Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 12 | Issue 4

Volume 12 | Issue 4 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: Design and Implementation of Mobile ATM Robot

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404955

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404955

  Register Paper ID - 256621

  Title: DESIGN AND IMPLEMENTATION OF MOBILE ATM ROBOT

  Author Name(s): Mr.A.KATHIRESAN, S S ISAI ARASU, NAVEEN RAJU SELVARAJU, G SARAVANAN

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i333-i342

 Year: April 2024

 Downloads: 54

 Abstract

The design and implementation of a mobile ATM robot represents a novel fusion of robotics and banking technologies aimed at addressing accessibility and convenience challenges in banking services. This innovative solution leverages the mobility of robotics to bring automated teller machines (ATMs) directly to users, eliminating the need for them to visit fixed ATM locations. Through the integration of embedded systems and sensor technologies, the mobile ATM robot can autonomously navigate urban environments, locate users, and facilitate secure ATM transactions. Key considerations in the design process include selecting appropriate hardware components, integrating sensors for navigation and obstacle avoidance, and developing robust software for user interaction and transaction processing. The hardware platform must be durable, reliable, and capable of supporting the necessary functionalities, while the software must ensure seamless communication between the robot and banking systems, as well as provide a user-friendly interface for interaction. During implementation, prototype development, rigorous testing, and iterative refinement are essential to ensure the functionality, safety, and user experience of the mobile ATM robot. Real-world deployment scenarios and user feedback play a crucial role in optimizing the design and operation of the robot, allowing for adjustments to be made to improve performance and address any usability issues. Ultimately, the goal of this project is to enhance banking accessibility, reduce reliance on traditional brick and-mortar branches, and provide a flexible and convenient banking solution that meets the needs of modern consumers.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Mobile ATM, robotics, banking technologies, autonomous navigation, sensor technologies, hardware and software integration, user interaction, accessibility, convenience, durability, safety, user experience, iterative refinement.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: UNEMPLOYMENT AND JOB OPPORTUNITIES LEADING TO RURAL-URBAN MIGRATION: A CASE STUDY IN BANGALORE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404954

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404954

  Register Paper ID - 256629

  Title: UNEMPLOYMENT AND JOB OPPORTUNITIES LEADING TO RURAL-URBAN MIGRATION: A CASE STUDY IN BANGALORE

  Author Name(s): Dr. Salma Begum, Sowmya P, Kishore Kumar M, Sheela Robert, Rahul Prakash, Vikas T , Mohd Yasin

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i326-i332

 Year: April 2024

 Downloads: 75

 Abstract

Global migration has shaped nations, cultures, and economics for as long as humans have existed. Migration, which is defined as the movement of people from one location to another, can happen for a number of reasons, such as the desire for a higher quality of life, economic opportunity, or the need to flee conflict or persecution. Migration has always been a major factor in determining the demographics and dynamics of different countries and areas. Unprecedented amounts of migration have been made possible in recent decades by globalization, technological advancements in transportation, and internet connectivity. This has given people, communities, and governments around the world possibilities as well as obstacles. Although migration can foster innovation, cultural diversity, and economic growth, it often raises difficult social, political, and humanitarian problems. The current study aims to understand the trend and pattern of the migration of the rural population and analyze the feasible solution according to the migrant requirements. The study is based on primary data analysis using descriptive statistical technique.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Unemployment, Job Opportunities, Migration, rural-urban

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FORMULATION AND EVALUATION OF ANTI-ACNE HERBAL FACE PACK CONTAINING TINOSPORA CORDIFOLIA.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404953

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404953

  Register Paper ID - 256589

  Title: FORMULATION AND EVALUATION OF ANTI-ACNE HERBAL FACE PACK CONTAINING TINOSPORA CORDIFOLIA.

  Author Name(s): Sanskruti Bobade, Yash Chavhan, Shubham Hoke, Prathamesh Nandurkar, Anjali Chavhan

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i316-i325

 Year: April 2024

 Downloads: 86

 Abstract

Acne is a persistent, chronic skin inflammatory condition affecting people worldwide. It is the eighth most common skin disease, with an estimated global prevalence of 9.38%. Tinospora cordifolia, a globrous, succulent, woody climbing shrub native to India, is a non-controversial and extensively used herb in Ayurvedic medicine. The plant is known by various names in different languages in India. The preparation of the plant extract includes Tinospora cordifolia, glycerine, sodium benzoate, kaolin, Bentonite powder, and Rose Water. The plant is used in various applications, including treating fevers, diabetes, dyspepsia, jaundice, urinary problems, skin diseases, chronic diarrhea, dysentery, heart disease, leprosy, and helmenthiasis. The plant was collected from the herbal Garden of Dr. Rajendra Gode Institute of Pharmacy, Amravati, and authenticated by the Botanical Department of Shri Shivaji College of Agriculture and Biotechnology. The dried plant material was ground to powder form, and the extract was prepared by sifting the powdered stems with ethanol. The extract was then filtered through a syringe to remove the oil.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Tinospora Cordifolia, acne, acne vulgaris, Ayurvedic, Face pack

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Difficulties Faced by Diploma student During Studying Chemistry

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404952

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404952

  Register Paper ID - 256504

  Title: DIFFICULTIES FACED BY DIPLOMA STUDENT DURING STUDYING CHEMISTRY

  Author Name(s): VANDANA ASHWIN PATIL, SURAJ SHRIPAL BHAGATE, DILIP HARISHCHANDRA CHAVAN

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i313-i315

 Year: April 2024

 Downloads: 62

 Abstract

Theoretical chemistry is a troublesome subject to instruct and to learn. Significant learning challenges are because of the specific perspectives on chemistry peculiarities that in numerous ways go against intuitive and ordinary perspectives on the students. Therefore, significant errors happen when understudies attempt to appreciate substance clarifications inside the structure of their pre-informative originations. This paper portrays research discoveries on understudies' students' Pre-instructional conceptions in the domain of chemistry and on attempts to guide students from their conceptions to the core ideas of chemistry. Rather than providing an overview of students' conceptions in various topics, we review learning difficulties from the perspectives of the challenge of multiple representations and the relation of chemistry to everyday experiences, including understanding the special language of chemistry. We believe that these perspectives contribute substantially to the limited success of teaching and learning chemistry. Major learning difficulties are due to the particular views of chemistry phenomenon, chemical reactions, their balancing that in many ways contradict intuitive and everyday views of the learners. As a result, major misunderstandings occur when students try to study chemical explanations within the framework practical knowledge of their pre-instructional conceptions. This paper describes research findings on


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

chemistry, difficulty, concepts, abstract, knowledge

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Deepfake Detection Using Transfer Learning and Multi-task Cascaded Convolutional Neural Network.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404951

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404951

  Register Paper ID - 256574

  Title: DEEPFAKE DETECTION USING TRANSFER LEARNING AND MULTI-TASK CASCADED CONVOLUTIONAL NEURAL NETWORK.

  Author Name(s): Sindhu V, Pandithurai O, Sasi Devi S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i309-i312

 Year: April 2024

 Downloads: 56

 Abstract

The project focuses on detecting deepfake images using a dataset containing real and fake images. This employs transfer learning, a technique in which a pre-trained model (EfficientNetB0) is used as a starting point and fine-tuned on a new dataset (comprising real and deepfake images). This approach leverages the knowledge learned by the pre-trained model on a large dataset (ImageNet) and adapts it to the specific task of deepfake detection. For face detection and alignment, the MTCNN (Multi-task Cascaded Convolutional Neural Network) algorithm is utilized. MTCNN is a state-of-the-art deep learning model known for its accuracy in detecting faces and facial landmarks. It is used to locate and extract faces from frames of a video, which are then processed and fed into the deepfake detection model. Data augmentation is applied to the dataset using techniques such as rotation, shifting, shearing, zooming, and flipping. This process helps increase the diversity of the training data, improving the model's ability to generalize to unseen images. The Deepfake detection model consists of a base EfficientNetB0 model followed by a Global Average Pooling 2D layer, a Dropout layer for regularization, and a Dense layer with a sigmoid activation function for binary classification (real or fake). The model is trained using the Adam optimizer with a varied range of learning rates and binary cross-entropy loss. During training, the model's performance is monitored using various metrics such as accuracy, precision, recall, and F1-score. Early stopping is employed to prevent overfitting, and the best model is saved using Model Checkpoint to ensure that the model with the lowest validation loss is retained. In conclusion, the project integrates cutting-edge technologies such as transfer learning, deep learning models like EfficientNetB0, and advanced face detection algorithms like MTCNN to develop a robust deepfake detection system.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Pre-Trained Model, MobileNetV3, MTCNN, Pooling, Dropout, Dense Layer, Sigmoid activation, regularization, F1-score, Model Checkpoint, cross-entropy loss, Adam optimizer.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: VEHICLE TRACKING SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404950

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404950

  Register Paper ID - 256540

  Title: VEHICLE TRACKING SYSTEM

  Author Name(s): KAVIYAPRABHA KM, Om Selvaprakash M, Dr.J.Arunarasi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i301-i308

 Year: April 2024

 Downloads: 71

 Abstract

The increasing frequency of car theft in today's society presents serious difficulties for both car owners and law enforcement. This study offers a novel car tracking and anti-theft system that seamlessly incorporates GPS and GSM technologies into an Internet of Things (IoT) architecture, effectively addressing these challenges. This all-inclusive system provides a comprehensive solution to improve vehicle security by combining remote control functions, emergency alarm functionality, and real-time tracking capabilities.This system's primary function is to provide precise vehicle position tracking and effective communication between the vehicle and a central monitoring station by utilizing both GSM and GPS technology. The GPS module that is installed in the car records its exact location on a regular basis, and the GSM modem makes it easier to send this information to the monitoring station. A robust 32-bit ARM7 LPC2148 microcontroller, which effectively controls the data transmission methods, such as General Packet Radio Service (GPRS) or Short Message Service (SMS), based on network availability, is what makes this connection possible.This system's capacity to deliver real-time vehicle location data analysis and visualization is one of its unique selling points. Through integration with widely used mapping services like Google Earth, users can effortlessly monitor the movement of the car and detect any questionable actions or detours from the prearranged routes. This improves the tracking of the vehicle's location and makes it easier to respond quickly in the event of theft or unauthorized use.The vehicle's engine can be turned on or off remotely, and an alert system with a buzzer and an alert light can be turned on. This reduces possible losses related to car theft by enabling consumers to act quickly in the case of a security breach.To strengthen security measures even further, the system includes an emergency alarm mechanism in addition to proactive tracking and management functions. Activated through the Blynk application, the GSM module uses the Arduino UNO microcontroller's ability to identify possible theft scenarios and trigger an automatic call to a pre-programmed emergency contact number. Thorough performance testing is done to assess the system's efficacy, showing its dependability and efficiency in deterring car theft and aiding in recovery operations. All things considered, the incorporation of IoT technology into this anti-theft and vehicle tracking system presents a complete answer to improve vehicle security and give car owners peace of mind.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

GSM, GPS, IoT, Vehicle Tracking, Anti-Theft System, NodeMCU ESP8266, NEO-6M Module, Blynk Application, Arduino UNO, Performance Evaluation.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Decentralized Blockchain Money Transaction System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404949

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404949

  Register Paper ID - 256187

  Title: DECENTRALIZED BLOCKCHAIN MONEY TRANSACTION SYSTEM

  Author Name(s): Dr.M.Kalaiarasu, Rithika S, Shamini V, Subha V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i295-i300

 Year: April 2024

 Downloads: 76

 Abstract

As information technology advances and is used more widely, blockchain technology (BT) is emerging as a key tool for advancing the integration of the physical and digital economies. BT has advanced to a point where it can be used for finance, traceability, and asset transactions. But there isn't a practical application framework or trading method for using BT in decentralized transactions offered by current technology. This article proposed a blockchain-based decentralized transaction method, which we simulated using Python(flask) programming language. This is achieved by implementing a decentralized system that eliminates the need for intermediaries, reducing delays and transaction costs. This system provides an intuitive user experience accessible to a wide range of users, including those unfamiliar with complex financial systems or technology. Through the use of blockchain technology, this project aims to redefine the way decentralized transactions are conducted, offering a secure, efficient, and user-friendly alternative to traditional methods.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Decentralized System, Python(flask), Block chain Technology

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Gen AI In Cybersecurity: Harnessing Artificial Intelligence For Next-Generation Security Solutions

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404948

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404948

  Register Paper ID - 256483

  Title: GEN AI IN CYBERSECURITY: HARNESSING ARTIFICIAL INTELLIGENCE FOR NEXT-GENERATION SECURITY SOLUTIONS

  Author Name(s): Kavita Vandeo Ingle

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i284-i294

 Year: April 2024

 Downloads: 43

 Abstract

This research paper explores the integration of Generative Artificial Intelligence (GenAI) into cybersecurity practices to enhance threat detection, response, and mitigation. The study investigates various aspects of GenAI technologies, including their capabilities in swiftly identifying and neutralizing threats, securing networks and endpoints, automating security operations, and adapting to evolving threat landscapes. Through an examination of these topics, the paper provides insights into how GenAI can revolutionize cybersecurity practices by leveraging advanced artificial intelligence algorithms. Additionally, the paper discusses the future prospects and opportunities for professionals in the field of GenAI cybersecurity. By mastering the essential skills at the intersection of artificial intelligence and cybersecurity, individuals can contribute to shaping secure digital environments with cutting-edge GenAI solutions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Generative Artificial Intelligence (GenAI), Cybersecurity, Threat detection, Network security, Endpoint security, Future prospects

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Diet Recommendation System Using Machine Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404947

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404947

  Register Paper ID - 256308

  Title: DIET RECOMMENDATION SYSTEM USING MACHINE LEARNING

  Author Name(s): Prof. Ms. P.P. Deshmukh, Mr. Aayush Y. Mohot, Mr. Vrishank A. Thakare, Mr. Niraj S. Karde, Ms. Anjali D. Jagtap

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i268-i283

 Year: April 2024

 Downloads: 69

 Abstract

Understanding health and lifestyle is a global concern in today's society. A balanced and healthy diet, coupled with regular physical activity, plays a crucial role in maintaining good health. This type of diet, tailored to factors such as height, weight, and age, is essential for promoting a healthy lifestyle. It aids in achieving and sustaining a healthy weight, reducing the risk of chronic diseases such as heart disease and cancer, and supporting overall well-being. A healthy diet ensures that the body receives essential nutrients for optimal function. Calories, the measure of energy in food, are expended through everyday activities such as breathing, walking, and running. While the average person requires around 2,000 calories daily, actual calorie needs vary based on individual factors like body size, weight, height, age, and gender. The prevalence of fast food presents a significant challenge, often leading to unhealthy dietary habits. This unhealthy eating pattern can result in various health issues including obesity, diabetes, and high blood pressure. Consequently, prioritizing nutritious eating habits and overall wellness has become increasingly imperative for individuals.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Nutrition, calories, BMI, recommended diet, machine learning, deep learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EFFECT OF HIKE IN PETROLEUM PRICE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404946

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404946

  Register Paper ID - 255998

  Title: EFFECT OF HIKE IN PETROLEUM PRICE

  Author Name(s): Sajitha. S, Dr. S Thirumal

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i257-i267

 Year: April 2024

 Downloads: 119

 Abstract

This research tries to study on the effects of hike in petroleum price that is the rise in petrol price. This rise in fuel prices over the past few days are eating into the margins of transporters, who will be forced to transfer the burden of rise in petrol price to their absolute customers as a whole. This in turn, is set to make the rise in prices of the daily consumables and other goods which is been used regularly. It affects all the people directly and indirectly. This daily raise in price will impinge on the pockets of the households also this will leads to a situation where the expenditure is more on fuel and cut their expenditures on other items which will explicitly affect their day to day expenditures. The experiences and the difficulties faced by the people are been collected by the questioner and have been interpreted using a table and pie charts. To see this effects on the people 50 respondents have been collected in this topic hike in petrol price. So from this research we could infer how people have been affected in a day to day basis. Because petrol has become an indispensable part of our day to day routine and we can imagine a day without petrol.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Hike, inflation, petroleum, day to day, indispensable.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: POST-QUANTUM ENCRYPTED COMMUNICATION IN AIR-GAPPED SYSTEMS.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404945

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404945

  Register Paper ID - 256012

  Title: POST-QUANTUM ENCRYPTED COMMUNICATION IN AIR-GAPPED SYSTEMS.

  Author Name(s): Suyash Bhosale, Dhritee Dwivedi, Sahal Manasia, Riya Singh, Rajesh Gaikwad

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i242-i256

 Year: April 2024

 Downloads: 69

 Abstract

The purpose of this study is to look into the factors that, the goal of "Post-Quantum Encrypted Communication in Air-Gapped Systems" is to increase the security of isolated computer environments. This effort aims to develop and apply quantum-resistant encryption algorithms that can withstand attacks while preserving backwards compatibility and customization for specific use cases. Among the primary objectives are boosting security, ensuring long-term resilience, and offering tailored, user-friendly encryption solutions for a variety of air-gapped applications. The primary goal of the project is to fortify sensitive data and operations inside air-gapped systems to offer a robust defense against the dynamic quantum threats of the digital age.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Post-Quantum Cryptography, Air-Gapped Systems, Quantum-Safe Encryption, Quantum Computing, Encrypted Communication, Key Exchange Protocols, Quantum Key Distribution (QKD), Secure Communication Protocols, Quantum Vulnerabilities.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Standardization and Formulation of Nutri rich kaju katli

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404944

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404944

  Register Paper ID - 256819

  Title: STANDARDIZATION AND FORMULATION OF NUTRI RICH KAJU KATLI

  Author Name(s): S.Dhaniyasri, Dr.K.U.Pavitra krishna

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i235-i241

 Year: April 2024

 Downloads: 94

 Abstract

Beetroot (Beta vulgaris L.) is the most common root in the class of beets produced in the world. Beets are high in fiber and promote the growth of good bacteria in your gut. The carrot is a biennial plant in the umbellifer family, Apiaceae. It is a good source of Vitamin C ,Lutein, Zeaxanthin , Vitamin K, dietary fiber etc. Dragon fruit (Hylocereus polyrhizus) peel is high in antioxidants and fiber. The peel of dragon fruit is a potential source of pectin. It is a good source for maintaining healthy diet snack prepared by incorporating beetroot , Carrot, Dragon fruit peel extract added in kaju katli. It is estimated by a panel of judges using score card with five point hedonic rating scale. The panel members are mostly preferred beetroot incorporated kaju katli. Shelf life analysis has experienced to examine the shelf life of a product Change with environmental conditions. The cost of Nutririch kaju katli were anatomized by taking into account. The fixed and variable cost during the course of processing. In conclusion, Nutririch kaju katli represent a Valuable supplement with potential health promoting properties.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Lutein, umbellifer family, Zeaxanthin

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Air-Writing and Recognition System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404943

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404943

  Register Paper ID - 255380

  Title: AIR-WRITING AND RECOGNITION SYSTEM

  Author Name(s): Dhakshith N, Lavanya A

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i224-i234

 Year: April 2024

 Downloads: 56

 Abstract

The trajectory-based writing system offers a novel approach to writing linguistic characters or words in open space by utilizing finger, marker, or handheld device movements. It addresses challenges faced by traditional pen-up and pen-down writing methods and presents distinct advantages over gesture-based systems due to its simplicity. However, its efficacy is hampered by the complexity of non-uniform characters and varied writing styles. This study presents the development of an air-writing recognition system utilizing three-dimensional (3D) trajectories captured by a depth camera monitoring fingertip movements. To enhance feature selection, we utilized nearest neighbor and root point translation techniques for trajectory normalization. Our recognition model integrates long short-term memory (LSTM) and convolutional neural network (CNN) architectures. Validation was conducted using a self-collected dataset, and robustness was assessed using the 6D motion gesture (6DMG) alphanumeric character dataset, achieving a remarkable 99.32% accuracy, a record high. This underscores the model's robustness across digits and characters. Additionally, we release a dataset comprising 21,000 digits, addressing the current research's dataset scarcity.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

air-writing; digit identification; depth sensing; Time-of-Flight (TOF) camera; LSTM; CNN; trajectory analysis; human-machine

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Offgrid & Hybrid Charging Stations For Electric Vehicle

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404942

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404942

  Register Paper ID - 256816

  Title: OFFGRID & HYBRID CHARGING STATIONS FOR ELECTRIC VEHICLE

  Author Name(s): Rohit Gaikwad, Vaishnavi Patil, Rutwik Kamthe, Shubham Kokate, Vandana Tonde

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i216-i223

 Year: April 2024

 Downloads: 47

 Abstract

Abstract - In Recent years car companies like TATA, TESLA introduced and launches new electric cars in the market. For charging these cars some of the stations are also set up. But considering the current situation, these cars take at least 15 minutes to half an hour to charge. If station is full and all the slots are filled previously then other customers have to wait for a long time. Our idea is to develop a system which will solve these kinds of issues. We are developing a system in which we are going to connect all the electric car charging stations together. By using our system user can find the station according to their choice and it will be useful for those who want to travel for long distance with their EV cars and it will be time saving. It will be very easy to use. If the given time slot is available then your place for the given slot will be booked. Otherwise system will ask to enter the new time schedule. In this system user has to pay some percent of amount online to confirm their booking. Our system will also provide shortest map route to reach at given station. Our system will also provide interface for charging stations to view all available slots as well as booked slot lists and manage slot timing. We are going to develop this system for web based devices. To develop this system, we are going to use time-slot allocation techniques as well as Google maps API for direction sensing. Our chatbot system will Control software via vocal commands. With the help of online payment gateway user can pay money quickly. Also the feature of choosing offgrid & hybrid charging will be there. By using the system peoples will save their so much time and they can view and book appropriate station easily.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Electric Vehicle, Slot, Map, Payment, Stations.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Security Of Windows Operating System - A Review

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404941

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404941

  Register Paper ID - 256001

  Title: SECURITY OF WINDOWS OPERATING SYSTEM - A REVIEW

  Author Name(s): Aachal Godse, Sakshi Sonone, Supriya Kesgire

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i210-i215

 Year: April 2024

 Downloads: 66

 Abstract

With the increasing reliance on digital technologies, ensuring robust security measures for operating systems like Windows is paramount. This review paper explores practical ways to enhance security on Windows systems using simple language and accessible methods. By identifying common security risks and proposing straightforward solutions, users can better protect their digital assets. The study provides an overview of Windows security, outlines easy-to-implement security measures, and discusses their effectiveness in mitigating threats. By examining various aspects including user authentication, data encryption, network security, and malware protection, this paper aims to provide insights.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Rootkit, Privilege Escalation, Cryptojacking.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: H.O.P.E-Food Donation System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404940

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404940

  Register Paper ID - 256804

  Title: H.O.P.E-FOOD DONATION SYSTEM

  Author Name(s): Harshada Khadilkar, Shweta Mane, Dhanashri Hingade, Vaishnavi Jadhav, Pragati Malusare

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i205-i209

 Year: April 2024

 Downloads: 56

 Abstract

This study has been undertaken to investigate food waste is a wide issue in our culture. "H.O.P.E Food Donation App", a new internet- grounded android operation that provides a platform for giving leftover food to all indigent people associations operation of food waste is essential since it can increase our capability to sustain our frugality and terrain. An Android mobile operation is developed that enables businesses to give and partake their food and leavings with people in need after relating the operation of mobile technology to reduce food waste operation. The Food donation operation will try to help the stoner to contribute the food for the NGO's and the NGO's can add their request for donation. The system communicates with the patron and NGO for food donations


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Donor, Hunger spot, Food wastage, Mobile App, Firebase Authentication

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: An Attribute-Based Access Control System for Cloud Storage with Blockchain

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404939

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404939

  Register Paper ID - 256076

  Title: AN ATTRIBUTE-BASED ACCESS CONTROL SYSTEM FOR CLOUD STORAGE WITH BLOCKCHAIN

  Author Name(s): Abhale Amol Anil, Monika Rokade, Sunil Khatal

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i199-i204

 Year: April 2024

 Downloads: 57

 Abstract

Access control systems are employed within the realm of computer security to govern the authorization of individuals to access essential or valuable resources, including but not limited to data, services, computational systems, and storage space. Attribute-based Access Control (ABAC) policies are comprised of a collection of conditions that define the characteristics of the persons, resources, environment, etc., involved in the access request. This report presents a novel methodology utilizing blockchain technology to facilitate the dissemination of policies that delineate the entitlement to access data and resources. Additionally, it proposes the utilization of smart contracts to enable the decentralized transfer of these rights among users in cloud computing. The proposed approach aims to establish self-enforcing policies over Virtual Machines (VMs). The proposed model entails the public visibility of policies and rights exchanges on the blockchain, which are securely encrypted. Additionally, data is stored in the cloud. Consequently, any user has the ability to access the policy associated with a given data or resource, as well as the individuals who currently possess the rights to access said data or resource. The proposed system facilitates distributed auditability, hence mitigating the risk of a party engaging in fraudulent practices to deny the rights conferred by a policy that can be enforced.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Blockchain, Cloud, Decentralized Network, Transaction, Blocks, Security, Smart Contract, Attribute Authority, Virtual Machine

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: UNSHACKLED RIGHTS: A STUDY OF PRISONER PROTECTIONS AND REFORMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404938

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404938

  Register Paper ID - 256706

  Title: UNSHACKLED RIGHTS: A STUDY OF PRISONER PROTECTIONS AND REFORMS

  Author Name(s): Shubham Mishra, DR.RAJEEV KUMAR SINGH

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i186-i198

 Year: April 2024

 Downloads: 49

 Abstract

This abstract provides an overview of the research on judicial activism in relation to the rights of prisoners, with a focus on a comparative analysis of approaches in different jurisdictions. The study examines the role of the judiciary in interpreting constitutional provisions and statutes, expanding legal protections, and addressing systemic issues within the criminal justice system. Specific attention is given to the Indian context, exploring instances of judicial activism by the Supreme Court and High Courts in safeguarding prisoners' rights. The research delves into the balance between judicial activism and the separation of powers, considering criticisms and debates surrounding this approach. The abstract highlights key themes, including the expansion of constitutional protections, considerations of international human rights standards, and the implications for prison conditions and reforms. This comparative analysis aims to contribute to a nuanced understanding of the dynamics between the judiciary and the rights of prisoners in different legal frameworks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

UNSHACKLED RIGHTS: A STUDY OF PRISONER PROTECTIONS AND REFORMS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Unused Medicine Donation System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404937

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404937

  Register Paper ID - 256165

  Title: UNUSED MEDICINE DONATION SYSTEM

  Author Name(s): Aryan Rajendra Shingan, Akash Sunil Chavan, Sushant Pandurang Kokate, Shreyash Ramnath Ramteke, Dr.R.V.Babar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i176-i185

 Year: April 2024

 Downloads: 94

 Abstract

This development aims to contribute treatments (medicines) that are either fresh or stale in nature. The new treatments can be handed to a poor individual who will be able to use them in the future. This programme assists the user in donating or selling any unused medicines to a non-profit organisation. There are three people that make up this body: the administrator, the non-governmental organisation, and the user. A system administrator will log in and manage users, including deleting and barring users who are giving incorrect or expired drugs. In addition, the administration has a consultant, similar to the appointment requested by the NGO. The administration receives a monthly noise of remedies that have been contributed. Authorizations are used to register and login for non-profit organisations. They can promote a request for an appointment, which will be added to a more appropriate and comprehensive list by the administrator. The standard is managed by an NGO, which aids in the preservation of the history of the current medicines. In the event of a safety issue, an NGO can also modify their PIN. Authorizations are used to allow users to register and log in. They can provide remedies by providing remedy details and generating demand; once this has been agreed upon by the administration and the NGO, they will plan a date for the donation to take place. Also available to consumers is a history of their previous remedial transactions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Student performance prediction in online courses using machine learning algorithms

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404936

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404936

  Register Paper ID - 256354

  Title: STUDENT PERFORMANCE PREDICTION IN ONLINE COURSES USING MACHINE LEARNING ALGORITHMS

  Author Name(s): D J Samatha Naidu, K.Venkata Ramya, D. Satheesh

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: i170-i175

 Year: April 2024

 Downloads: 53

 Abstract

Advances in Information and Communications Technology (ICT) have increased the growth of Massive open online courses (MOOCs) applied in distance learning environments. Various tools have been utilized to deliver interactive content including pictures, figures, and videos that can motivate the learners to build new cognitive skills. High ranking universities have adopted MOOCs as an efficient dashboard platform where learners from around the world can participate in such courses. The students learning progress is evaluated by using set computermarked assessments. In particular, the computer gives immediate feedback to the student once he or she completes the online assessments. The researchers claim that student assessment


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Massive Open Online Courses (MOOCs), Open University Learning Analytics Dataset (OULAD ),Receiver Operating Characteristic(ROC).

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 7 | Month- July 2024)

Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer