IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: ARABIC LANGUAGE THROUGHOUT THE AGES AND ITS CONTRIBUTION TO PROTECT HERITAGE OF WORLD KNOWLEDGE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6113
Register Paper ID - 212244
Title: ARABIC LANGUAGE THROUGHOUT THE AGES AND ITS CONTRIBUTION TO PROTECT HERITAGE OF WORLD KNOWLEDGE
Author Name(s): Dr. Ali Raza
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k272-k276
Year: May 2021
Downloads: 1681
ARABIC LANGUAGE THROUGHOUT THE AGES AND ITS CONTRIBUTION TO PROTECT HERITAGE OF WORLD KNOWLEDGE
Licence: creative commons attribution 4.0
ARABIC LANGUAGE THROUGHOUT THE AGES AND ITS CONTRIBUTION TO PROTECT HERITAGE OF WORLD KNOWLEDGE
Paper Title: A PRACTICAL ATTRIBUTE BASED DOCUMENT COLLECTION HIERARCHICAL ENCRYPTION SCHEME IN CLOUD COMPUTING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6112
Register Paper ID - 211121
Title: A PRACTICAL ATTRIBUTE BASED DOCUMENT COLLECTION HIERARCHICAL ENCRYPTION SCHEME IN CLOUD COMPUTING
Author Name(s): VEGESNA PAVITHRA, K.VENKATESH
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k260-k271
Year: May 2021
Downloads: 1749
Licence: creative commons attribution 4.0
Ciphertext-Policy Attribute-Based Hierarchical, Certificate Authority, Encryption, Cloud Computing.
Paper Title: PASSWORD AUTHENTICATION BASED ON CUEPOINTS OF IMAGES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6111
Register Paper ID - 211079
Title: PASSWORD AUTHENTICATION BASED ON CUEPOINTS OF IMAGES
Author Name(s): MYLABATHULA RATNA VIVEKA, A. DURGA DEVI
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k249-k259
Year: May 2021
Downloads: 1741
Click Cued points are a click-based graphical password scheme, a cued-recall graphical password technique. User click on one point per image for a sequence of images. The next image is based on the previous click point. Users preferred CCP to pass point, Saying that selecting and remembering only one point per image was easier, and that seeing each image triggered in their memory of where the corresponding point was located. CCP also provides greater security than pass Points because the number of images increases the workload for attackers.
Licence: creative commons attribution 4.0
PASSWORD AUTHENTICATION BASED ON CUEPOINTS OF IMAGES
Paper Title: REAL TIME PROJECT TRACKING AND MONITORING SYSTEM USING DATA MINING TECHNIQUES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6110
Register Paper ID - 210963
Title: REAL TIME PROJECT TRACKING AND MONITORING SYSTEM USING DATA MINING TECHNIQUES
Author Name(s): MALLULA DURGA SRIDEVI, A.DURGA DEVI
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k237-k248
Year: May 2021
Downloads: 1708
In the current days the software companies and their branches are located in different geographical places over the world. There is a high demand for the teams that they need to communicate with each other from any place to any place to synchronize their tasks. So there is a need to provide the industry to have the automated project tracking system and fast reliable messaging system. The project entitled " PROJECT TRACKING SYSTEM AND MONITORING SYSTEM USING DATA MINING TECHNIQUES " is a web application and can be accessed through internet. The main idea of this application is to provide help for anyone to interact with anyone, mainly in software industry by sending messages, receiving messages, open discussion forums to share their knowledge and updating their tasks with current information. This system allows group of team members around the world to communicate with each other. The application is for free of use expect the users has to sign with his/her details.
Licence: creative commons attribution 4.0
Project Tracking, Monitoring ,Data Mining
Paper Title: NORMALIZATION OF DUPLICATE RECORDS FROM MULTIPLE SOURCES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6109
Register Paper ID - 211075
Title: NORMALIZATION OF DUPLICATE RECORDS FROM MULTIPLE SOURCES
Author Name(s): KARRI THANUSHA DEVI, V.SARALA
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k224-k236
Year: May 2021
Downloads: 1659
Data consolidation is a challenging issue in data integration. The usefulness of data increases when it is linked and fused with other data from numerous (Web) sources. The promise of Big Data depends upon addressing several big data integration challenges while linking large amount of data into single file. There must be a lot of work for this data consolidation to achieve the normalized data. We refer to this task as record normalization. Such a record representation, coined normalized record, is important for both front-end and back-end applications. In this proposed application, we mainly try to normalize the records and try to find out the duplicate record attributes and then try to normalize that duplicate files while are present in database. We conducted extensive empirical studies with all the proposed methods. We indicate the weaknesses and strengths of each of them and recommend the ones to be used in practice.
Licence: creative commons attribution 4.0
NORMALIZATION OF DUPLICATE RECORDS FROM MULTIPLE SOURCES
Paper Title: DYNAMIC ROUTING FOR DATA INTEGRITY IN WIRELESS SENSOR NETWORKS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6108
Register Paper ID - 211067
Title: DYNAMIC ROUTING FOR DATA INTEGRITY IN WIRELESS SENSOR NETWORKS
Author Name(s): CHEDALAVADA MICHAEL JOSEPH RAJA, K.RAMBABU
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k212-k223
Year: May 2021
Downloads: 1571
Security has become one of the major issues for data communication over wired and wireless networks. Different from the past work on the designs of cryptography algorithms and system infrastructures, a dynamic routing algorithm that could randomize delivery paths for data transmission. The algorithm is easy to implement and compatible with popular routing protocols, such as the Routing Information Protocol in wired networks without introducing extra control messages. An analytic study on the proposed algorithm is presented, and a series of simulation experiments are conducted to verify the analytic results and to show the capability of the proposed algorithm.
Licence: creative commons attribution 4.0
DYNAMIC ROUTING FOR DATA INTEGRITY IN WIRELESS SENSOR NETWORKS
Paper Title: A NOVEL METHOD TO PROTECT THE PRIVACY OF CLOUD DATA USING SMARTCARD AUTHENTICATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6107
Register Paper ID - 211071
Title: A NOVEL METHOD TO PROTECT THE PRIVACY OF CLOUD DATA USING SMARTCARD AUTHENTICATION
Author Name(s): BONDA DIVIYA PRASANTHI, K.RAMBABU
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k200-k211
Year: May 2021
Downloads: 1603
In current days cloud computing is providing great flexibility for the end- users to store and access a lot of valuable information to and from remote servers. As we all know that data is uploaded into the cloud is outsourced to a third party untrusted remote server, privacy for that data is almost a big problem for the enterprises. Hence in this current project, we try to add a new level of security for the cloud data by adding biometric authentication techniques like fingerprint images and then verify the user authentication based on the biometric images. Here we try to design a mutual authentication scheme based on a smartcard for cloud computing to avoid the illegal data access by unauthorized users and in which this will be divided into two phases for providing security.
Licence: creative commons attribution 4.0
Cloud Computing, Smart Card Authentication, Encryption, Decryption
Paper Title: CHARON: A NOVEL PROTOCOL FOR SECURE DATA STORAGE AND SHARING IN CLOUD -OF- CLOUD ENVIRONMENT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6106
Register Paper ID - 210967
Title: CHARON: A NOVEL PROTOCOL FOR SECURE DATA STORAGE AND SHARING IN CLOUD -OF- CLOUD ENVIRONMENT
Author Name(s): NAMGEDDA SIREESHA, L. SOWJANYA
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k186-k199
Year: May 2021
Downloads: 1583
Licence: creative commons attribution 4.0
CHARON: A NOVEL PROTOCOL FOR SECURE DATA STORAGE AND SHARING IN CLOUD -OF- CLOUD ENVIRONMENT
Paper Title: MARINE OPERATIONS AND MANAGEMENT SYSTEM IN JETTY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6105
Register Paper ID - 210973
Title: MARINE OPERATIONS AND MANAGEMENT SYSTEM IN JETTY
Author Name(s): KARANAM PRABHU KIRAN, B.SURYANARAYANA MURTHY
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k174-k185
Year: May 2021
Downloads: 1681
Licence: creative commons attribution 4.0
MARINE OPERATIONS AND MANAGEMENT SYSTEM IN JETTY
Paper Title: G-CLOUD : SECURE FRAMEWORK FOR GOVERNMENT HEALTH CARE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6104
Register Paper ID - 211005
Title: G-CLOUD : SECURE FRAMEWORK FOR GOVERNMENT HEALTH CARE
Author Name(s): SAYYAD ARIFA, K.VENKATESH
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k162-k173
Year: May 2021
Downloads: 1584
Now a days cloud computing is increasing its attention towards data storage and accessing from several users range from small scale companies to large scale companies.As we have witnessed in the healthcare sector, there is a great demand for cloud in order to store and access the documents for end users.But current cloud servers in government health care services are not providing complete security and flexibility. In this project, we propose a flexible, secure, cost effective, and privacy- preserved cloud-based framework for the healthcare environment. We propose a secure and efficient framework for the government EHR system, in access control can be afforded based on multi-authority attribute-based encryption (MABE), together with a hierarchical structure, to enforce access control policies.
Licence: creative commons attribution 4.0
G-CLOUD : SECURE FRAMEWORK FOR GOVERNMENT HEALTH CARE
Paper Title: EXPLORING THE ONTOLOGY OF THE PERCEPTUAL OBJECT: A PRELIMINARY CONVERSATION BETWEEN DHARMAKIRTI AND RUSSELL
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6103
Register Paper ID - 210584
Title: EXPLORING THE ONTOLOGY OF THE PERCEPTUAL OBJECT: A PRELIMINARY CONVERSATION BETWEEN DHARMAKIRTI AND RUSSELL
Author Name(s): Devasia Muruppath Antony
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k158-k161
Year: May 2021
Downloads: 1326
Licence: creative commons attribution 4.0
Ontology, Perceptual Object, Dharmakirti, Svalakshana, Kalpana, Buddhism, Russell, Neutral Monism, Idealism, Materialism, Analytic Philosophy
Paper Title: A STUDY ON THE AWARENESS AND E-LEARNING EXPERIENCES AMONG PG STUDENTS ON SWAYAM PORTAL
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6102
Register Paper ID - 210417
Title: A STUDY ON THE AWARENESS AND E-LEARNING EXPERIENCES AMONG PG STUDENTS ON SWAYAM PORTAL
Author Name(s): Dr.Kanakappa Pujar
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k153-k157
Year: May 2021
Downloads: 1355
Massive Open Online Courses (MOOCs) are the key drivers of technological innovations in online teaching in education in India. Ministry of Human Resource Development has launched the indigenous MOOC platform SWAYAM (Study Webs of Active-Learning for Young Aspiring Minds). The introduction of SWAYAM courses is to provide easy access, equity, and quality education to all. The success of the SWAYAM portal depends on awareness about this portal among the pupils and its scope in enhancing lifelong learning skills. This study is intended to discover awareness and learning experiences of e-learning on the SWAYAM among PG students of Rani Channamma University, Belagavi, and factors influencing the utilization of SWAYAM/ MOOCs by students. The students only who have been enrolled in SWAYAM courses are considered for the study. The study reveals that there is high awareness onthe SWAYAM/MOOCs among students. Very few students have enrolled in courses in different subjects. The study concluded that there is a need to encourage students to adopt MOOCs as a learning resource. This will need a collaborative effort between Faculty, University Departments, and also Academicians. There is a need for Industry, Academic Institutions to promote the acceptability of certification provided by SWAYAM in the job market.
Licence: creative commons attribution 4.0
MOOCs, SWAYAM, ICT skills, e-learning,
Paper Title: A STUDY ON CULTURAL AND HERITAGE TOURISM OF INDIA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6101
Register Paper ID - 208250
Title: A STUDY ON CULTURAL AND HERITAGE TOURISM OF INDIA
Author Name(s): Ashwini S
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k149-k152
Year: May-2021
Downloads: 2164
Licence: creative commons attribution 4.0
Cultural Tourism, Tangible, Intangible, Heritage Tourism, Employment, Preserve, Income, Market Segment, Blend, Uniqueness, Future Generations, Assets
Paper Title: ISOLATION, CHARACTERIZATION OF GIBBERELLIC ACID PRODUCING RHIZOACTERIA FROM VARIOUS PLANT ROOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6100
Register Paper ID - 207865
Title: ISOLATION, CHARACTERIZATION OF GIBBERELLIC ACID PRODUCING RHIZOACTERIA FROM VARIOUS PLANT ROOT
Author Name(s): Aparna Ashok Bhairappa, Vishal Nannavare
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k143-k148
Year: May 2021
Downloads: 2068
Gibberellic acid (GA3) considered as one of the important plant hormone in growth and development of plant. It has wide applications in agriculture area as well as in horticulture. Bacteria have symbiotic association with plant thus they utilize atmospheric nitrogen and help plant for growth .one of the important metabolite known as gibberellic acid synthesised by bacteria utilized by plant for their growth and development. This study aims at isolation of gibberelic acid producing bacteria and its characterization .Total 25 isolates were isolated from rhizospheric soil of various local plants such as Rice, sugarcane, jowari, mug bean from agricultural field of solapur area .these isolates were screened for gibberellic acid production in artificial nutrient media and analysed by spectrophotometric method. Among these isolates RR5 ( Rice Rizobacteria ) and SR2 (Sugar Rhizobacteria) produce gibberellic acid in high amount as compare to other isolates and thus used for further study. The filtrate was bio assayed on wheat plant and show significant growth after treatment with organic solution of rhizobacterial filtrate.
Licence: creative commons attribution 4.0
- isolation, gibberellic acid producing, rhizobacteria, separating, chromatography
Paper Title: TECHNIQUES FOR EXTRACTION OF ESSENTIAL OIL FROM ORANGE PEELS: A REVIEW
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6099
Register Paper ID - 207899
Title: TECHNIQUES FOR EXTRACTION OF ESSENTIAL OIL FROM ORANGE PEELS: A REVIEW
Author Name(s): Nikhil S Patil, Sailee M Dongare, Girish K Magare, Nitin T Satao
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k134-k142
Year: May 2021
Downloads: 1976
Background: In recent years, variety of Extraction techniques has been introduced for the recovery of organic compounds. Pure essential oils are derived from various part of the plants and fruits. These essential oils have a very high commercial value due to its properties. They are widely used in the various fields of industries, such as perfumery industries and pharmaceuticals. The essential oils for are primarily used in the perfumery industry and have a very high commercial value due to its therapeutic properties. Objective: To study the techniques available to extract the essential oils from Orange peels and study the efficiency and the selectivity for this techniques. Results: The essential oils of the plant are composed of heat-sensitive chemical compounds, the use of steam distillation and Microwave-assisted extraction (MAE) techniques would inevitably inflict thermal degradation to the natural fragrance. In this experimental work, solvent extraction method was employed due to its mild extracting condition and lower operating cost. Ethanol was used as the solvent due to its high availability in the market. The extract compositions were compared using UV analysis. Conclusion: Extraction of essential oils out by different techniques and Innovative methods avoid shortcomings of content optional techniques friendly to environmental to avoid chemical risk, extraction time, consumption the solvents and obtain yield quality of essential oils.
Licence: creative commons attribution 4.0
Essential oil; Extraction method;Conventional methods; Non-Traditional extraction________________________________________
Paper Title: STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON EMPLOYEE MOTIVATION IN A STEEL AND INDUSTRIAL FORGINGS COMPANY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6098
Register Paper ID - 208172
Title: STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON EMPLOYEE MOTIVATION IN A STEEL AND INDUSTRIAL FORGINGS COMPANY
Author Name(s): Anoop Gurunathan A
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k121-k133
Year: May 2021
Downloads: 1785
Licence: creative commons attribution 4.0
organizational culture, employee motivation, leadership style, organizational climate
Paper Title: POST-COVID MUCORMYCOSIS: A PARALLEL PANDEMIC
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6097
Register Paper ID - 207846
Title: POST-COVID MUCORMYCOSIS: A PARALLEL PANDEMIC
Author Name(s): Dr. Shrikant Joshi, Dr.Anjali Upadhye, Dr.Sarika Kandharkar
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k109-k120
Year: May 2021
Downloads: 1518
Licence: creative commons attribution 4.0
mucormycosis, Post COVID symptoms, fungus
Paper Title: POWER THEFT IDENTIFICATION SYSTEM USING IOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6096
Register Paper ID - 207984
Title: POWER THEFT IDENTIFICATION SYSTEM USING IOT
Author Name(s): K.Sameera Banu, Jeejabai.SJ, K.Divyashree, Priyanka M Joshi, Sarvar Begum
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k100-k108
Year: May 2021
Downloads: 1589
Power theft can be a challenging question in electrical power networks that cause huge economic losses and lead in an unreliable provision of power. Power steals are also briefly defined as electricity consumption without the awareness of the supplier. It's been India's biggest challenge, and it's a crime. Overall, India has the largest losses of about $16.2 billion. Power theft can take place in several ways, one of which is that authorized members either rob power by transferring the meter. And several other forms, that is, linking across the meter to a live cable on the client side of the meter or tampering with the device to make the meter read less or less consumable. In proposed system, the arduino uno continously calculates the consumed currents of each and every load and compare the actual current rating of the transformer and if any abnormal condition detected, then an arduino will update the data on the web and it will send the message to the authorized person and also gives the alert.
Licence: creative commons attribution 4.0
Arduino Uno, LCD Display, Current transformers, GPRS/GSM Modem, Bridge rectifier, Capacitor,Voltage Regulator, Power supply and Buzzer.
Paper Title: A NOVEL METHOD FOR MUTUAL AUTHENTICATION IN CLOUD COMPUTING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6095
Register Paper ID - 207983
Title: A NOVEL METHOD FOR MUTUAL AUTHENTICATION IN CLOUD COMPUTING
Author Name(s): Gangamma Hediyalad, Pooja H, Azizkhan F Pathan, Dr. Chetana Prakash
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k94-k99
Year: May 2021
Downloads: 1548
Cloud computing is the fastest emergent internet centered technology for sharing computer resources on an as-needed base. In the cloud, security is really important. We propose a mutual authentication mechanism for cloud users and the cloud. In a cloud context, the framework also manages session keys. The mutual authentication process in this approach is split into three phases: server initialization, registration and authentication. The framework's security has been thoroughly examined in order to confirm its effectiveness. The proposed system is also immune to a variety of cloud computing assaults.
Licence: creative commons attribution 4.0
Cloud Computing, Authentication, Security.
Paper Title: RAJASTHANI MINIATURE PAINTING: A LITERATURE REVIEW
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT21A6094
Register Paper ID - 207950
Title: RAJASTHANI MINIATURE PAINTING: A LITERATURE REVIEW
Author Name(s): Manju Jain
Publisher Journal name: IJCRT
Volume: 9
Issue: 5
Pages: k86-k93
Year: May 2021
Downloads: 1603
Indian art is one of the world's best artistic practices. Miniature's History of Indian Art has been planned as a project that will consider all relevant research evidence and match the most scholarly work in its sources but will melt the content into a fluent and entertaining narrative, with the images expressed in it still being the different visions of beauty in the tradition. We concentrated on and presented appropriate information about miniature painting based on surveyed findings from the 15th to 17th centuries by visiting various painting schools, previous related records, and analyzing the data in aspects of this work, some of which are based on Mughal and Mewar Painting. In this paper, we present the findings of a survey on Rajasthan Miniature Art.
Licence: creative commons attribution 4.0
Miniature, Paintings, Rajput art, Indian art, Mughal paintings, Mewar paintings
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 13 | Issue 11 | Month- November 2025)

