ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: DESIGNING OF NEGATIVE REFRACTIVE INDEX BASED ANTENNA FOR L AND C BAND APPLICATIONS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6680
Register Paper ID - 222236
Title: DESIGNING OF NEGATIVE REFRACTIVE INDEX BASED ANTENNA FOR L AND C BAND APPLICATIONS
Author Name(s): Aneri Pandya, Killol Pandya, Trushit Upadhyaya, Upesh Patel
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f538-f542
Year: June 2022
Downloads: 221
In recent years, wireless technology is in demand. The researchers are doing research in designing technology-based, multiple application-oriented, efficient, and cost-effective RF structures. Incorporating all requirements of existing industries, various wireless applications-oriented, negative refractive index-based antenna structure is designed and analysed in this paper. The claimed antenna resonates at 1.79 GHz and 5.04 GHz frequencies. The output parameters show very good potential for the L and C band frequency applications.
Licence: creative commons attribution 4.0
Negative refractive index, wireless communications, Split ring resonator
Paper Title: ARTIFICIAL INTELLIGENCE IN AGRICULTURE AND ITS APPLICATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6679
Register Paper ID - 221948
Title: ARTIFICIAL INTELLIGENCE IN AGRICULTURE AND ITS APPLICATION
Author Name(s): Anbarasan. V, Jayalakshmi.V
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f533-f537
Year: June 2022
Downloads: 263
The application of artificial intelligence (AI) has recently become apparent in the agricultural sector. This sector faces many challenges to maximize yields, including improper soil treatment, disease and pest epidemics, big data requirements, poor performance, and knowledge gaps between farmers and technology. The main concepts of AI in agriculture are its flexibility, high performance, accuracy, and cost-effectiveness. This paper outlines AI applications in soil management, crop management, weed control, and disease control. Here particular attention is paid to the strengths and limitations of the application and how to use expert systems to improve productivity.
Licence: creative commons attribution 4.0
Agriculture, Artificial Intelligence, IOT, Soil, Crop Management
Paper Title: A STUDY OF AWARENESS ABOUT USAGE OF ICT AMONG RURAL PEOPLE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6678
Register Paper ID - 222315
Title: A STUDY OF AWARENESS ABOUT USAGE OF ICT AMONG RURAL PEOPLE
Author Name(s): RAMYA SHREE T, Dr. S. BHUVANESWARI
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f524-f532
Year: June 2022
Downloads: 244
The use of information and communication technologies no doubt is gaining momentum in Indian higher education . The Internet is used by faculty, staff and students in sourcing information. Information and communication technologies assist lib raries in providing efficient and current information services. Once the s taff and students are able to u se these technologies effectively, the teaching, learning and research activities in the college will be made easier fo r the college community. ICT usage will facilitate development since there will be free flow of information. The electronic revolution, specifically, Internet is narrowing the information gap. The power of web technology is enabling the generator of information to disseminate their creativity at low cost and high speed. Internet is the gateway for libraries and information centers to enter the Electronic Information Era and is providing the information, generated by different organizations, institutions, research centers and individuals all over the wo rld. This paper is an attempt to investigate the use of Information and Communication Technology among the students of rural areas in Tamil Nadu. For this purpose a survey was carried out using questionnaire tool. The findings indicated that more than half acquired their internet skill through training from the college. The results indicated majority of students used Internet weekly (56.53% ). The study found that most of the respondents 73. 91% us e internet for literature search
Licence: creative commons attribution 4.0
Ke y wo rd s ICT, Internet, E-Resources, Online Help, Websites, CD -ROM , Information Needs
Paper Title: ANALYSIS ON SERVICE FAILURE RECOVERY STRATEGIES IN FOOD AND BEVERAGE ESTABLISHMENTS WHILE TOURISM ACTIVITIES RESUMED DUE TO COVID-19 PANDEMIC: THE CASE OF RESTAURANTS IN RWANDA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6677
