Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 12 | Issue 5

Volume 12 | Issue 5 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: "HELPING HAND DONATION SYSTEM"

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02059

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02059

  Register Paper ID - 261066

  Title: "HELPING HAND DONATION SYSTEM"

  Author Name(s): Prof. Shital Jade, Ms. Sakshi Babar, Ms. Gayatri Sanap, Ms. Sakshi Pande

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 294-299

 Year: May 2024

 Downloads: 20

 Abstract

Facilitating charitable contributions has always been a challenge, but the Helping Hand Donation System Application offers an efficient answer. This innovative mobile software makes it simple and convenient for people to practice generosity. The application's user-centric design allows contributors to securely make provides with a few clicks while also exploring a variety of charity causes, organizations, and campaigns. A revolutionary project, the Helping Hand Donation System aims to improve and simplify the act of making charitable contributions. With an emphasis on effect, simplicity, and openness, our system offers contributors a smooth way to make contributions to different organizations and causes. Donors can simply make one-time or ongoing contributions with ease through user-friendly interfaces and safe payment choices, all while knowing that their contributions are actually improving the lives of others. Because actual time accounting and monitoring systems allow contributors to see the immediate results of their contributions, they promote openness and responsibility. Furthermore, social media sharing features empower contributors to motivate others and magnify their influence, establishing a community of empathy and solidarity. The Helping Hand Donation System utilizes technology to enable significant relationships between donors and beneficiaries, with an aim of enabling people to make an impact on the world.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Donation, Charitable Organization, Donors, Beneficiary, Android

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Healthcare Chatbot on Hospital Management System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02058

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02058

  Register Paper ID - 261067

  Title: HEALTHCARE CHATBOT ON HOSPITAL MANAGEMENT SYSTEM

  Author Name(s): Sopan Kshirsagar, Yashraj Patel, Minal Pawar, Pratik Pawar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 290-293

 Year: May 2024

 Downloads: 26

 Abstract

A ground-breaking project that has the potential to completely transform the way healthcare is provided in hospital settings is the Healthcare Chatbot for Hospital Management System, which makes use of the Dialogflow Framework. By utilizing the state-of-the-art natural language processing features built into the Dialogflow framework, this creative chatbot acts as a clever intermediary that significantly improves the effectiveness, accessibility, and efficiency of hospital administration systems. This chatbot is essentially a shining example of technology progress, blending in seamlessly with medical infrastructures already in place to maximize a multitude of crucial features. This intuitive interface redefines administrative efficiency by easing the complex dance of appointment scheduling, rescheduling, and cancellations as well as coordinating the symphony of patient flow management. With the help of this revolutionary technology, patients--the beating heart of every healthcare system--are given unprecedented empowerment. All things considered, the Healthcare Chatbot for Hospital Management System is not only an incredible technological achievement, but also a sign of optimism and advancement for the medical field. It is proof of the boundless potential of human intellect and is driving a paradigm shift toward a day when healthcare will not only be widely available but also really transformational. For patients, doctors, and communities alike, the chatbot opens the door to a better, healthier future with every contact, question, and answer it receives.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

natural language processing, healthcare, chatbots, dialogflow, and hospital management systems

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Hand gesture Based Virtual Mouse using Machine learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02057

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02057

  Register Paper ID - 261068

  Title: HAND GESTURE BASED VIRTUAL MOUSE USING MACHINE LEARNING

  Author Name(s): Neha Bhagwat, Mansi Dusane, Moinoddin Inamdar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 283-289

 Year: May 2024

 Downloads: 30

 Abstract

This paper suggests a new method for controlling the cursor that uses hand movements that can be easily recorded by a regular webcam in place of the conventional mouse. This facilitates a hands-free user experience by doing away with the requirement for a physical device. The technology makes use of the webcam's capabilities to track hands accurately. It does more than just mimic hand gestures, though. Certain hand movements will be created for different functions, like dragging and left and right clicks. This allows users to use the cursor and its functionalities in a natural and simple way. For the system to be implemented as described, Python and OpenCV are required. These models, which mimic the swaying motion of human hand movements, have the potential to greatly improve the usability of such computer vision solutions. The world of technology nowadays is always changing due to the abundance of technologies. One such intriguing idea is the human-machine interface. The idea basic this is called signal acknowledgment, which is a technique for reproducing mouse functionalities on a screen without the requirement for any equipment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Gesture Control Virtual Mouse, Virtual Mouse, Hand Gestures, OpenCV

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GourmetGuide: Implementing Real-Time Recommendation Systems for Contextually-Aware Dining Experiences

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02056

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02056

  Register Paper ID - 261069

  Title: GOURMETGUIDE: IMPLEMENTING REAL-TIME RECOMMENDATION SYSTEMS FOR CONTEXTUALLY-AWARE DINING EXPERIENCES

  Author Name(s): Arjun Haghwane, Vinay Ippili, Mithilesh Jogale, Prof. Smita Thube

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 277-282

 Year: May 2024

 Downloads: 29

 Abstract

In the present carefully interconnected world, recommendation systems have become basic devices for directing clients to customized content and administrations. This paper presents an original proposal system that coordinates planning innovation to propose custom fitted ideas in view of client inclinations and geographic setting. By joining the force of suggestion calculations with constant area information recovered from planning APIs, our system conveys dynamic proposals that adjust to clients' ongoing environmental elements. The system uses AI strategies to investigate client requirements, authentic area information, and context-oriented data to produce pertinent and convenient ideas. Through this mix of proposal system with planning innovation, we mean to change the manner in which clients find and investigate new spots and encounters in their environmental elements.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Recommendation, Machine Learning, Reviews, Natural Language Processing, APIs.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Finding Purchase Intentions using Social Media Implementation

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02055

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02055

  Register Paper ID - 261076

  Title: FINDING PURCHASE INTENTIONS USING SOCIAL MEDIA IMPLEMENTATION

  Author Name(s): Prof. Sonu Khapekar, Rokade Jayesh, Shaikh Irfan, Patil Vaishnavi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 271-276

 Year: May 2024

 Downloads: 30

 Abstract

Recently, there has been a significant increase in the ecommerce industry, specifically in people purchasing goods online. A lot of research has been conducted to determine a user's purchasing patterns and, more importantly, the factors that determine whether or not the user will purchase the product. In this study, we will investigate whether it is possible to identify and predict a user's purchase intention for a product, and then target that user with a personalized advertisement or deal. Furthermore, we hope to create software that will assist businesses in identifying potential customers for their products by estimating their purchase intention in measurable terms based on their tweets and user profiles on Twitter. We have discovered that it is possible to predict whether or not a user has expressed a desire to buy a product after applying various text analytical models to tweet data. Additionally, our analysis has shown that the majority of users who had initially expressed a desire to buy the product have also purchased it.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Natural Language Processing, Product, Purchase Intention, Tweets, Twitter

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AI-Powered Inventory Management System: IntelliStock

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02054

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02054

  Register Paper ID - 261077

  Title: AI-POWERED INVENTORY MANAGEMENT SYSTEM: INTELLISTOCK

  Author Name(s): Pritam Ahire, Adarsh Biju Nair, Prathamesh Sandeep Nalawade, Nishant Vinod Patil

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 267-270

 Year: May 2024

 Downloads: 33

 Abstract

IntelliStock is an intelligent assistant designed to help store managers manage inventory efficiently. By leveraging natural language processing, IntelliStock can provide store managers with real-time inventory updates, track product movements, and generate insights for better inventory. With the ability to understand and answer questions in natural language, IntelliStock streamlines the inventory management process, allowing store managers to make quick decisions. This case study explores the development and implementation of IntelliStock and highlights its benefits for businesses looking to improve their inventory management processes.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Generative AI, Natural Language Processing, Inventory Management System, SQL, Case Study

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Facial Emotion Detection Using Machine Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02053

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02053

  Register Paper ID - 261080

  Title: FACIAL EMOTION DETECTION USING MACHINE LEARNING

  Author Name(s): Prof. Sopan Kshirsagar, Harshad Shinde, Salman Shikalgar, Ruturaj Raut

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 263-266

 Year: May 2024

 Downloads: 21

 Abstract

Looks assume an imperative part in human correspondence as they act as a window to our emotions. The project focuses on the creation of an emotion identification system in real time capable of documenting a wide range of human moods. To achieve this, a combination of machine learning and deep learning algorithms is leveraged to create various models. The centre of this venture lies in the improvement of use programming, which uses strong Python bundles. Key libraries like Keras, OpenCV, and Matplotlib are tackled to make an ongoing feeling acknowledgment framework By training these models, the system becomes adept at detecting diverse human emotions, creating it a flexible device that can be carried out across different stages. At its heart, this venture is an investigation of the capabilities of profound learning and AI to precisely recognize and archive human feelings continuously, subsequently upgrading relational correspondence.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Facial Emotion detection, Deep learning, Knowledge graphs, Machine learning, Mental health, Early detection, Data integration, Real-time sensing, Image processing

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Exploring the relationship between facial expressions and music preferences

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02052

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02052

  Register Paper ID - 261082

  Title: EXPLORING THE RELATIONSHIP BETWEEN FACIAL EXPRESSIONS AND MUSIC PREFERENCES

  Author Name(s): Prof. Renuka Kajale, Ayushi Kale, Asawari Khairnar, Vaishnavi Mavale

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 259-262

 Year: May 2024

 Downloads: 34

 Abstract

This research project aims to investigate the intricate relationship between facial expressions and music preferences. Music has a profound impact on human emotions and behavior, often evoking a wide range of feelings such as happiness, sadness, excitement, and relaxation. Similarly, facial expressions serve as a primary means of nonverbal communication, reflecting one's emotional state and reactions to external stimuli. By examining how facial expressions correlate with individuals' preferences for different genres, styles, and specific pieces of music, this study seeks to uncover underlying patterns and mechanisms governing the emotional response to music. The methodology involves collecting data through surveys and experimental sessions where participants listen to various musical pieces while their facial expressions are recorded using facial recognition technology. Participants will be asked to rate their emotional response to each piece of music, providing insights into their subjective preferences. Additionally, demographic information such as age, gender, cultural background, and musical background will be gathered to explore potential correlations with music preferences and facial expressions. The findings of this research could have implications for various domains including psychology, neuroscience, marketing, and entertainment. Understanding how facial expressions and music preferences interact can inform the design of personalized music recommendations, therapeutic interventions for mood disorders, and the creation of more emotionally engaging multimedia content.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Music, Expression, Emotion, Multimedia

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Exploring Adversarial Attacks and Defenses on Machine Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02051

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02051

  Register Paper ID - 261083

  Title: EXPLORING ADVERSARIAL ATTACKS AND DEFENSES ON MACHINE LEARNING

  Author Name(s): Prof. Shital Jade, Vipul Chaudhari, Aditya Kadam, Janhavi Chaudhari

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 252-258

 Year: May 2024

 Downloads: 27

 Abstract

Machine learning (ML) algorithms have demonstrated remarkable success across various domains, revolutionizing industries and enabling advancements in artificial intelligence (AI). However, the increasing deployment of ML models in critical applications has attracted attention to their vulnerability to adversarial attacks. These attacks exploit weaknesses in ML models to manipulate their behavior, posing significant threats to their reliability, security, and trustworthiness. In this study, we delve into the landscape of adversarial attacks and defenses in machine learning, aiming to understand the underlying mechanisms, assess the effectiveness of existing defense strategies, and propose novel approaches to enhance model robustness. We survey the diverse range of attack methodologies, including gradient-based methods, evolutionary algorithms, and physical-world attacks, that adversaries employ to undermine ML systems. Furthermore, we investigate state-of-the-art defense mechanisms designed to mitigate the impact of adversarial attacks, such as adversarial training, input preprocessing, and model regularization. By analyzing the strengths and limitations of these defense techniques, we identify opportunities for improvement and explore interdisciplinary insights from fields like cybersecurity, cognitive psychology, and game theory. Through empirical evaluations on benchmark datasets and real-world applications, we aim to provide comprehensive insights into the dynamic interplay between attacks and defenses in machine learning. Our findings contribute to advancing the understanding of adversarial phenomena in ML and guiding the development of resilient AI systems capable of withstanding adversarial challenges in diverse operational environments.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Machine Learning, Adversarial Attacks, Defense Mechanisms, Robustness Security, Adversarial Examples, Gradient-based Method, Adversarial Training Model Robustness.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Enhancing Timetable Generation Through Machine Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02050

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02050

  Register Paper ID - 261084

  Title: ENHANCING TIMETABLE GENERATION THROUGH MACHINE LEARNING

  Author Name(s): Prof.Rupali Kaldoke, Gagan Matkar, Gaurav Bhalerao, Prasad Adhav

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 247-251

 Year: May 2024

 Downloads: 36

 Abstract

The process of manually creating timetables in colleges with a large number of students is very time-consuming and often results in scheduling conflicts, with classes clashing in timing or room, or teachers having more than one class simultaneously. This manual workflow leads to many system issues and restrictions. The organization cannot meet its needs in a timely manner and the outcomes may also lack accuracy, mainly due to common human errors that are difficult to prevent in such processes. To resolve these issues, we propose developing an automated system. The Automatic Timetable Generator system would take various inputs such as faculty, student, subject details, and based on these inputs, generate a feasible timetable that optimally utilizes all resources to best fit the specified constraints or college policies. The Adaptive Timetable Generator system is an automated system that produces timetables according to the data provided by the user. The main requirements of the application are to collect details about the branch, semester, subjects, labs and total number of periods. The list of subjects may include electives and core subjects, with students needing to choose their electives. The application then generates the timetable according to specifications.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Automated, time-table, constraints, college, clashes

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Enhancing the Evolution and Analysis of Body Posture in Different Self Learning Activities Processes

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02049

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02049

  Register Paper ID - 261086

  Title: ENHANCING THE EVOLUTION AND ANALYSIS OF BODY POSTURE IN DIFFERENT SELF LEARNING ACTIVITIES PROCESSES

  Author Name(s): Prof. Roshni Narkhede, Saurabh Sonalkar, Dhiraj Yadav

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 242-246

 Year: May 2024

 Downloads: 33

 Abstract

This work presents a novel approach to accurately assess Yoga poses using advanced deep learning algorithms. Our proposed system utilizes pose detection techniques to enhance the understanding and proficiency of Yoga practitioners. By employing multi-stage pose detection using a PC camera, we can accurately identify Yoga poses in real-time. Additionally, we introduce an innovative scoring algorithm applicable to various poses, ensuring comprehensive assessment capabilities. Our system's performance is evaluated across different Yoga poses and environmental conditions, demonstrating its robustness. Furthermore, we introduce a sophisticated deep learning model for real-time Yoga recognition, leveraging linear regression to extract features from key points detected in each frame using OpenPose.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Yoga disguise Recognition, Deep Learning Algorithms, Linear Retrogression, Real- time videotape Analysis, Pose Discovery System.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Enhancing Cybersecurity: A Machine Learning Approach to Malware Detection

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02048

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02048

  Register Paper ID - 261087

  Title: ENHANCING CYBERSECURITY: A MACHINE LEARNING APPROACH TO MALWARE DETECTION

  Author Name(s): Prof. Sonu Khapekar, Shubham Gade, Pratik Bhujange, Kaustubh Gade

