ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Design and Implementation of Mobile ATM Robot
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404955
Register Paper ID - 256621
Title: DESIGN AND IMPLEMENTATION OF MOBILE ATM ROBOT
Author Name(s): Mr.A.KATHIRESAN, S S ISAI ARASU, NAVEEN RAJU SELVARAJU, G SARAVANAN
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i333-i342
Year: April 2024
Downloads: 54
The design and implementation of a mobile ATM robot represents a novel fusion of robotics and banking technologies aimed at addressing accessibility and convenience challenges in banking services. This innovative solution leverages the mobility of robotics to bring automated teller machines (ATMs) directly to users, eliminating the need for them to visit fixed ATM locations. Through the integration of embedded systems and sensor technologies, the mobile ATM robot can autonomously navigate urban environments, locate users, and facilitate secure ATM transactions. Key considerations in the design process include selecting appropriate hardware components, integrating sensors for navigation and obstacle avoidance, and developing robust software for user interaction and transaction processing. The hardware platform must be durable, reliable, and capable of supporting the necessary functionalities, while the software must ensure seamless communication between the robot and banking systems, as well as provide a user-friendly interface for interaction. During implementation, prototype development, rigorous testing, and iterative refinement are essential to ensure the functionality, safety, and user experience of the mobile ATM robot. Real-world deployment scenarios and user feedback play a crucial role in optimizing the design and operation of the robot, allowing for adjustments to be made to improve performance and address any usability issues. Ultimately, the goal of this project is to enhance banking accessibility, reduce reliance on traditional brick and-mortar branches, and provide a flexible and convenient banking solution that meets the needs of modern consumers.
Licence: creative commons attribution 4.0
Mobile ATM, robotics, banking technologies, autonomous navigation, sensor technologies, hardware and software integration, user interaction, accessibility, convenience, durability, safety, user experience, iterative refinement.
Paper Title: UNEMPLOYMENT AND JOB OPPORTUNITIES LEADING TO RURAL-URBAN MIGRATION: A CASE STUDY IN BANGALORE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404954
Register Paper ID - 256629
Title: UNEMPLOYMENT AND JOB OPPORTUNITIES LEADING TO RURAL-URBAN MIGRATION: A CASE STUDY IN BANGALORE
Author Name(s): Dr. Salma Begum, Sowmya P, Kishore Kumar M, Sheela Robert, Rahul Prakash, Vikas T , Mohd Yasin
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i326-i332
Year: April 2024
Downloads: 75
Global migration has shaped nations, cultures, and economics for as long as humans have existed. Migration, which is defined as the movement of people from one location to another, can happen for a number of reasons, such as the desire for a higher quality of life, economic opportunity, or the need to flee conflict or persecution. Migration has always been a major factor in determining the demographics and dynamics of different countries and areas. Unprecedented amounts of migration have been made possible in recent decades by globalization, technological advancements in transportation, and internet connectivity. This has given people, communities, and governments around the world possibilities as well as obstacles. Although migration can foster innovation, cultural diversity, and economic growth, it often raises difficult social, political, and humanitarian problems. The current study aims to understand the trend and pattern of the migration of the rural population and analyze the feasible solution according to the migrant requirements. The study is based on primary data analysis using descriptive statistical technique.
Licence: creative commons attribution 4.0
Unemployment, Job Opportunities, Migration, rural-urban
Paper Title: FORMULATION AND EVALUATION OF ANTI-ACNE HERBAL FACE PACK CONTAINING TINOSPORA CORDIFOLIA.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404953
Register Paper ID - 256589
Title: FORMULATION AND EVALUATION OF ANTI-ACNE HERBAL FACE PACK CONTAINING TINOSPORA CORDIFOLIA.
Author Name(s): Sanskruti Bobade, Yash Chavhan, Shubham Hoke, Prathamesh Nandurkar, Anjali Chavhan
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i316-i325
Year: April 2024
Downloads: 86
Acne is a persistent, chronic skin inflammatory condition affecting people worldwide. It is the eighth most common skin disease, with an estimated global prevalence of 9.38%. Tinospora cordifolia, a globrous, succulent, woody climbing shrub native to India, is a non-controversial and extensively used herb in Ayurvedic medicine. The plant is known by various names in different languages in India. The preparation of the plant extract includes Tinospora cordifolia, glycerine, sodium benzoate, kaolin, Bentonite powder, and Rose Water. The plant is used in various applications, including treating fevers, diabetes, dyspepsia, jaundice, urinary problems, skin diseases, chronic diarrhea, dysentery, heart disease, leprosy, and helmenthiasis. The plant was collected from the herbal Garden of Dr. Rajendra Gode Institute of Pharmacy, Amravati, and authenticated by the Botanical Department of Shri Shivaji College of Agriculture and Biotechnology. The dried plant material was ground to powder form, and the extract was prepared by sifting the powdered stems with ethanol. The extract was then filtered through a syringe to remove the oil.
Licence: creative commons attribution 4.0
Tinospora Cordifolia, acne, acne vulgaris, Ayurvedic, Face pack
Paper Title: Difficulties Faced by Diploma student During Studying Chemistry
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404952
Register Paper ID - 256504
Title: DIFFICULTIES FACED BY DIPLOMA STUDENT DURING STUDYING CHEMISTRY
Author Name(s): VANDANA ASHWIN PATIL, SURAJ SHRIPAL BHAGATE, DILIP HARISHCHANDRA CHAVAN
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i313-i315
Year: April 2024
Downloads: 62
Theoretical chemistry is a troublesome subject to instruct and to learn. Significant learning challenges are because of the specific perspectives on chemistry peculiarities that in numerous ways go against intuitive and ordinary perspectives on the students. Therefore, significant errors happen when understudies attempt to appreciate substance clarifications inside the structure of their pre-informative originations. This paper portrays research discoveries on understudies' students' Pre-instructional conceptions in the domain of chemistry and on attempts to guide students from their conceptions to the core ideas of chemistry. Rather than providing an overview of students' conceptions in various topics, we review learning difficulties from the perspectives of the challenge of multiple representations and the relation of chemistry to everyday experiences, including understanding the special language of chemistry. We believe that these perspectives contribute substantially to the limited success of teaching and learning chemistry. Major learning difficulties are due to the particular views of chemistry phenomenon, chemical reactions, their balancing that in many ways contradict intuitive and everyday views of the learners. As a result, major misunderstandings occur when students try to study chemical explanations within the framework practical knowledge of their pre-instructional conceptions. This paper describes research findings on
Licence: creative commons attribution 4.0
chemistry, difficulty, concepts, abstract, knowledge
Paper Title: Deepfake Detection Using Transfer Learning and Multi-task Cascaded Convolutional Neural Network.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404951
Register Paper ID - 256574
Title: DEEPFAKE DETECTION USING TRANSFER LEARNING AND MULTI-TASK CASCADED CONVOLUTIONAL NEURAL NETWORK.
Author Name(s): Sindhu V, Pandithurai O, Sasi Devi S
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i309-i312
Year: April 2024
Downloads: 56
The project focuses on detecting deepfake images using a dataset containing real and fake images. This employs transfer learning, a technique in which a pre-trained model (EfficientNetB0) is used as a starting point and fine-tuned on a new dataset (comprising real and deepfake images). This approach leverages the knowledge learned by the pre-trained model on a large dataset (ImageNet) and adapts it to the specific task of deepfake detection. For face detection and alignment, the MTCNN (Multi-task Cascaded Convolutional Neural Network) algorithm is utilized. MTCNN is a state-of-the-art deep learning model known for its accuracy in detecting faces and facial landmarks. It is used to locate and extract faces from frames of a video, which are then processed and fed into the deepfake detection model. Data augmentation is applied to the dataset using techniques such as rotation, shifting, shearing, zooming, and flipping. This process helps increase the diversity of the training data, improving the model's ability to generalize to unseen images. The Deepfake detection model consists of a base EfficientNetB0 model followed by a Global Average Pooling 2D layer, a Dropout layer for regularization, and a Dense layer with a sigmoid activation function for binary classification (real or fake). The model is trained using the Adam optimizer with a varied range of learning rates and binary cross-entropy loss. During training, the model's performance is monitored using various metrics such as accuracy, precision, recall, and F1-score. Early stopping is employed to prevent overfitting, and the best model is saved using Model Checkpoint to ensure that the model with the lowest validation loss is retained. In conclusion, the project integrates cutting-edge technologies such as transfer learning, deep learning models like EfficientNetB0, and advanced face detection algorithms like MTCNN to develop a robust deepfake detection system.
Licence: creative commons attribution 4.0
Pre-Trained Model, MobileNetV3, MTCNN, Pooling, Dropout, Dense Layer, Sigmoid activation, regularization, F1-score, Model Checkpoint, cross-entropy loss, Adam optimizer.
Paper Title: VEHICLE TRACKING SYSTEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404950
Register Paper ID - 256540
Title: VEHICLE TRACKING SYSTEM
Author Name(s): KAVIYAPRABHA KM, Om Selvaprakash M, Dr.J.Arunarasi
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i301-i308
Year: April 2024
Downloads: 71
The increasing frequency of car theft in today's society presents serious difficulties for both car owners and law enforcement. This study offers a novel car tracking and anti-theft system that seamlessly incorporates GPS and GSM technologies into an Internet of Things (IoT) architecture, effectively addressing these challenges. This all-inclusive system provides a comprehensive solution to improve vehicle security by combining remote control functions, emergency alarm functionality, and real-time tracking capabilities.This system's primary function is to provide precise vehicle position tracking and effective communication between the vehicle and a central monitoring station by utilizing both GSM and GPS technology. The GPS module that is installed in the car records its exact location on a regular basis, and the GSM modem makes it easier to send this information to the monitoring station. A robust 32-bit ARM7 LPC2148 microcontroller, which effectively controls the data transmission methods, such as General Packet Radio Service (GPRS) or Short Message Service (SMS), based on network availability, is what makes this connection possible.This system's capacity to deliver real-time vehicle location data analysis and visualization is one of its unique selling points. Through integration with widely used mapping services like Google Earth, users can effortlessly monitor the movement of the car and detect any questionable actions or detours from the prearranged routes. This improves the tracking of the vehicle's location and makes it easier to respond quickly in the event of theft or unauthorized use.The vehicle's engine can be turned on or off remotely, and an alert system with a buzzer and an alert light can be turned on. This reduces possible losses related to car theft by enabling consumers to act quickly in the case of a security breach.To strengthen security measures even further, the system includes an emergency alarm mechanism in addition to proactive tracking and management functions. Activated through the Blynk application, the GSM module uses the Arduino UNO microcontroller's ability to identify possible theft scenarios and trigger an automatic call to a pre-programmed emergency contact number. Thorough performance testing is done to assess the system's efficacy, showing its dependability and efficiency in deterring car theft and aiding in recovery operations. All things considered, the incorporation of IoT technology into this anti-theft and vehicle tracking system presents a complete answer to improve vehicle security and give car owners peace of mind.
Licence: creative commons attribution 4.0
GSM, GPS, IoT, Vehicle Tracking, Anti-Theft System, NodeMCU ESP8266, NEO-6M Module, Blynk Application, Arduino UNO, Performance Evaluation.
Paper Title: Decentralized Blockchain Money Transaction System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404949
Register Paper ID - 256187
Title: DECENTRALIZED BLOCKCHAIN MONEY TRANSACTION SYSTEM
Author Name(s): Dr.M.Kalaiarasu, Rithika S, Shamini V, Subha V
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i295-i300
Year: April 2024
Downloads: 76
As information technology advances and is used more widely, blockchain technology (BT) is emerging as a key tool for advancing the integration of the physical and digital economies. BT has advanced to a point where it can be used for finance, traceability, and asset transactions. But there isn't a practical application framework or trading method for using BT in decentralized transactions offered by current technology. This article proposed a blockchain-based decentralized transaction method, which we simulated using Python(flask) programming language. This is achieved by implementing a decentralized system that eliminates the need for intermediaries, reducing delays and transaction costs. This system provides an intuitive user experience accessible to a wide range of users, including those unfamiliar with complex financial systems or technology. Through the use of blockchain technology, this project aims to redefine the way decentralized transactions are conducted, offering a secure, efficient, and user-friendly alternative to traditional methods.
Licence: creative commons attribution 4.0
Decentralized System, Python(flask), Block chain Technology
Paper Title: Gen AI In Cybersecurity: Harnessing Artificial Intelligence For Next-Generation Security Solutions
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404948
Register Paper ID - 256483
Title: GEN AI IN CYBERSECURITY: HARNESSING ARTIFICIAL INTELLIGENCE FOR NEXT-GENERATION SECURITY SOLUTIONS
Author Name(s): Kavita Vandeo Ingle
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i284-i294
Year: April 2024
Downloads: 43
This research paper explores the integration of Generative Artificial Intelligence (GenAI) into cybersecurity practices to enhance threat detection, response, and mitigation. The study investigates various aspects of GenAI technologies, including their capabilities in swiftly identifying and neutralizing threats, securing networks and endpoints, automating security operations, and adapting to evolving threat landscapes. Through an examination of these topics, the paper provides insights into how GenAI can revolutionize cybersecurity practices by leveraging advanced artificial intelligence algorithms. Additionally, the paper discusses the future prospects and opportunities for professionals in the field of GenAI cybersecurity. By mastering the essential skills at the intersection of artificial intelligence and cybersecurity, individuals can contribute to shaping secure digital environments with cutting-edge GenAI solutions.
Licence: creative commons attribution 4.0
Generative Artificial Intelligence (GenAI), Cybersecurity, Threat detection, Network security, Endpoint security, Future prospects
Paper Title: Diet Recommendation System Using Machine Learning
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404947
Register Paper ID - 256308
Title: DIET RECOMMENDATION SYSTEM USING MACHINE LEARNING
Author Name(s): Prof. Ms. P.P. Deshmukh, Mr. Aayush Y. Mohot, Mr. Vrishank A. Thakare, Mr. Niraj S. Karde, Ms. Anjali D. Jagtap
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i268-i283
Year: April 2024
Downloads: 69
Understanding health and lifestyle is a global concern in today's society. A balanced and healthy diet, coupled with regular physical activity, plays a crucial role in maintaining good health. This type of diet, tailored to factors such as height, weight, and age, is essential for promoting a healthy lifestyle. It aids in achieving and sustaining a healthy weight, reducing the risk of chronic diseases such as heart disease and cancer, and supporting overall well-being. A healthy diet ensures that the body receives essential nutrients for optimal function. Calories, the measure of energy in food, are expended through everyday activities such as breathing, walking, and running. While the average person requires around 2,000 calories daily, actual calorie needs vary based on individual factors like body size, weight, height, age, and gender. The prevalence of fast food presents a significant challenge, often leading to unhealthy dietary habits. This unhealthy eating pattern can result in various health issues including obesity, diabetes, and high blood pressure. Consequently, prioritizing nutritious eating habits and overall wellness has become increasingly imperative for individuals.
Licence: creative commons attribution 4.0
Nutrition, calories, BMI, recommended diet, machine learning, deep learning
Paper Title: EFFECT OF HIKE IN PETROLEUM PRICE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404946
Register Paper ID - 255998
Title: EFFECT OF HIKE IN PETROLEUM PRICE
Author Name(s): Sajitha. S, Dr. S Thirumal
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i257-i267
Year: April 2024
Downloads: 119
This research tries to study on the effects of hike in petroleum price that is the rise in petrol price. This rise in fuel prices over the past few days are eating into the margins of transporters, who will be forced to transfer the burden of rise in petrol price to their absolute customers as a whole. This in turn, is set to make the rise in prices of the daily consumables and other goods which is been used regularly. It affects all the people directly and indirectly. This daily raise in price will impinge on the pockets of the households also this will leads to a situation where the expenditure is more on fuel and cut their expenditures on other items which will explicitly affect their day to day expenditures. The experiences and the difficulties faced by the people are been collected by the questioner and have been interpreted using a table and pie charts. To see this effects on the people 50 respondents have been collected in this topic hike in petrol price. So from this research we could infer how people have been affected in a day to day basis. Because petrol has become an indispensable part of our day to day routine and we can imagine a day without petrol.
Licence: creative commons attribution 4.0
Hike, inflation, petroleum, day to day, indispensable.
Paper Title: POST-QUANTUM ENCRYPTED COMMUNICATION IN AIR-GAPPED SYSTEMS.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404945
Register Paper ID - 256012
Title: POST-QUANTUM ENCRYPTED COMMUNICATION IN AIR-GAPPED SYSTEMS.
Author Name(s): Suyash Bhosale, Dhritee Dwivedi, Sahal Manasia, Riya Singh, Rajesh Gaikwad
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i242-i256
Year: April 2024
Downloads: 69
The purpose of this study is to look into the factors that, the goal of "Post-Quantum Encrypted Communication in Air-Gapped Systems" is to increase the security of isolated computer environments. This effort aims to develop and apply quantum-resistant encryption algorithms that can withstand attacks while preserving backwards compatibility and customization for specific use cases. Among the primary objectives are boosting security, ensuring long-term resilience, and offering tailored, user-friendly encryption solutions for a variety of air-gapped applications. The primary goal of the project is to fortify sensitive data and operations inside air-gapped systems to offer a robust defense against the dynamic quantum threats of the digital age.
Licence: creative commons attribution 4.0
Post-Quantum Cryptography, Air-Gapped Systems, Quantum-Safe Encryption, Quantum Computing, Encrypted Communication, Key Exchange Protocols, Quantum Key Distribution (QKD), Secure Communication Protocols, Quantum Vulnerabilities.
Paper Title: Standardization and Formulation of Nutri rich kaju katli
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404944
Register Paper ID - 256819
Title: STANDARDIZATION AND FORMULATION OF NUTRI RICH KAJU KATLI
Author Name(s): S.Dhaniyasri, Dr.K.U.Pavitra krishna
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i235-i241
Year: April 2024
Downloads: 94
Beetroot (Beta vulgaris L.) is the most common root in the class of beets produced in the world. Beets are high in fiber and promote the growth of good bacteria in your gut. The carrot is a biennial plant in the umbellifer family, Apiaceae. It is a good source of Vitamin C ,Lutein, Zeaxanthin , Vitamin K, dietary fiber etc. Dragon fruit (Hylocereus polyrhizus) peel is high in antioxidants and fiber. The peel of dragon fruit is a potential source of pectin. It is a good source for maintaining healthy diet snack prepared by incorporating beetroot , Carrot, Dragon fruit peel extract added in kaju katli. It is estimated by a panel of judges using score card with five point hedonic rating scale. The panel members are mostly preferred beetroot incorporated kaju katli. Shelf life analysis has experienced to examine the shelf life of a product Change with environmental conditions. The cost of Nutririch kaju katli were anatomized by taking into account. The fixed and variable cost during the course of processing. In conclusion, Nutririch kaju katli represent a Valuable supplement with potential health promoting properties.
Licence: creative commons attribution 4.0
Lutein, umbellifer family, Zeaxanthin
Paper Title: Air-Writing and Recognition System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404943
Register Paper ID - 255380
Title: AIR-WRITING AND RECOGNITION SYSTEM
Author Name(s): Dhakshith N, Lavanya A
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i224-i234
Year: April 2024
Downloads: 56
The trajectory-based writing system offers a novel approach to writing linguistic characters or words in open space by utilizing finger, marker, or handheld device movements. It addresses challenges faced by traditional pen-up and pen-down writing methods and presents distinct advantages over gesture-based systems due to its simplicity. However, its efficacy is hampered by the complexity of non-uniform characters and varied writing styles. This study presents the development of an air-writing recognition system utilizing three-dimensional (3D) trajectories captured by a depth camera monitoring fingertip movements. To enhance feature selection, we utilized nearest neighbor and root point translation techniques for trajectory normalization. Our recognition model integrates long short-term memory (LSTM) and convolutional neural network (CNN) architectures. Validation was conducted using a self-collected dataset, and robustness was assessed using the 6D motion gesture (6DMG) alphanumeric character dataset, achieving a remarkable 99.32% accuracy, a record high. This underscores the model's robustness across digits and characters. Additionally, we release a dataset comprising 21,000 digits, addressing the current research's dataset scarcity.
Licence: creative commons attribution 4.0
air-writing; digit identification; depth sensing; Time-of-Flight (TOF) camera; LSTM; CNN; trajectory analysis; human-machine
Paper Title: Offgrid & Hybrid Charging Stations For Electric Vehicle
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404942
Register Paper ID - 256816
Title: OFFGRID & HYBRID CHARGING STATIONS FOR ELECTRIC VEHICLE
Author Name(s): Rohit Gaikwad, Vaishnavi Patil, Rutwik Kamthe, Shubham Kokate, Vandana Tonde
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i216-i223
Year: April 2024
Downloads: 47
Abstract - In Recent years car companies like TATA, TESLA introduced and launches new electric cars in the market. For charging these cars some of the stations are also set up. But considering the current situation, these cars take at least 15 minutes to half an hour to charge. If station is full and all the slots are filled previously then other customers have to wait for a long time. Our idea is to develop a system which will solve these kinds of issues. We are developing a system in which we are going to connect all the electric car charging stations together. By using our system user can find the station according to their choice and it will be useful for those who want to travel for long distance with their EV cars and it will be time saving. It will be very easy to use. If the given time slot is available then your place for the given slot will be booked. Otherwise system will ask to enter the new time schedule. In this system user has to pay some percent of amount online to confirm their booking. Our system will also provide shortest map route to reach at given station. Our system will also provide interface for charging stations to view all available slots as well as booked slot lists and manage slot timing. We are going to develop this system for web based devices. To develop this system, we are going to use time-slot allocation techniques as well as Google maps API for direction sensing. Our chatbot system will Control software via vocal commands. With the help of online payment gateway user can pay money quickly. Also the feature of choosing offgrid & hybrid charging will be there. By using the system peoples will save their so much time and they can view and book appropriate station easily.
Licence: creative commons attribution 4.0
Electric Vehicle, Slot, Map, Payment, Stations.
Paper Title: Security Of Windows Operating System - A Review
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404941
Register Paper ID - 256001
Title: SECURITY OF WINDOWS OPERATING SYSTEM - A REVIEW
Author Name(s): Aachal Godse, Sakshi Sonone, Supriya Kesgire
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i210-i215
Year: April 2024
Downloads: 66
With the increasing reliance on digital technologies, ensuring robust security measures for operating systems like Windows is paramount. This review paper explores practical ways to enhance security on Windows systems using simple language and accessible methods. By identifying common security risks and proposing straightforward solutions, users can better protect their digital assets. The study provides an overview of Windows security, outlines easy-to-implement security measures, and discusses their effectiveness in mitigating threats. By examining various aspects including user authentication, data encryption, network security, and malware protection, this paper aims to provide insights.
Licence: creative commons attribution 4.0
Rootkit, Privilege Escalation, Cryptojacking.
Paper Title: H.O.P.E-Food Donation System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404940
Register Paper ID - 256804
Title: H.O.P.E-FOOD DONATION SYSTEM
Author Name(s): Harshada Khadilkar, Shweta Mane, Dhanashri Hingade, Vaishnavi Jadhav, Pragati Malusare
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i205-i209
Year: April 2024
Downloads: 56
This study has been undertaken to investigate food waste is a wide issue in our culture. "H.O.P.E Food Donation App", a new internet- grounded android operation that provides a platform for giving leftover food to all indigent people associations operation of food waste is essential since it can increase our capability to sustain our frugality and terrain. An Android mobile operation is developed that enables businesses to give and partake their food and leavings with people in need after relating the operation of mobile technology to reduce food waste operation. The Food donation operation will try to help the stoner to contribute the food for the NGO's and the NGO's can add their request for donation. The system communicates with the patron and NGO for food donations
Licence: creative commons attribution 4.0
Donor, Hunger spot, Food wastage, Mobile App, Firebase Authentication
Paper Title: An Attribute-Based Access Control System for Cloud Storage with Blockchain
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404939
Register Paper ID - 256076
Title: AN ATTRIBUTE-BASED ACCESS CONTROL SYSTEM FOR CLOUD STORAGE WITH BLOCKCHAIN
Author Name(s): Abhale Amol Anil, Monika Rokade, Sunil Khatal
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i199-i204
Year: April 2024
Downloads: 57
Access control systems are employed within the realm of computer security to govern the authorization of individuals to access essential or valuable resources, including but not limited to data, services, computational systems, and storage space. Attribute-based Access Control (ABAC) policies are comprised of a collection of conditions that define the characteristics of the persons, resources, environment, etc., involved in the access request. This report presents a novel methodology utilizing blockchain technology to facilitate the dissemination of policies that delineate the entitlement to access data and resources. Additionally, it proposes the utilization of smart contracts to enable the decentralized transfer of these rights among users in cloud computing. The proposed approach aims to establish self-enforcing policies over Virtual Machines (VMs). The proposed model entails the public visibility of policies and rights exchanges on the blockchain, which are securely encrypted. Additionally, data is stored in the cloud. Consequently, any user has the ability to access the policy associated with a given data or resource, as well as the individuals who currently possess the rights to access said data or resource. The proposed system facilitates distributed auditability, hence mitigating the risk of a party engaging in fraudulent practices to deny the rights conferred by a policy that can be enforced.
Licence: creative commons attribution 4.0
Blockchain, Cloud, Decentralized Network, Transaction, Blocks, Security, Smart Contract, Attribute Authority, Virtual Machine
Paper Title: UNSHACKLED RIGHTS: A STUDY OF PRISONER PROTECTIONS AND REFORMS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404938
Register Paper ID - 256706
Title: UNSHACKLED RIGHTS: A STUDY OF PRISONER PROTECTIONS AND REFORMS
Author Name(s): Shubham Mishra, DR.RAJEEV KUMAR SINGH
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i186-i198
Year: April 2024
Downloads: 49
This abstract provides an overview of the research on judicial activism in relation to the rights of prisoners, with a focus on a comparative analysis of approaches in different jurisdictions. The study examines the role of the judiciary in interpreting constitutional provisions and statutes, expanding legal protections, and addressing systemic issues within the criminal justice system. Specific attention is given to the Indian context, exploring instances of judicial activism by the Supreme Court and High Courts in safeguarding prisoners' rights. The research delves into the balance between judicial activism and the separation of powers, considering criticisms and debates surrounding this approach. The abstract highlights key themes, including the expansion of constitutional protections, considerations of international human rights standards, and the implications for prison conditions and reforms. This comparative analysis aims to contribute to a nuanced understanding of the dynamics between the judiciary and the rights of prisoners in different legal frameworks.
Licence: creative commons attribution 4.0
UNSHACKLED RIGHTS: A STUDY OF PRISONER PROTECTIONS AND REFORMS
Paper Title: Unused Medicine Donation System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404937
Register Paper ID - 256165
Title: UNUSED MEDICINE DONATION SYSTEM
Author Name(s): Aryan Rajendra Shingan, Akash Sunil Chavan, Sushant Pandurang Kokate, Shreyash Ramnath Ramteke, Dr.R.V.Babar
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i176-i185
Year: April 2024
Downloads: 94
This development aims to contribute treatments (medicines) that are either fresh or stale in nature. The new treatments can be handed to a poor individual who will be able to use them in the future. This programme assists the user in donating or selling any unused medicines to a non-profit organisation. There are three people that make up this body: the administrator, the non-governmental organisation, and the user. A system administrator will log in and manage users, including deleting and barring users who are giving incorrect or expired drugs. In addition, the administration has a consultant, similar to the appointment requested by the NGO. The administration receives a monthly noise of remedies that have been contributed. Authorizations are used to register and login for non-profit organisations. They can promote a request for an appointment, which will be added to a more appropriate and comprehensive list by the administrator. The standard is managed by an NGO, which aids in the preservation of the history of the current medicines. In the event of a safety issue, an NGO can also modify their PIN. Authorizations are used to allow users to register and log in. They can provide remedies by providing remedy details and generating demand; once this has been agreed upon by the administration and the NGO, they will plan a date for the donation to take place. Also available to consumers is a history of their previous remedial transactions.
Licence: creative commons attribution 4.0
Paper Title: Student performance prediction in online courses using machine learning algorithms
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2404936
Register Paper ID - 256354
Title: STUDENT PERFORMANCE PREDICTION IN ONLINE COURSES USING MACHINE LEARNING ALGORITHMS
Author Name(s): D J Samatha Naidu, K.Venkata Ramya, D. Satheesh
Publisher Journal name: IJCRT
Volume: 12
Issue: 4
Pages: i170-i175
Year: April 2024
Downloads: 53
Advances in Information and Communications Technology (ICT) have increased the growth of Massive open online courses (MOOCs) applied in distance learning environments. Various tools have been utilized to deliver interactive content including pictures, figures, and videos that can motivate the learners to build new cognitive skills. High ranking universities have adopted MOOCs as an efficient dashboard platform where learners from around the world can participate in such courses. The students learning progress is evaluated by using set computermarked assessments. In particular, the computer gives immediate feedback to the student once he or she completes the online assessments. The researchers claim that student assessment
Licence: creative commons attribution 4.0
Massive Open Online Courses (MOOCs), Open University Learning Analytics Dataset (OULAD ),Receiver Operating Characteristic(ROC).
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 7 | Month- July 2024)