IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Medication errors Related To LASA Drugs
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303959
Register Paper ID - 233710
Title: MEDICATION ERRORS RELATED TO LASA DRUGS
Author Name(s): Reema Bansal, Alok Kumar, Sneha Bharti
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i79-i91
Year: March 2023
Downloads: 1381
The existence of confusing drug names is one of the most common causes of medication error and is of concern worldwide. With tens of thousands of drugs currently on the market, the potential for error due to confusing drug names is significant. This includes nonproprietary names and proprietary (brand or trade marked) names. Many drug names look or sound like other drug names such as Losec(omeprazole) and Lasix(furosemide) Led to the incidents that the patients were given lasix instead of the prescribed losec, which resulted in the patient death. This type of LASA drugs had created vast number of medication errors due to confusion and put a question mark on safety of patients. To combat errors arise due to LASA drugs their identification and adequate policy to manage these errors is required. Along with this, there should be development of such effective methodology such as tall mann lettering and patient education and awareness to decrease negative consequences of look alike sound alike drugs. Therefore, to aware the community and health care workers this present study has been designed to get information about patient safety policy, medication safety, medication error, look- alike/sound-alike medication and risk management system. Also, to discover various strategies to prevent LASA medication errors.
Licence: creative commons attribution 4.0
LASA drugs, Medication errors, Proprietary names, Strategies
Paper Title: IMPLEMENTION ON BEHAVIOUR BASED SAFETY IN WAREHOUSE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303958
Register Paper ID - 233702
Title: IMPLEMENTION ON BEHAVIOUR BASED SAFETY IN WAREHOUSE
Author Name(s): R. SUBASH, A.V. BALAN
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i70-i78
Year: March 2023
Downloads: 473
Requirement of law and execution of various strategies and practices by association to diminish mishaps at working environment is a continuum which has brought about new ways. The outcome showed that a sufficient improvement in wellbeing execution is conceivable with this methodology like Dock safety, stack safety, Manual material handling, rack safety, PIT and trolley handling, Rigging storage cage and Corona virus rules. Behaviour Based Safety (BBS) study is a cycle that makes a wellbeing organization among the executives and workers that persistently zeros in individuals' considerations and activities on theirs, and others, day by day security practices.
Licence: creative commons attribution 4.0
Safety, Warehouse, storage and Potential hazard.
Paper Title: A Study of Issues and Challenges in MSME Industry After the GST
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303957
Register Paper ID - 233672
Title: A STUDY OF ISSUES AND CHALLENGES IN MSME INDUSTRY AFTER THE GST
Author Name(s): Vikash Kumar yadav
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i63-i69
Year: March 2023
Downloads: 501
GST is one of the games changing tax reforms in the indirect tax structure of India. The previous tax regime comprised of separate Centre and State laws. Therefore, to bring transparency and reduce 'tax on tax', a single, unified tax in the forms of GST was introduced. These types of tax system involve levy on the supply of goods or services or both with concurrent jurisdiction of Centre and States. This law will replace all indirect taxes levied on goods and services by the central government and state government implement GST by April 2017. Implementation of GST will have a long-term impact on almost all the aspects of the business running in India. With more than 160 countries now adopting GST. It is a single, destination based indirect tax levied on the value addition to goods as well as services at each stage of the supply chain. The main objective of levying such a tax is to consolidate multiple indirect tax levies into a single tax. Thus, GST subsumes bundle of taxes. It completes the limitations in the previous indirect tax structure and brings efficiency in the administration of tax. In this tax reform restructured our economy and business dynamics MSME sector. The MSME sector is a major contributor in our economy, IT contributes significantly on Indian economy. MSME sector is the one of the fastest emerging manufacturing segments. This paper help to find how GST impact and what are its implications on the MSME sector. From an industry point of view, 5 years provide a good timeframe to assess what more needs to be done for GST to fully achieve its objectives of rationalization of taxes, simplification in compliances, seamless flow of credit and yielding the benefits of 'One Nation, One Market and one tax' to businesses at all levels
Licence: creative commons attribution 4.0
GST, MSME, IGST, SGST, CASCADING EFFECT
Paper Title: A SYSTAMETIC APPROACH OF ENHANCING IMAGECHAIN USING BLOCK CHAIN
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303956
Register Paper ID - 233679
Title: A SYSTAMETIC APPROACH OF ENHANCING IMAGECHAIN USING BLOCK CHAIN
Author Name(s): R. Elankavi, M.Sandhya, S Omsai, B Pavani, E Prasad
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i52-i62
Year: March 2023
Downloads: 472
Digital images are linked together in an image chain using hash connections in a cryptographic structure. The main characteristic that sets it apart from block chains is that the images are not kept inside the blocks. Instead, the embedding procedure combines the block with the picture. The image chain is made up of normal graphic files that may be utilised in the same way as other images but also each of which has a data block that connects it to an earlier link in the chain. Apart for the photos themselves, the proposed approach doesn't call for any other files. It is portable and user-friendly due to the variety of file formats and embedding techniques it supports. The plan also offers a substantial amount of security and forgery resistance. This is accomplished by hashing the entire file with embedded data, making it impossible to change or remove the picture from the chain without the integrity being compromised. This project explains the fundamental idea of an image chain along with its components and uses. Block structure and embedding techniques are the two most crucial challenges.
Licence: creative commons attribution 4.0
picture watermarking, image chain, and cloud technologies
Paper Title: Self-Help Group (SHG) for Economical Development
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303955
Register Paper ID - 232837
Title: SELF-HELP GROUP (SHG) FOR ECONOMICAL DEVELOPMENT
Author Name(s): DR MADHUKAR PANDHARINATH AGHAV
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i49-i51
Year: March 2023
Downloads: 429
India has a wide variety of cultural practices, customs, historical origins, etc. As a consequence, the government finds it challenging to address socioeconomic issues on its own. Therefore, bringing individuals together who are facing comparable problems could be a significant economic breakthrough for India. Many people think that social, female, and rural empowerment are all fueled by self-help organizations. According to the most current data, about one fourth of Indians live in rural poverty. One third of the labor population in India is made up of women. They have found it challenging to access and use the resources that could help them better their living circumstances, though, due to societal constraints.
Licence: creative commons attribution 4.0
SHG, Self-Help Group, Economics
Paper Title: Eatry Desktop Application
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303954
Register Paper ID - 233668
Title: EATRY DESKTOP APPLICATION
Author Name(s): Vaibhav singh, Shivansh mishra, Saurabh Kumar, Rohit Kumar, Sachin Bansal
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i42-i48
Year: March 2023
Downloads: 387
Eatry is a modern management system designed to simplify and streamline hotel and restaurant operations. The platform aims to enhance efficiency and accuracy in managing hotel reservations, room assignments, guest billing, and other related tasks, as well as restaurant ordering, serving, and billing. Through Eatry, guests can book rooms, view availability, place orders, and make payments directly from their mobile devices. Hotel staff can manage room assignments, check-ins and check-outs, and monitor guest billing, while restaurant staff can track orders and manage tables with ease. Eatry's data analytics feature enables managers to monitor occupancy rates, track revenue, monitor sales, and make informed business decisions. By integrating these features into a single platform, Eatry enhances the efficiency of hotel and restaurant operations, leading to a better overall guest experience. Eatry is a powerful tool for hotels and restaurants of all sizes, and can help optimize operations, increase revenue, and improve profitability.
Licence: creative commons attribution 4.0
Hotel management, Restaurant management, Modern technology, Streamline operations, Data analytics, Revenue optimization
Paper Title: FROM A SOCIO-ECONOMIC PERSPECTIVE R.K. NARAYAN'S THE GUIDE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303953
Register Paper ID - 233669
Title: FROM A SOCIO-ECONOMIC PERSPECTIVE R.K. NARAYAN'S THE GUIDE
Author Name(s): KRISHNAMURTHY NOMULA
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i37-i41
Year: March 2023
Downloads: 418
This essay discusses the socioeconomic issues raised by R.K. Narayan's book The Guide. The characters are analyzed in light of Post-Independence Indian economic ideas as they are set against this backdrop. The effects of westernization and modernization are also discussed, as well as how the protagonist Raju's idealistic attitude is gradually altered by new philosophies, cultures, and fashions. One of the key elements of R.K. Narayan's writings, the exaltation of human relationships, is the aim of this article. The book and the characters are so critically examined against the backdrop of societal changes because the study deals with socio-economic discourse.
Licence: creative commons attribution 4.0
Indian economic ideas, Westernization and Modernization.
Paper Title: ATOMIC PLATFORM FOR REGULATING CHARITY FUNDS USING BLOCKCHAIN TECHNOLOGY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303952
Register Paper ID - 233665
Title: ATOMIC PLATFORM FOR REGULATING CHARITY FUNDS USING BLOCKCHAIN TECHNOLOGY
Author Name(s): R.M Mallika, D. Dharani, D. Ganesh, H. Bhavana, G. Hima Sailaja
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i29-i36
Year: March 2023
Downloads: 431
Legislators from all over the world are collecting taxes on the profit, but nobody knows where this vast amount of money is going. A significant majority of us must donate those funds in order to support a cause, receive gifts, or secure sponsorships. Everyone is simultaneously unsure of which association to trust and to whom to give their federal tax returns. The crowd funding entrance/local area/non-benefit association/peer-to-peer automatic aiding programme was introduced so that anyone could give/support money to people/startups that need/merit it in order to avoid these numerous uncertainties and questions. This CF application uses block chain innovation for safe financial transactions. Blockchain will be the only medium of exchange. Clients and employees from all around the world have gathered in this entryway to provide a hand and demonstrate humanity. It is an open source platform that is entirely transparent, trustworthy, and focused on the cause as well as how to make it as easy as possible for people to support it. Before funding, the government's income tax division can approve the funding and any appropriate tax exemptions for the charity, so the funding's transparency ensures its accuracy.
Licence: creative commons attribution 4.0
Black Chain, Information Security, Crowd Funding
Paper Title: Implementing Blood Bank Tracking System with Information Security Using Fuzzy Logic
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303951
Register Paper ID - 233662
Title: IMPLEMENTING BLOOD BANK TRACKING SYSTEM WITH INFORMATION SECURITY USING FUZZY LOGIC
Author Name(s): J. Jerin Jose, J . Keerthi, M . Reddy Asha, T . Ravindra, K . Jayanth
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i24-i28
Year: March 2023
Downloads: 425
A network-based system called Blood Bank Management is intended to store, process, retrieve, and analyse data related to the administrative and inventory management within a blood bank. This project intends to keep all the data regarding blood donors, the various blood types accessible in each blood bank, and assist them in managing more effectively. The goal is to increase openness in this industry, make it simple and free of corruption to receive blood from a blood bank, and improve the efficiency of the blood bank management system. Instead of storing blood, we are stocking the names of blood donors because our client is not interested in doing so. Blood donors must register in the database if they are interested in giving blood. There are no issues with the idea because there is no blood storage. In order to find the closest and most appropriate donors, the proposal integrates Nearest Neighbor Search with Fuzzy Expert. The need for blood must be expressed, and we provide the donor's information. Whether they are available or not, the donors are allowed to adjust their status.
Licence: creative commons attribution 4.0
fuzzy, neural networks, fuzzy AI, and blood bank management system
Paper Title: Detect and Display the Subterranean Failing of Cables Using IoT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303950
Register Paper ID - 233661
Title: DETECT AND DISPLAY THE SUBTERRANEAN FAILING OF CABLES USING IOT
Author Name(s): Miriyala Sailesh, Lanka Padmalatha, Niranjan Karre, Madugula Vamsi, Penumatcha Vikas
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i15-i23
Year: March 2023
Downloads: 420
This project aims to demonstrate the distance of a Subterranean cable defect from the main station through the internet. The implementation of Subterranean cables has various advantages over an overhead system, but the main disadvantage is that we cannot identify the specific site of the defect. When a defect occurs for whatever reason, the repair process for that individual cable is difficult due to the precise unknown location of the problem within the cable. This Internet of Things technology is used to determine the accurate location of the defect and convey data in graphical format to the website via an IOT module and accordingly in the LCD panel.. The classic idea of Ohms law is used in this paper.,Since resistance is proportional to the distance when a voltage is provided at the end , the current fluctuates depending on the location of defect in the cable. When a fault occurs occurs, the voltage between series resistors fluctuates according to the resistance, which varies with distance. This is then transmitted to generate precise digital data, which the programmed microcontroller detects and displays on the website in kilometres, along with the latitude and longitude
Licence: creative commons attribution 4.0
Fault Detection,ArduinoUno,Esp8266,Relays,GPS Module.
