Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 12 | Issue 4

Volume 12 | Issue 4 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: Enhanced Criminal Face Detection Using Haar Cascade Algorithm

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404895

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404895

  Register Paper ID - 256513

  Title: ENHANCED CRIMINAL FACE DETECTION USING HAAR CASCADE ALGORITHM

  Author Name(s): Prof.Kavitha.G, Vidhyaa Shree C S, Sujatha K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h818-h822

 Year: April 2024

 Downloads: 71

 Abstract

Abstract-- Confront discovery innovation has gotten to be progressively crucial in different security applications, especially in the distinguishing proof and following of offenders. This paper presents an upgraded approach to criminal confront discovery leveraging the Haar Cascade calculation. The proposed strategy points to make strides the exactness and effectiveness of recognizing criminal faces in observation symbolism. The Haar Cascade calculation is a well known strategy for confront location due to its vigor and speed. Be that as it may, ordinary usage frequently battle with precisely recognizing faces beneath challenging conditions such as shifting lighting, occlusions, and posture varieties. To address these restrictions, our upgraded approach consolidates a few key upgrades. Firstly, we present a refined preparing dataset particularly custom-made to capture a differing run of criminal facial characteristics. This dataset incorporates commented on pictures of people with known criminal records, guaranteeing the demonstrate is prepared on pertinent information for progressed execution in criminal confront location errands. Furthermore, we utilize highlight designing procedures to improve the discriminative control of the Haar Cascade classifier. By extricating more instructive highlights from the input pictures, our approach can superior separate between criminal and non-criminal faces, indeed in complex scenarios. Moreover, we coordinated post-processing steps such as non-maximum concealment to refine the discovery comes about and decrease wrong positives. This guarantees that as it were the most sure location are held, improving the unwavering quality of the framework in real-world applications. Test assessments conducted on benchmark datasets illustrate the adequacy of the proposed approach compared to pattern strategies. Our strategy accomplishes prevalent precision and vigor in identifying criminal faces over different challenging conditions, exhibiting its potential for arrangement in security frameworks and law requirement applications. Generally, the improved criminal confront location framework displayed in this paper offers a promising arrangement for moving forward open security and security through the exact recognizable proof and following of people with criminal records. This venture executes a confront acknowledgment framework which to begin with identifies the confront and then identifies the individual by comparing the identified confront with picture database. It will offer assistance to keep up a solid security in that environment. To begin with the information sets are made and prepared them with the offer assistance of calculations which experiences include extraction, normalization and at that point pre- handled. The prepared information sets are compared with the input facial picture, it to begin with identifies and perceives the individual and shows the title of the work force. We got confront acknowledgment rate of 77% and its false-positive rate is 28%. This framework is recognizing faces indeed when there are glasses or developed a whisker. Confront Acknowledgment of obscure people is about 60% for both with and without applying limit esteem. Its false-positive rate is 14% and 30% with and without applying limit respectively.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

LBPH Recognizer, Confront Datasets, Histogram, Haar Cascade Algorithm.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INSUFFICIENT SALARY PROBLEMS FACED BY SALARIED PERSON IN BPO SECTOR

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404894

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404894

  Register Paper ID - 256759

  Title: INSUFFICIENT SALARY PROBLEMS FACED BY SALARIED PERSON IN BPO SECTOR

  Author Name(s): Dr.SANTHINI.S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h813-h817

 Year: April 2024

 Downloads: 69

 Abstract

The Business Process Outsourcing (BPO) sector has long grappled with the persistent challenge of insufficient salaries for its employees. This issue significantly impacts the lives of salaried individuals within this industry. Despite being an integral part of the global economy, BPO employees often face compensation packages that fail to match the demanding nature of their roles.The work in the BPO sector involves handling critical operations, customer service, and complex tasks requiring round-the-clock availability. However, the compensation structure frequently falls short in reflecting the skill set and dedication these employees bring to their roles. Low salaries often lead to financial stress, impacting the overall well-being and motivation of workers.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Employees, BPO, Salary, Financial Stress

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DNA SEQUENCING OF GENOME AND GENETICS USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404893

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404893

  Register Paper ID - 256053

  Title: DNA SEQUENCING OF GENOME AND GENETICS USING MACHINE LEARNING

  Author Name(s): Deepa Bendigeri, Leena Sakri, Adarsh Hosamani, Prabhakar Kulkarni, Spoorthi D P,Swathi A S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h809-h812

 Year: April 2024

 Downloads: 41

 Abstract

Genomics has been revolutionized by DNA sequencing technologies, generating an avalanche of data that necessitates sophisticated analysis techniques. Machine learning (ML) has emerged as a powerful tool in harnessing this data deluge, unlocking new frontiers in our understanding of genomes and their role in genetics. This review delves into the transformative applications of ML across the DNA sequencing workflow, encompassing tasks like genome assembly, variant calling, and functional annotation. We explore how ML algorithms are employed to decipher genetic variations associated with diseases, paving the way for personalized medicine. Additionally, the potential of ML in drug discovery and accelerating research in various genetic disorders is investigated. We culminate by addressing the ethical considerations surrounding the use of genomic data and the future directions of this burgeoning field.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Machine learning(ML), DNA, Genome, genetics

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOCIO ECONOMIC DEVELOPMENT OF SUGALI TRIBE IN ANDHRA PRADESH: A STUDY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404892

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404892

  Register Paper ID - 256612

  Title: SOCIO ECONOMIC DEVELOPMENT OF SUGALI TRIBE IN ANDHRA PRADESH: A STUDY

  Author Name(s): Dr. M. VENKATESULU

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h799-h808

 Year: April 2024

 Downloads: 101

 Abstract

This study is aimed to examine the socio economic development of sugali tribe in Andhra Pradesh. The survey was conducted in ten villages spread over three Mandals of Anathapur district in Andhra Pradesh by using purposive random sampling method. Anathapur district has 63 Mandals, out of these mandals three rural mandals were selected purposively. They are Mudigubba, Gorantla, and Uravakonda Mandals. Four Villages were selected from each mandal and from each village selected 40 respondents. In the present study 400 sample sizes were selected randomly. Data were collected from respondents belonged to sugalies.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Socio Economic, Development, Sugali Tribe, Andhra Pradesh.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Comparative Analysis Of Special Economic Zones(SEZs) In India With China Within International Trade Law

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404891

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404891

  Register Paper ID - 255649

  Title: COMPARATIVE ANALYSIS OF SPECIAL ECONOMIC ZONES(SEZS) IN INDIA WITH CHINA WITHIN INTERNATIONAL TRADE LAW

  Author Name(s): Shreeti Dhanuka, Dr. Shilpa ML

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h793-h798

 Year: April 2024

 Downloads: 42

 Abstract

Special Economic Zones have been built to foster the economic growth of the country, attract foreign investment and promote international trade. These areas are governed by unique regulatory frameworks that catalyze economic growth, and technological advancement and create job opportunities. SEZs have evolved from Export Processing Zones(EPZs) and Free Trade Zones and have been tailored in such a way to meet the needs of the host country. These zones have played a pivotal role in shaping investment policies and enhancing the competitiveness of the country hosting them. The methodology used in this article is doctrinal research. The research gap in the topic is that a comparative analysis can be done to understand the shortcomings in the present regulatory system of India and will help in the effective implementation of SEZs. In the present article, a comparative study of SEZs in India and China has been conducted. A comparative analysis of SEZs in India and China within trade law has provided insights into the economic, trade, export dynamics of these two powerful nations. The analysis helps explore the legal framework, regulatory environments and trade law implications in India and China.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Special Economic Zone(SEZ), Free-Trade Zones, Export Processing Zones, Industrial Parks, Specialised Zones.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Fake Biometric Detection Using Blockchain and Thermal Imaging For Voting System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404890

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404890

  Register Paper ID - 256559

  Title: FAKE BIOMETRIC DETECTION USING BLOCKCHAIN AND THERMAL IMAGING FOR VOTING SYSTEM

  Author Name(s): Sadhana R, Indhumathi P, Jayasuriya J, Chandana J

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h784-h792

 Year: April 2024

 Downloads: 50

 Abstract

The integration of fake biometric detection using blockchain and thermal imaging technology presents a pioneering approach to bolstering the security and transparency of voting systems. By leveraging Convolutional Neural Networks (CNNs) in thermal image recognition, alongside the immutable ledger of blockchain, this innovative solution ensures the integrity of biometric data. Multi-CNNs use multiple channels as input, allowing the network to process different types of data or features simultaneously. Each thermal image, along with associated data, is securely stored on the blockchain, employing cryptographic hashes to link consecutive blocks, thereby preventing tampering or manipulation. The voting process becomes inherently transparent and traceable, fostering trust among stakeholders. Furthermore, smart contracts play a pivotal role in automating processes and enforcing predefined rules within the voting system. These self-executing contracts, encoded with the terms of the agreement, can trigger alerts or execute predetermined actions if anomalies are detected in the thermal image data, such as temperature breaches beyond acceptable limits. This proactive approach enhances the security posture of the voting system, mitigating potential risks and ensuring the authenticity of each vote cast. By combining fake biometric detection, thermal imaging technology, and blockchain-enabled transparency, this novel solution sets a new standard for secure and trustworthy electoral processes, safeguarding the democratic foundation of societies. SHA-256 is considered to be secure against collision attacks, where two different inputs produce the same hash output, and pre-image attacks, where the original input is derived from the hash output, when used correctly.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Convolutional Neural Networks, Blockchain, Thermal Imaging, Cryptographic Hashes, Biometric Data,SHA-256.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Seed Thought on Religious Harmony through Philosophy of Science and Religion / Spirituality module in Dr. Vishwanath Karad MIT-World Peace University Students; a quantitative analysis

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404889

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404889

  Register Paper ID - 256174

  Title: SEED THOUGHT ON RELIGIOUS HARMONY THROUGH PHILOSOPHY OF SCIENCE AND RELIGION / SPIRITUALITY MODULE IN DR. VISHWANATH KARAD MIT-WORLD PEACE UNIVERSITY STUDENTS; A QUANTITATIVE ANALYSIS

  Author Name(s): Prof Rasika Beohar, Dr Sachin Gadekar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h777-h783

 Year: April 2024

 Downloads: 78

 Abstract

Technological advancements have significant implications for society and emphasizes the need for a well - rounded education that goes beyond technical skills. The focus on global awareness, environmental impact, social and political considerations, and professional ethics reflects the growing recognition of the interconnectedness between various disciplines and the need for a comprehensive understanding of the world's challenges. By incorporating these aspects into the curriculum, Dr. Vishwanath Karad MIT-World Peace University aims to prepare students to navigate complex societal issues and contribute to sustainable and inclusive progress. MIT WPU's vision of "Powering the future" through education, innovation, and culture indicates a commitment to creating a positive impact on society. By equipping students with the necessary knowledge and skills and fostering a sense of social responsibility, the university aims to drive sustainable and progressive transformation. The first part of the paper focuses on the teaching and learning of the core concept of Religious Harmony through Philosophy of Science and Religion / Spirituality. Statistics and components of the module being taught at UG and PG level at Dr. Vishwanath Karad MIT-World Peace University, Pune are presented. The quantitative analysis would be based on a questionnaire. This part focuses on collecting data, circulating the questionnaire to a minimum of 300 students who had studied the module in the recent past. The quantitative analysis of the data shows that the module's comprehension of religious correlations, instilment, and understandability is underscored by a significant positivity rate.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Religious Harmony, Science, Spirituality, Seed thought

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Examining the factors influencing Investment Decisions of investors: Insights from a Review of Literature

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404888

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404888

  Register Paper ID - 255721

  Title: EXAMINING THE FACTORS INFLUENCING INVESTMENT DECISIONS OF INVESTORS: INSIGHTS FROM A REVIEW OF LITERATURE

  Author Name(s): Nisha Kumari, Aditi Sharma

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h770-h776

 Year: April 2024

 Downloads: 47

 Abstract

This paper examines the factors that shape investment decisions, providing a comprehensive review of existing literature on investor behavior. Central to the review are the influences of financial goals, risk tolerance, and market knowledge on individual investment choices. While traditional finance theory posits rational decision-making, this paper highlights the role of emotions, biases, and heuristics in shaping investment decisions, drawing on insights from behavioral finance research. Additional factors, such as return on investment, financial literacy, social influences, and market conditions, are also found to impact investment behavior. Given the importance of informed decision-making for investors and financial institutions, a nuanced understanding of these factors is crucial for building prosperous economies. This paper acknowledges limitations, including reliance on secondary data, more in-depth analysis, and consideration of regional differences. Future research may explore specific factors using primary data and examine the impact of technological advancements on investment behavior.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords: Investment decision, factors influencing, individual investors.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Real World Applications of Artificial Intelligence

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404887

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404887

  Register Paper ID - 256662

  Title: REAL WORLD APPLICATIONS OF ARTIFICIAL INTELLIGENCE

  Author Name(s): Mrs.J.Dhivya, Mrs.A.V.Anuja

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h765-h769

 Year: April 2024

 Downloads: 56

 Abstract

Artificial Intelligence (AI) is one of the most important innovations that has permeated both our daily lives and industrial processes. Its quick development portends revolutionary effects in a number of areas, from cutting-edge businesses to regular people's lives. AI is continuously improving human experiences by modifying interactions and enhancing capacities. For example, modern educational institutions use facial recognition technology to track attendance using AI algorithms. In the future, autonomous vehicles will be the ultimate application of AI, with cars depending solely on AI systems to navigate roads, detect traffic signals, and navigate.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

higher education, covid pandemic, virtual classrooms, and online communication tools

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Detecting Phishing Website using Machine Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404886

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404886

  Register Paper ID - 256492

  Title: DETECTING PHISHING WEBSITE USING MACHINE LEARNING

  Author Name(s): Mr.Pratharv Surve, Mr.Ayush Singh, Ms.Khushboo Yadav, Mr.Aman Yadav

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h760-h764

 Year: April 2024

 Downloads: 79

 Abstract

Phishing assaults, which include content injection phishing, social engineering, online social networks, and mobile applications, employ advanced tactics and technologies to obtain sensitive information. To stop and reduce the chances of these attacks, a number of phishing detection methods were developed; deep learning algorithms were one of them that showed potential. The application of deep learning algorithms to phishing detection lacks a comprehensive overview, and the findings and related lessons are scattered throughout multiple publications. We carried out a systematic literature review (SLR) to find, assess, and condense the research results on deep learning algorithms for phishing detection as offered by the selected academic publications. The phishing website may be recognized in the final phishing detection rate depending on a number of important features, including the URL and Domain Identity, security and encryption specifications, and other elements. When a consumer completes an online transaction and pays through a website, our technology employs deep learning algorithms to identify whether or not the website is a phishing website.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Detect Fake Urls

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Towards Detection and Attribution of Cyber- Attacks in IOT- Enabled Cyber - Physical Systems

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404885

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404885

  Register Paper ID - 256718

  Title: TOWARDS DETECTION AND ATTRIBUTION OF CYBER- ATTACKS IN IOT- ENABLED CYBER - PHYSICAL SYSTEMS

  Author Name(s): Palapala Sravya, Gosu Naveen, Petcheti Dedeepya Lahari, Naramsetty Keerthi Priya, Kasimkota Roop Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h751-h759

 Year: April 2024

 Downloads: 88

 Abstract

The growth of Internet of Things (IoT) devices inside cyber-physical systems has brought in opportunities for technical improvements that are both encouraging and unprecedented in terms of the difficulties they provide to cybersecurity. This project intends to address the fundamental difficulties that are associated with the detection and attribution of cyberattacks within cyber-physical systems that are enabled by the Internet of Things (IoT). Increasing the capabilities of real-time detection is the key goal, and the primary objective focuses around the development and implementation of advanced algorithms and security protocols. In order to accomplish this, it is necessary to develop robust algorithms that are able to quickly recognize anomalies and potential dangers within the complex and interconnected landscape of Internet of Things environments. Additionally, the initiative will also investigate attribution, with the goal of identifying the origins of cyberattacks as well as the groups that are accountable for them. Utilizing cutting-edge technology like blockchain and forensic tools, we will investigate the possibility of establishing attribution systems that can be relied upon. By working on this project, the student hoping to earn a Bachelor of Technology degree hopes to make a significant contribution to the field of cybersecurity by developing workable solutions to strengthen cyber-physical systems that are enabled by the Internet of Things. It is predicted that the results of this research will bring to an improvement in the robustness of these systems, hence offering an increased level of protection against hostile activity. This endeavor highlights the significance of joint efforts among cybersecurity, Internet of Things, and related professionals in order to guarantee the effectiveness of complete detection and attribution tactics.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Internet of Things (IoT), Cyber Security, Blockchain, Detection, Cyber attack

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NEWBORNS NEONATAL INTENSIVE CARE UNIT FOR PRE-MATURE INFANT BASED ON IOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404884

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404884

  Register Paper ID - 256733

  Title: NEWBORNS NEONATAL INTENSIVE CARE UNIT FOR PRE-MATURE INFANT BASED ON IOT

  Author Name(s): VIVEK S, VINAY KUMAR R, MALIK RIHAN, JUWAIRIAH IFFATH

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h740-h750

 Year: April 2024

 Downloads: 33

 Abstract

We report the design and implementation of an affordable bedside device, Neo is capable of acquiring vital data in real time by integrating with diverse devices connected to newborns in neonatal intensive care units (NICUs). NICUs are equipped with multiple vital sign monitoring devices that are connected to the premature newborn. An NICUs is a device consisting of a rigid box-like enclosure in which an infant may be kept in a controlled environment for medical care. An infant incubator provides stable levels of temperature, relative humidity and oxygen concentration The relative humidity should follow set values according to the number of incubation days. In this smart NICUs an infant's data will be sent through via Phone or PC by doctor/care taker.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Neo, vital data, networks in intensive care units (NICUs), monitoring devices, premature newborn, few gigabytes of data.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Liberation of Women and Nature: An Ecofeminist Analysis of Barbara Kingsolver's Flight Behavior and The Bean Trees

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404883

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404883

  Register Paper ID - 256727

  Title: LIBERATION OF WOMEN AND NATURE: AN ECOFEMINIST ANALYSIS OF BARBARA KINGSOLVER'S FLIGHT BEHAVIOR AND THE BEAN TREES

  Author Name(s): Navya Kapoor, Dr Surbhi Saraswat

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h732-h739

 Year: April 2024

 Downloads: 62

 Abstract

: Barbara Kingsolver as an author has mastered the art of writing political stories about human's plight and nature's exploitation. Her life in Kentucky and career as a biologist has opened doors to new ecofeminist perspectives. This paper aims to analyse The Bean Trees and Flight Behaviour from ecofeminist perspective, highlighting every issue ecofeminism aims to analyse. Anthropocentrism gives priority to human needs and Androcentrism narrows down the discrimination by treating men as the representatives of human condition. In both cases nature and women receive the shorter end of the stick as they are exploited to cater to the needs of entitled men. The prevalence of this entitlement can be seen through Bear Turnbow's actions in The Flight Behaviour and Turtles assault in The Bean Trees. Kingsolver unearths different layers of Anthropocentrism in her narrative by highlighting the moral dilemmas which come with using natural resources for one's own gain. While the women in her novels feel trapped in their world due to social conventions, nature is also given very little regard by the same people. The predicament of women and the exploitation of nature interweave to create a compelling narrative which advocates the liberation of both.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Key Words : Ecofeminism, Anthropocentrism, Androcentrism, Women, Nature

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A Review : Solution for Word Senceambiguity

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404882

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404882

  Register Paper ID - 252077

  Title: A REVIEW : SOLUTION FOR WORD SENCEAMBIGUITY

  Author Name(s): Sulekha kundu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h720-h731

 Year: April 2024

 Downloads: 51

 Abstract

Abstract. Word sense disambiguation is the method of believing out what an expression'splannedimportiswhenitlooksinalinguistic.Thenetworksamong the many parts of linguistics, most notably words, expressions, and routes, are highlyunclearanddeeplyentwined. Theplannedsensesofwordsare,parenthe- tically,easyforpeopletorealizeanddecode. Becauseofmistiness,itistoughto create a highly accurate material retrieval scheme or machine version system. Plentifuldeviceshavebeendevisedtoresolveambiguity,buttheyhaverelatively low success rates. Relative factors may have substantially impacted how well people could decipher the meaning ofpolysemic words. Announcing the Multi- Sensedatasetincludes9,000picturesofEnglishverbs,amachinetranslationsys- tem, or both as of ambiguity. Several methods have been developed to resolve ambiguity but have relatively low success rates. Associated factors may have greatly impacted how well people could interpret the meaning of polysemic words. Introducing the Multi-Sense dataset, which includes 9,000 pictures of Englishverbs.Theoutcome is low accuracy. Thepresentqueryexpansion algo- rithmsdonottakeintoversiontheframeworkoftheworker'squestion'spuzzling terms.Themethodforcausalthecorrectsenseofambiguousphrasesisprovided in this work. It contains likening the import of the unclear term to the senses of the other terms in the question and then giving weight to the contrast. Weights aregiventothelikenessmeasuresofthephrasesindecreasingorderofproximity to the ambiguous term. An overall likeness score is resolute by the supplied weights.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

WordSenceDisambiguation,MachineLearning,Multi-Sence words, Natural Language Processing.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PYRO-GUARD : A WILDFIRE MONITORING SYSTEM USING YOLO-V8 ALGORITHM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404881

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404881

  Register Paper ID - 253815

  Title: PYRO-GUARD : A WILDFIRE MONITORING SYSTEM USING YOLO-V8 ALGORITHM

  Author Name(s): Sathya Priya SR, Surya S, Sudhakar S, Sachin G

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h711-h719

 Year: April 2024

 Downloads: 51

 Abstract

In this paper, we present a novel approach utilizing recent advancements in embedded processing to enhance fire detection capabilities in surveillance systems, specifically tailored for forested areas. Our proposed system utilizes the YOLO-v8 algorithm, optimized for efficiency and accuracy, to detect wildfires in their early stages, crucial for mitigating potential impacts and facilitating swift responses. Through fine-tuning the model with fire-specific data and considering the unique characteristics of the target problem, we achieve a balance between efficiency and accuracy. The framework's effectiveness is validated through rigorous testing in CCTV surveillance environments. Upon detection of a fire, the system promptly notifies relevant personnel via email alerts and buzzer notifications, ensuring timely intervention and minimizing potential damages. It uses a sensor that detects the heat by using the temperature sensors which can differentiate the heat levels of the sunlight from the actual forest fire.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Fire detection, Surveillance systems, Yolo-v8 algorithm, Sensors, Temperature sensor.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Bal shram aur shoshan : Bihar

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404880

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404880

  Register Paper ID - 256624

  Title: BAL SHRAM AUR SHOSHAN : BIHAR

  Author Name(s): Dr. Priyanka Choudhary

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h697-h710

 Year: April 2024

 Downloads: 43

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: The interplay between competition laws and intellectual property right