Register Paper ID - 222227
Title: ANALYSIS ON SERVICE FAILURE RECOVERY STRATEGIES IN FOOD AND BEVERAGE ESTABLISHMENTS WHILE TOURISM ACTIVITIES RESUMED DUE TO COVID-19 PANDEMIC: THE CASE OF RESTAURANTS IN RWANDA
Author Name(s): HABUMUREMYI Faustin, HABIMANA Jean Claude
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f513-f523
Year: June 2022
Downloads: 295
Abstract Customer service has always been the hallmark of the Tourism and Hospitality Industry since last decade in Rwanda and the industry was among the top priorities to contribute to the development of the country, however due to COVID-19 pandemic spread all over the world since December 2019, many service sectors has been injured by the pandemic where some were partial or fully closed, including tourism and hospitality industry. In February 2022, the pandemic slowed down and the government allowed most of the closed businesses to resume again, it has been long waiting time for customers and employees to meet again in service environment. The purpose of this study is to analyze service failure recovery strategies by food and beverage employees in Rwanda after COVID-19 Pandemic. One hundred and fifty (150) food and beverage professionals were selected randomly from different establishments in different touristic areas of Rwanda such as Kigali, Musanze, Rubavu, Karongi, Kayonza and Huye. With the use of Google forms, forty four (44) questionnaires containing twenty most likely service failures in F&B establishments with their possible recovery actions were given to respondents to determine which best action to recover each service failure. The results demonstrated that some actions are mostly used by respondents to recover service failures after the pandemic (table 4) and others are less recommended. The study suggests that F&B establishments should establish complaint procedures that are unproblematic and free from bureaucracy as possible; to invest time, money and effort in handling customer complaints properly, to give more comprehensive trainings to their human resources in dealing with complaining guests. The study concludes that the main service failures are linked staff professionalism, managers are advised to initiate day to day awareness and on job empowerment to their staff for minimizing or removing all those failures so that Tourism and Hospitality Industry might catch the good level than before the Pandemic.
Licence: creative commons attribution 4.0
Service failure, service recovery, F&B Establishments
Paper Title: VEHICLE ANTI-THEFT SYSTEM USING PCA ALGORITHM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6676
Register Paper ID - 221864
Title: VEHICLE ANTI-THEFT SYSTEM USING PCA ALGORITHM
Author Name(s): Savitha R, Priyaadharshini A S, Rajalakshmi R, Selkia J, Shreeakalya M
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f506-f512
Year: June 2022
Downloads: 248
In this modern age there is rapid increase in number of vehicles and so is the number of car theft attempts, locally and internationally. With the invention of strong stealing techniques, owners are in fear of having their vehicles being stolen from common parking lot or from outside their home. In this proposed vehicle security system face detection system (FDS) is used to detect the face of the driver and compare it with the predefined face. Real-time vehicle security system supported computer vision provides an answer to the present problem. Thus the protection of vehicles from theft becomes important due to insecure environment. Real time vehicle security system based on computer vision provides a solution to this problem. The proposed vehicle security system performs image processing based on real-time user authentication using face detection and recognition techniques. As the person enters the parked car to the driver's seat of the vehicle activates the hidden camera fixed in an appropriate position inside the vehicle. As soon as the image is acquired from the activated camera, the face of the person is detected. The extracted face is recognized using the PCA. Face recognition is the technique in which the identity of a human being can be identified using ones individual face. Such kind of systems can be used in photos, videos, or in real time machines. The objective of this article is to provide a simpler and easy method in machine technology.