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 238-241

 Year: May 2024

 Downloads: 23

 Abstract

Efficient detection of malware holds critical importance in cybersecurity, and this study explores the work of machine learning methodologies to enhance detection precision. By harnessing the power of logistic regression, random forests and decision trees Classifier algorithms, our methodology adeptly discerns among benign and malicious files based on meticulously extracted features. Employing rigorous feature selection techniques, we pinpoint the most discriminative attributes. Emphasizing the utilization of ensemble techniques and the interpretability of Decision Trees, our framework endeavors to furnish robust, comprehensible, and high-precision malware detection solutions. Through a meticulous comparative analysis, we meticulously scrutinize the strengths and limitations of each algorithm, empowering cybersecurity practitioners to make well-informed decisions. Additionally, we confront the challenge posed by imbalanced datasets, ubiquitous in real-world scenarios, ensuring our methodology maintains a high detection rate between benign and malicious samples.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Malware Detection, Cybersecurity, Machine Learning, Logistic Regression, Random Forest, Feature Selection, Decision Tree, Cyber Threats.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Enhancing Attendance Management with An IR- Based IOT Enabling System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02047

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02047

  Register Paper ID - 261089

  Title: ENHANCING ATTENDANCE MANAGEMENT WITH AN IR- BASED IOT ENABLING SYSTEM

  Author Name(s): Dr. Rohini Hanchate, Sakshi Bhauso Zanzane, Shreya N Surdi, Preeti Prakash Pingale, Prof. Pritam Ahire

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 234-237

 Year: May 2024

 Downloads: 54

 Abstract

This paper offers a new way to track student attendance in schools using infrared sensors. ARDUINO, Module, Breadboard are the main components used for the system. Unlike older conventional methods that take time, which are error- prone, or which will cost a lot (like RFID), this system is cheaper, anonymous, and gives real-time data. Tests show it works well and could be a great way to manage attendance in a more streamlined way. It can be integrated with access control for school or colleges for efficient and advance management in educational system and can be also useful in other public places where crowd management is crucial.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

infrared sensors, ARDUINO, Module, Breadboard , cheaper, real-time data, manage attendance.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Empowering Malware Detection with Machine Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02046

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02046

  Register Paper ID - 261090

  Title: EMPOWERING MALWARE DETECTION WITH MACHINE LEARNING

  Author Name(s): Prof. Sonu Khapekar, Shubham Gade, Pratik Bhujange, Kaustubh Gade

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 230-233

 Year: May 2024

 Downloads: 27

 Abstract

In today's digital environment, cybersecurity remains a paramount concern, with malware posing significant risks to individuals, organizations, and society. This paper introduces an innovative strategy for reinforcing cybersecurity by employing machine learning methods for malware detection. Utilizing sophisticated algorithms like decision tree, logistic regression, and random forest classifiers, our methodology aims to improve the precision and effectiveness of malware detection systems. By scrutinizing complex features extracted from malware samples, our approach facilitates the identification of malicious software with high levels of accuracy and recall. Moreover, our research tackles the challenges by evolving cyber threats through the integration of adaptive learning mechanisms, which continuously update and refine detection capabilities. Through empirical assessment and comparative analysis, we showcase the efficacy and resilience of our machine learning-based approach in mitigating malware risks. This study contributes to the advancement of cybersecurity strategies by offering a blueprint for the development of proactive and adaptable malware detection solutions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cybersecurity, Malware Detection, Machine Learning, Logistic Regression, Random Forest, Decision Tree Classifiers, Feature Extraction, Adaptive Learning, Comparative Analysis

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: E-C Commerce Recommendation System Based On GNN and LSTM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02045

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02045

  Register Paper ID - 261091

  Title: E-C COMMERCE RECOMMENDATION SYSTEM BASED ON GNN AND LSTM

  Author Name(s): Prof. Shital Jade, Manasi Vilas Takle, Aarti Nandkumar Thorat, Pranali Shridhar Naik

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 226-229

 Year: May 2024

 Downloads: 29

 Abstract

The recommendation system is made for suggesting best products for users as per their conveniences. In this system Individual suggestions are Important for making in general future decisions this data will be useful in upcoming ages. DRL has been a good option for E-com. This system will focus on multiple hops rather than single hops. This could lead to optimal suggestions that's why Graph based neural network has been used in this system. Also, this system propagates use of LSTM. Here in this system, we are using Interactive recommendations by using LSTM which is useful for predicting long term dependencies in the system. This will lead to more interactive and speedy suggestions. Social graph neural network and LSTM is going to play huge role in this recommendation system which will suggest proper products through E-com system. LSTM will be useful for speeding the processing rate which is a part of RNN and will help system to understand past events and user preferences in product suggestions


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Interactive Recommendation (IR), Long Short-Term Memory (LSTM), Graph Neural Network (GNN).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Dynamic Information driven Personalization: Harnessing Real-Time Insights for Contextually- Aware Recommendations

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02044

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02044

  Register Paper ID - 261093

  Title: DYNAMIC INFORMATION DRIVEN PERSONALIZATION: HARNESSING REAL-TIME INSIGHTS FOR CONTEXTUALLY- AWARE RECOMMENDATIONS

  Author Name(s): Arjun Haghwane, Vinay Ippili, Mithilesh Jogale, Prof. Smita Thube

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 222-225

 Year: May 2024

 Downloads: 31

 Abstract

In the present computerized age, suggestion frameworks assume a critical part in further developing client experience across different web-based stages like shopping locales, real time features, and online entertainment. Customary proposal frameworks use past information to recommend things, yet with constant information opening up, there's a requirement for frameworks that can adjust and give convenient ideas in view of current data. This paper investigates how AI can be utilized to make suggestion frameworks that answer constant information. Through this joining of suggestion frameworks with planning innovation, we expect to upset the manner in which clients find and investigate new spots and encounters in their environmental factors. We talk about the significance of understanding client opinion through normal language handling (NLP) and how it can improve proposals. Experiments demonstrate the advantages.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Recommendations, Machine Learning, Reviews, Natural Language Processing, AI.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DrowseGuard Drowsiness Detector: Python Implementation Employing Deep Learning and Computer Vision

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02043

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02043

  Register Paper ID - 261095

  Title: DROWSEGUARD DROWSINESS DETECTOR: PYTHON IMPLEMENTATION EMPLOYING DEEP LEARNING AND COMPUTER VISION

  Author Name(s): Prof. Pritam Ahire, Pratham Bhor, Ishika Bansal, Prayukti Dubey

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 216-221

 Year: May 2024

 Downloads: 29

 Abstract

In 2021, a report from the Ministry of Road Transport and Highways Transport Research Wing underscored the alarming toll of road accidents, which claimed the lives of 1,53,972 individuals and injured 3,84,448. The majority of those affected were drivers aged between 18 and 45 years. Additionally, a CDC survey revealed that approximately 1 in 25 adult drivers reported experiencing drowsiness and even falling asleep while operating a vehicle within the past 30 days. The devastating consequences of these accidents highlight the urgent need for effective preventive measures. Transportation companies employing overnight drivers face particularly heightened risks, as nighttime driving often leads to severe fatigue and drowsiness. Consequently, automakers are increasingly implementing driver drowsiness detection systems. While existing systems, such as those employed by Toyota and Audi using ECG machines, have drawbacks like discomfort, there's a growing interest in advanced solutions based on machine learning and deep learning. Proposed systems aim to assess driver fitness and alert them based on fatigue levels, utilizing technologies like webcams for facial monitoring. By implementing such systems on a broader scale and at a manageable cost, the potential to significantly reduce the rate of road accidents is substantial. Moreover, platforms like OLA and Uber could leverage performance analysis modules to monitor drivers' fitness levels and mitigate risks associated with drowsiness effectively.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

road accident prevention, face detection and analysis, Computer Vision, Machine Learning, and driver sleepiness detection.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DrowseGuard Drowsiness Detection System: A Review Of Existing Systems And A Schema For Future Solution

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02042

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02042

  Register Paper ID - 261096

  Title: DROWSEGUARD DROWSINESS DETECTION SYSTEM: A REVIEW OF EXISTING SYSTEMS AND A SCHEMA FOR FUTURE SOLUTION

  Author Name(s): Prof. Pritam Ahire, Pratham Bhor, Ishika Bansal, Prayukti Dubey

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 211-215

 Year: May 2024

 Downloads: 30

 Abstract

Driver drowsiness detection systems improve road safety by tracking driver attention in real time and providing timely warnings to reduce the risk of accidents. This research compares many methods for utilizing computer vision and machine learning techniques to identify driver weariness. Techniques that make use of physiological signals, driving performance measures, face analysis, and hybrid approaches are assessed for their viability and efficacy. The main conclusions show that hybrid methods that incorporate facial monitoring together with other modalities can identify tiredness with over 94% accuracy. Real-time processing, individual variability, and striking a balance between system performance and user acceptability continue to be obstacles. To fully implement driver sleepiness detection in a variety of real-world driving circumstances, more research into tailored, adaptive systems is necessary.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

road safety, face analysis, Computer Vision, Machine Learning, and driver sleepiness detection.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Document Verification based on Blockchain Technology

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02041

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02041

  Register Paper ID - 261098

  Title: DOCUMENT VERIFICATION BASED ON BLOCKCHAIN TECHNOLOGY

  Author Name(s): Prof. Roshni Narkhede, Nikhil Rananware, Kunal Kale, Aditya Gadhave

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 206-210

 Year: May 2024

 Downloads: 27

 Abstract

In India, there were roughly 9 million graduates every year and an estimated 26.3 million students enrolled in higher education in 2018-19. Throughout their time in school, students--high school, undergraduate, graduate, or postgraduate--produce a great deal of certificates, which could include transcripts, results, or diplomas. Students must present these certifications to universities or businesses in order to be admitted. It gets tiresome to track these certificates and personally verify their legitimacy. The graduation certificate may be discovered to be forged in the event that a suitable anti-forge system is not in place. Everything must be digitalized using the principles of confidentiality, reliability, and availability in order to increase data security and safety.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Blockchain, Data Mining, Multi-cloud Data Security, Proxy Key Generation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Digitally Enriching Historical Images Converting Grayscale image to RGB scale image

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAF02040

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAF02040

  Register Paper ID - 261099

  Title: DIGITALLY ENRICHING HISTORICAL IMAGES CONVERTING GRAYSCALE IMAGE TO RGB SCALE IMAGE

  Author Name(s): Dhanshri Gaikwad, Manasi Ghotane, Gauri Lokhande, Dr.Saurabh Saoji, Dr.Naveenkumar Jaykumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 201-205

 Year: May 2024

 Downloads: 28

 Abstract

Focusing on the conversion of grayscale representations to RGB color images using Plain Colorization Neural Networks (CNNs), the study aims to revitalize aged documents, thereby safeguarding cultural heritage. region segmentation alongside CNN-based colorization, the project seeks to rejuvenate historical records visually. Additionally, quantitative assessments such as MSE, PSNR, and SSIM, coupled with histogram analysis, ensure the fidelity and richness of the color transformation. Ultimately, this research contributes to the restoration and preservation of historical images, offering deeper insights into our collective past through enriched visual representations


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN , Mean Square Error(MSE), Peak Signal Noise Ratio(PSNR), Structural Similarity(SSIM), Gray scale, RGB scale.

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 7 | Month- July 2024)

Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer