ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: A DESIGN AND SIMULATION OF DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704153
Register Paper ID - 170395
Title: A DESIGN AND SIMULATION OF DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS
Author Name(s): S. Kiran Kumar, R. Raja Kishore M. Tech, Dr. M. Narsing Yadav
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1179-1189
Year: November 2017
Downloads: 1191
Now a days wireless sensor networks are rapidly growing technologies that have been widely used in many applications such as emergency response, healthcare monitoring, battlefield surveillance, habitat monitoring, traffic management, smart power grid, etc. However the wireless media and resource-constraint nature of a sensor network makes it an ideal medium for malicious attackers to intrude the system. Thus providing security is extremely important for the safe application of WSNs. Various security mechanisms like cryptography, authentication, confidentiality, and message integrity, have been proposed to avoid security threats such as eavesdropping, message replay, and fabrication of messages. To establish secure communications, we need to ensure that all communicating nodes are trusted first, according to the number of packets received by sensor nodes, direct trust and recommendation trust are selectively calculated after that communication trust, energy trust and data trust are considered during the calculation of direct trust. Distributed trust model can evaluate trustworthiness of sensor nodes more precisely and prevent the security breaches more effectively. A network Controller is designed to monitor network nodes continuously and if malicious node is found then it changes the routing path. By adding network controller to this model will reduces the packet drop ratio between nodes. Hence Performance of the model increases and Simulation results of Trust models are shown in output.
Licence: creative commons attribution 4.0
A DESIGN AND SIMULATION OF DISTRIBUTED TRUST MODEL FOR WIRELESS SENSOR NETWORKS
Paper Title: ONGC WORKSHOP AND MAINTENANCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704152
Register Paper ID - 170424
Title: ONGC WORKSHOP AND MAINTENANCE
Author Name(s): Karan Jani
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1174-1178
Year: November 2017
Downloads: 1277
work of maintenance department of ONGC and brief knowledge about crude oil production and equipment used
Licence: creative commons attribution 4.0
ONGC, crude oil process , maintanance and production of ONGC
Paper Title: WIRELESS HOME SECURITY SYSTEM WITH MOBILE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704148
Register Paper ID - 170491
Title: WIRELESS HOME SECURITY SYSTEM WITH MOBILE
Author Name(s): Kulbhushan Singh
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1156-1157
Year: November 2017
Downloads: 1310
Security and automation is a prime concern in our day-to-day life. The approach to home and industrial automation and security system design is almost standardized nowadays. In this paper, we have tried to increase these standards by combining new design techniques and developed a low cost home and industrial automated security systems. Everyone wants to be as much as secure as possible. The design of simple hardware circuit enables every user to use this wireless home security system with PIR sensor, Gas sensor, Smoke sensor and Main fuse Failure Detector at Home & Industries.Wireless security is the prevention of unauthorized access or damage to MOBILE using wireless networks Systematic solution for home. The aim of this paper is to investigate a cost effective solution that will provide controlling of home appliances remotely and will also enable home security against intrusion in the absence of home owner. The system uses latest wireless communication like Bluetooth, Infrared and Wi-Fi access to the system for security and automated appliance control. Home security has been a major issue where crime is increasing and everybody wants to take proper measures to prevent intrusion. System will works on different wireless communications and latest 3 of 10 mobiles uses for security purpose. The proposed system characteristics involve remote controlling of appliances, intrusion detection, system security and auto-configuration such that system automatically adjusts the system settings on running hardware support check.
Licence: creative commons attribution 4.0
Mobile, Camera, Internet, Chips, Bluetooth, SMS, Web Technique, Electric Circuit.
Paper Title: INTELLIGENT E –RESTAURENT BILLING SYSTEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704147
Register Paper ID - 170460
Title: INTELLIGENT E –RESTAURENT BILLING SYSTEM
Author Name(s): M.BHAVYASRI, MOHDAMEENUDDIN
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1151-1155
Year: November 2017
Downloads: 1240
Today’s era is said to be the world of technology. So many efforts have been taken by restaurants owners also to adopt information and communication technologies such as PDA, wireless LAN, costly multi-touch screens etc. to enhance dining experience. This paper highlights some of the limitations of the conventional paper based and PDA-based food ordering system and proposed the low cost touch screen based Restaurant Management System using an android Smartphone or tablet as a solution. The system consists of a Smartphone/tablet at the customer table contains the android application with all the menu details. The customer tablet, kitchen display connects directly with each other through Bluetooth/wifi . Orders made by the customers will be instantly reach the kitchen module. This wireless application is user-friendly, improves efficiency and accuracy for restaurants by saving time, reduces human errors and provides customer feedback. This system successfully overcomes the drawbacks in earlier automated food ordering systems and is less expensive as it requires a one-time investment for gadgets.
Licence: creative commons attribution 4.0
INTELLIGENT E –RESTAURENT BILLING SYSTEM
Paper Title: COMPUTER AIDED PROCESS PLANNING AND OPTIMIZATION OF SPIKE SUPPORT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704146
Register Paper ID - 170471
Title: COMPUTER AIDED PROCESS PLANNING AND OPTIMIZATION OF SPIKE SUPPORT
Author Name(s): Dr J.V.R.Ramesh, K.Yogesh
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1141-1150
Year: November 2017
Downloads: 1195
In manufacturing, the goal is to produce components that meet the design specifications. The design specification ensures the functionality aspect. Spike support is used in a fourth-generation man-portable fire-and-forget anti-tank guided missile with tandem-charged heat warhead, developed and designed by the ISRAELI company and in service with some nations. As it is a missile component, it should be light in weight at the same time strength should be more. Aluminum material is used for spike support due to its best material properties. Due to this thin wall thickness, there is more chance of rejections and reworks. Nowadays rejection is a serious problem that has been arising in every manufacturing industry. Due to this reason, the manufacturing sector is advancing into losses. There are many factors responsible for rejection and reworks, such as human errors, machine errors, process planning, material errors etc. CAD/CAM/CAE systems play a crucial role in design optimization and process optimization of any component and it is helpful in reducing the reworks and rejections. By considering the above important aspect, this project is taken up for reducing the rejections to the least values. The aim of the project is to reduce and maintain the rejection rate below six percent which was previously 9 percent and reduces and keep the rework rate below 10 percent which was previously 15%. Initially, the optimum cutting speed of the tool is evaluated by doing the harmonic analysis in the CAE system using ANSYS software. Once the cutting speeds are determined, manufacturing process plan will be developed in cam system using the NX-CAM software. Process optimization was also carried out by using the mandrel for a job holding to reduce damage to the component while machining operation is running.
Licence: creative commons attribution 4.0
COMPUTER AIDED PROCESS PLANNING AND OPTIMIZATION OF SPIKE SUPPORT
Paper Title: VALUE PATTERN OF ADOLESCENT: A STUDY WITH REFERENCE TO CHILDREN IN COIMBATORE DISTRICT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704145
Register Paper ID - 170449
Title: VALUE PATTERN OF ADOLESCENT: A STUDY WITH REFERENCE TO CHILDREN IN COIMBATORE DISTRICT
Author Name(s): E.Sridevi, Dr.L.Ranjit
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1135-1140
Year: November 2017
Downloads: 1221
Licence: creative commons attribution 4.0
Values, Adolescent, School, Children
Paper Title: A REVIEW OF DIGITAL STEGANOGRAPHY METHODS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704144
Register Paper ID - 170454
Title: A REVIEW OF DIGITAL STEGANOGRAPHY METHODS
Author Name(s): Asha Durafe
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1129-1134
Year: November 2017
Downloads: 1240
Security in data communication is a very important concern today. It is used in almost every region like e-commerce, education, and industry and data warehouse. Steganography literally means secret writing. The technique has been used in various forms for 2500 years or long but in the last two decades Steganography has been introduced to digital media. The goal of steganography is to hide information by concealing it into some other medium like image, audio or video so that only sender and intended recipient knows existence of information in communication. So the main focus of this paper is to study and discuss the trends which are already been proposed in the direction of cryptography and steganography. The main focus of this paper is on emerging concepts and recent techniques like Parity Coding, Least Significant Bit Coding (LSB), Phase Coding, Echo Data Hiding, Spread Spectrum about audio steganography. The performance of recent audio steganography techniques on the basis of strengths, weaknesses and hiding rate is evaluated. Some advancement like Generic Algorithm based Audio Steganography and steganalysis concepts are also discussed.
Licence: creative commons attribution 4.0
Steganography, data hiding, parity, coding, security measures, LSB, cryptography, steganalysis
Paper Title: DESIGN AND ANALYSIS OF TEST-RIG FOR MULTIPLE VALVE TESTING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704143
Register Paper ID - 170455
Title: DESIGN AND ANALYSIS OF TEST-RIG FOR MULTIPLE VALVE TESTING
Author Name(s): Joy Gohil
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1085-1128
Year: November 2017
Downloads: 1262
Licence: creative commons attribution 4.0
Valve automation, Valve technology, Fluid mechanics, Mechanical, Advance Engineering, System analysis, Technology, Process engineering, Thermodynamics, Designing, Modeling, Analytical calculations.
Paper Title: A NEW SIFT AND SURF BASED VERIFICATION OF DOCUMENT IN AUTOMATIC LOGO EXTRACTION AND DETECTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704142
Register Paper ID - 170457
Title: A NEW SIFT AND SURF BASED VERIFICATION OF DOCUMENT IN AUTOMATIC LOGO EXTRACTION AND DETECTION
Author Name(s): LAKSHMI PRASAD CHENNAMSETTY, BOYAPATI BHARATHIDEVI
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1078-1084
Year: November 2017
Downloads: 1223
Algorithms and methods used for recognize of objects from images in imperative to implement numerous operations such as document verification and object identification. To extract and segmenting logo from transfer certificates or any other document become the difficult task. The present investigation is effort to design the necessary programme module to extract logo from different document. This well-defined module could be an efficient tool to recognize the valued document like TC or any other document that enhances accuracy to saves time, this Automated logo detection module and its application could be extended in access of other documentation. In this paper SIFT and SURF algorithm is used to extract logo from image. In the next step work may be used in noise removal technology. This module and its proper execution help to extract and matches the objects and will give promising results for document identification. We got 96% accuracy.
Licence: creative commons attribution 4.0
TC-Transfer Certificate, Logo Detection, Thresholding, feature extraction, SIFT, SURF, Bounding Box, match feature.
Paper Title: WOMEN AT THE MARGIN:A STUDY ON FEMALE DOMESTIC WORKERS IN ASSAM'S KARBI ANGLONG DISTRICT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704141
Register Paper ID - 170415
Title: WOMEN AT THE MARGIN:A STUDY ON FEMALE DOMESTIC WORKERS IN ASSAM'S KARBI ANGLONG DISTRICT
Author Name(s): Dr.Mousumi Choudhury
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1071-1077
Year: November 2017
Downloads: 1273
This paper seeks to explore the plight and predicament of female domestic workers in Karbi Anglong district. Women suffer discrmination in the male dominated society.They are more vulnerable when they are parts of the lower rungs of the society.Domestic workers lack support system from the Govt. and in Karbi Anglong district,their plight is more severe since the district is infested by militancy and perpetual underdevelopment.
Licence: creative commons attribution 4.0
Marginalisation,vulnerable, insecurity,trafficking,abuse
Paper Title: A NEW EMBEDDED SYSTEM FORADAPTIVE SPATIAL VIDEO DE-INTERLACING ALGORITHMS BASED ON FUZZY LOGIC
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704140
Register Paper ID - 170485
Title: A NEW EMBEDDED SYSTEM FORADAPTIVE SPATIAL VIDEO DE-INTERLACING ALGORITHMS BASED ON FUZZY LOGIC
Author Name(s): Ms.BOYAPATI BHARATHIDEVI, Mr.LAKSHMI PRASAD CHENNAMSETTY
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1059-1070
Year: November 2017
Downloads: 1239
Video de-interlacing algorithms perform a crucial task in video processing. Despite these algorithms are developed using software implementations, their implementations in hardware are required to achieve real-time operation. This paper describes the development of an embedded system for video de-interlacing. The algorithm for video de-interlacing uses three fuzzy logic-based systems to tackle three relevant features in video sequences: motion, edges, and picture repetition. The proposed strategy implements the algorithm as a hardware IP core on a FPGA-based embedded system. The paper details the proposed architecture and the design methodology to develop it. The resulting embedded system is verified on a FPGA development board and it is able to de-interlace in real-time.
Licence: creative commons attribution 4.0
Embedded system, video de-interlacing, Fuzzy system, IP core
Paper Title: AN IMPROVED NEIGHBOUR NODE DISCOVERY METHOD FOR WIRELESS SENSOR NETWORKS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704139
Register Paper ID - 170461
Title: AN IMPROVED NEIGHBOUR NODE DISCOVERY METHOD FOR WIRELESS SENSOR NETWORKS
Author Name(s): Anitha Banoth
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1055-1058
Year: November 2017
Downloads: 1212
A sensor network may contain a huge number of simple sensor nodes that are deployed at some inspected site. In large areas, such a network usually has a mesh structure .In most sensor networks the nodes are static .Nevertheless ,node connectivity is subject to changes because of disruptions in wireless communication, transmission power changes, or loss of synchronization between neighbouring nodes. Hence, even after a sensor is aware of its immediate neighbours, it must continuously maintain its view, a process we call continuous neighbour discovery. In this work we distinguish between neighbour Discovery during sensor network initialization and continuous neighbour discovery. We focus on the latter and view it as a joint task of all the nodes in every connected segment. Each sensor employs a simple protocol in a coordinate effort to reduce power consumption without increasing the time required to detect hidden sensors.
Licence: creative commons attribution 4.0
An Improved Neighbour Node Discovery Method for Wireless Sensor Networks
Paper Title: SUPERIOR AND PARALLEL BASED CELLULAR NETWORK ARCHITECTURE WITH POLYNOMIAL WEIGHT FUNCTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704138
Register Paper ID - 170450
Title: SUPERIOR AND PARALLEL BASED CELLULAR NETWORK ARCHITECTURE WITH POLYNOMIAL WEIGHT FUNCTION
Author Name(s): V.BhagyaLakhmi, V.Shravya, P. Suresh Reddy
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1049-1054
Year: November 2017
Downloads: 1291
A learning system for the progression of cellular neural systems (CNN) with nonlinear cell cooperation’s is displayed. It is connected keeping in mind the end goal to discover the parameters of CNN that demonstrate the flow of certain nonlinear frameworks, which are portrayed by partial differential conditions (PDE). Qualities of an answer of the considered PDE for a specific starting condition are taken as the preparation design at as it were few focuses in time. Our outcomes illustrate that CNN got with our strategy estimated the dynamical conduct of different nonlinear frameworks precisely. Results for cellular network with appropriate polynomial weight function condition is talked about in detail.
Licence: creative commons attribution 4.0
Superior and Parallel Based Cellular Network Architecture with Polynomial Weight Function
Paper Title: AUTONOMOUS GAS DETECTION AND OVER SPEED PRODUCTION USING GSM AND GPS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704137
Register Paper ID - 170448
Title: AUTONOMOUS GAS DETECTION AND OVER SPEED PRODUCTION USING GSM AND GPS
Author Name(s): Vadla Srikanth, Ch. Venu Gopal
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1045-1048
Year: November 2017
Downloads: 1213
The insurance of the vehicle is vital nowadays. Along these lines, in this we are concentrating on this issue. We are in this undertaking we are shielding the vehicle from the LPG gas spillage, higher CO discharge, and the higher speed. Any of these paradigms happens, and after that the motor of the vehicle consequently stops and advises the proprietor of that vehicle as GSM SMS alongside the GPS area esteems i.e. Scope and Longitude esteems. To switch ON the motor, we give the slide switch. When you work the slide switch, at that point just the motor of the vehicle will begins. After this for distinguishing the distinctive risky measures like gas spillage, CO outflow, over speed, we should utilize the sensor like, gas sensor, CO sensor, IR photograph recognition sensor separately. To quantify the speed of the vehicle, we are utilizing the IR photograph identification sensor. To identify the gas spillage and the CO outflows, we are utilizing the gas and CO sensor individually. For each sensor, we should set the limit esteem. In the event that the sensor esteem goes past the edge level, at that point the vehicle will stop consequently, gives the bell alarm and sends the ready message alongside the GPS area esteems. Raspberry pi is used as processor to control all the sensors. LCD is used to display all the system data.
Licence: creative commons attribution 4.0
GSM, GPS module, gas sensor, CO sensor, IR sensor, Raspberry pi, LCD.
Paper Title: SPATIAL ANALYSIS OF PUBLIC AMENITIES DISTRIBUTION IN JODHPUR MUNICIPAL AREA USING RS and GIS TECHNIQUES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704136
Register Paper ID - 170458
Title: SPATIAL ANALYSIS OF PUBLIC AMENITIES DISTRIBUTION IN JODHPUR MUNICIPAL AREA USING RS AND GIS TECHNIQUES
Author Name(s): S.L. Borana, S. K. Yadav
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1034-1044
Year: November 2017
Downloads: 1278
The increase in population and area is causing lot of basic infrastructure and proper amenities problems in the Jodhpur city. Jodhpur is the second largest city of the Rajasthan and for establishing as an ideal city, factor like stability; health facility; education; and infrastructure, should be properly monitored. The paper examined the distribution of urban amenities in Jodhpur City. Spatial visualization and overlay analysis were carried out using Remote Sensing (RS)and GIS techniques. Landsat satellite data of 2015 and Survey of India map were used for georeferencing and digitization of 65 ward layers in Jodhpur city. The spatial distribution and concentration of three social amenities, viz, Educational, Gas Services and Petrol Pump were studied in the municipal wards. The Weighted Index Score has been used to determine the spatial concentration pattern in the provision of these amenities. The research outcomes would be of great importance for the government officials and urban planners to take necessary steps towards sustainable development of the city.
Licence: creative commons attribution 4.0
Spatial Analysis, Public Amenities, Landsat Data, Weighted Index.
Paper Title: DRILLING SERVICES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704135
Register Paper ID - 170456
Title: DRILLING SERVICES
Author Name(s): Joy Gohil
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 1004-1033
Year: November 2017
Downloads: 1451
To understand all about Drilling Services in Oil and Natural Gas corporation. Covering all aspects of Drilling Technologies which are currently Being use. Detailed information about currently in use conventional methods, description about maintenance of it. Compact and useful engineering technologies for Oil & Gas manufacturers & drillers. important information about drill sight and technologies. production technologies of crude oil.
Licence: creative commons attribution 4.0
Oil & Gas, Mechanical Engineering, Drilling technologies, Natural gas, Petroleum, Industrial, Electrical, Maintenance.
Paper Title: MECHANICAL CHARACTERISATION OF GLASS/EPOXY, CARBON/EPOXY, AND HYBRID COMPOSITE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704134
Register Paper ID - 170437
Title: MECHANICAL CHARACTERISATION OF GLASS/EPOXY, CARBON/EPOXY, AND HYBRID COMPOSITE
Author Name(s): Kavin kumar K , Ajith V.S, Selvakumari G, Mohamed Sameer T K
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 990-1003
Year: November 2017
Downloads: 1537
Glass, Carbon and hybrid fiber material is a well-established branch of research in composite structures stability. It has a wide range of applications in engineering science and technology. Polymeric materials reinforced with synthetic fibers such as glass, carbon, and hybrid fiber provide advantages of high stiffness and strength to weight ratio as compared to conventional construction materials. Composite subjected to in-plane loads is an important consideration in the preliminary design of aircraft and launch vehicle components. The sizing of many structural subcomponents of these vehicles is often determined by stability constraints. The purpose of this project was to generate the experimental and analytical investigation, conducted to find out the mechanical properties. In analytical method, the different types of stress distributions were found out by using the ANSYS 12 software. In experimental method, the mechanical properties were found by using tensile test and flexural test in universal testing machine. Composite fiber Plates are extensively used as structural members in aircraft design. The Glass fiber, carbon fiber and hybrid materials behavior of such has always received much attention by researchers. These materials were used access in the case of fuselage, wings, windows and doors. In some cases composite materials are used to reduce the weight of the structure. In aerospace and many other applications these structural components are also made up of composite material to further reduce the weight of the structure. The outstanding mechanical properties of composite structures, such as durability and corrosion-resistance characteristics combined with low density, make it more attractive compared to conventional materials.
Licence: creative commons attribution 4.0
GLASS/EPOXY, CARBON/EPOXY, AND HYBRID COMPOSITE
Paper Title: DISCRIMINATION OF WOMEN IN LAW ENFORCEMENT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704133
Register Paper ID - 170435
Title: DISCRIMINATION OF WOMEN IN LAW ENFORCEMENT
Author Name(s): Dr. Arun Kumar Mishra
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 984-989
Year: November 2017
Downloads: 1228
Broad social changes in developing countries such as India have resulted in the increased representation of women officers. The philosophy governing their integration into the police is that they should be treated equally to men and they should be provided with the same opportunities to undertake the same tasks. The influx of new cohorts of women into the police in recent years in India, resulting from its 1997 labour law legislation which required that 33 per cent of new hires for government organisations be women, provides the opportunity to examine how well women have been integrated into performing police tasks, how contented they are with their roles, how their male counterparts judge their performance and whether they accept women as equal partners. Using a survey questionnaire and an unstructured interview schedule, this study gathered data in 2010 from 222 men and 218 women police constables with 13 years or less service in the Tamil Nadu Police. The main finding of the study is that, in spite of the increased representation of women in the police force and their broad exposure to a wide range of duties, they are still negatively perceived by their male counterparts. This negative perception seems to have been internalised by women, many of whom reported that they prefer a traditional policing role. These findings suggest that the police should re-evaluate their gender integration policies, perhaps to include more gender-sensitive allocation of duties.
Licence: creative commons attribution 4.0
DISCRIMINATION OF WOMEN IN LAW ENFORCEMENT
Paper Title: COMPARATIVE STUDY OF VON NEUMANNS REGULAR, BOURNES REGULAR AND k-REGULAR ON SEMI RING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704132
Register Paper ID - 170426
Title: COMPARATIVE STUDY OF VON NEUMANNS REGULAR, BOURNES REGULAR AND K-REGULAR ON SEMI RING
Author Name(s): S. DICKSON
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 979-983
Year: November 2017
Downloads: 1190
In this paper, a study of Von Neumann’s regular, Bourne’s regular and k-regular on Semi ring are discussed. Many procedures have been established during the past few decades yet there is need of procedure to compare these types of regulars on semi ring. Here the objective is to compare these three regulars and to give the relationship between them.
Licence: creative commons attribution 4.0
Regular, Semi ring, Idempotent.
Paper Title: ONLINE SOCIAL NETWORK AND THEIR INFLUENCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704131
Register Paper ID - 170425
Title: ONLINE SOCIAL NETWORK AND THEIR INFLUENCE
Author Name(s): Dr. Arun Kumar Mishra
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 973-978
Year: November 2017
Downloads: 1219
Teenagers are among the most prolific users of social network sites (SNS). Emerging studies find that youth spend a considerable portion of their daily life interacting through social media. Subsequently, questions and controversies emerge about the effects SNS have on adolescent development. As technology improves and advances, social networking sites have an even bigger impact on society and human relationships, both positive and negative. Social networking sites have influence on teenagers in the way they develop socially. The way teenagers are connected to these global SNSs is both a frightening prospect for parents and educators and an intriguing area for social science research. Further there is no comprehensive knowledge of the activities adolescents do on these sites as well as how they impact their social life. The use of social networking by college students has become increasingly relevant to their academic lives. Smartphones have added great potential by enabling an increase in the use of social networking and in the number of hours spent on such sites. Being online for a long time and being able to access different information from different sources at the same time could cause information overload. Students could face problems in filtering the information they receive and they might find it difficult to decide which sources they can trust and, therefore, which to select.
Licence: creative commons attribution 4.0
ONLINE SOCIAL NETWORK AND THEIR INFLUENCE
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 7 | Month- July 2024)