development on BSNL and the telecommunication sector. Keywords: Human Resource; Human Resource Development; Telecom Industry; BSNL; Assam Telecom Circle
Licence: creative commons attribution 4.0
Keywords: Human Resource; Human Resource Development; Telecom Industry; BSNL; Assam Telecom Circle
Paper Title: Evaluating the Impact of Continuous Integration and Continuous Deployment (CI/CD) On Software Development Lifecycle Efficiency
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403893
Register Paper ID - 253858
Title: EVALUATING THE IMPACT OF CONTINUOUS INTEGRATION AND CONTINUOUS DEPLOYMENT (CI/CD) ON SOFTWARE DEVELOPMENT LIFECYCLE EFFICIENCY
Author Name(s): Umang H Patel
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h495-h503
Year: March 2024
Downloads: 286
The paper is organized in such a way that it begins with an extensive examination of the literature on the development of CI/CD and its guiding principles. The methodology section that follows describes the study strategy used to assess the effect of CI/CD on SDLC efficiency. The study finishes with a discussion of the significance of these findings for software development techniques and future research initiatives. The results section contains data from case studies and industry surveys.
Licence: creative commons attribution 4.0
Continuous Integration and Continuous Deployment (CI/CD), Software Development Lifecycle(SDLC)
Paper Title: Toward Efficient Encrypted Image Scrambling
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403892
Register Paper ID - 253892
Title: TOWARD EFFICIENT ENCRYPTED IMAGE SCRAMBLING
Author Name(s): Miss. Niharika Raman Satpute, Mr. Hirendra Hajare
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h479-h494
Year: March 2024
Downloads: 229
Several schemes are proposed to solve this problem, but they suffer from low search accuracy on large datasets. In this paper, we propose the first secure image retrieval scheme that simultaneously solves these two problems. To obtain higher search accuracy, we extract image features via fine-tuned convolutional neural networks. Then, the image features are encrypted by using the secure k-Nearest Neighbor algorithm. To improve search speed and reduce the cost of image owners, we let cloud servers locally build a secure hierarchical index graph by using the encrypted image features. Besides, the secure index can be built and updated in parallel. We provide security analysis for the proposed scheme. Performance evaluations on the CIFAR-10 dataset show that the proposed scheme is practical. Moreover, compared with a recent scheme, our scheme can save more index construction time and cost of image owners when building secure indexes
Licence: creative commons attribution 4.0
encrypted image retrieval, navigable small world graph, secure index.
Paper Title: Phishing Attack
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403891
Register Paper ID - 253894
Title: PHISHING ATTACK
Author Name(s): Jincy J, Ashish L
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h473-h478
Year: March 2024
Downloads: 179
Phishing attacks is a prevalent form of cyber threat, continue to jeopardise the integrity and security of digital environments worldwide. This. abstract provides a succinct examination of phishing attacks, encompassing their methodologies, impacts, and mitigation strategies. Phishing attacks exploit social engineering techniques to deceive individuals into divulging sensitive information, often masquerading as trusted entities through emails, text messages, or phone calls. This abstract delves into the diverse tactics employed by cyber criminals, including email spoofing, domain impersonation, and psychological manipulation, to orchestrate successful phishing campaigns. Moreover, it highlights the dire consequence of falling victim to phishing attacks, ranging from financial losses and identity theft to the compromise of confidential data and organisational reputation damage. To combat the pervasive threat of phishing, this abstract advocates for a holistic approach to cyber security, integrating technical safeguards, user education, and incident response protocols. Effective mitigation strategies encompass email filtering, web content analysis, and multi-factor authentication to thwart phishing attempts at various entry points. Additionally, ongoing user awareness programs empower individuals to recognise phishing indicators and respond appropriately, fostering a culture of cyber vigilance within organisations. In conclusion, this abstract underscores the critical importance of understanding and mitigating phishing attacks in today's digital landscape. By embracing proactive cyber security measures and fostering a culture of resilience, individuals and organisations can fortify themselves against the persistent threat of phishing, safeguarding sensitive information and preserving trust in digital interactions.
Licence: creative commons attribution 4.0
clone phishing; e-mail phishing; malware; spear phishing; whaling
Paper Title: Nano Emulsion Type, Theories, and Factors Influencing: A Review of Nano Emulsion Formulation
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403890
Register Paper ID - 253857
Title: NANO EMULSION TYPE, THEORIES, AND FACTORS INFLUENCING: A REVIEW OF NANO EMULSION FORMULATION
Author Name(s): Jennifer Gay, Rajesh Saini, Lalit, Sneha Adhikary
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h466-h472
Year: March 2024
Downloads: 230
The Nano emulsion takes into account a novel medication delivery method that permits a regulated or prolonged drug release. It is regarded as a dispersion made up of oil, surfactant, and a transparent, kinetically or thermodynamically stable aqueous phase with droplet diameters ranging from 10 to 100 N. Nanotechnology is used to improve the solubility and bioavailability of lipophilic medications; nano emulsions offer a variety of benefits for drug delivery. It can be used in a variety of delivery methods, offering a consistent result in a wide range of industries, including biotechnology, therapy, and cosmetics. Oil and water dispersions known as nano emulsions allow for the stabilisation of dispersed phase droplets (20-500 nm) by an active surface coating composed of non-ionic surfactants. Nano emulsions have been proposed as a super solvent vehicle that can dissolve both lipophilic and hydrophilic medications. To some extent, a system based on nano emulsion can pass via hepatic metabolism because it has been observed that nanoparticles can enter the bloodstream directly through the paracellular pathway and absorb into the blood, indicating a systemic drug sequence
Licence: creative commons attribution 4.0
Nano emulsion mellitus; Nanotechnology; Nanoparticle; NDDS
Paper Title: Drug Recommendation System Using NLP And Machine Learning Approach
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403889
Register Paper ID - 253800
Title: DRUG RECOMMENDATION SYSTEM USING NLP AND MACHINE LEARNING APPROACH
Author Name(s): Punidha A, Arjun Balaji, Jaisri V, Mithra Saravanan
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h455-h465
Year: March 2024
Downloads: 315
A drug recommendation system is a technological solution that helps doctors prescribe the right drugs to patients based on their demographics, history of illness, symptoms, and drug efficacy, among other things. The system analyses massive datasets, including patient data, medication profiles, clinical research, and drug-drug interactions, among others, by using sophisticated algorithms and methodologies. This innovative approach analyses user sentiment and emotions in text data by using big data and sophisticated analytics. As a result, a drug recommendation system is now required to assist doctors and patients in understanding how different medications may affect their medical conditions. A software programme that makes product recommendations based on user wants and preferences is called a recommender framework. It makes utilization of client surveys to anticipate customized remedies and comprehend feelings. Sentiment analysis and feature engineering are used by drug recommendation systems to identify patients with certain conditions and provide the right medication.
Licence: creative commons attribution 4.0
Drug Recommendation, medicine, health, symptoms, healthcare.
Paper Title: Remotely Operately Video Enhanced Receiver
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403888
Register Paper ID - 253844
Title: REMOTELY OPERATELY VIDEO ENHANCED RECEIVER
Author Name(s): Shruthi S, Sreeji Pradeep
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h446-h454
Year: March 2024
Downloads: 235
Area mindful figuring involves the programmed fitting of data and administrations in view of the current area of the client. We have planned and carried out Meanderer, a framework that empowers area based administrations, as well as the customary time-mindful, client mindful and gadget mindful administrations. To accomplish framework versatility to extremely enormous client sets, Wanderer servers are carried out in an "activity based" simultaneous software design that empowers fine-grained application-explicit booking of undertakings. We have illustrated feasibility through executions for both open air and indoor conditions on different stages.
Licence: creative commons attribution 4.0
Activity model, Meanderer engineering, Meanderer dataset, Multi-wanderer framework, Wanderer administration, Wanderer clients, Wanderer regulator.
Paper Title: CRIMES AND VIOLENCE AGAINST WOMEN DURING PRE INDEPENDENCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403887
Register Paper ID - 253852
Title: CRIMES AND VIOLENCE AGAINST WOMEN DURING PRE INDEPENDENCE
Author Name(s): Dr. N. Kishore, Dr. G. Anand Amruth Raj
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h440-h445
Year: March 2024
Downloads: 212
Violence against women tends to violate their integrity, safety and dignity. Crime against women has been the key features of the Indian economy where women share a population base of 49% (Census of India, 2011). Crimes against women degrade and hamper their position in the society as well as their autonomy. Thus, the paper makes an attempt to study the determinants of crime against women during the period of 1991-2015. The data has been retrieved from National Crime Records Bureau, National Sample Survey Organisation and Central Statistical Organisation. The main findings of the study reveals literacy rate as the most significant indicator of the major forms of crimes against women. Urbanisation, however, does not provide any significant linkage. The paper also gives a glimpse of inert-state variations with respect to various forms of crimes.
Licence: creative commons attribution 4.0
Crime and violence agnist Women, Development, Growth, Liberalisation Gender based violence
Paper Title: Ringpayment:Pioneering Contactless Transactions With Biometric Fingerprint Security
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403886
Register Paper ID - 253846
Title: RINGPAYMENT:PIONEERING CONTACTLESS TRANSACTIONS WITH BIOMETRIC FINGERPRINT SECURITY
Author Name(s): Rija R, Ms Divya P
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h433-h439
Year: March 2024
Downloads: 236
Ringpay, the innovative wearable ring, transforms the payment experience by merging advanced technology seamlessly into daily life. With its smart card chip and biometric fingerprint scanner, Ringpay ensures secure and convenient transactions, revolutionizing traditional payment methods. By harnessing NFC technology, this ring effortlessly communicates with POS systems, mirroring the ease of debit and credit card transactions. Its standout feature lies in biometric authentication, guaranteeing user consent for each transaction and enhancing security measures. Ringpay's core mission is to simplify payments, removing the need for physical cards or smartphones, and offering a futuristic payment encounter. This stylish wearable not only epitomizes convenience and security but also adds a touch of elegance to the payment process, marking a significant advancement in contactless payments.
Licence: creative commons attribution 4.0
NFC wearable technology, Payment Ring, Ringpay, Wearable ring
Paper Title: Role of Celebrity Endorsement on Branding of FMCG Products in Tier II and III cities
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403885
Register Paper ID - 253823
Title: ROLE OF CELEBRITY ENDORSEMENT ON BRANDING OF FMCG PRODUCTS IN TIER II AND III CITIES
Author Name(s): Dr. V. N. Santhisree, Eshwar Dattu Vudayaraju, Mahesh Gandavaram
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h418-h432
Year: March 2024
Downloads: 244
The advertisement has a significant part in altering the customer's opinion of brands in the current environment of media dominance and the abundance of information. The company uses a celebrity as its spokesman, using endorsements as a form of brand communication to support its positions and claims. The brand benefits from the celebrity's personality, notoriety, social standing, and industry expertise. In order to differentiate their brand in today's cutthroat marketplace, firms sign endorsement deals with movie stars, athletes, entertainers, politicians, and other celebrities, creating a billion-dollar industry. Today's advertising landscape has become increasingly dependent on celebrity endorsement, particularly in the FMCG industry. According to earlier studies, FMCG companies erred when they entered the rural sector. These businesses view the rural market as a growth area for the current urban market. But compared to urban customers, Indian consumers in rural areas have different demographic and psychographic characteristics. This study purposes to ascertain the impact of celebrity endorsement on FMCG product branding in Telangana's Tier II and III cities. According to the study, celebrity endorsements have a significant influence on the branding of FMCG products in Telangana's Tier II and III cities. The study also comes to the conclusion that in the case of Telangana Tier II and III cities, celebrity endorsement has little to no impact on businesses and the aspects that go into their creation (branding elements).
Licence: creative commons attribution 4.0
Brand Awareness, Brand Identity, Brand Equity, Brand Personality, Brand Positioning, FMCG and Celebrity Endorsement
Paper Title: Development Of Pigmentation Reducing Sheet Mask Using Herbal Extracts
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403884
Register Paper ID - 253958
Title: DEVELOPMENT OF PIGMENTATION REDUCING SHEET MASK USING HERBAL EXTRACTS
Author Name(s): Vijayalakshmi, Jaya Janani. E
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h408-h417
Year: March 2024
Downloads: 295
A skin condition known as "hyperpigmentation" results in darker or more discolored skin. This is due to the surplus production of melanin. There might be several reasons behind this. Treatments for hyperpigmentation have an immediate impact. The formation of melanin in our skin can be reduced by applying a range of natural substances that are safe for our skin. Additionally, the skin should need to be cooled and moisturized for this. Herbs, including liquorice, vettiver, musk turmeric, aloe vera, and citric bio-enzyme, could be used to cure hyperpigmentation. These nutrients are made of natural ingredients that are cooling, help cure pigmentation, and add moisture to the skin. The citric bio-enzyme will significantly brighten the skin.
Licence: creative commons attribution 4.0
hyperpigmentation, skin discoloration, melanin, hydration, coolness, liquorice, khus, wild turmeric, aloe vera, citric bio-enzyme, natural components, lighten skin.
Paper Title: LOCATION OF DG'S IN RESTRUCTURED POWER SYSTEMS USING LOCATIONAL MARGINAL PRICE (LMP)
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403883
Register Paper ID - 251026
Title: LOCATION OF DG'S IN RESTRUCTURED POWER SYSTEMS USING LOCATIONAL MARGINAL PRICE (LMP)
Author Name(s): R Mathangi
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h396-h407
Year: March 2024
Downloads: 210
Distributed or decentralized generation refers to electric power generating on a small scale, often between a few kilowatts (kW) and one hundred megawatts (MW), typically located within distribution networks or on the client side of the network. The major reasons to put in DG are to make the electric power market more efficient, to lower electricity rates for customers, and to have clean energy sources close to where the loads are. The auxiliary service it provides is voltage support at the distribution level. Power quality, voltage consistency, and reliability are all boosted by DG's contributions to these areas. To figure out where exactly DG should go up, we look at the Locational Marginal Price (LMP) at the load buses. Using MATLAB, we conduct penetration tests on the suggested technique for the IEEE 9, 14, and 57 bus systems.
Licence: creative commons attribution 4.0
Distributed generation; Locational marginal price; Optimal power flow; Electricity market; Social welfare.
Paper Title: Silver Nanoparticles & its Antimicrobial Activity from Azadirachta indica (Neem) leaf extract.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403882
Register Paper ID - 253792
Title: SILVER NANOPARTICLES & ITS ANTIMICROBIAL ACTIVITY FROM AZADIRACHTA INDICA (NEEM) LEAF EXTRACT.
Author Name(s): Mansi M. Barad, Jaynesh K. Ambechada
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h387-h395
Year: March 2024
Downloads: 225
Nanotechnology is an emerging field that focuses on manipulating matter at the atomic and molecular scale, typically within the size range of 1 to 100 nanometers in one dimension. This technology has gained attention due to the unique behaviour of materials when reduced to nanoscale dimensions. One significant application is the utilization of nanostructured materials, such as silver nanoparticles, for removing harmful substances from air and water. Silver nanoparticles are renowned for their ability to eliminate bacteria. They are now being incorporated into next-generation dressings to combat infections. These nanoparticles can also be integrated into materials and fabrics, rendering them sterile. Recent research has revealed that silver nanoparticles can be produced through a green synthesis method using leaf extracts from the Azadirachta indica (neem). The presence of flavonoids and terpenoids in the extract serves as both reducing and capping agents. This study involved treating an aqueous solution of silver nitrate (AgNO3) with neem leaf extract, resulting in the formation of crystalline silver nanoparticles. The confirmation of nanoparticle formation was achieved using UV-visible spectroscopy, which displayed a peak absorption at 440 nm. The silver nanoparticles displayed antimicrobial properties against both Gram-positive and Gram-negative bacteria. For instance, they formed clear zones around them, with a diameter of 4 mm for Bacillus subtilis and 3 mm for Escherichia coli when using pure silver nanoparticles. Additionally, the crude extract of silver nanoparticles produced a 2 mm clear zone for Escherichia coli. Antifungal activity of Silve nanoparticles against Capnodium spp showed 4 mm which indicated the inhibition of fungal growth.
Licence: creative commons attribution 4.0
Silver Nanoparticles, Antimicrobial Activity, Azadirachta indica
Paper Title: Smart Blood Donor Finder Android Application
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403881
Register Paper ID - 252677
Title: SMART BLOOD DONOR FINDER ANDROID APPLICATION
Author Name(s): Pranita Bhosale, Rutuja Jamdar, Sakshi Shinde, Akanksha Totare, Trupti Kherde
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h382-h386
Year: March 2024
Downloads: 254
Blood is an emergency need for some situations. The problem is that finding the right donor at the right time is a very difficult task in an emergency situation. We want to build an application for donors who can help each other during an emergency. This application timely updates the information with respect to the donors where the decision maker accesses the entire information about the blood bank system. Donors will be prompted to enter an individual's details, like name, phone number, and blood group. In the urgent need of a blood requirement, you can quickly check for blood banks or hospitals matching a particular or related blood group and reach out to them through the App using geofencing and filtering techniques. Blood bank details displayed on the user screen to select proper requirements for the user. If blood is unavailable at blood banks then users search for donors in a nearby area. A large number of blood donors are drawn in using an Android application. Since almost everyone conveys a mobile phone with him, it ensures present location tracking and communication. Only a registered person, with the disposition to donate blood, will be able to access the service. In this application we are using the GPS technology that will be used to trace the way to the blood bank. The user will get the route to reach the desired location and he won't have to ask manually, therefore time can be saved.
Licence: creative commons attribution 4.0
React Native, GPS, Geofencing, Blood Bank
Paper Title: A SOCIO-ECONOMIC PROFILE OF STREET WORKING CHILDREN OF AGRA CITY:A SOCIOLOGICAL STUDY.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403880
Register Paper ID - 253838
Title: A SOCIO-ECONOMIC PROFILE OF STREET WORKING CHILDREN OF AGRA CITY:A SOCIOLOGICAL STUDY.
Author Name(s): SANJANA
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h376-h381
Year: March 2024
Downloads: 255
Street children are the common sights of every society in all over the world. They are working or living on their own on the streets in very poor conditions. Street children face various problems like abuse, exploitation, violence, drug abuse etc. working on the streets. The present study aimed at identifying the socio-economic profile of street children working on the streets of Agra City. The data for the study was collected from 38 street children between the age of 5-17years by using snow-ball sampling technique. The information was gathered by face-to-face interviews. The results of the study showed that the majority of street children were boys and the number of females were less than males. It was found that street children were involved in various kinds of work which include begging, rag picking, selling water bottles, working on roadside food stalls, and construction sites. The study suggested to have better implementation of policies for protecting children in difficult circumstances.
Licence: creative commons attribution 4.0
Street Children, Socio-economic, Profile, Conditions.
Paper Title: A PRE-EXPERIMENTAL STUDY TO ASSESS THE EFFECTIVENESS OF PLANNED TEACHING ON KNOWLEDGE REGARDING SELFIE SYNDROME AMONG JUNIOR STUDENTS IN SELECTED COLLEGE IN THE CITY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403879
Register Paper ID - 253750
Title: A PRE-EXPERIMENTAL STUDY TO ASSESS THE EFFECTIVENESS OF PLANNED TEACHING ON KNOWLEDGE REGARDING SELFIE SYNDROME AMONG JUNIOR STUDENTS IN SELECTED COLLEGE IN THE CITY
Author Name(s): Ms.Sneha Tadulwar, Dr. Supriya Chinchpure, Mr.Kaustubh Parihar, Mr.Vaibhav More, Ms.Aarti Kambale
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h363-h375
Year: March 2024
Downloads: 204
Abstract: OBJECTIVES OF THE STUDY: 1.To assess pretest knowledge regarding selfie syndrome among junior student at selected college in the city. 2. To evaluate effectiveness of planned teaching on knowledge regarding selfie syndrome among junior student at selected college in the city. 3.To associate pretest knowledge score of selfie syndrome among junior student with selected demographic variables.HYPOTHESIS: H0 - There will be no significant difference between pre-test & post-test levels of knowledge regarding selfie syndrome among junior students.H01 -There will be no significant association of pre-test knowledge score with selected demographic variables on knowledge regarding selfie syndrome among junior student. Dependent Variable: knowledge of pre schooler. Independent Variables: structural teaching program on selfie syndrome. Setting Of The Study : selected sbes college of chhatrapati sambhajinagar . Population: in the present study accessible population was preschooler of sbes college of chhatrapati sambhajinagar. Sample: sample is a a subset of a population selected to participate in a research study.Sampling Technique: In this study non-probability purposive sampling technique is used for selecting the samples.SAMPLE SIZE: The sample size taken forthis study is 60 junior student.Major Findings Of Study:The Mean, standard deviation and mean difference values are compared and student's paired 't' test is applied at 5% level of significance. The tabulated value for n=60-1 i.e., 59 degrees of freedom was 2.00. The calculated 't' value i.e., 31.20 are much higher than the tabulated value At 5% level of significance for overall knowledge score of junior college students which is statistically acceptable level of significance. Hence it is statistically interpreted that the planned teaching programme on knowledge regarding selfie syndrome among junior colleges students From selected junior colleges of the city was effective.
Licence: creative commons attribution 4.0
Paper Title: Effectiveness of Vocal Music On Reducing Odd Behaviour Among Children With Intellectual Disabilities Having ASD
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403878
Register Paper ID - 253849
Title: EFFECTIVENESS OF VOCAL MUSIC ON REDUCING ODD BEHAVIOUR AMONG CHILDREN WITH INTELLECTUAL DISABILITIES HAVING ASD
Author Name(s): Jayati Mitra
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h357-h362
Year: March 2024
Downloads: 182
Purpose: The goal of the study was to investigate the effectiveness of Vocal music on reducing odd behaviour among children with Intellectual Disabilities having ASD Method: Total 5 students with moderate Intellectual disability between the age group of 10-16 years studying at special school were selected as the sample for the present study. All the selected participants were at simple sentence level and having frequent level of laughing and self talking. Single group pre-test post-test research design was used for this study. BASIC -MR Part-B was administered to assess the base line and evaluation score of the odd behaviour. Performance checklist was developed to check the performance of their associated skills during signing period. The students of the group were taught singing consisted with 8 lines and jingles were also introduced along with singing. Task analysis of singing and frequency recording of selected odd behaviours were done to check the regular achievement level of the participants. Total 20 sessions were carried out for the data collection. Results: The result indicated that there is a significant difference for reducing of odd behaviour among all 5 participants of the study. Time series was done for each participant to see the difference in session wise achievement scores in singing skills and reducing odd behaviour. The rates of learning among the students were also high. This study reveals that rhythm focuses on reducing repetitive talking and laughing with other odd behaviour for easy acquisition of any task or activity which leads the participants towards Independent living. Conclusion: From the result it is evident that intervention through vocal music also helps in enhancing good communication and social skills among children with moderate intellectual disabilities having ASD. It makes the environment more meaningful to the children with ASD as it improves their social communication skills. Finally it can be concluded that introducing Vocal Music to the children with Intellectual Disabilities having ASD definitely brings positive changes in reducing all other problem behaviours. So intervention through Vocal music is regarded as one of the most suitable approach implemented for Independent Living for the children with Intellectual Disabilities having ASD.
Licence: creative commons attribution 4.0
: Vocal Music, Odd Behaviour, Children, Intellectual Disability, ASD
Paper Title: Huffman Based LZW Lossless Image Compression Using Retinex Algorithm
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403877
Register Paper ID - 253826
Title: HUFFMAN BASED LZW LOSSLESS IMAGE COMPRESSION USING RETINEX ALGORITHM
Author Name(s): BK. Chinna Maddileti, R. Yeshwanth Raju, K. Nitin Reddy, M. Pavan Kumar
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h351-h356
Year: March 2024
Downloads: 225
Image Data compression finds application in picture compression, where it minimizes the number of bits required to represent an image compared to its original format. In order to store and transmit data efficiently, picture compression aims to decrease irrelevant and redundant image data. Therefore, picture compression may speed up transmission and decrease network latency.In employing a lossless compression technique, data remains intact throughout the compression process without any loss. This study introduces a novel three-stage lossless compression approach called Huffman Inspired LZW Lossless Compression of Images utilising Retinex Algorithm. The first step is to compress the picture using Huffman coding. The second step is to compress the data using LZW and then decode it after joining all of the Huffman code words. Stage three involves applying the Retinex algorithm to the compressed picture in order to boost contrast and overall image quality. Using this suggested method, you can improve MATLAB's compression rate (CR), or mean square error (MSE).
Licence: creative commons attribution 4.0
Lossless LZW Compression, Huffman Coding, Compression Ratio, Retinex, Mean Square Error, LZW Coding and Decoding.
Paper Title: Remote Access Tool
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2403876
Register Paper ID - 253076
Title: REMOTE ACCESS TOOL
Author Name(s): Sanskruti Punyarthi, Mikil Lalwani, Nilay Pophalkar, Shree Samal, Dr. Manoj Sabnis
Publisher Journal name: IJCRT
Volume: 12
Issue: 3
Pages: h341-h350
Year: March 2024
Downloads: 162
In the presented work, a remote access tool has been developed utilizing the Flutter framework, with the primary objective of facilitating remote monitoring of a host device from a separate remote device. Initially conceptualized for parental control purposes, the application provides a secure and user-friendly solution for parents to actively supervise the digital activities of their child's mobile device. The tool is designed to offer real-time activity monitoring, content filtering, spam SMS detection and detailed reporting, empowering parents to enhance their child's safety and well-being in the digital age. Its capabilities extend to promoting responsible device usage and cultivating a secure digital environment for children. This abstract concisely outlines the core functionality and objectives of the remote access tool, emphasizing its potential utility in parental monitoring scenarios, while acknowledging its adaptability for broader use cases beyond the parent-child scope.
Licence: creative commons attribution 4.0
remote access tool, parent - child monitoring, sms spam detection, parental control system, smartphones
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 14 | Issue 4 | Month- April 2026)

