ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: BUILDING SERVICES WHICH ARE EASILY PROGRAMMABLE, VERSATILE, ELASTIC, INTEGRATED AND FLEXIBLE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704500
Register Paper ID - 171356
Title: BUILDING SERVICES WHICH ARE EASILY PROGRAMMABLE, VERSATILE, ELASTIC, INTEGRATED AND FLEXIBLE
Author Name(s): Laxman Jadhav
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3735-3738
Year: December 2017
Downloads: 1281
Licence: creative commons attribution 4.0
Building Services which are easily programmable, versatile, elastic, integrated and flexible
Paper Title: WOMEN EMPOWERMENT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704499
Register Paper ID - 171357
Title: WOMEN EMPOWERMENT
Author Name(s): Sandeep Pandya
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3730-3734
Year: December 2017
Downloads: 1276
Women empowerment is the process of treating the women with same status with that of men in all the fields of the society. Women Empowerment has become a movement now but in our country it only seems a distant dream. We have restricted our perceptions to only upliftment of women- from the value of an object to the value of a living being. But what is required in the present period is something beyond it. We make a great show off whenever a woman makes high achievements but instead of showing off why not accept it to be natural and normal like we do with men doing the same. During Vedic era women had enjoyed equal status with men. Various modes were also adopted to ensure that this stature continues. Like Stridhan and the description of women scholars like Maitray, Gargi shows the importance a woman hold during that period.
Licence: creative commons attribution 4.0
Paper Title: STUDENTS ATTITUDES TOWARDS THE USE OF ICT IN SECONDARY SCHOOLS IN ARUNACHAL PRADESH
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704498
Register Paper ID - 171366
Title: STUDENTS ATTITUDES TOWARDS THE USE OF ICT IN SECONDARY SCHOOLS IN ARUNACHAL PRADESH
Author Name(s): Miss Ligang Suniya, Prof. T. Lhungdim
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3725-3729
Year: December 2017
Downloads: 1328
Licence: creative commons attribution 4.0
Attitude, information and communication technology, secondary school student
Paper Title: A REVIEW PAPER ON SQL INJECTION AND CROSS SITE SCRIPTING VULNERABILITIES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704497
Register Paper ID - 171391
Title: A REVIEW PAPER ON SQL INJECTION AND CROSS SITE SCRIPTING VULNERABILITIES
Author Name(s): Shivani Sukhanand, Priyanka Sharma
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3720-3724
Year: December 2017
Downloads: 1301
As of late, web remains the favored stage for clients to do their business exercises. The movement of utilizations to web has been quick extending from applications like E-trade, Public gathering, E-administration, E-saving money, Shopping Portals or some other applications running on the web. Web Applications have expanded its use on account of simple availability to various clients around the globe. Be that as it may, as the utilization of the web has expanded, it has likewise given a bothersome or dull side to the use of html. Cross-webpage scripting (XSS) assaults keep on remaining the highest risk to web applications, databases and sites far and wide for a lot of time now. A study of around 15 million digital assaults in the second from last quarter of 2012 has uncovered that the greater part of these assaults are XSS based. In spite of the fact that assaults like SQL Injection, CSRF and Phishing are likewise normal, XSS still remains the favored procedure for programmers to complete malevolent exercises on web. This paper examines about XSS assaults, their operation and distinctive classifications of XSS assaults. The paper additionally features the alleviation situation and strategies feasible for anticipation. Data enters a Web application through an unauthorized source, most much of the time a web ask. The information is incorporated into dynamic substance that is sent to a web client without being approved for malignant substance. The malignant substance sent to the web program regularly appears as a fragment of JavaScript, however may likewise incorporate HTML, Flash, or some other sort of code that the program may execute. The assortment of assaults in view of XSS is practically boundless, however they regularly incorporate transmitting private information, similar to treats or other session data, to the aggressor, diverting the casualty to web content controlled by the assailant, or performing different vindictive operations on the client's machine under the pretense of the powerless.
Licence: creative commons attribution 4.0
Cross Site Scripting (XSS), SQL Injection, Phishing, Cyber Attacks, Web Application Security, Security, Software Security, Security Vulnerability, Black-Box Security Testing, Test Automation, web application, static analysis, Prevention, Detection, Fault injection.
Paper Title: A REVIEW PAPER ON MALWARE AND MALWARE PREVENTION AND DETECTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704496
Register Paper ID - 171390
Title: A REVIEW PAPER ON MALWARE AND MALWARE PREVENTION AND DETECTION
Author Name(s): Nilesh Makwana, Chadresh Parekh
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3713-3719
Year: December 2017
Downloads: 1258
In the course of the most recent decades, there were loads of concentrates made on malware and their countermeasures. The latest reports stress that the innovation of malevolent programming is quickly expanding. In addition, the serious utilization of systems and Internet expands the capacity of the spreading and the adequacy of this sort of programming. Then again, scientists and makers attempting awesome endeavors to create hostile to malware frameworks with powerful identification strategies for better insurance on PCs. Different applications contain bad conduct code; however those are not really malignant applications. The current framework classifications such applications as a malware applications. This issue will be overcome in proposed framework with the assistance of new element extraction calculation. In proposed framework chose android highlights will be separated for whole list of capabilities to recognize malware on four stages: bundle, client, application, and approval stage. The malware identification will be founded on behavioral and characterized by their hazard (High, Medium, and Low). This will be useful for the client to deal with the framework (Application) easily.
Licence: creative commons attribution 4.0
Malware, Malware Detection Systems, Antivirus, Malware Detection, Machine Learning, Pattern Recognition, Android.
Paper Title: A REVIEW PAPER ON AUTHENTICATION IN MOBILE PLATFORM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704495
Register Paper ID - 171389
Title: A REVIEW PAPER ON AUTHENTICATION IN MOBILE PLATFORM
Author Name(s): Harshil K. Chaudhari, Chadresh Parekh
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3708-3712
Year: December 2017
Downloads: 1247
Today need of confirmation isn't restricted to secret key and PIN. It needs an abnormal state of security which can be accomplished by Keystroke bio-measurements. This paper endeavors to get the imposer regardless of the possibility that he conveys login subtle elements of client. The paper tries to survey the keystroke techniques and reach a typical inference. Including keystroke instrument with existing framework improves the security.
Licence: creative commons attribution 4.0
Keystroke Biometrics, Network Security, Password Security and Password Strengthening.
Paper Title: A Review Paper on Ransomware and Ransomware Prevention and Detection
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704494
Register Paper ID - 171388
Title: A REVIEW PAPER ON RANSOMWARE AND RANSOMWARE PREVENTION AND DETECTION
Author Name(s): Alpesh Kavad, Chadresh Parekh
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3702-3707
Year: December 2017
Downloads: 1226
Blackmail utilizing computerized stages is an expanding type of wrongdoing. A normally observed issue is blackmail as a disease of a Crypto Ransomware that encodes the records of the objective and requests a payment to recuperate the bolted information. By examining the four most basic Crypto Ransomwares, at composing, a reasonable weakness is distinguished; all diseases depend on apparatuses accessible on the objective framework to have the capacity to keep a straightforward recuperation after the assault has been recognized. By renaming the framework device that handles shadow duplicates it is conceivable to recoup from contaminations from every one of the four of the most well-known Crypto Ransomware. The arrangement is bundled in a solitary, simple to utilize content. Ransomware is a quickly developing danger to the information documents of people and organizations. It encodes documents on a contaminated PC and holds the way to decode the records until the point that the casualty pays a payoff. This malware is in charge of a huge number of dollars of misfortunes every year. Because of the a lot of cash to be made, new forms show up oftentimes. This permits bypassing antivirus programming and other interruption location techniques. In this paper, we show a concise history of Ransomware, the contentions for and against paying the payoff, best practices to keep a contamination, and to recuperate from a disease should one happen.
Licence: creative commons attribution 4.0
Crypto, Locker, Malware, Ransomware, Antivirus, malware, recovery, extortion, network security.
Paper Title: A STUDY ON SECURITY AND PRIVACY ISSUES OF CLOUD AND FOG COMPUTING FOR INTERNET OF THINGS(IOT)
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704493
Register Paper ID - 171350
Title: A STUDY ON SECURITY AND PRIVACY ISSUES OF CLOUD AND FOG COMPUTING FOR INTERNET OF THINGS(IOT)
Author Name(s): P.V. Madhumitha
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3693-3701
Year: December 2017
Downloads: 1216
Fog computing is a promising computing worldview that ex-tends cloud computing to the edge of networks. Like cloud computing yet with distinct qualities, fogcomputing faces new security and protection challenges other than those acquired from cloud computing. In this paper, we have reviewed these difficulties and comparing arrangements in a short way.
Licence: creative commons attribution 4.0
Fog computing, cloud/mobile computing, security, privacy
Paper Title: CLASSIFICATION TECHNIQUES IN AUTOMATIC BUG TRIAGE TO DECREASING THE MANUAL AND TIME COST
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704492
Register Paper ID - 171349
Title: CLASSIFICATION TECHNIQUES IN AUTOMATIC BUG TRIAGE TO DECREASING THE MANUAL AND TIME COST
Author Name(s): Mrs.T.Aruna Jyothi, Mr.V.Vinay Kumar
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3688-3692
Year: December 2017
Downloads: 1268
Programming organizations spend more than 45 percent of cost in managing programming bugs. Bug triage is a vital advance during the time spent bug settling. The objective of bug triage is to dole out another coming bug to the right potential engineer. The current bug triage approaches depends on machine learning, which assemble classifiers from the preparation sets of bug reports. According to writing, need to build up a compelling model for doing information diminishment on bug informational collection which will decrease the size of the information and also increment the nature of the information., by lessening the time and cost. Numerous product organizations spend their the greater part of cost in managing these bugs. We are utilizing case determination and highlight choice at the same time with chronicled bug information. To diminish the manual and time cost, content arrangement methods are connected to play out the programmed bug triage.
Licence: creative commons attribution 4.0
Classification Techniques in Automatic Bug Triage to Decreasing the Manual and time Cost
Paper Title: AN EFFICIENT RECOMMENDATION MODEL WITH USER TRUST AND ITEM RATINGS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704491
Register Paper ID - 171348
Title: AN EFFICIENT RECOMMENDATION MODEL WITH USER TRUST AND ITEM RATINGS
Author Name(s): Parimi.Gowthami, P.G.K.Sirisha, G.M.Naik
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3680-3687
Year: December 2017
Downloads: 1226
As a basic method for Information Filtering, the recommender frameworks have been pulled in and made a packet of enthusiasm for as far back as ten years. The past recommendation procedures and methodologies have been broadly dissected in the data recovery look into groups, machine learning systems and information mining. Due to their incredible business request, the proposal frameworks have been effectively worked out in modern conditions and in business zones, for example, proposal of the item at Amazon, proposal of music at iTunes, recommendation of motion pictures at Netflix, et cetera. Here, we are proposing an approach called TrustSVD, which is a confide in based framework factorization system for item or administration recommendations. This TrustSVD incorporates numerous different data sources into the recommendation framework to decrease the information sparsity and the cool begin issues and their debasement execution. A goal examination of social put stock in information from the few of true informational indexes tells that, the unequivocal and certain impact of the two appraisals and trust must be thought about for a recommendation show. Subsequently TrustSVD manufactures upon the best in class recommender method known as, SVD++ (which makes utilization of impact of understood and unequivocal evaluated things), by furthermore fusing both impact of trusted and trusting clients upon the expectation of the things for a dynamic client. In light of our astute information of recommender frameworks, the proposed strategy is the first to enhance SVD++ with the social put stock in data.
Licence: creative commons attribution 4.0
Recommender systems, social trust, collaborative filtering, implicit trust.
Paper Title: A REVIEW OF GATEWAY RELOCATION MECHANISM IN WIMAX NETWORKS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704490
Register Paper ID - 170927
Title: A REVIEW OF GATEWAY RELOCATION MECHANISM IN WIMAX NETWORKS
Author Name(s): NIDHI SINGH, ANIL SANGWAN
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3673-3679
Year: December 2017
Downloads: 1221
Wimax was aimed to provide high bit rate, high rapidity, large coverage area, quality of service (QOS), multimedia services and to assist all sort of real time applications. In order to maintain the good quality of service and good network performance the load on Access Service Network Gateway (ASN GW) has to be reduced. In order to reduce load on ASN gateway the relocation has to be accomplished. ASN Gateway relocation is the procedure in which the connection point of one mobile station is changed from one gateway to another gateway. Wimax Forum has introduced two mobility management schemes for this relocation purpose. These mobility management schemes reduce the packet loss and handover delay to minimum. But the mobility management techniques do not answer when to relocate the Access Service Network Gateway. Two gateway relocation algorithms were introduced to upgrade the overall working in terms of dropping probability, blocking probability, average signalling overhead; it also reduces the load of ASN gateways. In this paper we will review the gateway relocation mechanism for WiMax Network.
Licence: creative commons attribution 4.0
ASN connected mobility, CSN connected mobility, Handover, Relocation algorithm, WiMax
Paper Title: FLEXURAL BEHAVIOUR OF FIBER REINFORCED CONCRETE USING PVA-ECC
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704489
Register Paper ID - 170940
Title: FLEXURAL BEHAVIOUR OF FIBER REINFORCED CONCRETE USING PVA-ECC
Author Name(s): Dr.I.R.Mithanthaya, Shriram Marathe, Sandeep.V.S
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3666-3672
Year: December 2017
Downloads: 1324
Licence: creative commons attribution 4.0
ECC, PVA , Fibers ,Flexural Strength, Compressive Strength
Paper Title: QUALITY ASSURANCE IN TECHNICAL EDUCATION BY TOTAL QUALITY MANAGEMENT TECHNIQUES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704488
Register Paper ID - 171041
Title: QUALITY ASSURANCE IN TECHNICAL EDUCATION BY TOTAL QUALITY MANAGEMENT TECHNIQUES
Author Name(s): Veeranna D.K, Anand K.Joshi
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3662-3665
Year: December 2017
Downloads: 1256
India has one of the largest systems of post secondary science, engineering and technical education in the world. The discovery of Indian talent by employers around the world has laid to a global competition for Indian talent. As a consequence, human resource is emerging as one of the most serious constraints to economic growth of India as well. The higher education system of India is struggling to meet the new expectation. At the same time, even though the concept of Total Quality Management (TQM) was developed by an American, W. Edwards Deming, after World War II for improving the production quality of goods and services. The concept was not taken seriously by Americans until the Japanese, who adopted it in 1950 to resurrect their postwar business and industry issues. Now the TQM is a common word used across the world including service and production industries. The use of TQM techniques in education system will definitely reform the quality and assures integrity at large.
Licence: creative commons attribution 4.0
quality, integration, assurance, management.
Paper Title: POLAROGRAPHIC INVESTIGATION OF MIXED LIGAND COMPLEX FORMATION OF CD(II) OXALATE-VALINATE SYSTEM AND DETERMINATION OF THERMODYNAMIC PARAMETERS OF COMPLEXES FORMED.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704487
Register Paper ID - 171206
Title: POLAROGRAPHIC INVESTIGATION OF MIXED LIGAND COMPLEX FORMATION OF CD(II) OXALATE-VALINATE SYSTEM AND DETERMINATION OF THERMODYNAMIC PARAMETERS OF COMPLEXES FORMED.
Author Name(s): Saroj bhatia
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3651-3661
Year: December 2017
Downloads: 1224
Licence: creative commons attribution 4.0
Mixed ligand complex, Oxalate-Valinate System, thermodynamic parameters
Paper Title: "MAKING OF KASHMIRI IDENTITY AND ITS RELIGIOUS CONNOTATIONS: A HISTORICAL REVIEW"
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704486
Register Paper ID - 171226
Title: "MAKING OF KASHMIRI IDENTITY AND ITS RELIGIOUS CONNOTATIONS: A HISTORICAL REVIEW"
Author Name(s): Rashmi Sharma
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3641-3650
Year: December 2017
Downloads: 1260
The factor of religion remained significant in the identity formation as well as in the process of political mobilisation in the Kashmir valley since Dogra period.It has been argued that in the internally fragmented and backward Muslim society of Kashmir, the popular leadership initially used religion as a uniting force but, in the later period the identity politics of Kashmir became more inclusive and secular in character. The paper also argues that the identity politics of Kashmir does not have much space for extreme religious expression, though, in the absence of democratic and pacific means of expression religion might assume central space in the politics of Kashmir.
Licence: creative commons attribution 4.0
Kashmir, Muslim, Religion, and Politics
Paper Title: SOCIAL MEDIA'S INTERFERENCE IN RURAL POLITICAL SOCIALIZATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704485
Register Paper ID - 171271
Title: SOCIAL MEDIA'S INTERFERENCE IN RURAL POLITICAL SOCIALIZATION
Author Name(s): SHIVENDU KUMAR RAI
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3625-3640
Year: December 2017
Downloads: 1325
Licence: creative commons attribution 4.0
Democracy, Social Media, Political Socialization, Rural Communication, Youth.
Paper Title: DESIGN MODIFICATION FOR VIBRATION CONTROL AND VALIDATION OF VIBRATIONS FOR INDUSTRIAL AIR BLOWER
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704484
Register Paper ID - 171275
Title: DESIGN MODIFICATION FOR VIBRATION CONTROL AND VALIDATION OF VIBRATIONS FOR INDUSTRIAL AIR BLOWER
Author Name(s): Milind U.Karanjkar, Dattatrey S.Nikam
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3617-3624
Year: December 2017
Downloads: 1287
Licence: creative commons attribution 4.0
Impeller, Vibration Analysis, Finite Element Analysis, Modal Analysis.
Paper Title: A SOLAR POWERED WATER PUMPING FRAMEWORK USING SWITCHED RELUCTANCE MOTOR
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704483
Register Paper ID - 171292
Title: A SOLAR POWERED WATER PUMPING FRAMEWORK USING SWITCHED RELUCTANCE MOTOR
Author Name(s): Vijayaraja L, Dhanasekar R, Rupa Kesavan
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3609-3616
Year: December 2017
Downloads: 1348
Nowadays there is a great advancement in using Solar Photo Voltaic array for many purposes. A simple design and MATLAB simulation of a solar water pumping framework using Switched Reluctance Motor is proposed here. Switched Reluctance Motor possessing a number of advantages over the DC and AC motors such as high torque density, low inertia, quick response and low losses because of the absence of permanent magnet or any winding on the rotor. It also exhibits wide speed range capability and simple control for the Solar Photo Voltaic array powered water pumping system. For the smooth and continuous operation of the proposed scheme a Cuk converter and Midpoint converter is designed in the circuit. Maximum Power Point Tracking algorithm is used as an intermediate DC-DC converter between the Solar Photo Voltaic array and the Midpoint converter, in order to operate the Solar Photo Voltaic array at its optimum power point. The proposed system achieves better efficiency and output than that of a conventional water pumping system.
Licence: creative commons attribution 4.0
Solar photo voltaic, Switched Reluctance Motor, Cuk Converter,Maximum Power Point Tracking
Paper Title: ANTIBACTERIAL ACTIVITY FROM THE HAEMOLYMPH OF FRESHWATER CRAB, HIMALAYAPOTAMON EMPHYSETUM ON SOME OF CLINICAL PATHOGENS.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704482
Register Paper ID - 171300
Title: ANTIBACTERIAL ACTIVITY FROM THE HAEMOLYMPH OF FRESHWATER CRAB, HIMALAYAPOTAMON EMPHYSETUM ON SOME OF CLINICAL PATHOGENS.
Author Name(s): Priya Manhas, Rakesh Kumar Gupta, Seema Langer
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3604-3608
Year: December 2017
Downloads: 1253
In the present study, an attempt has been made to assess the antimicrobial activity of haemolymph collected from a freshwater Himalayapotamon emphysetum. The haemolymph collected was subjected to antimicrobial activities against some of clinical pathogens viz., Escherichia coli, Streptococcus pyrogenes Pseudomonas aeruginosa, Staphylococcus aureus, Bacillus subtilis. and Salmonella paratyphi. In males, the highest zone of inhibition was observed against Staphylococcus aureus while least in Salmonella paratyphi whereas in females, highest zone of inhibition was observed against Streptococcus pyrogenes while least in case of Pseudomonas aeruginosa.
Licence: creative commons attribution 4.0
Crab, Haemolymph, Antibacterial
Paper Title: Hurdles in Metamorphosing Indias Economy to a Cashless Economy
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT1704480
Register Paper ID - 171305
Title: HURDLES IN METAMORPHOSING INDIAS ECONOMY TO A CASHLESS ECONOMY
Author Name(s): Bharat Kumar Meher
Publisher Journal name: IJCRT
Volume: 5
Issue: 4
Pages: 3582-3597
Year: December 2017
Downloads: 1254
Abstract Demonetization is considered as a first biggest and successful step to transform India into a cashless economy. The premier object to transform India into a cashless economy is to curb the corruption and menace of black money from the country, to reduce the cost of making and handling paper money, terrorist activities and cutting of trees for printing notes, and also to bring more transparency in every sector of Indian economy. The prevalent Modi Government is making all possible efforts to transform India into cashless or digitalized economy. During demonetization the government even encouraged people to use many electronic payment methods rather than cash to reduce the use of physical cash and the people may be accustomed with the use of various electronic payments. Hence, this paper is an attempt to study the various problems faced by the people during demonetization and the need to transform India into a Cashless economy. It also discusses the various electronic payment methods used by the people, the frequency of using these methods during demonetization and after the expiration of it and also to examine the reasons of changing habits in using electronic modes of payments. Apart from that this paper also focuses on the various challenges or hurdles that India is facing in transforming itself into a Cashless Economy.
Licence: creative commons attribution 4.0
Cashless Economy, Demonetization, E-Wallets,Plastic Cards, Net Banking, Fisher’s Exact Test
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 7 | Month- July 2024)