Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 12 | Issue 5

Volume 12 | Issue 5 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02125

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02125

  Register Paper ID - 259907

  Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT

  Author Name(s): Dr. Balaji K, Biswajit Nayak, Kavita Soren, Arpita Kumari, Madhushree R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 824-829

 Year: May 2024

 Downloads: 79

 Abstract

We examine the revolutionary effects of artificial intelligence (AI) on education in this thorough investigation, paying particular attention to the critical ideas of personalized learning and adaptive assessment. The research explains how education has changed historically. AI's integration into educational paradigms emphasizes how crucial it is to provide learners with learning experiences that are specifically personalized to them. It also explores the field of AI-powered adaptive assessment, explaining how it differs from traditional testing methods. The paper provides a comprehensive overview of this educational revolution by synthesizing case studies, existing literature, and developing trends.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02124

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02124

  Register Paper ID - 259906

  Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY

  Author Name(s): Dr. Balaji k, Mohammed Tauqir Ali T.M, Satyajit Mohanty, N.V. Rakesh, Viswa .M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 820-823

 Year: May 2024

 Downloads: 97

 Abstract

In today's corporate world, network and data security is a major concern. Many different types of businesses, such as financial institutions, law firms, schools, healthcare, telecommunications, mining, and government organizations, have a strong demand for strategic data management techniques. Businesses lose sensitive data, such as biometric and financial information, to competitors and other parties as a result of hackers' activity. Businesses are losing millions of dollars as a result of malicious people gaining access to unprotected data. Businesses now place a great value on data security. Protection is required to guarantee information security. Using encryption algorithms to protect communications in these kinds of threads is one of the most important and practical solutions available. Performance and security are two factors that the developer must take into account while creating an extremely secure Android application. Android-based applications must perform better because Android smartphones have constrained resources. The most widely used secure encryption algorithms Rijndael, Serpent, and Two fish will be evaluated in this study to see which works best in order to overcome the issues.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

telecommunications, android, encryption algorithms

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BIOMETRICS USING PYTHON

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02123

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02123

  Register Paper ID - 259903

  Title: BIOMETRICS USING PYTHON

  Author Name(s): Dr. K Balaji, AnushreeGD, BhavanaShreeS, BhuvanaShreeBS, KavyaBN

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 815-819

 Year: May 2024

 Downloads: 82

 Abstract

Biometric authentication systems have gained significant attention due to their ability to provide secure and convenient access control. This project proposes a novel approach to biometric authentication using Python, leveraging machine learning techniques and computer vision algorithms. The system integrates facial recognition, fingerprint recognition, and voice recognition modalities to enhance authentication accuracy and robustness. The system begins by capturing biometric data from users through respective sensors(camera, fingerprint scanner, microphone). Preprocessing techniques are applied to clean and normalize the data, followed by feature extraction to extract unique biometric features. Machine learning models, such as Convolution Neural Networks (CNNs) and Support Vector Machines (SVMs), are trained on the extracted features to learn the patterns specific to each user. During the authentication phase, the system compares the input biometric data with the stored templates using appropriate similarity metrics. Fusion techniques are employed to combine the results from multiple modalities, enhancing the overall authentication accuracy and reliability. Keywords-recognition, authentication, security.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BIOMETRICS USING PYTHON

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02122

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02122

  Register Paper ID - 259901

  Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY

  Author Name(s): Dr. Balaji K, Ashwini P, Likhitha P, Jagadevi, Gnanapriya

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 809-814

 Year: May 2024

 Downloads: 63

 Abstract

Setting up an email account involves confirming ownership through a link sent to the provided email address. Personal questions, like favorite colors or pets' names, may also be asked for added security. Email services monitor login locations and usage patterns to detect suspicious activity. Two-factor authentication adds an extra layer of security by sending a code to the user's phone. Account recovery processes often include sending a reset link to an alternate email or mobile number. During email sessions, encryption and session management techniques are used to protect user data. Automatic logout may occur after a period of inactivity to prevent unauthorized access. These measures collectively ensure email account security and user verification.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

EMAIL AUTHENTICATION USING CRYPTOGRAPHY

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BRAIN COMPUTER INTERFACE UNDER AI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02121

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02121

  Register Paper ID - 259900

  Title: BRAIN COMPUTER INTERFACE UNDER AI

  Author Name(s): DR. Balaji K, P Srikanth, Tharun Reddy J, Mahesh Naik, R Bali Bai ,Nithin Kumar S M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 804-808

 Year: May 2024

 Downloads: 83

 Abstract

A brain-machine interface, also referred to as BCIs, is a type of technology that enables people to interact with technology through their brain. It allows them to bypass the need for physical controls by connecting their brain activity to external devices. These systems are able to interpret brain signals and translate them into commands for various devices, such as computers and robotic arms.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BRAIN COMPUTER INTERFACE UNDER AI

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BIG DATA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02120

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02120

  Register Paper ID - 259899

  Title: BIG DATA

  Author Name(s): DR. Balaji, Pallavi K G, Meghana U, Shwetha S, Manasa N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 801-803

 Year: May 2024

 Downloads: 77

 Abstract

Big Data is a term used to describe large and complex datasets that require powerful computing tools and analytics methods to extract meaningful insights. The rapid growth of data in the modern era has led to an explosion of Big Data sources including social media, sensor data, email logs, and more. This report provides a comprehensive over view of Big Data, including its definition, its characteristics, its sources, and its applications. We need big data when the user has large amount of data, it has noisy and inconsistency. Traditional data storage cannot able of handling large volume of data hence we need a big data analytic. In big data the data can be Structured type, Unstructured type and semi structured type. Big data has characteristics and it is also called as 5V's. We discuss the challenges posed by Big Data, including storage, retrieval, and analysis, and we describe several tools and technologies used to address these challenges.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DISEASE PREDICTION USING DATA MINING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02119

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02119

  Register Paper ID - 259897

  Title: DISEASE PREDICTION USING DATA MINING

  Author Name(s): DR.BALAJI.K, MONISHA P, MADHUSHREE S G, MOHAN KUMAR, SAMRAT RAJ

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 796-800

 Year: May 2024

 Downloads: 87

 Abstract

Data mining is described as sifting via very huge amount of records for beneficial information. Some of the vital and famous records mining techniques are classification, clustering, prediction. Data mining methods are used for range of applications. In health care industry, data mining plays an necessary position for predicting diseases. For detecting a sickness number of exams should be required from the patient. But the use of data mining method the wide variety of check be reduced. This reduced check plays an important position in time and performance. This method has an benefits and disadvantages. This paper analyzes how data mining techniques are used for predicting one of kind sorts of diseases. This paper reviewed the research papers which mainly targeted on predicting heart disease, Diabetes, breast cancer.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DISEASE PREDICTION USING DATA MINING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02118

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02118

  Register Paper ID - 259896

  Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES

  Author Name(s): Dr Balaji K, Kruthi P.J, Lekha V.S, Harshitha V, Keerthana E

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 792-795

 Year: May 2024

 Downloads: 77

 Abstract

In today's digital age, the concept of a connected world has transformed the way we interact, communicate, and conduct business. This paper explores the intricate web of connectivity that defines our modern society. From social media platforms to the Internet of Things, this presentation delves into the impact of interconnected technologies on individuals, businesses, and societies globally. Through an in-depth analysis of the benefits, challenges, and future implications of this connected world, we aim to shed light on the opportunities and risks associated with our increasingly interconnected digital landscape. Join us as we navigate through the complexities of the connected world and uncover the potential it holds for shaping our future. The advent of the connected world has ushered in a new era of technological innovation and societal transformation. This paper delves into the myriad opportunities and challenges presented by the interconnectedness facilitated by the digital landscape. It explores the implications of connectivity across various domains including communication, commerce, healthcare, education, and governance. From the proliferation of IoT devices to the rise of artificial intelligence, the paper examines how these advancements are reshaping industries, redefining human interactions, and influencing global dynamics. Additionally, it addresses the ethical, privacy, and security concerns arising from the unprecedented level of connectivity. Through a comprehensive analysis, this paper aims to provide insights into navigating the complexities of the connected world and harnessing its potential for the betterment of society.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DIGITAL FORENSIC

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02117

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02117

  Register Paper ID - 259894

  Title: DIGITAL FORENSIC

  Author Name(s): Dr Balaji K, Rahul P, Naveen Kumar, Sharath U, Nandeep

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 788-791

 Year: May 2024

 Downloads: 102

 Abstract

Crimes committed in electronic or digital spaces, particularly within cyberspace, have become widespread. Criminals utilize technology to carry out their unlawful activities, presenting novel challenges for law enforcement agents, legal practitioners, military personnel, and security specialists. Digital forensics has assumed a critical role in detecting and resolving crimes involving computers and digital assistance. This paper presents a brief overview of digital forensics, offering an introduction to its importance in tackling modern criminal activities.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DIGITAL FORENSIC

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ECTOLIFE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02116

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02116

  Register Paper ID - 259891

  Title: ECTOLIFE

  Author Name(s): Dr Balaji K, Lavanya V, Chandana M, Chethan kumar H V, Arpitha J K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 783-787

 Year: May 2024

 Downloads: 105

 Abstract

EctoLife the world's first artificial womb facility. This concept was designed by biotechnologist Hashem AI-Ghaili, the artificial womb facility is powered by renewable energy.EctoLife is designed to help countries that are suffering from low populations. Ectolife introduces a dynamic fusion of virtual reality (VR), augmented reality (AR), and mixed reality (MR) technologies into our everyday existence. This abstract concept aims to seamlessly integrate digital elements into our physical world, revolutionizing how we interact, learn, work, and entertain. Through ectolife, individuals immerse themselves in virtual environments, interact with digital objects, and engage with virtual entities as if they were part of their physical surroundings. This integration of virtual and real experiences redefines traditional boundaries, offering new avenues for communication, collaboration, and creativity. Beyond personal experiences, ectolife extends its impact across various sectors, including healthcare, gaming, education, and architecture. VR-assisted therapies improve patient rehabilitation, AR gaming enhances interactive entertainment, and MR facilitates real-time design prototyping in architecture.However, as ectolife evolves, it brings forth ethical, social, and existential considerations. Privacy concerns, data security issues, and the potential for over-reliance on virtual experiences raise important questions. Furthermore, the blurring of virtual and physical realities prompts reflection on identity, agency, and the nature of existence. Inconclusion, ectolife signifies a transformative shift, offering exciting possibilities while posing challenges. Embracing ectolife requires a balanced approach that harnesses its potential while addressing associated risks. As ectolife continues to unfold, it promises to reshape human experiences and advance society in unprecedented ways.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Website Blocker Using Python

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02115

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02115

  Register Paper ID - 259888

  Title: WEBSITE BLOCKER USING PYTHON

  Author Name(s): DR.BALAJI K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 778-782

 Year: May 2024

 Downloads: 84

 Abstract

According to the Google Search Statistics, Google processes more than 3.7 billion searches every day, with an average of 40000 searches per second. This illustrates our extreme dependency on the internet for all our daily tasks ranging from complex projects on space science to simplest queries like what is the right way to greet a person in the evening. Our searches are answered through interlinked web pages, known as websites. As of September 2022, there are over 1.98 billion websites available online. Apart from the benefits of having access to huge content and numerous resources on our fingertips, it can also be a great source of distraction and mismanagement of time. Constant online presence of an individual may affect an individual's ability of achieving professional and personal goals. Hence, website blocker is one effective tool that helps an individual take a conscious call on blocking a website. There may be many reasons for blocking a website, which will be discussed in the following sections of the paper. A website blocker, if effectively utilized, can enhance focus, productivity and value of time of an individual and the organization as well. Here, we propose a simple website blocker implementation in Python.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Website Blocker Using Python

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: An Introduction to Artificial Intelligence Tools in Various Domains

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02114

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02114

  Register Paper ID - 259887

  Title: AN INTRODUCTION TO ARTIFICIAL INTELLIGENCE TOOLS IN VARIOUS DOMAINS

  Author Name(s): Dr Balaji K, Naveena kumara K S, Naveen H S, Yashavanth achar, Raghunandan P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 770-777

 Year: May 2024

 Downloads: 98

 Abstract

This research paper introduces Artificial Intelligence tools and uses of the same in various domains. The importance of Artificial Intelligence in enhancing the efficiency and automation to solve complex problems is discussed, along with the various types of artificial intelligence tools available. The paper also covers the use of artificial intelligence in AI in Cyber security, AI in Education, AI in Agriculture, AI in Education, AI Smart cities, AI in Environmental conservation, AI in Sport Analytics. The paper concludes with a summary of the key takeaways and the potential impact of artificial intelligence tools in various domains. The paper aims to provide a comprehensive overview of artificial intelligence tools and to highlight their importance in various fields to develop new approaches in solving complex problems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