Paper Title: A PERCEPTIVE HYBRID MODEL FOR SPECIALIZED SYSTEM IN MALWARE DETECTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303949
Register Paper ID - 233660
Title: A PERCEPTIVE HYBRID MODEL FOR SPECIALIZED SYSTEM IN MALWARE DETECTION
Author Name(s): K. Sirisha, T. Muni Amala, N. Nikhil Chowdary, Y. Priyanka, K.Karthik
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i7-i14
Year: March 2023
Downloads: 420
Online social networks have become a popular means of communication for internet users, and as a result, harmful assaults that target these platforms are also on the rise. In this case, our goal is to build a hybrid specialized system that uses artificial intelligence and a fuzzy system technique to identify malware. Malicious assaults can cause harm to people and businesses by allowing crucial data to be completely altered or misrepresented while being transferred or stored on social media platforms. The hybrid model was put through malware detection tests that were made accessible in several public datasets in order to execute the fuzzy rules extraction and to confirm the effectiveness of the hybrid technique. It was contrasted in binary classification tests with artificial neural network models and hybrid models of fuzzy neural networks. The simulation findings show that the fuzzy neural network method to treating malware detection is workable and that it permits the construction of fuzzy rules that can help in the development of specialized systems. Next, utilizing the IPS-MD5 algorithm, we enhance it with the Text Mining and Op code-based learning method to stop the propagation of harmful software in social applications. As a result, the frequency of malicious assaults will decline.
Licence: creative commons attribution 4.0
Fuzzy Neural Networks, Machine Learning, Export Systems
Paper Title: Esther Morgan's "The Lost Word ": A Frantic Quest for a Feminist Identity
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303948
Register Paper ID - 233622
Title: ESTHER MORGAN'S "THE LOST WORD ": A FRANTIC QUEST FOR A FEMINIST IDENTITY
Author Name(s): Dr.Sunita Malik
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: i1-i6
Year: March 2023
Downloads: 1123
Abstract Esther Morgan's poem "The Lost Word" is from her first collection ,Beyond Calling Distance. The very first line sets the theme and tone of the poem - "She's lost a word."The woman is desperately searching for a word she had used once upon a time, but now despite exerting much pressure on her brain, she cannot recall it; a powerful two-letter word the letter referred to here is "No."In a very subtle manner, the poem depicts a woman's powerlessness, even within the domestic space. The poem showcases her inability and inefficacy to say "no" to suggest how women are made to submit to patriarchal authority through gender conditioning. This paper focuses on how, through a short poem, Morgan draws attention to the desperation and helplessness a woman faces because she has lost her ability to say "no." She has forgotten to use the power to say "No" --a woman's struggle to find her tongue and language. The poem points out how women have been subjugated and suppressed everywhere due to patriarchy and its notions about not allowing women to have opinions and the freedom to deny. Gender inequality takes many forms, to fill a woman's mouth with someone else's language;(language is not just words, but within language lies one's nativity, dignity and culture), so much so that she forgets her language and, in the process, loses her capacity to refuse, refute and reject. The paper Esther Morgan's "The Lost Word": A Frantic Quest for a Feminist Identity" attempts to assert the need for a gender-neutral language where women can respond in negation and forging an identity for themselves.
Licence: creative commons attribution 4.0
No ,Inequality, Helplessness, Lost word ,Gender, Feminism
Paper Title: POLYHERBAL SHAMPOO POWDER
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303947
Register Paper ID - 233659
Title: POLYHERBAL SHAMPOO POWDER
Author Name(s): Bhushan R. Pawar, Pooja Bhonde, Dr. Gajanan Sanap
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h995-h1003
Year: March 2023
Downloads: 430
The shampoo sector is probably the largest unit sale among the hair care products since shampoos are one of the cosmetic products used in daily life. Synthetic preservatives and detergents have sometimes been the cause of adverse effects among consumer. A more radical approach in reducing the synthetic ingredients is by incorporating natural extracts whose functionality is comparable with their synthetic ingredients. A shampoo is a cleaning aid for the hair and is counted among the foremost beauty products. Today's shampoo formulations are beyond the stage of pure cleaning of the hair. Additional benefits are expected, e.g. conditioning, smoothing of the hair surface, good health of hair, e.g. hair free of dandruff, dirt, grease and lice and, above all, it is safety benefits are expected. As the scalp is one of the most absorbent part of the body, product applied to the scalp go directly to the blood, without being filtered in any way. Formulation of shampoo must be safe and efficient for long use. The major objective of the present study was to formulate an herbal shampoo powder by means of eliminating harmful synthetic ingredients and substitutes them with natural ingredients. Our formulated herbal shampoo powder consists of fenugreek, hibiscus, ashwagandha , shikakai, amla, neem, reetha,cinnamon, kalonji , and rose petals in appropriate ratio.
Licence: creative commons attribution 4.0
Paper Title: Defending Against DDoS Attacks Using Ant Colony Optimization
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303946
Register Paper ID - 233654
Title: DEFENDING AGAINST DDOS ATTACKS USING ANT COLONY OPTIMIZATION
Author Name(s): R.M. Mallika, P.Lavanya, M. Peddaiah, K. Lohith, P.Lokeswari
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h988-h994
Year: March 2023
Downloads: 424
The importance of the DDoS issue and the rise in the frequency, sophistication, and power of assaults have prompted the development of several prevention techniques. Each suggested preventive measure differs from the others in certain specific benefits and drawbacks. In this study, we categorise the many defences against potential DDoS assaults that have been put forth in the literature and evaluate the advantages and disadvantages of each defence. It is preferred to consider that the number of maximum continuous DoS attacks in both the S-C and the C-A channels is bounded because of the cost effect of attacks. In this project on Distributed denial of service (DoS) attacks in cyber-systems, DoS attacks exist in between the sensor and controller communications and the controller-to-actuator communications. Then, a successful security control technique is developed to counter two-channel DoS attacks, fully utilising the hardware to guarantee that control inputs are periodically captured during each time slot. A security controller that includes both the present and future control inputs is designed at the same time. The addressed CPS can be stable under 2-channel DoS attacks while maintaining control effectiveness under an appropriate security control strategy and security controller. Last but not least, simulations and tests are provided to show the viability of the suggested active security control approach.
Licence: creative commons attribution 4.0
DoS attacks, Security transmission policy, Actively defend, Security control, Experiments, Cyber-physical systems.
Paper Title: Emergence And Growing Potentiality Of Small Tea Cultivators Towards Employment Generation In Assam
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303945
Register Paper ID - 233658
Title: EMERGENCE AND GROWING POTENTIALITY OF SMALL TEA CULTIVATORS TOWARDS EMPLOYMENT GENERATION IN ASSAM
Author Name(s): Monali Borah
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h980-h987
Year: March 2023
Downloads: 440
This paper discusses the emergence and growing potentiality of the small tea cultivators in Assam towards employment generation. The tea industry in Assam has traditionally been dominated by large tea estates, but in recent years, small tea growers have emerged as a significant force in the sector. These small growers, often located in remote and underdeveloped regions, have been able to leverage modern technology and better cultivation practices to increase their yields and quality. As a result, they are contributing significantly to the state's tea production and employment generation. This study examines the factors driving the growth of small tea cultivators in Assam and the challenges they face. It also analyzes the potential of this sector to provide livelihoods for a large number of people in the region and contribute to the state's economic development.
Licence: creative commons attribution 4.0
Small tea growers, development, plantation
Paper Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303944
Register Paper ID - 233653
Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE
Author Name(s): B. Getthavani, B. Venkat Kethan, K. Vijay Kumar, P. Shanmuga Reddy, G. Santhosh
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h969-h979
Year: March 2023
Downloads: 398
Despite the delayed adoption of IoT (Internet of Things) in the healthcare industry compared to other sectors, IoT in medicine is destined to keep the people safe and healthy, with the primary goal being to reduce the cost of health care in the next years. An intelligent medication box linked to sensors and a server for routine health monitoring is suggested as part of a smart Internet of Things-based healthcare system. With the aid of this internet-connected smart pill box, patients can stay on top of their medical regimens and easily communicate with their doctors even when they can't be in the same room at the same time. The suggested medication box has an alert that will remind the patient to take their medication at the prescribed time. Information about the doctor and patient, including medical history, medications, and upcoming appointments, is maintained on a laptop that also serves as a server. The doctor and the patient both have their own login credentials to use on the server. The server also stores the patient's prescription history and body temperature for the convenience of the attending physician. If the doctor decides to make a modification to the patient's prescription, they will be informed via the patient's mobile app. In addition, the doctor is in a position to act quickly in the event of a medical emergency.
Licence: creative commons attribution 4.0
Health Care,Internet of Things (IoT), Body sensor network, LCD
Paper Title: AUTOMATIC DETECTION AND CLASSIFICATION OF BREAST CANCER USING THE TRANSFER-LEARNING TECHNIQUE.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303943
Register Paper ID - 233650
Title: AUTOMATIC DETECTION AND CLASSIFICATION OF BREAST CANCER USING THE TRANSFER-LEARNING TECHNIQUE.
Author Name(s): B. Geethavani, R. Ganeswari, N. Hyndavi, V. Bharath Kumar, P.G. Hanumateja
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h963-h968
Year: March 2023
Downloads: 378
Cancer is one of the most deadly diseases. In addition, breast cancer is the most common cancer in women and can be fatal if untreated. Despite substantial improvements in medical technology over the years, a biopsy is still the only effective way to find breast cancer. Pathologists can detect cancer using microscopic histology images. Visualizing cancer is a challenging task that requires a lot of skill, creativity, and focus. Hence, a quicker and more accurate way of detecting breast cancer is needed. As a result of advancements in machine learning and image processing, numerous sorts of research are being conducted to create an efficient partially or totally computer monitored diagnosing system. In this study, invasive ductal carcinoma was diagnosed and classified utilising
Licence: creative commons attribution 4.0
Deep learning, convolutional neural network (CNN), VGG19, Inception, Resnet, and dataset of breast cancer images.
Paper Title: Group Data Sharing in Cloud Computing on Identity Based Encryption
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303942
Register Paper ID - 233648
Title: GROUP DATA SHARING IN CLOUD COMPUTING ON IDENTITY BASED ENCRYPTION
Author Name(s): N.BABU, M. Sonali, D. Venkatesh, K. Subba Reddy, V. Sai Kumar
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h957-h962
Year: March 2023
Downloads: 398
One of the most popular ways to protect data secrecy in many real-world applications, such as cloud-based data storage systems, is using encryption technologies. However, the production of encrypted data in a largely "static" format may obstruct further data processing. For computation or other purposes, encrypted data might need to be "converted" into another format. The idea of encryptions witching was first put up for conversion, namely between Paillier and ElGamal encryptions, in order to allow encryption to be employed in another device equipped with a different encryption mechanism. The conversion between traditional identity-based and attribute-based encryptions is taken into consideration in this research, and it also makes a concrete construction suggestion using the proxy re-encryption technique. In the standard model, it is demonstrated that the design is CPA secure under the q-decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons show that, especially when the client's data is encrypted and outsourced to a distant cloud, our bridging technique lowers compute and communication costs on the client side. In practise, it is acceptable to incur the computational overhead associated with re-encryption (on the server side) and decryption (on the client side).
Licence: creative commons attribution 4.0
CPA security, identity-based encryption, attribute-based encryption, encryption switching, data security.
Paper Title: A Trustworthy Block chain-based Domain Name System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303941
Register Paper ID - 233646
Title: A TRUSTWORTHY BLOCK CHAIN-BASED DOMAIN NAME SYSTEM
Author Name(s): P. M. M. S. Chandu, M. Jashwanth, R. Gayathri, K. Jayakiran, G. Bhuvanesh
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h949-h956
Year: March 2023
Downloads: 397
T 2 DNS is a third-party DNS service that we created. T 2 DNS provides client trustworthiness evidence, protects clients from channel and server attackers, is compatible with the current Internet infrastructure, and introduces bounded overhead while serving client DNS queries. T 2 DNS uses an encryption and obfuscation hybrid protocol to protect user privacy, and Intel SGX is used to power its service proxy. Scaling the initialization procedure, limiting the obfuscation overhead, and fine-tuning useful system parameters are obstacles we successfully overcame. We develop a T 2 DNS prototype, and testing demonstrates that it is completely functional, has a manageable overhead when compared to alternative alternatives, and scales to the number of customers.
Licence: creative commons attribution 4.0
Ethereum, smart contracts, DNS security, block chains.
Paper Title: Block chain in Student Registration System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303940
Register Paper ID - 233647
Title: BLOCK CHAIN IN STUDENT REGISTRATION SYSTEM
Author Name(s): K.Maheswari, C. Kavya, B. Mohan Sai, P. Madhusudhan, D. Mahidhar
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h944-h948
Year: March 2023
Downloads: 383
Blockchain enables us to design a decentralised environment free from interference from outside parties. Every completed transaction is permanently validated and recorded in a public ledger. We suggest a global platform for managing student data and attendance based on blockchain technology. It makes up an internationally reputable, decentralised network for managing student data, attendance, and file sharing that can provide security at the level of a school or higher educational institution.
Licence: creative commons attribution 4.0
Block chain in student management system, student registration system.
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 14 | Issue 2 | Month- February 2026)