Licence: creative commons attribution 4.0
Vehicle security, face detection, face recognition, license verification, Warning message, authorization
Paper Title: STURDY INTELLIGENT MALWARE DETECTION USING DEEP LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6675
Register Paper ID - 222026
Title: STURDY INTELLIGENT MALWARE DETECTION USING DEEP LEARNING
Author Name(s): V Yashasree, K Vijay Shankar, M Gayathri, V Veena
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f500-f505
Year: June 2022
Downloads: 248
In this virtual global of Industry 4.0, the speedy development of technology has affected the everyday sports in groups in addition to in non-public lives. Internet of Things (IoT) and packages have brought about the improvement of the current idea of the records society. Though a few latest studies research exist on this direction, the overall performance of the algorithms is biased with the education data. There is a want to mitigate bias and examine those techniques independently so as to arrive at new more desirable techniques for powerful 0-day malware detection. To fill the space in literature, this painting evaluates classical MLAs and deep getting to know architectures for malware detection, class and categorization with each public and personal dataset. The educate and take a look at splits of public and personal datasets used withinside the experimental evaluation are disjoint to every other and amassed in distinctive timescales. In addition, we advocate a unique photo processing approach with most desirable parameters for MLAs and deep getting to know architectures. A complete experimental assessment of those techniques suggests that deep getting to know architectures outperform classical MLAs. Overall, this painting proposes a powerful visible detection of malware the use of a scalable and hybrid deep getting to know framework for real-time deployments.
Licence: creative commons attribution 4.0
malware, framework, photo processing, MLAs, classification, categorization, system
Paper Title: A SURVEY ON VARIOUS IMAGE ENCRYPTION TECHNIQUE AND CHALLENGES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6674
Register Paper ID - 222128
Title: A SURVEY ON VARIOUS IMAGE ENCRYPTION TECHNIQUE AND CHALLENGES
Author Name(s): Akansha Dongre, Chetan Gupta, Sonam Dubey
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f496-f499
Year: June 2022
Downloads: 233
The security of information, or data, in today's communication environment is the most significant problem. The image encryption approach should be constructed in such a manner that it improves the efficacy of communication while also keeping data safe from unwanted access. The business world, health care, military activities, and multimedia systems all use image encryption. Encryption is the process of converting plain text into cipher text, whereas decryption is the act of converting cipher text back to plain text. Encryption and decryption techniques make up cryptography. We have discussed the different encryption terminology, the purpose of cryptography, and its kinds in this article.
Licence: creative commons attribution 4.0
Encryption, Data Encryption Standard, integrity, authenticity, cryptography.
Paper Title: IOT BASED AIR AND WATER MONITORING USING RASPBERRY PI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6673
Register Paper ID - 222281
Title: IOT BASED AIR AND WATER MONITORING USING RASPBERRY PI
Author Name(s): Dr.SK.Umar Faruk, A. Naimisha, N. Vinoda, G. Pranavi, P. Shravani Reddy
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f493-f495
Year: June 2022
Downloads: 269
With the tremendous increase in the level of population and mechanization, pollution has increased many folds. This results in deterioration of individual health. There by directly affecting health of entire population. An IOT Based Air and Water Monitoring System using Raspberry pi is proposed which will monitor the level of pollution over a web server using internet. Sensors can be deployed at various locations which can sense and collect data. The big data can be uploaded on the Google cloud which facilitates monitoring from any part of the globe. The presence of harmful gases like Smoke, CO, Butane and LPG above a particular limit may turn fatal which can lead to severe accidents. This type of accidents can be prevented by implementing an effective pollution monitoring system. The air quality and water Ph is displayed on the webpage which makes environment monitoring easy and whenever the air quality goes high, it triggers an alarm. So, here in my project, the main aim is to monitor various gases which are responsible for air pollution and to monitor Water ph.
Licence: creative commons attribution 4.0
Iot, Monitoring, Sensors, big data, Cloud, Web page, pollution, Raspberry pi, Internet, mechanization
Paper Title: A Study On Teacher Effectiveness Among Secondary School Teachers
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6672
Register Paper ID - 222177
Title: A STUDY ON TEACHER EFFECTIVENESS AMONG SECONDARY SCHOOL TEACHERS
Author Name(s): 1Mr.Dr. Zakkula DhanaRaju, Dr S.Vijaya Vardhini
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f482-f492
Year: June 2022
Downloads: 269
Licence: creative commons attribution 4.0
Teacher Effectiveness, Social status, Locale, Type of School, Teaching Experience and Secondary School Teacher
Paper Title: BRAIN TUMOR DETECTION USING DEEP LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6671
Register Paper ID - 222225
Title: BRAIN TUMOR DETECTION USING DEEP LEARNING
Author Name(s): Anuradha SG, Siddalingaswamy Hiremath, Shafi T, Siddalinga Swamy PM, Venkatesh Danda
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f477-f481
Year: June 2022
Downloads: 251
The formation of aberrant cells in the brain, some of which may progress to cancer, is known as a brain tumor. Magnetic Resonance Imaging (MRI) scans are the most common tool for detecting brain tumor. Information on aberrant tissue growth in the brain is identified using MRI imaging. The detection of a brain tumor has been discussed in a number of studies. Machine Learning and Deep Learning algorithms were used to accomplish this. When these methods are used on a data set, MRI scans The diagnosis of a brain tumor is done quickly, and the higher the accuracy, the better the patients' therapy, this forecast aids the radiologist in making timely decisions In the proposed scenario. In this study, an Artificial Neural Network (ANN) and a Convolution Neural Network (CNN) with self-defined parameters are used in recognizing the presence of tumor in human brain and the action is analyzed.
Licence: creative commons attribution 4.0
Convolution neural network(CNN), Artificial neural network(ANN), Magnetic resonance image(MRI)
Paper Title: PRE-PROCESSING OF E0-1 HYPERION DATA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6670
Register Paper ID - 222198
Title: PRE-PROCESSING OF E0-1 HYPERION DATA
Author Name(s): Dr. Prasantha H S, Kaushik M, Nishan R, R Jayanth, Krishan Rao
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f469-f476
Year: June 2022
Downloads: 283
Hyperspectral Classification is one of the most emerging technologies where input image plays important role as that of the processing that takes place so the pre-processing stages are an important step before the image can be used for classification or any other analysis. The stages of the pre-processing done for the image include Bad-band removal, vertical De-stripping, Radiometric calibration, Atmospheric correction, and Dimensionality reduction (MNF) and End member extraction. Since hyperspectral image can be used in variety of fields such as agriculture, mining, food quality, soil type, defense etc.
Licence: creative commons attribution 4.0
Image processing, Hyperspectral Imaging, pre-processing, Feature Extraction and reduction
Paper Title: PATIENT HEALTH MONITORING SMART MIRROR
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6669
Register Paper ID - 222287
Title: PATIENT HEALTH MONITORING SMART MIRROR
Author Name(s): Dikshita Badwaik, Ekta Game, Pooja Zade, Pranali Kathote, Prof. Gayatri Padole
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f463-f468
Year: June 2022
Downloads: 247
Licence: creative commons attribution 4.0
Internet of Things (IoT), Smart Mirror, Arduino, Wi-Fi Module.
Paper Title: SENTIMENT ANALYSIS AND OPINION MINING IN TWITTER USING LOGISTIC REGRESSION WITH R
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6668
Register Paper ID - 222283
Title: SENTIMENT ANALYSIS AND OPINION MINING IN TWITTER USING LOGISTIC REGRESSION WITH R
Author Name(s): Sunitha.C, Samyuktha.S, Shankaranarayanan.B, Aishwarrya.S
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f458-f462
Year: June 2022
Downloads: 254
Over the past few years, there has been a huge growth in microblogging platforms such as Twitter. More tweets are being tweeted per day. There is a large amount of data and it is getting extremely difficult to get the relevant information from the data. There has been a vast number of research on how sentiments are conveyed in a genre such as online reviews about a movie, news articles, and blogs, but how sentiments are conveyed in case of unofficial languages and message-length constraints of microblogging are less analysed. In that case sentiment analysis comes into the picture. The collection of natural language processing that tries to identify and extract the opinion from the review of the respective blogs is called sentiment analysis. It has been proven helpful in many other domains, but will it also prove useful in Twitter?
Licence: creative commons attribution 4.0
Human Emotions, Microblogging, Sentiment Analysis, Sentiment Analysis principles,Sigmoid Function, Expermental result
Paper Title: PECTIN-CHITOSAN HYDROGEL SYNTHESIS AND ITS DYE ADSORPTION APPLICATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6667
Register Paper ID - 222265
Title: PECTIN-CHITOSAN HYDROGEL SYNTHESIS AND ITS DYE ADSORPTION APPLICATION
Author Name(s): Dipak D. Dhobi, Hemangi Desai
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f443-f457
Year: June 2022
Downloads: 251
Licence: creative commons attribution 4.0
Pectin-Chitosan hydrogel, Methylene blue dye adsorption, Dye adsorption kinetic study, Adsorption isotherms, Dye desorption
Paper Title: AN APPROACH FOR STEGANOGRAPHY OF MULTIMEDIA DATA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6666
Register Paper ID - 222197
Title: AN APPROACH FOR STEGANOGRAPHY OF MULTIMEDIA DATA
Author Name(s): Dr. Prasantha H S, Aasima Khan, Bhavitha K R, Sunidhi Singh,, Shiddhika Goenka
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f435-f442
Year: June 2022
Downloads: 256
Abstract: In this new world of technology, communication using digital media has increased tremendously and this easy data exchange comes with the risk of intrusion. At times, the system itself can get affected by various types of malwares which leads to data loss. So, there is a need for a secure communication method to exchange sensitive data. Steganography is one such technique for hiding data over a media file in such a way that any eavesdropper will not be able to detect the presence of the hidden data. This paper proposes the LSB (Least Significant Bit) algorithm which hides data over different media files that are text, image and audio using python. In Image steganography, the cover images taken are of various types, i.e, binary, gray scale and color images. In audio steganography, we have also taken real-time audio as a cover file.
Licence: creative commons attribution 4.0
LSB, Steganography, Python
Paper Title: FATHER FIXATION: REVISITING USHA PRIYAMVADA'S NOVEL RUKOGI NAHIN RADHIKA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6665
Register Paper ID - 222325
Title: FATHER FIXATION: REVISITING USHA PRIYAMVADA'S NOVEL RUKOGI NAHIN RADHIKA
Author Name(s): Pradeep Kumar, Professor, (Dr.) Nikhilesh Yadav
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f431-f434
Year: June 2022
Downloads: 294
Abstract: Psychoanalytic theory explains human relations with respect to its chief postulations like Oedipus Complex, Electra Complex, the tripartite id, ego and superego, penis envy, defense mechanisms amongst others. Father fixation is one of these that requires to be settled down in a girl's life trajectory to grow up into maturity. Otherwise, unhappy conjugal relationship ensues from an unresolved fixation. A daughter's identity and superego develop under the direct influence of her father. Certain schools in Sociology and Psychology, other than Freudians, have also contributed tremendously in exploring interpersonal relationships. Usha Priyamvada's novel is revisited in the present paper to explore father-daughter interaction and to focus on the resolution of Radhika's complex. Masculinity in father's persona needs to be transformed into effeminate behavior so that he may appear graceful in sublimated desires. Contrarily, he can be a potential threat to the established order of society. In non-Western cultures, the psychoanalytic concepts may not verify owing to different world-views, still they can be employed for a comprehensive understanding to obtain a variegated discourse.
Licence: creative commons attribution 4.0
Electra Complex, father fixation, identity, masculinity, psychoanalysis
Paper Title: FIRST RECORD OF THE ORDER POLYCLADIDA FROM COAST OF ANDHRA PRADESH, INDIA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6664
Register Paper ID - 222290
Title: FIRST RECORD OF THE ORDER POLYCLADIDA FROM COAST OF ANDHRA PRADESH, INDIA
Author Name(s): Sri Chakra Pranav Tamarapalli, Kaduri Vimal raj
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f428-f430
Year: June 2022
Downloads: 273
Pseudoceros galatheensis, a member of order polycladida, was observed for the first time in Visakhapatnam coast situated in the east coast of India. This record happens to be the first record of any member of order polycladida in Andhra Pradesh and the east coast of mainland India.
Licence: creative commons attribution 4.0
Marine Biology, Marine Flatworm, Visakhapatnam, Intertidal ecosystem, East Coast Conservation Team
Paper Title: RESEARCH PAPER - PERFORMANCE STUDIES OF BITUMINOUS MIXES USING CO-POLYMERS AND TYRE WASTE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6663
Register Paper ID - 222136
Title: RESEARCH PAPER - PERFORMANCE STUDIES OF BITUMINOUS MIXES USING CO-POLYMERS AND TYRE WASTE
Author Name(s): Vishvdeep, Devender kumar
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f418-f427
Year: June 2022
Downloads: 245
Six percent HDPE and ten percent waste tyre samples have the best consistency and flow performance, whereas the typical combination performs similarly. A 61 percent increase in blend consistency means that the new BC mix is far more resistant to deformation under load. The Marshall Quotient has improved by 63 percent, despite the fact that the flow value is nearly comparable to the standard mix.
Licence: creative commons attribution 4.0
HDPE; tyre waste; Stability; Marshall quotient; conventional mix
Paper Title: BIG DATA PROCESSING USING MINING ALGORITHAM IN DATA SETS FOR DATA BASE SYSTEMS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6662
Register Paper ID - 222049
Title: BIG DATA PROCESSING USING MINING ALGORITHAM IN DATA SETS FOR DATA BASE SYSTEMS
Author Name(s): Akanksha Akulwar, P.V. Ramana Murthy, Dr. P. Srinivas
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f415-f417
Year: June 2022
Downloads: 278
The fundamental challenge for a lot of big data programs must be to search data volumes and take functional understanding for other hobbies. Focused by real-world programs controlling of massive Data were revealed to acquire demanding yet very compelling job. We make as read the efficient theorem that differentiates highlights of big data rising, and signifies big human sources representation, in the thought of data mining. Suggested theorem recommends that important highlights of big data are large by heterogeneous and varied data sources self-directed with distributed additionally to decentralized control, and sophisticated, developing in data associations featuring think that big data necessitate a sizable intelligence to boost data for finest values. We submit big human sources depiction, in the thought of data mining which data-driven structure involves demand determined selection of information sources, mining additionally to analysis, modeling of user interest, and contemplation on security.
Licence: creative commons attribution 4.0
Big Data, Heterogeneous, Big data processing, Data Mining, Decentralized, Data Sources, Modeling, Security and Statistics.
Paper Title: INTRUSION DETECTION NETWORK
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT22A6661
Register Paper ID - 222132
Title: INTRUSION DETECTION NETWORK
Author Name(s): Palak Namdev, Chetan Gupta
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: f410-f414
Year: June 2022
Downloads: 230
several researchers suggest an intrusion detection system based on data mining technology, focusing on the shortcomings of current intrusion detection models. It addresses the system's lack of self-adaptability, as well as the risks of misreporting or omission. However, when dealing with large amounts of data, an intrusion detection system based on data mining technology must use an increasing amount of resources, slowing down the detection speed. Another issue emerges when we consider the aforementioned approach: when we establish clusters of the same object for future pattern formation, we do not always get a satisfactory outcome. Because each time the support is different, the pruning value varies according to the support. As a consequence, we must process the rule generation dynamic, which overcomes the aforementioned difficulty and allows us to get various results under various scenarios.
Licence: creative commons attribution 4.0
IDS,NSL-KDD, Dos, Probe, R2L, U2R.
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 7 | Month- July 2024)