An Introduction to Artificial Intelligence Tools in Various Domains

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Cybersecurity using Python

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02113

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02113

  Register Paper ID - 259885

  Title: CYBERSECURITY USING PYTHON

  Author Name(s): Dr.Balaji K, M Shireesha, Aishwarya S, Kavya Shree K V, Gagana Shree M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 765-769

 Year: May 2024

 Downloads: 81

 Abstract

Cybersecurity is known for defending computers, servers, mobile device, electronic system, networks and data from malicious (misusing the insured computer systems). Python has emerged as a versatile and powerful tool in the field of cybersecurity, python is known for versatility offering a wide range of libraries and frameworks for various security task.This abstract involves into the application of python in cybersecurity, focusing on its role in penetration testing, network security, and malware analysis. Python effectiveness in network traffic analysis, intrusion(An Intrusion Detection System (IDS) maintains network traffic looks for unusual activity and alerts when it occurs), log analysis (Log analysis is the process of reviewing, interpreting and understanding computer-generated records called logs.) Enabling security professionals to monitor and defend against malicious activities (misuse of system resources) effectively


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cybersecurity using Python

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Artificial Intelligence in Healthcare

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02112

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02112

  Register Paper ID - 259884

  Title: ARTIFICIAL INTELLIGENCE IN HEALTHCARE

  Author Name(s): Dr.Balaji K, A Ravi Kumar Reddy, Jagan Mohan, Yashwanth Kumar Sai, Nanda

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 759-764

 Year: May 2024

 Downloads: 77

 Abstract

Goal of this systematic search is to offer an description of artificial intelligence's role in healthcare. Artificial intelligence has played a crucial influence in healthcare. A paradigm change in healthcare has take place due to increasing availability of healthcare data and rapid progress of analytics technology. Machine learning technologies such as assist vector machine, deep learning neural networks, and natural language processing manage structured data. Unstructured data is processed using natural language processing.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Artificial Intelligence in Healthcare

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02111

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02111

  Register Paper ID - 259881

  Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE

  Author Name(s): Dr. Balaji K, Mr. Samir Raza, Mr. Ratan J

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 754-758

 Year: May 2024

 Downloads: 93

 Abstract

Natural Language Processing (NLP) is the study of how computers and human languages interact is the focus of the artificial intelligence (AI) field of natural language processing, or NLP. It encompasses a range of techniques and strategies intended to give robots the capacity to understand, interpret, and generate natural language in a way that is beneficial and appropriate for a number of applications. Natural language processing (NLP) has evolved tremendously in recent years thanks to the availability of large datasets, powerful computer power, and sophisticated machine learning models. Natural language, or spoken and written human communication, is extremely difficult because of its complexity, context-dependence, and intrinsic ambiguity. By creating models and algorithms that are capable of analyzing and interpreting natural language data, natural language processing (NLP) aims to close the understanding gap between human language and computers. NLP's main objective is to provide computers the ability to do language-related activities including comprehending text, coming up with logical answers, extracting data, and communicating between languages. To accomplish these goals, NLP incorporates concepts from multiple academic fields, including as statistics, computational science, machine learning, and linguistics.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NEURAL NETWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02110

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02110

  Register Paper ID - 259880

  Title: NEURAL NETWORK

  Author Name(s): Dr.Balaji K, Vinil Monteiro, Tarun G, Tarun Kulakarni, Santosh Maddi, Syed Kaif

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 750-753

 Year: May 2024

 Downloads: 64

 Abstract

Neural networks, also known as artificial neural networks (ANNs) or simply neural networks, are a subset of machine learning that form the foundation of deep learning techniques. Which was inspired by the structure and function of the human brain, mimicking the way real neurons communicate. ANNs are composed of many interconnected basic processors, functioning in parallel. This paper explores artificial neural networks and their basic types, outlining the fundamental neuron and the artificial computer model. It discusses network structures, learning methods, and some of the most commonly used ANNs..


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NEURAL NETWORK

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02109

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02109

  Register Paper ID - 259878

  Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS

  Author Name(s): DR.BALAJI, Madhu suharika, Gouri Rangabhatt Joshi, Jameema Joy.S, Aishwarya S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 743-749

 Year: May 2024

 Downloads: 74

 Abstract

The project aims to implement two popular searching algorithms that is Depth-First-Search (DFS) and the Breadth-First-Search (BFS) in a web-based application using JSP and Spring Tool Suite. The user is presented with a form where they can input the starting and ending nodes, as well as choose between the BFS and DFS algorithms. When the user submits the form, a Java file takes the form data and saves it to another JSP file called register. If the selected algorithm is DFS, the Java code for DFS is executed, and likewise for BFS. While the code is running, the user is shown a progress indicator to let them know that the algorithm is processing. Once the algorithm has finished running, the user is directed to a results page where they can view the nodes explored and the path found. The results are displayed in an easy-to-read format, such as a table or list. The project also handles errors, such as when the user inputs a non-existent node, and alerts the user if no path was found. Overall, this project offers a convenient and user-friendly way for users to explore and search graphs using BFS and DFS algorithms. It showcases the use of JSP, Spring Tool Suite, and Java to create a web-based application that can handle complex data structures and algorithms


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BFS, JSP, SpringBoot. I.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02108

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02108

  Register Paper ID - 259877

  Title: PLAGIARISM CHECKER AND CLASSIFICATION OF FILES ON CLOUD USING SMART CLOUD

  Author Name(s): Dr.Balaji K, Divya .M, Krupa.B, Gouri.G, Arpita.P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 739-742

 Year: May 2024

 Downloads: 82

 Abstract

This study suggests a method to address the cloud duplication problem. The restricted amount of data storage that these service providers can offer is only partially utilized by the abundance of redundant and useless data on the internet. Inadequate cloud efficiency might result in far greater costs for service providers than anticipated. The fact that the data is kept on a server that may be located kilometres distant from the user presents another problem. This raises the price and efficiency even further. A smart cloud can assist with resolving these problems. By calculating the ratio between the proportions of two vectors, we can assign a categorization rating to the document.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ROBOTIC EVOLUTION IN MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02107

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02107

  Register Paper ID - 259875

  Title: ROBOTIC EVOLUTION IN MACHINE LEARNING

  Author Name(s): Dr.Balaji K, Inav Sultan, Subhalaxmi Dora, Harish S J, Harshith S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 734-738

 Year: May 2024

 Downloads: 77

 Abstract

The integration of robotics and machine learning has revolutionized the field of automation, enabling robots to perform complex tasks with unprecedented levels of autonomy and adaptability. This paper provides an in-depth exploration of the evolution of robotics in machine learning, tracing its historical development, current state, and future trends. We begin by examining the early developments in robotics, highlighting the limitations of pre-programmed robots and the need for more adaptive and intelligent systems. We then discuss the emergence of machine learning algorithms and their integration into robotic systems, leading to the development of robots capable of learning from data and improving their performance over time. The paper also explores the current state of robotics in machine learning, focusing on key technologies such as deep learning, reinforcement learning, and computer vision. We discuss how these technologies are being used to enhance robotic capabilities in various domains, including manufacturing, healthcare, and autonomous vehicles. Challenges and opportunities in integrating machine learning with robotics are also addressed. Technical challenges, such as the need for robust and efficient algorithms, as well as ethical and social implications, such as the impact of intelligent robots on the workforce, are discussed.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ROBOTIC EVOLUTION IN MACHINE LEARNING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Prevention of Vulnerable Virtual Machines against DDOS Attacks in the Cloud

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02106

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02106

  Register Paper ID - 259873

  Title: PREVENTION OF VULNERABLE VIRTUAL MACHINES AGAINST DDOS ATTACKS IN THE CLOUD

  Author Name(s): Dr.Balaji K, Tanushree M, Pavan Kalyan, Manik Rahul, Rohit

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 729-733

 Year: May 2024

 Downloads: 90

 Abstract

One of the biggest issues that has drawn a lot of research and development attention in recent years is cloud security. Notably, assailants will investigate exploits in a cloud system and infiltrate virtual machines to release more extensive Distributed Denial-of-Service attacks (DDoS). Early-stage tactics including multi-step exploitation, low-frequency vulnerability scanning, and turning found susceptible virtual machines into zombies are sometimes used in DDoS assaults. Finally, DDoS attacks are launched using the zombies that have been infected. When it comes to cloud systems, especially Infrastructure-as-a-Service (IaaS) clouds, zombie exploration attack detection is truly problematic. This might occur from cloud customers installing susceptible software on their virtual computers.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Attack graph model, NICE, distributed denial of service attack, cloud security, and cloud attacks

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 7 | Month- July 2024)

Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer