Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 5 | Issue 4

Volume 5 | Issue 4 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: BUILDING SERVICES WHICH ARE EASILY PROGRAMMABLE, VERSATILE, ELASTIC, INTEGRATED AND FLEXIBLE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704500

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704500

  Register Paper ID - 171356

  Title: BUILDING SERVICES WHICH ARE EASILY PROGRAMMABLE, VERSATILE, ELASTIC, INTEGRATED AND FLEXIBLE

  Author Name(s): Laxman Jadhav

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3735-3738

 Year: December 2017

 Downloads: 1281

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Building Services which are easily programmable, versatile, elastic, integrated and flexible

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: WOMEN EMPOWERMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704499

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704499

  Register Paper ID - 171357

  Title: WOMEN EMPOWERMENT

  Author Name(s): Sandeep Pandya

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3730-3734

 Year: December 2017

 Downloads: 1276

 Abstract

Women empowerment is the process of treating the women with same status with that of men in all the fields of the society. Women Empowerment has become a movement now but in our country it only seems a distant dream. We have restricted our perceptions to only upliftment of women- from the value of an object to the value of a living being. But what is required in the present period is something beyond it. We make a great show off whenever a woman makes high achievements but instead of showing off why not accept it to be natural and normal like we do with men doing the same. During Vedic era women had enjoyed equal status with men. Various modes were also adopted to ensure that this stature continues. Like Stridhan and the description of women scholars like Maitray, Gargi shows the importance a woman hold during that period.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

WOMEN EMPOWERMENT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STUDENTS ATTITUDES TOWARDS THE USE OF ICT IN SECONDARY SCHOOLS IN ARUNACHAL PRADESH

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704498

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704498

  Register Paper ID - 171366

  Title: STUDENTS ATTITUDES TOWARDS THE USE OF ICT IN SECONDARY SCHOOLS IN ARUNACHAL PRADESH

  Author Name(s): Miss Ligang Suniya, Prof. T. Lhungdim

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3725-3729

 Year: December 2017

 Downloads: 1328

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Attitude, information and communication technology, secondary school student

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW PAPER ON SQL INJECTION AND CROSS SITE SCRIPTING VULNERABILITIES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704497

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704497

  Register Paper ID - 171391

  Title: A REVIEW PAPER ON SQL INJECTION AND CROSS SITE SCRIPTING VULNERABILITIES

  Author Name(s): Shivani Sukhanand, Priyanka Sharma

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3720-3724

 Year: December 2017

 Downloads: 1301

 Abstract

As of late, web remains the favored stage for clients to do their business exercises. The movement of utilizations to web has been quick extending from applications like E-trade, Public gathering, E-administration, E-saving money, Shopping Portals or some other applications running on the web. Web Applications have expanded its use on account of simple availability to various clients around the globe. Be that as it may, as the utilization of the web has expanded, it has likewise given a bothersome or dull side to the use of html. Cross-webpage scripting (XSS) assaults keep on remaining the highest risk to web applications, databases and sites far and wide for a lot of time now. A study of around 15 million digital assaults in the second from last quarter of 2012 has uncovered that the greater part of these assaults are XSS based. In spite of the fact that assaults like SQL Injection, CSRF and Phishing are likewise normal, XSS still remains the favored procedure for programmers to complete malevolent exercises on web. This paper examines about XSS assaults, their operation and distinctive classifications of XSS assaults. The paper additionally features the alleviation situation and strategies feasible for anticipation. Data enters a Web application through an unauthorized source, most much of the time a web ask. The information is incorporated into dynamic substance that is sent to a web client without being approved for malignant substance. The malignant substance sent to the web program regularly appears as a fragment of JavaScript, however may likewise incorporate HTML, Flash, or some other sort of code that the program may execute. The assortment of assaults in view of XSS is practically boundless, however they regularly incorporate transmitting private information, similar to treats or other session data, to the aggressor, diverting the casualty to web content controlled by the assailant, or performing different vindictive operations on the client's machine under the pretense of the powerless.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cross Site Scripting (XSS), SQL Injection, Phishing, Cyber Attacks, Web Application Security, Security, Software Security, Security Vulnerability, Black-Box Security Testing, Test Automation, web application, static analysis, Prevention, Detection, Fault injection.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW PAPER ON MALWARE AND MALWARE PREVENTION AND DETECTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704496

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704496

  Register Paper ID - 171390

  Title: A REVIEW PAPER ON MALWARE AND MALWARE PREVENTION AND DETECTION

  Author Name(s): Nilesh Makwana, Chadresh Parekh

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3713-3719

 Year: December 2017

 Downloads: 1258

 Abstract

In the course of the most recent decades, there were loads of concentrates made on malware and their countermeasures. The latest reports stress that the innovation of malevolent programming is quickly expanding. In addition, the serious utilization of systems and Internet expands the capacity of the spreading and the adequacy of this sort of programming. Then again, scientists and makers attempting awesome endeavors to create hostile to malware frameworks with powerful identification strategies for better insurance on PCs. Different applications contain bad conduct code; however those are not really malignant applications. The current framework classifications such applications as a malware applications. This issue will be overcome in proposed framework with the assistance of new element extraction calculation. In proposed framework chose android highlights will be separated for whole list of capabilities to recognize malware on four stages: bundle, client, application, and approval stage. The malware identification will be founded on behavioral and characterized by their hazard (High, Medium, and Low). This will be useful for the client to deal with the framework (Application) easily.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Malware, Malware Detection Systems, Antivirus, Malware Detection, Machine Learning, Pattern Recognition, Android.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW PAPER ON AUTHENTICATION IN MOBILE PLATFORM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704495

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704495

  Register Paper ID - 171389

  Title: A REVIEW PAPER ON AUTHENTICATION IN MOBILE PLATFORM

  Author Name(s): Harshil K. Chaudhari, Chadresh Parekh

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3708-3712

 Year: December 2017

 Downloads: 1247

 Abstract

Today need of confirmation isn't restricted to secret key and PIN. It needs an abnormal state of security which can be accomplished by Keystroke bio-measurements. This paper endeavors to get the imposer regardless of the possibility that he conveys login subtle elements of client. The paper tries to survey the keystroke techniques and reach a typical inference. Including keystroke instrument with existing framework improves the security.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keystroke Biometrics, Network Security, Password Security and Password Strengthening.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A Review Paper on Ransomware and Ransomware Prevention and Detection

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704494

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704494

  Register Paper ID - 171388

  Title: A REVIEW PAPER ON RANSOMWARE AND RANSOMWARE PREVENTION AND DETECTION

  Author Name(s): Alpesh Kavad, Chadresh Parekh

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3702-3707

 Year: December 2017

 Downloads: 1226

 Abstract

Blackmail utilizing computerized stages is an expanding type of wrongdoing. A normally observed issue is blackmail as a disease of a Crypto Ransomware that encodes the records of the objective and requests a payment to recuperate the bolted information. By examining the four most basic Crypto Ransomwares, at composing, a reasonable weakness is distinguished; all diseases depend on apparatuses accessible on the objective framework to have the capacity to keep a straightforward recuperation after the assault has been recognized. By renaming the framework device that handles shadow duplicates it is conceivable to recoup from contaminations from every one of the four of the most well-known Crypto Ransomware. The arrangement is bundled in a solitary, simple to utilize content. Ransomware is a quickly developing danger to the information documents of people and organizations. It encodes documents on a contaminated PC and holds the way to decode the records until the point that the casualty pays a payoff. This malware is in charge of a huge number of dollars of misfortunes every year. Because of the a lot of cash to be made, new forms show up oftentimes. This permits bypassing antivirus programming and other interruption location techniques. In this paper, we show a concise history of Ransomware, the contentions for and against paying the payoff, best practices to keep a contamination, and to recuperate from a disease should one happen.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Crypto, Locker, Malware, Ransomware, Antivirus, malware, recovery, extortion, network security.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A STUDY ON SECURITY AND PRIVACY ISSUES OF CLOUD AND FOG COMPUTING FOR INTERNET OF THINGS(IOT)

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704493

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704493

  Register Paper ID - 171350

  Title: A STUDY ON SECURITY AND PRIVACY ISSUES OF CLOUD AND FOG COMPUTING FOR INTERNET OF THINGS(IOT)

  Author Name(s): P.V. Madhumitha

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3693-3701

 Year: December 2017

 Downloads: 1216

 Abstract

Fog computing is a promising computing worldview that ex-tends cloud computing to the edge of networks. Like cloud computing yet with distinct qualities, fogcomputing faces new security and protection challenges other than those acquired from cloud computing. In this paper, we have reviewed these difficulties and comparing arrangements in a short way.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Fog computing, cloud/mobile computing, security, privacy

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CLASSIFICATION TECHNIQUES IN AUTOMATIC BUG TRIAGE TO DECREASING THE MANUAL AND TIME COST

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704492

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704492

  Register Paper ID - 171349

  Title: CLASSIFICATION TECHNIQUES IN AUTOMATIC BUG TRIAGE TO DECREASING THE MANUAL AND TIME COST

  Author Name(s): Mrs.T.Aruna Jyothi, Mr.V.Vinay Kumar

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3688-3692

 Year: December 2017

 Downloads: 1268

 Abstract

Programming organizations spend more than 45 percent of cost in managing programming bugs. Bug triage is a vital advance during the time spent bug settling. The objective of bug triage is to dole out another coming bug to the right potential engineer. The current bug triage approaches depends on machine learning, which assemble classifiers from the preparation sets of bug reports. According to writing, need to build up a compelling model for doing information diminishment on bug informational collection which will decrease the size of the information and also increment the nature of the information., by lessening the time and cost. Numerous product organizations spend their the greater part of cost in managing these bugs. We are utilizing case determination and highlight choice at the same time with chronicled bug information. To diminish the manual and time cost, content arrangement methods are connected to play out the programmed bug triage.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Classification Techniques in Automatic Bug Triage to Decreasing the Manual and time Cost

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AN EFFICIENT RECOMMENDATION MODEL WITH USER TRUST AND ITEM RATINGS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704491

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704491

  Register Paper ID - 171348

  Title: AN EFFICIENT RECOMMENDATION MODEL WITH USER TRUST AND ITEM RATINGS

  Author Name(s): Parimi.Gowthami, P.G.K.Sirisha, G.M.Naik

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3680-3687

 Year: December 2017

 Downloads: 1226

 Abstract

As a basic method for Information Filtering, the recommender frameworks have been pulled in and made a packet of enthusiasm for as far back as ten years. The past recommendation procedures and methodologies have been broadly dissected in the data recovery look into groups, machine learning systems and information mining. Due to their incredible business request, the proposal frameworks have been effectively worked out in modern conditions and in business zones, for example, proposal of the item at Amazon, proposal of music at iTunes, recommendation of motion pictures at Netflix, et cetera. Here, we are proposing an approach called TrustSVD, which is a confide in based framework factorization system for item or administration recommendations. This TrustSVD incorporates numerous different data sources into the recommendation framework to decrease the information sparsity and the cool begin issues and their debasement execution. A goal examination of social put stock in information from the few of true informational indexes tells that, the unequivocal and certain impact of the two appraisals and trust must be thought about for a recommendation show. Subsequently TrustSVD manufactures upon the best in class recommender method known as, SVD++ (which makes utilization of impact of understood and unequivocal evaluated things), by furthermore fusing both impact of trusted and trusting clients upon the expectation of the things for a dynamic client. In light of our astute information of recommender frameworks, the proposed strategy is the first to enhance SVD++ with the social put stock in data.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Recommender systems, social trust, collaborative filtering, implicit trust.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW OF GATEWAY RELOCATION MECHANISM IN WIMAX NETWORKS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704490

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704490

  Register Paper ID - 170927

  Title: A REVIEW OF GATEWAY RELOCATION MECHANISM IN WIMAX NETWORKS

  Author Name(s): NIDHI SINGH, ANIL SANGWAN

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3673-3679

 Year: December 2017

 Downloads: 1221

 Abstract

Wimax was aimed to provide high bit rate, high rapidity, large coverage area, quality of service (QOS), multimedia services and to assist all sort of real time applications. In order to maintain the good quality of service and good network performance the load on Access Service Network Gateway (ASN GW) has to be reduced. In order to reduce load on ASN gateway the relocation has to be accomplished. ASN Gateway relocation is the procedure in which the connection point of one mobile station is changed from one gateway to another gateway. Wimax Forum has introduced two mobility management schemes for this relocation purpose. These mobility management schemes reduce the packet loss and handover delay to minimum. But the mobility management techniques do not answer when to relocate the Access Service Network Gateway. Two gateway relocation algorithms were introduced to upgrade the overall working in terms of dropping probability, blocking probability, average signalling overhead; it also reduces the load of ASN gateways. In this paper we will review the gateway relocation mechanism for WiMax Network.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ASN connected mobility, CSN connected mobility, Handover, Relocation algorithm, WiMax

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FLEXURAL BEHAVIOUR OF FIBER REINFORCED CONCRETE USING PVA-ECC

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704489

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704489

  Register Paper ID - 170940

  Title: FLEXURAL BEHAVIOUR OF FIBER REINFORCED CONCRETE USING PVA-ECC

  Author Name(s): Dr.I.R.Mithanthaya, Shriram Marathe, Sandeep.V.S

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3666-3672

 Year: December 2017

 Downloads: 1324

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ECC, PVA , Fibers ,Flexural Strength, Compressive Strength

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: QUALITY ASSURANCE IN TECHNICAL EDUCATION BY TOTAL QUALITY MANAGEMENT TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704488

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704488

  Register Paper ID - 171041

  Title: QUALITY ASSURANCE IN TECHNICAL EDUCATION BY TOTAL QUALITY MANAGEMENT TECHNIQUES

  Author Name(s): Veeranna D.K, Anand K.Joshi

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3662-3665

 Year: December 2017

 Downloads: 1256

 Abstract

India has one of the largest systems of post secondary science, engineering and technical education in the world. The discovery of Indian talent by employers around the world has laid to a global competition for Indian talent. As a consequence, human resource is emerging as one of the most serious constraints to economic growth of India as well. The higher education system of India is struggling to meet the new expectation. At the same time, even though the concept of Total Quality Management (TQM) was developed by an American, W. Edwards Deming, after World War II for improving the production quality of goods and services. The concept was not taken seriously by Americans until the Japanese, who adopted it in 1950 to resurrect their postwar business and industry issues. Now the TQM is a common word used across the world including service and production industries. The use of TQM techniques in education system will definitely reform the quality and assures integrity at large.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

quality, integration, assurance, management.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: POLAROGRAPHIC INVESTIGATION OF MIXED LIGAND COMPLEX FORMATION OF CD(II) OXALATE-VALINATE SYSTEM AND DETERMINATION OF THERMODYNAMIC PARAMETERS OF COMPLEXES FORMED.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704487

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704487

  Register Paper ID - 171206

  Title: POLAROGRAPHIC INVESTIGATION OF MIXED LIGAND COMPLEX FORMATION OF CD(II) OXALATE-VALINATE SYSTEM AND DETERMINATION OF THERMODYNAMIC PARAMETERS OF COMPLEXES FORMED.

  Author Name(s): Saroj bhatia

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3651-3661

 Year: December 2017

 Downloads: 1224

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Mixed ligand complex, Oxalate-Valinate System, thermodynamic parameters

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: "MAKING OF KASHMIRI IDENTITY AND ITS RELIGIOUS CONNOTATIONS: A HISTORICAL REVIEW"

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704486

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704486

  Register Paper ID - 171226

  Title: "MAKING OF KASHMIRI IDENTITY AND ITS RELIGIOUS CONNOTATIONS: A HISTORICAL REVIEW"

  Author Name(s): Rashmi Sharma

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3641-3650

 Year: December 2017

 Downloads: 1260

 Abstract

The factor of religion remained significant in the identity formation as well as in the process of political mobilisation in the Kashmir valley since Dogra period.It has been argued that in the internally fragmented and backward Muslim society of Kashmir, the popular leadership initially used religion as a uniting force but, in the later period the identity politics of Kashmir became more inclusive and secular in character. The paper also argues that the identity politics of Kashmir does not have much space for extreme religious expression, though, in the absence of democratic and pacific means of expression religion might assume central space in the politics of Kashmir.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Kashmir, Muslim, Religion, and Politics

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOCIAL MEDIA'S INTERFERENCE IN RURAL POLITICAL SOCIALIZATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704485

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704485

  Register Paper ID - 171271

  Title: SOCIAL MEDIA'S INTERFERENCE IN RURAL POLITICAL SOCIALIZATION

  Author Name(s): SHIVENDU KUMAR RAI

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3625-3640

 Year: December 2017

 Downloads: 1325

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Democracy, Social Media, Political Socialization, Rural Communication, Youth.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN MODIFICATION FOR VIBRATION CONTROL AND VALIDATION OF VIBRATIONS FOR INDUSTRIAL AIR BLOWER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704484

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704484

  Register Paper ID - 171275

  Title: DESIGN MODIFICATION FOR VIBRATION CONTROL AND VALIDATION OF VIBRATIONS FOR INDUSTRIAL AIR BLOWER

  Author Name(s): Milind U.Karanjkar, Dattatrey S.Nikam

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3617-3624

 Year: December 2017

 Downloads: 1287

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Impeller, Vibration Analysis, Finite Element Analysis, Modal Analysis.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A SOLAR POWERED WATER PUMPING FRAMEWORK USING SWITCHED RELUCTANCE MOTOR

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704483

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704483

  Register Paper ID - 171292

  Title: A SOLAR POWERED WATER PUMPING FRAMEWORK USING SWITCHED RELUCTANCE MOTOR

  Author Name(s): Vijayaraja L, Dhanasekar R, Rupa Kesavan

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3609-3616

 Year: December 2017

 Downloads: 1348

 Abstract

Nowadays there is a great advancement in using Solar Photo Voltaic array for many purposes. A simple design and MATLAB simulation of a solar water pumping framework using Switched Reluctance Motor is proposed here. Switched Reluctance Motor possessing a number of advantages over the DC and AC motors such as high torque density, low inertia, quick response and low losses because of the absence of permanent magnet or any winding on the rotor. It also exhibits wide speed range capability and simple control for the Solar Photo Voltaic array powered water pumping system. For the smooth and continuous operation of the proposed scheme a Cuk converter and Midpoint converter is designed in the circuit. Maximum Power Point Tracking algorithm is used as an intermediate DC-DC converter between the Solar Photo Voltaic array and the Midpoint converter, in order to operate the Solar Photo Voltaic array at its optimum power point. The proposed system achieves better efficiency and output than that of a conventional water pumping system.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Solar photo voltaic, Switched Reluctance Motor, Cuk Converter,Maximum Power Point Tracking

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANTIBACTERIAL ACTIVITY FROM THE HAEMOLYMPH OF FRESHWATER CRAB, HIMALAYAPOTAMON EMPHYSETUM ON SOME OF CLINICAL PATHOGENS.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704482

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704482

  Register Paper ID - 171300

  Title: ANTIBACTERIAL ACTIVITY FROM THE HAEMOLYMPH OF FRESHWATER CRAB, HIMALAYAPOTAMON EMPHYSETUM ON SOME OF CLINICAL PATHOGENS.

  Author Name(s): Priya Manhas, Rakesh Kumar Gupta, Seema Langer

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3604-3608

 Year: December 2017

 Downloads: 1253

 Abstract

In the present study, an attempt has been made to assess the antimicrobial activity of haemolymph collected from a freshwater Himalayapotamon emphysetum. The haemolymph collected was subjected to antimicrobial activities against some of clinical pathogens viz., Escherichia coli, Streptococcus pyrogenes Pseudomonas aeruginosa, Staphylococcus aureus, Bacillus subtilis. and Salmonella paratyphi. In males, the highest zone of inhibition was observed against Staphylococcus aureus while least in Salmonella paratyphi whereas in females, highest zone of inhibition was observed against Streptococcus pyrogenes while least in case of Pseudomonas aeruginosa.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Crab, Haemolymph, Antibacterial

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Hurdles in Metamorphosing Indias Economy to a Cashless Economy

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT1704480

  Your Paper Publication Details:

  Published Paper ID: - IJCRT1704480

  Register Paper ID - 171305

  Title: HURDLES IN METAMORPHOSING INDIAS ECONOMY TO A CASHLESS ECONOMY

  Author Name(s): Bharat Kumar Meher

 Publisher Journal name: IJCRT

 Volume: 5

 Issue: 4

 Pages: 3582-3597

 Year: December 2017

 Downloads: 1254

 Abstract

Abstract Demonetization is considered as a first biggest and successful step to transform India into a cashless economy. The premier object to transform India into a cashless economy is to curb the corruption and menace of black money from the country, to reduce the cost of making and handling paper money, terrorist activities and cutting of trees for printing notes, and also to bring more transparency in every sector of Indian economy. The prevalent Modi Government is making all possible efforts to transform India into cashless or digitalized economy. During demonetization the government even encouraged people to use many electronic payment methods rather than cash to reduce the use of physical cash and the people may be accustomed with the use of various electronic payments. Hence, this paper is an attempt to study the various problems faced by the people during demonetization and the need to transform India into a Cashless economy. It also discusses the various electronic payment methods used by the people, the frequency of using these methods during demonetization and after the expiration of it and also to examine the reasons of changing habits in using electronic modes of payments. Apart from that this paper also focuses on the various challenges or hurdles that India is facing in transforming itself into a Cashless Economy.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cashless Economy, Demonetization, E-Wallets,Plastic Cards, Net Banking, Fisher’s Exact Test

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 7 | Month- July 2024)

Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer