ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Constructing Challenge Set For Machine Translation
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304702
Register Paper ID - 234669
Title: CONSTRUCTING CHALLENGE SET FOR MACHINE TRANSLATION
Author Name(s): Ms.Saumya Jain, Dr. Ranjana Sharma, Mr. Ajay Rastogi
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f657-f666
Year: April 2023
Downloads: 158
In the modern world, there is an increased need for language translations owing to the fact that language is an effective medium of communication. The demand for translation has become more in recent years due to increase in the exchange of information between various regions using different regional languages. Accessibility to web document in other languages, for instance, has been a concern for information Professionals. Machine translation (MT), a subfield under Artificial Intelligence, is the application of computers to the task of translating texts from one natural (human) language to another. Many approaches have been used in the recent times to develop an MT system. Each of these approaches has its own advantages and challenges. This paper takes a look at these approaches with the few of identifying their individual features, challenges and the best domain they are best suited to.
Licence: creative commons attribution 4.0
Machine Translation, Rule-based Approach, Corpus-based Approach, Statistical Approach, Transfer-Based Approach
Paper Title: "Klippel: Trenaunay Syndrome ( KTS) & It's management"
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304701
Register Paper ID - 233585
Title: "KLIPPEL: TRENAUNAY SYNDROME ( KTS) & IT'S MANAGEMENT"
Author Name(s): Miss. Shendage A.S., Mr. Jadhav T.S., Mr. Waghmode S.N., Mr. Khatal V.K.
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f647-f656
Year: April 2023
Downloads: 127
Klippel-Trenaunay Syndrome(KTS) is a congenital disorder with a rare incidence to affect at least 3-5 in 100,000 people worldwide. Alternative names given for Klippel-Trenaunay Syndrome are Klippel-Trenaunay-Weber syndrome. It is a rare sporadic disease characterized by clinical triad of capillary malformation; soft tissue and bony hypertrophy; and atypical varicosity. Symptoms of Klippel-Trenaunay Syndrome (KTS) include pain, swelling, lymphedema, bleeding, superficial thrombophlebitis, and deep vein thrombosis. This type of syndrome was first described more than hundred years ago, exact incidence has not been estimated yet. We report a case of a 21-year-old Male who presented to us with the symptoms of varicose plaques over left lower limbs & was diagnosed as a case of KTS. CT-Angiography IV contrast Vascular Doppler Ultrasound, skeletal X-ray, and magnetic resonance imaging of the Limb indicated a Klippel-Trenaunay disease.
Licence: creative commons attribution 4.0
Klippel-Trenaunay Syndrome, Varicose veins, Capillary Malformations, compression stockings.
Paper Title: Message source identification using reverse dissemination process
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304700
Register Paper ID - 233952
Title: MESSAGE SOURCE IDENTIFICATION USING REVERSE DISSEMINATION PROCESS
Author Name(s): Sangavi Suress, Dr. S.Geetha
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f643-f646
Year: April 2023
Downloads: 124
Identifying message sources in social networks plays a critical role in limiting the damage caused by them through the timely quarantine of the sources. However, the temporal variation in the topology of social networks and the ongoing dynamic processes challenge our traditional source identification techniques that are considered in static networks. In this paper, we borrow an idea from criminology and propose a novel method to overcome the challenges. First, we reduce the time-varying networks to a series of static networks by introducing a time-integrating window. Second, instead of inspecting every individual in traditional techniques, we adopt a reverse dissemination strategy to specify a set of suspects of the real message source. This process addresses the scalability issue of source identification problems, and therefore dramatically promotes the efficiency of message source identification. Third, to determine the real source from the suspects, we employ a novel microscopic message spreading model to calculate the maximum likelihood (ML) for each suspect. The one who can provide the largest ML estimate is considered as the real source. The evaluations are carried out on real social networks with time- varying topology. The experiment results show that our method can reduce 60% - 90% of the source seeking area in various time-varying social networks. The results further indicate that our method can accurately identify the real source, or an individual who is very close to the real source. To the best of our knowledge, the proposed method is the first that can be used to identify message sources in time-varying social network
Licence: creative commons attribution 4.0
Paper Title: Article on Rethinking about the Ethical Perspective of Surrogacy
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304699
Register Paper ID - 234980
Title: ARTICLE ON RETHINKING ABOUT THE ETHICAL PERSPECTIVE OF SURROGACY
Author Name(s): Rajesh Gupta
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f639-f642
Year: April 2023
Downloads: 139
The process of Reproduction is natural and bearing a child is essential for any creature in this world to claim their existence. Generally every couple wants to give birth of their child but sometimes they are failure due to several causes like the problem of infertility, critical health issues, and some time it's biologically impossible. Nowadays infertility becomes a great problem that women have to face and in our Indian society a woman who has not a child is considered as an incomplete and inauspicious for any good social ritual. She has to tolerate undeserved comments and sometimes received worst behavior from society and even from her family members. Sometimes men have to face the same problem and in this way they are emotionally tortured by the society. So here it can be said that surrogacy is a new hope for these couples. Surrogacy is a contract between a fertile women and infertile couple or intended parent(s), where a fertile woman ready to give birth child on the behalf of intended parent(s). Generally on the basis of contract we found two types of surrogacy Altruistic surrogacy and Commercial surrogacy. Among this especially Commercial surrogacy is badly involved many ethical and legal issues. But here on this article I am going to discuss another ethical perspective from need based point of view. It helps us to rethinking about the ethical issues of surrogacy.
Licence: creative commons attribution 4.0
surrogacy, surrogate mother, intended parent(s), commissioning parents, commercial surrogacy, altruistic surrogacy.
Paper Title: House Price Prediction using Machine Learning
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304698
Register Paper ID - 234988
Title: HOUSE PRICE PREDICTION USING MACHINE LEARNING
Author Name(s): Shubham Kulkarni, Shikhar Singh, Rahul Tapre, Amit Kukreja
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f634-f638
Year: April 2023
Downloads: 123
In the current study, a framework is presented that makes use of a dataset of housing prices from various areas of Mumbai as well as important variables like the property's location, size, and existence of a swimming pool, among others. The information came from Kaggle Inc. Based on the aforementioned parameters, the technique is intended to predict the resale price of a property. An ensemble learning technique was used to improve prediction accuracy by mixing numerous machine learning algorithms rather of relying just on one. In order to provide a more accurate prediction result than utilising only one method, the ensemble model used in the study integrates Decision Tree, Linear Regression, and K-Nearest Neighbour algorithms. The system achieves the lowest predicting error with the use of this ensemble model, with the trained model showing a Mean Absolute Percentage Error (MAPE) of 16.09%.
Licence: creative commons attribution 4.0
House Price Prediction, Linear Regression, Decision Tree, KNN, Ensemble Learning
Paper Title: Document Security within Institutions Using Image Steganography Technique
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304697
Register Paper ID - 234677
Title: DOCUMENT SECURITY WITHIN INSTITUTIONS USING IMAGE STEGANOGRAPHY TECHNIQUE
Author Name(s): Suresh A.T.K., P Ebby Darney
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f626-f633
Year: April 2023
Downloads: 129
The art or practise of hiding a message, image, or file within another message, image, or file is known as steganography. This essay examines how images on the institution's network can be used to hide papers within that organisation. The C programming language was used to create this free, self-contained, and user-friendly application. Before the document is delivered through the institution's network to the intended recipient, the encryption procedure is carried out on the user's computer. Images are encrypted and decrypted during this procedure, preventing hackers or casual users from reading documents that weren't created for them.
Licence: creative commons attribution 4.0
steganography, image, encrypting, decryption, image
Paper Title: A SHORT HISTORY OF EMPOWERMENT OF WOMEN IN INDIA THROUGH THE AGES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304696
Register Paper ID - 234993
Title: A SHORT HISTORY OF EMPOWERMENT OF WOMEN IN INDIA THROUGH THE AGES
Author Name(s): Dr.Rajesh.T
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f621-f625
Year: April 2023
Downloads: 131
The social dignity and position of women was very favourable for them during the Rig Vedic India. They lost their freedom during the later Vedic period. They enjoyed maximum freedom during the Sangam Age that was the Dravidian civilization. They began to be enjoyed rights and freedom during the British period. Now they are more aware about their freedom and civic rights through Missionary Education, wealth and higher positions.
Licence: creative commons attribution 4.0
Vidatha, Aryanisation, Arditi, Usha, Rathi, Aranyani, Manusmriti, Mahapraja Pati Gautami, Ananda, Ammaiyar and Thilagavathiar, talukdars, Vidyalaya
Paper Title: Survey Paper On Breast Cancer Prediction Using Machine Learning & Cross-Validation Techniques
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304695
Register Paper ID - 234975
Title: SURVEY PAPER ON BREAST CANCER PREDICTION USING MACHINE LEARNING & CROSS-VALIDATION TECHNIQUES
Author Name(s): Abhishek Sanjay Powar, Aditi Parikshitee Batwal, Pranav Dilip Kale, Shubham Sanjay Kamble
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f616-f620
Year: April 2023
Downloads: 123
Licence: creative commons attribution 4.0
KNN, SVM, Decision Tree, Random Forest, Breast Cancer, Cross Validation
Paper Title: l'usage des antibiotiques aux urgences d'un centre hospitalier de casablanca
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304694
Register Paper ID - 234687
Title: L'USAGE DES ANTIBIOTIQUES AUX URGENCES D'UN CENTRE HOSPITALIER DE CASABLANCA
Author Name(s): Mohamed amine elabidi, Mehdi simou, Hanane zouin
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f606-f615
Year: April 2023
Downloads: 173
Licence: creative commons attribution 4.0
Paper Title: PAIN MANAGEMENT IN AN EMERGENCY DEPARTMENT OF A TERTIARY HOSPITAL IN CASABLANCA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304693
Register Paper ID - 234878
Title: PAIN MANAGEMENT IN AN EMERGENCY DEPARTMENT OF A TERTIARY HOSPITAL IN CASABLANCA
Author Name(s): Mohamed amine elabidi, Mehdi simou, Hanane zouin
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f595-f605
Year: April 2023
Downloads: 102
Pain is defined by The International Association for the Study of Pain (IASP) as "an unpleasant sensory and emotional experience related to or described in actual or potential tissue damage". In emergency rooms, 60% of patients experience acute pain and in 85% of cases, pain is the main reason for consultation. The fight against pain is a public health priority. The establishment of national guidelines and recommendations testifies to the institutional will and of health professionals to optimize their management. The organizational and structural impact as well as human resources are major determinants in the success of any pain management strategy, especially in emergencies, both symptomatic and etiological. As a result, we carried out work within the emergency admissions department of the tertiary hospital to take stock of analgesia practices as well as the epidemiological and clinical characteristics of the patients concerned. This is a prospective single-center, analytical cross-sectional study carried out over 3 months in an emergency department of a tertiary hospital in Casablanca.
Licence: creative commons attribution 4.0
pain , emergency , pain relief
Paper Title: Physiological evaluation of correlation between Dhatwagnimandhya and Hypothyroidism
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304692
Register Paper ID - 234974
Title: PHYSIOLOGICAL EVALUATION OF CORRELATION BETWEEN DHATWAGNIMANDHYA AND HYPOTHYROIDISM
Author Name(s): Dr. Komal Patel, Dr. Rajesh Kumar Sharma, Dr.Dineshchandra Sharma
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f589-f594
Year: April 2023
Downloads: 132
The basal metabolic rate is reduced in hypothyroidism because the thyroid gland does not produce enough thyroid hormones. The major job of thyroxine is to support oxidative metabolism by acting as a catalyst. These roles are comparable to how Agni is described in Ayurveda. Agni (jatharagni, bhutagni, and dhatvagni) regulates all bodily metabolic processes. Jatharagnimandya results in dhatwagnimandya since dhatwagni depends on jatharagni. Although hypothyroidism is not directly described in Ayurveda, it can be linked to dhatwagnimandya (ras and meda dhatwagnimandya) based on its clinical manifestation. The health and altered condition of Agni might be related to the normal and abnormal function of the thyroid gland. The relationship between hypothyroidism and Agnimandhya is highlighted in this article.
Licence: creative commons attribution 4.0
Thyroid gland, hypothyroidism, Agnimandhya, Dhatwagnimandhya,
Paper Title: QUANTUM CRYPTOGRAPY BASED DEVICE-TO-DEVICE CONTINUOUS AUTHENTICATION PROTOCOL FOR CLOUD
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304691
Register Paper ID - 234970
Title: QUANTUM CRYPTOGRAPY BASED DEVICE-TO-DEVICE CONTINUOUS AUTHENTICATION PROTOCOL FOR CLOUD
Author Name(s): NISHANTHKUMAR . K, Mrs. S. KALAIVANI
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f578-f588
Year: April 2023
Downloads: 114
With the widespread adoption of cloud computing, securing data and ensuring continuous authentication of devices accessing cloud services has become a critical concern. Traditional cryptographic methods, while effective, are vulnerable to quantum computing attacks that can compromise security. To address this challenge, we propose a novel device-to-device continuous authentication protocol for cloud services, leveraging the principles of quantum cryptography.Our proposed protocol utilizes quantum key distribution (QKD) to establish secure and authenticated communication channels between devices accessing cloud services. QKD leverages the principles of quantum mechanics, such as the Heisenberg uncertainty principle and quantum entanglement, to securely generate and distribute cryptographic keys, which are immune to attacks from quantum computers. The protocol continuously authenticates the devices by periodically exchanging quantum keys, verifying their authenticity and integrity, and updating the keys accordingly.Our protocol ensures secure and continuous authentication of devices accessing cloud services, protecting against various attacks including man-in-the-middle attacks, replay attacks, and eavesdropping attacks. It provides strong security guarantees, leveraging the unique properties of quantum mechanics to protect against attacks from both classical and quantum computers. Moreover, our protocol reduces the need for centralized authentication servers, reducing the risk of single point of failure and enhancing the scalability and efficiency of cloud services.We evaluate our proposed protocol through extensive simulations and performance analysis, demonstrating its effectiveness in ensuring secure and continuous authentication of devices accessing cloud services. Our findings highlight the potential of quantum cryptography as a promising solution for securing cloud computing environments and enabling secure device-to-device communication.
Licence: creative commons attribution 4.0
QUANTUM CRYPTOGRAPY BASED DEVICE-TO-DEVICE CONTINUOUS AUTHENTICATION PROTOCOL FOR CLOUD
Paper Title: Stock Market Trend Prediction Using Machine Learning algorithms and performing comparative analysis
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304690
Register Paper ID - 234960
Title: STOCK MARKET TREND PREDICTION USING MACHINE LEARNING ALGORITHMS AND PERFORMING COMPARATIVE ANALYSIS
Author Name(s): N.Pavan Kumar, A.Ashwini, P.Vijay Kumar
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f572-f577
Year: April 2023
Downloads: 413
The nature of stock market movement has always been ambiguous for investors because of various influential factors. This study aims to significantly reduce the risk of trend prediction with machine learning algorithms. Four stock market groups, namely diversified financial, petroleum, non-metallic minerals and basic metals, are chosen for experimental evaluations. This study compares Three machine learning Linear Regression, Random Forest and KNN algorithm.
Licence: creative commons attribution 4.0
Stock Market Prediction, Machine Learning Algorithm, K-Nearest algorithm, Linear Regression, Random Forest algorithm, RMSA, MSE, R-Squared
Paper Title: Impact Of Online Education And Implications of learning
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304689
Register Paper ID - 234812
Title: IMPACT OF ONLINE EDUCATION AND IMPLICATIONS OF LEARNING
Author Name(s): Dr Supriya rai, Mohammed maaz, Piyush r jain, Vaibhav jain
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f561-f571
Year: April 2023
Downloads: 111
Abstract: Online education refers to the use of digital technology to deliver educational content and instruction remotely over the internet. With the widespread availability of the internet, online education has become increasingly popular as a way to access education from anywhere, at any time. Online education offers several advantages over traditional in-person learning, including greater flexibility, accessibility, and convenience. Additionally, online education can be more cost-effective than traditional education, with reduced tuition fees and lower transportation costs. However, there are also some potential disadvantages to online education, such as the lack of face-to-face interaction with instructors and peers, the need for self-discipline and motivation, and concerns about the quality of online instruction. Despite these challenges, online education continues to grow in popularity and importance, with many educational institutions and organizations now offering online courses, degree programs, and training modules to learners around the world. Online education also poses some challenges, including the need for learners to be self-motivated and disciplined in their learning, and concerns about the quality and rigor of online instruction. Additionally, online education can exacerbate existing inequalities, as learners in low-income or rural areas may not have access to the necessary technology and internet connectivity. Despite these challenges, online education has the potential to transform education and training, making learning more accessible and inclusive. It is important for educators and institutions to continue to innovate and adapt to meet the needs of diverse learners in the digital age. This may involve new approaches to instructional design, the use of emerging technologies, and a focus on promoting equity and access in online education.
Licence: creative commons attribution 4.0
Key Words: Online education, e- learning, classroom based education, Potential
Paper Title: High Speed Area Efficient VLSI Architecture of Three Operand Binary Adder
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304688
Register Paper ID - 234924
Title: HIGH SPEED AREA EFFICIENT VLSI ARCHITECTURE OF THREE OPERAND BINARY ADDER
Author Name(s): G.HarshavardhanReddy, K.Vaishnavi, Dr. B.Swapna Rani
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f554-f560
Year: April 2023
Downloads: 187
For Area-efficient VLSI architecture a Two-operand binary adder is designed where in which area is more and speed of operation is low, because of these limitations a new architecture with Three-operand binary adder logic is to be designed instead of previous architecture which performs 3-9 times faster than the previous architecture. Three-operand binary adder is the basic functional unit to perform the modular arithmetic and various Cryptography and Pseudorandom Bit Generator (PRBG) algorithm. Carry save adder (CS3A) is widely used technique to perform the Three-operand binary adder. However the ripple-carry stage in CS3A leads to a high propagation delay. Moreover a parallel prefix Two-operand binary adder such as Han-Carlson (HCA) can also be used for Three-operand addition that significantly reduces the critical path delay a cost of additional hardware. Three-operand binary addition significantly decreases area and power consumption. Hence a new High-speed and Area efficient adder architecture is proposed using pre-compute bitwise addition followed by carry prefix computation logic to perform the Three-operand binary addition. With this Logic a new architecture is to be designed, for 16-bit Three-operand binary addition which is called as 16-bit Three-operand binary adder. To design this logic we are using Xilinx ISE, ModelSim software with VHDL, Verilog languages.
Licence: creative commons attribution 4.0
Paper Title: Deep Learning Based Model To Forecast The Direction Of Stock Exchange Market Using Social Media
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304687
Register Paper ID - 234858
Title: DEEP LEARNING BASED MODEL TO FORECAST THE DIRECTION OF STOCK EXCHANGE MARKET USING SOCIAL MEDIA
Author Name(s): Ms. Dhyeyaja Petkar, Ms. Janhavi Kongari, Mr. Pranav Shinde, Prof. Suparna Shirish Naik
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f547-f553
Year: April 2023
Downloads: 122
A company's stock exchange price isn't just a measure of the present worth of the value of its shares, but an index of its anticipated unborn performance as well. The company is an incorporated organisation with the Regulatory Body and shares trading members are registered with SEBI. Given that stock request statistics are extremely time-specific and generally nonlinear in nature, it's veritably delicate to read unborn stock values. The cast offers details about the present state of the inflow of force values. This will also be used to decide whether to buy or vend the individual shares of the particular stock for consumers. numerous scientists were conducted with different data mining ways to read stock request prices. This paper attempts to read the stock price of companies in the public stock exchange indicator LIX15 using Neural Network technology. For designing and training the models, the once data of the chosen stock will be used. To corroborate the thickness of the model, the goods of the model are used for comparison with factual data.
Licence: creative commons attribution 4.0
Deep Learning, Recurrent neural network, stock market, prediction.
Paper Title: Basic discrimination in interpersonal communication based on Gender in Corporate environment
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304686
Register Paper ID - 234817
Title: BASIC DISCRIMINATION IN INTERPERSONAL COMMUNICATION BASED ON GENDER IN CORPORATE ENVIRONMENT
Author Name(s): RACHNA
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f542-f546
Year: April 2023
Downloads: 115
In work environment, we encounter various situations involving speech or writing: conversation with friends, professors, or colleagues to achieve various purposes; group discussions,meetings, presentations, project report submission etc.Likewise we interact with superior and subordinates,converse with them and share the materials.Communication at this level is known as Interpersonal communication where we need to examine how many people are involved,how close they are to one another, how many channels are used and the feedback provided. A lot of conversation is devoted to the idea that women and men communicate in different manner.Mostly studies indicate that women are more sensitive in communication rather than men.Therefore society expects from them more responsibility in regulation. Men on the other hand more sensitive about their status in communication.All the interpersonal communication takes places in accordance with the gender role and gender identity ; so it would not be wrong to say that gender roles possesses a significant effect on the formation of the relationship established. But discrimination between them on the basis of gender is seen at workplace. And they directly and indirectly influenced on the performance of the employees. This study deeply concerns the different aspects of discrimination and how can we manage. There should be equal opportunity for both male as well as female employees; Communication must be comprehensive as it reduces the gap among the employees.
Licence: creative commons attribution 4.0
interpersonal communication, channels, gender identity, discrimination, comprehensive, gender role.
Paper Title: SMS Spam Detection
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304685
Register Paper ID - 234722
Title: SMS SPAM DETECTION
Author Name(s): V. Iswarya Kumari, J. Sirisha, T. Lakshmi Prasanna, M. Jaya Tanuja, M. Rishitha
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f536-f541
Year: April 2023
Downloads: 132
: In our everyday lives, the conversation has been going through SMS (Short Message Service) for various purposes. Many organizations communicate our request processing through SMS, which is easy to communicate. Many fraudulent URLs and short links are sent through SMS, and we don't know if they are safe or not. If we click on the links and give them our information, they may misuse it and threaten us with money. So, we can't predict them by seeing whether they are spam or not. To address this problem, we have come across machine learning algorithms and a natural language toolkit that help tokenize and preprocess every word. To come up with a user interface that makes better use of availability and can predict spam and not spam. In this paper, we are going to check all the classification algorithms and choose the most accurate one to build and save the model so we can implement it in the user interface.
Licence: creative commons attribution 4.0
Paper Title: Taxonomy of Research Misconducts: A Conceptual Analysis
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304684
Register Paper ID - 234895
Title: TAXONOMY OF RESEARCH MISCONDUCTS: A CONCEPTUAL ANALYSIS
Author Name(s): Mr. Jateendra Das, Dr. Sarat Kumar Rout
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f523-f535
Year: April 2023
Downloads: 131
Any scientific research not only follows systematic steps and procedure but also encompasses research ethics, which is very essential for every researcher to be aware of. The Committee on Publication Ethics (COPE) has therefore issued a "research code of conduct" and advices the researcher and editors how to manage the cases of research and publication misconduct. Ethical standards given by ethics committee refrains the researchers' involvement in doing dishonest practices during research work. Unfortunately the detrimental attitude towards publishing the paper quickly and improve academic score has piloted to unethical practices in scientific research. Violation in the principles of research integrity results fabrication, falsification, or plagiarism in proposing, performing, or reviewing research, or in reporting research results which is considered as research misconduct in scientific research. The present study aims to furnish different taxonomy of research misconduct with assisting the review of related literature. Besides, this article will hope to minimise the dopiness and anxiety of early career researcher and help them to keep away from different misconduct or wrong doing in research practices.
Licence: creative commons attribution 4.0
Fabrication, Falsification and Plagiarism (FFP), Ethical Approval, Missing Data, Informed Consent, Post hoc analysis, Authorship Issues, Redundant Publication, Conflict of Interest and Salami Slicing
Paper Title: Standalone Desktop application for pumping test data analysis
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2304683
Register Paper ID - 234813
Title: STANDALONE DESKTOP APPLICATION FOR PUMPING TEST DATA ANALYSIS
Author Name(s): Avishek baranwal, Akash, Aayush Chhaparia
Publisher Journal name: IJCRT
Volume: 11
Issue: 4
Pages: f519-f522
Year: April 2023
Downloads: 124
There is an immediate necessity to look into how aquifers respond to different human activities in terms of both quantity and quality of groundwater. A stand-alone desktop application for evaluation and interpretation of pumping test data can be distributed as freeware for use by groundwater experts, researchers, students, teachers, and others. The pumping test is the most common and accepted technique for figuring out an aquifer's hydraulic properties. A pumping test help us determine a number of aquifers' properties, including transmissivity, storativity, and specific yield.Data from pumping tests are typically evaluated using computer programmes . Since there is no computer software offered in India for this use. The Central Ground Water Board is proposing to develop a stand-alone desktop application for the study and interpretation of pumping test data that can be used by groundwater specialists, With the increase of human population its demands has increased and resources are limited and in one of those resources water is undisputedly holds the top spot. Since we get most of our water from groundwater resources the government and concerned authorities have increased their data collection and keep records of water levels and parameters related to aquifers. But for better and efficient use of the collected records we will use data analysis which comprises steps like data preprocessing which further includes data cleaning and data mining. Next steps include data analysis which includes pupils, researchers, educators, and other users. This software will be offered as freeware. The user has the option of directly entering data using interfaces or importing it from already-existing datasets.[3] Expected result: a desktop programme that can analyse and interpret data from pumping tests on its own. The software application can include components for interpreting includes common techniques like Theiss, Theiss recovery, and Jacob technique.[3]
Licence: creative commons attribution 4.0
pumping test,aquifers,standalone, desktop,data,storativity,transmissivity
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 7 | Month- July 2024)