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404879

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404879

  Register Paper ID - 254805

  Title: THE INTERPLAY BETWEEN COMPETITION LAWS AND INTELLECTUAL PROPERTY RIGHT

  Author Name(s): Manu Kesarwani, Dr Taru Mishra

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h684-h696

 Year: April 2024

 Downloads: 44

 Abstract

The purposes and goals of competition law and intellectual property law appear to be at odds with one another. These disagreements have resulted in the formation of a long-debated issue that must be resolved. Anti-competitive practices in the market are prohibited by the Competition Law, which serves to facilitate market expansion. IPRs, on the other hand, give the owner an exclusive monopoly over the product or service. Economic efficiency is increased when there is healthy and fair competition. The goal of putting the competition law into effect was to reduce monopolies and promote competition. In contrast to the goal of establishing competition legislation, intellectual property laws are intended to prevent ideas developed through research and development by inventor firms from being copied and sold by companies that produce comparable items and profit from the sale of those products. Competition rules are drafted in order to prevent a dominant corporation from abusing its market position. Its goal is to eliminate monopolisation of the manufacturing process, hence stimulating the entry of new enterprises into the marketplace. Some of the primary objectives of competition law include the enhancement of consumer welfare and the increase in the value of production. However, intellectual property laws offer monopolistic legal rights to the producers and owners of works that are the outcome of human intellectual creation. When this dominant/monopoly position is abused, it is in violation of intellectual property rights and competition law. The IPR may result in a situation in which substitutes are no longer available on the market. Consequently, a dominant position in the market may be established, which may later be exploited by the dominant enterprises, thereby defeating the primary goal of the Competition Act of 2002. Research Objectives o LINKING PATENT AND COPYRIGHT WITH COMPETITION LAW o BALANCING IPR AND ANTITRUST o UNREASONABLE CONDITIONS IMPOSED BY IP HOLDER THAT COULD LEAD TO ANTI-COMPETITIVE PRACTISES o UNDERSTAND EFFECTS OF IPRs ON COMPETITION AND WELFARE


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

legal view on interplay between competition laws and intellectual property right

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NUTRI AI - REVOLUTIONIZING FITNESS AND DIET MANAGEMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404878

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404878

  Register Paper ID - 256528

  Title: NUTRI AI - REVOLUTIONIZING FITNESS AND DIET MANAGEMENT

  Author Name(s): Mohanraj S, Ashwath L, Durnav Pattnaik, Rithvikkumar V T, Thiruvarul V T

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h679-h683

 Year: April 2024

 Downloads: 71

 Abstract

Diabetes mellitus is a chronic disorder that is widely prevalent and requires careful management that includes diet, lifestyle, and health parameters. This research describes a novel mobile application that provides individualized meal advice and monitoring for people with diabetes. The application uses machine learning algorithms to provide personalized food recommendations based on dietary restrictions, personal tastes, and health data like blood glucose levels. The application seeks to enable users to achieve optimal glycemic control while partaking in a varied and fulfilling diet by combining user input with real-time data. This manuscript outlines the intended mobile application's characteristics, developmental trajectory, and possible benefits in enhancing diabetes self-management. The application aims to transform nutritional support for people with diabetes by utilizing an innovative method that promotes informed decision-making and improved well-being.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Diabetes Management, Mobile Application, Personalized Recommendations, Machine Learning, Dietary Monitoring, Blood Sugar Levels.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Compressive review on:-Night Blooming Jessamine

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404877

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404877

  Register Paper ID - 256366

  Title: COMPRESSIVE REVIEW ON:-NIGHT BLOOMING JESSAMINE

  Author Name(s): Dakshta P.Devgade, Mayuri G.Harinkhede, Yogeshwari S. Donode, Krishna R. Bhendarkar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h672-h678

 Year: April 2024

 Downloads: 62

 Abstract

Cestrum nocturnum Linn is a medicinal plant, found as weed throughout India. The plant is native to tropical regions such as the West Indies, India and other South Asian Countries. It has been extensively used in Indian traditional medicine for wound healing, such as antioxidant, antibacterial, anticancer, antifungal, analgesic, anti-inflammatory. Cestrum nocturnum is the most valuable drug which is used in compound preparation included in Ayurveda literature. From leaves to the roots, the whole Parijat plant is very useful for various healing properties. It is known to improve the function of insulin and reduce the symptoms of diabetes.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cestrum nocturnum Linn , Wound healing, Anti-cancer, Antioxidant, Analgesic

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PREDICTING FAKE JOB POSTS USING MACHINE LEARNING MODELS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2404876

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2404876

  Register Paper ID - 256616

  Title: PREDICTING FAKE JOB POSTS USING MACHINE LEARNING MODELS

  Author Name(s): Mr. B.J.M Ravi Kumar, Mr. Melkamu Boka Eba, Mr. Ridwan Mohammed

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 4

 Pages: h661-h671

 Year: April 2024

 Downloads: 89

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

False Job Prediction, Machine Learning, Data Mining.

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 7 | Month- July 2024)

Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer