Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 9 | Issue 6

Volume 9 | Issue 6 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: SPAM TEXT CLASSIFICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106199

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106199

  Register Paper ID - 208462

  Title: SPAM TEXT CLASSIFICATION

  Author Name(s): Sowmya Racha, Sai Kiran Maggidi, Dr. Sunil Bhutada

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b570-b576

 Year: June 2021

 Downloads: 1247

 Abstract

The Internet has changed the way of communication. Out of each type of communication, e-mails are more likely to be exploited. Messages, instant text messages, and online messages visiting have become a vital part of our lives. Spamming has become a threat that negatively affects e-mail. E-mail threats are an extremely significant issue in today's life. Also, many consequences are likely to cause productivity loss, occupy memory in mailboxes, viruses threat, and materials containing harmful information for a specific category of users. Destroy the stability of mail servers. As a result, users spend much time sorting incoming mails and deleting undesirable correspondence. Most of the time, spam calls are the aim of advertisements. While this helps to extend customers, it's often unwanted communication to several of us. While reaching consumers in a sizable amount so that the overall public presentation of their information could seem harmless, it's essential to recall that spam messages, in many cases, include non-commercial propagation or prohibited content. These can put the customer at the receiving end in peril.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Spam Messgaes, Spamers, Deep Learning, Machine Learning Algorithm, Accuracy.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN OF IOT BASED SMART RATION DISPENSING SYSTEM USING LOADCELL FEEDBACK TO PREVENT RATION FRAUDULENCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106198

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106198

  Register Paper ID - 208485

  Title: DESIGN OF IOT BASED SMART RATION DISPENSING SYSTEM USING LOADCELL FEEDBACK TO PREVENT RATION FRAUDULENCE

  Author Name(s): Shivaanivarsha N, Vigita S, Santhini V

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b563-b569

 Year: June 2021

 Downloads: 1285

 Abstract

The present system for Ration shops has many disadvantages. They have low processing speed. They have less man power, so the filling and the packing of products takes a lot of time. And some of the ration dealers weigh the products less compared to what was requested by the customer. This paper aims in providing an automatic filling machine which fills all the products requested by the customer, simultaneously, thus reducing the time consumed per customer. This machine works on the feedback of loadcell, which provides high weight accuracy, thus eliminating the risk for the customers getting cheated.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Loadcell, ESP8266, Servomotor, Ultrasonic sensor, ESP8266 webserver

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SURVEY PAPER ON DIFFERENT TYPES OF PREDICTION ALGORITHM FOR AIR QUALITY INDEX AND COMPARATIVE STUDY ON TYPES OF ALGORITHMS USED

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106197

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106197

  Register Paper ID - 208560

  Title: SURVEY PAPER ON DIFFERENT TYPES OF PREDICTION ALGORITHM FOR AIR QUALITY INDEX AND COMPARATIVE STUDY ON TYPES OF ALGORITHMS USED

  Author Name(s): Diana George, Jayakrishnan.R, Sam G.Benjamin, ManoLekshmi.I

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b557-b562

 Year: June 2021

 Downloads: 1246

 Abstract

Air pollution is considered to be a major concern of the day.Many researches has been demonstrated on various fields on regarding air pollution and seeking a stable solution for the problem.Early prediction of air quality and to make it avail and aware to the society being an important aspect.This survey paper present about various machine learning algorithms for Air Quality Index Prediction and in-depth analysis of most relevant machine leaning algorithms available on the literature survey .The discussed techniques are Neural Networks, fuzzy a system, Support Vector Machine, Support Vector Machine for regression, fuzzy logic, Decision Trees, K-Nearest Neighbor,Naive Bayes,Random forest and Decision Trees.We are working on the algorithm with best accuracy.This will help the Government ,environmentalist and the general public to make the plans best.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Machine Learning, Prediction, Classification Technique, Decision Tree, Accuracy,Random forest.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AUGMENTING NETWORK INTRUSION DETECTION SYSTEM USING EXTREME GRADIENT BOOSTING(XGBOOST)

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106196

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106196

  Register Paper ID - 208495

  Title: AUGMENTING NETWORK INTRUSION DETECTION SYSTEM USING EXTREME GRADIENT BOOSTING(XGBOOST)

  Author Name(s): R.Vijay, S.Manoj, V.P.Ravi Kanth, Y.Vikas, Dr.P.Indira Priyadarshini

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b550-b556

 Year: June 2021

 Downloads: 1317

 Abstract

There is a high rise in the design on the utility of Internet technological innovation functioning day by functioning day. This amazing improve ushers in a huge volume of info produced as well as handled. For apparent great factors, undivided focus is thanks for guaranteeing group security. An intrusion detection system plays an important role in the spot of the earlier mentioned protection. The detection of protection associated operates by utilizing Machine Learning (ML) is extensively investigated. Intrusion Detection Systems (IDSs) are safety aids used to determine malicious activity. Network Intrusion Detection Systems (NIDS) are among most well-known contexts of machine learning software program in the security region. IDSs is generally categorized working for lots of criteria. One of these basic- Positive Many Meanings- crucial components is the detection tactic, around terminology of what IDSs (and NIDSs) is signature-based or anomaly-based often. The former group detects attacks by checking out the info flow below analysis to patterns stashed at bay inside a signature site of recognized attacks. The later detects anomalies dealing with a sort of typical behaviour of monitored phone system and also flagging activity resting outside of the item as anomalous or suspicious. Signature-based IDSs can determine trendy hits with too much precision but do not recognize or perhaps search for new hits, while anomaly based IDSs have that ability. In this specific task we focus on anomaly-based society intrusion detection by employing XGBoost algorithm on KDD CUP 1999 info positioned to get the ideal outcomes. XGBoost is a fairly recently accessible machine learning strategy that is been operating boosting interest. It gotten Kaggle's Higgs Machine Learning Challenge, about different Kaggle competitions, because of the general functionality of its. The match procedure was constructing a method intrusion detector, a predictive model good at distinguishing between "bad" connections, referred to as intrusions or hits, as well as "good" everyday connections. This specific site features a normal variety of info being audited, incorporating an array of intrusions simulated inside a military neighborhood atmosphere. The very first KDD Cup 1999 dataset offered by UCI Machine Learning repository features forty-one qualities (thirty-four constant, and 7 categorical) and also offers 3,925,651 attacks (80.1 %) outside of 4,898,431 papers. The whole goal is studying the integrity of info and in addition have a much better accuracy in the prediction of info. In that manner, the volume of mischievous info drifting in a method might be reduced, making the network a secured area to transfer info. The more secure a channel is, the less instances where data might get hacked or manipulated.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

XGBoost,Intrusion,Anomaly,Signature.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DOMESTIC VIOLENCE: A CRIME AGAINST WOMEN

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106195

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106195

  Register Paper ID - 208295

  Title: DOMESTIC VIOLENCE: A CRIME AGAINST WOMEN

  Author Name(s): Dr. Ritu Agarwal

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b546-b549

 Year: June 2021

 Downloads: 1301

 Abstract

Abstract: Domestic violence is one of the crimes against women which might be related to their disadvantageous position in the society. Domestic violence refers to violence against women specially in matrimonial homes. The hassle is grossly under-reported. A range of causes were blamed for crimes against women. An inefficient law implementing agencies has frequently been jogged for the growing range of instances being reported. Also, psychiatric morbidity can perpetuate such crimes.?The act of domestic violence toward women is a?human rights violation?in addition to an illegal act under?law. It is consequently extensively taken into consideration a threat to women's rights via any lens. Greater gender equality can be accomplished if fundamental health needs are met and if cultural biases that permit for domestic violence in India stops. Women go through many types of physical and emotional?abuses?because of cruel, heinous and unlawful activities that happens with them in their homes. It has been seen through researches that women who've experienced domestic violence have a tendency to have more long-term mental problems and drug dependencies than others who do not face such problems. Domestic violence is greater in women belonging to low socio-economic status.?In India, decreasing domestic violence is vital not only from an ethical and human rights perspective but also due to apparent instrumental health benefits that might be gained from such reduction.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Key Words: Domestic Violence, Crime, Women, Causes, Consequences, Laws

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TREATMENT OF CAR WASH WATER USING ELECTROCOAGULATION, CHEMICAL AND BIOLOGICAL PROCESS - A COMPARATIVE STUDY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106194

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106194

  Register Paper ID - 208526

  Title: TREATMENT OF CAR WASH WATER USING ELECTROCOAGULATION, CHEMICAL AND BIOLOGICAL PROCESS - A COMPARATIVE STUDY

  Author Name(s): Sowmiya S, Ravathi M C

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b538-b545

 Year: June 2021

 Downloads: 1360

 Abstract

Waste water generated from car wash service station contributes to majority of environmental contamination because of the chemical characteristics present in the car wash water. This research work compares the effectiveness of treating car wash water collected from car wash station located in Coimbatore using naturally available water hyacinth, chemical(alum) and electrocoagulation (Cu - Cu, Cu - Al, Al - Al) method. Different parameters like pH, turbidity, Chemical oxygen demand, oil and grease, total organic carbon were characterized for the collected car wash water. Oil and grease, Chemical oxygen demand contributes to majority of pollution. Experimental results show that electro coagulation method have better removal efficiency of oil and grease, Chemical oxygen demand and turbidity. Maximum Chemical oxygen demand removal efficiency of 61% and oil and grease removal efficiency of 70% has been attained by electro coagulation method. Water hyacinth has also shown a good result with Chemical oxygen demand removal efficiency of 50% and oil and grease removal efficiency of 54.5%. Electrocoagulation method has been found to give better results for the treatment of car wash water.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Electrocoagulation, turbidity, Chemical oxygen demand, oil and grease, Total organic carbon, car wash water.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HOW MANY PEOPLE USE SOCIAL MEDIA & THEIR EFFECTS ON SOCIETY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106193

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106193

  Register Paper ID - 208488

  Title: HOW MANY PEOPLE USE SOCIAL MEDIA & THEIR EFFECTS ON SOCIETY

  Author Name(s): Mr. Aditya S. Pawar, Mr. PRASAD K. HARDAS,, Mr. VIRAJ P. DEORE, Mr. ALAN ABHISHEK P. THOMAS

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b533-b537

 Year: June 2021

 Downloads: 1347

 Abstract

Social media is a new and accelerating phenomenon that has to begin its jump in the 21st century. What is social media? It is a way that lets the user interact with many other users over the internet and participate in social networking activities for fun and also functions in professional use, aids in information gathering. The kick start for social media can begin with the invention of the World Wide Web which is credited to Sir Tim Berners Lee that led to the formation of various other search engines and other social media sites such as Facebook YouTube Instagram and many others. In 2021 there were 3.96 billion active users of social media and that began with the first social networking site that was called 'six degrees.com'. But just like a coin social media has two sides on one hand it provides entertainment, knowledge gain, advertising, various jobs and industries. On the other hand, they can cause mental fatigue (if used excessively )along with physical health issues, it can also lead to the propagation of fake news and propaganda and a major issue is cyberbullying along with privacy issues that can be harmful in various ways. Social media is a whole different world that has its flaws and boons, and to be honest, it may not be possible to categories 'social media as a good thing or bad. Therefore we can conclude that proper care should be given towards social media (the whole internet too) so that we can be safe and healthy while using them.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Social media, 3.96 billion active users, side effects.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BLOCKCHAIN BASED ADAPTIVE TRUST MANAGEMENT IN INTERNET OF VEHICLES USING SMART CONTRACT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106192

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106192

  Register Paper ID - 207870

  Title: BLOCKCHAIN BASED ADAPTIVE TRUST MANAGEMENT IN INTERNET OF VEHICLES USING SMART CONTRACT

  Author Name(s): HARINI S, AROCKIA SNEHA S, KAVIYA B, C. Vijayalakshmi

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b529-b532

 Year: June 2021

 Downloads: 1332

 Abstract

The Internet of Vehicles (IoV) provides the concept of coordination of vehicles for enhancing safety of both the driver and the vehicle and also increasing transportation performance. Vehicles are coordinated for avoiding collisions by communicating their positions when they become closer. The information about location is identified by their geographical positions or the ones in road maps. The system can also be made efficient by informing about traffic jams by sharing their locations and destination. In this way, traveling time can be reduced. However, IoV also have some security challenges, such as keeping safe from virtual hijacking. To avoid this, vehicles should detect and avoid the hijacked vehicles ignoring their communications. This system presents a technique for improving security by applying certain prioritization rules, using digital certificates, applying trust policies and incorporating them with block chain technology for detecting and avoiding hijacked vehicles. Based on trust values the corrupted messages are blocked by the system itself and broadcasting of fake messages is completely avoided, thereby enhancing the security.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Internet of Vehicles (IoV), VANET, Broadcasting messages, RSU, V2V communications

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A SURVEY ON DIAGNOSIS OF SKIN CANCER BASED ON IMAGE PROCESSING USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106191

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106191

  Register Paper ID - 208385

  Title: A SURVEY ON DIAGNOSIS OF SKIN CANCER BASED ON IMAGE PROCESSING USING MACHINE LEARNING

  Author Name(s): Snehal Vijay Kamble, Dr. P.R. Gumble

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b523-b528

 Year: June 2021

 Downloads: 1401

 Abstract

In a human body, skin is the core part, which helps to cover the muscles, bones what's more with the entire body. These days numerous people are suffering from skin cancer. Malignant melanoma is the deadliest form of skin cancer. The most serious type of cancer is Melanoma, which is the enormous type of skin malignant growth and the extent of these skin cancer is increasing day by day. Melanoma can be easily treatable if detected in early stages. Clinical as well as automated methods are being used for melanoma diagnosis. Image-based computer aided diagnosis systems have great potential for early malignant melanoma detection. Recognizing the type of skin cancer automatically from the images can assist in the quick diagnosis and enhanced accuracy saving valuable time. This paper presents review on automated diagnosis of skin cancer by analyzing image using Image Processing techniques with applying intelligence using Machine Learning. The purpose of this bibliographic review is to provide researchers opting to work in implementing machine learning learning for cancer diagnosis a knowledge from scratch of the state-of-the-art achievements.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Skin Cancer, Skin Lesion, Melanoma, Image Processing, Machine Learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A FRAMEWORK TO ANALYSE DIFFERENT APPLICATION WHICH IS USED TO IDENTIFY ENCRYPTED MEDIA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106190

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106190

  Register Paper ID - 208493

  Title: A FRAMEWORK TO ANALYSE DIFFERENT APPLICATION WHICH IS USED TO IDENTIFY ENCRYPTED MEDIA

  Author Name(s): Shaminaz, Dr. Divya .T.L

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b513-b522

 Year: June 2021

 Downloads: 1311

 Abstract

Steganography Encryption is a technology which is used to hide any data or information as an embedded one within another file. Steganography was first used in 440BC. Its main purpose is to hide information from any third person. Data are hidden safely and for embedding data different tools are used where each tool uses different approaches to hide an information. This research is focused on how these technologies are misused by black hat hackers in order to make someone compromise his data and it is not a difficult task that any person who is master in hacking only can be done, it is something anyone can do that is why it is very difficult aspect to identify which image or audio or video is corrupted or embedded with malicious code.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Steganography encryption, embedding data, malicious code, technology misused

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SIGNCRYPTION AND ITS PERSPECTIVES FOR NETWORK SECURITY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106189

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106189

  Register Paper ID - 208475

  Title: SIGNCRYPTION AND ITS PERSPECTIVES FOR NETWORK SECURITY

  Author Name(s): Richa kunal Sharma, Dr. Nalini Kant Joshi

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b506-b512

 Year: June 2021

 Downloads: 1300

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DES, AES, Elliptic curve, Signcryption, Unsigncryption, Key generation, Asymmetric algorithms.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: WATER WASTAGE IN THE AGRICULTURAL SECTOR

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106188

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106188

  Register Paper ID - 208482

  Title: WATER WASTAGE IN THE AGRICULTURAL SECTOR

  Author Name(s): Raghav Bansal, Ms. Nidhi Sengar, Ms. Vasudha Bahl, Dr. Amita Goel, Anamika Hans

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b503-b505

 Year: June 2021

 Downloads: 1280

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

water, agriculture, IoT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANALYSIS OF BANKS TOTAL FACTOR PRODUCTIVITY BY DISAGGREGATE LEVEL

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106187

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106187

  Register Paper ID - 208479

  Title: ANALYSIS OF BANKS TOTAL FACTOR PRODUCTIVITY BY DISAGGREGATE LEVEL

  Author Name(s): Bhadrappa Haralayya, P S Aithal

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b488-b502

 Year: June 2021

 Downloads: 1282

 Abstract

The banks astute profitability examination features that private segment banks are the main entertainer as far as efficiency development over the timeframe and being the essential area in the general development of economy, they are performing in mindful way pursued by their partners. It has likewise been discovered that TFP approach shows variety in profitability change, consequently, affirming the nearness of extreme challenge, great sound working condition and distinctive social destinations among the banks . It has additionally been finished up from the quartile portrayals of the efficiency of business banks that the banks present in the fourth quartile goes about as the benchmark for the under resourced ones. Out of three possession gatherings, the banks underneath the normal are inadequate as far as the efficiency in keeping money activities. Hence, these banks should attempt the examination of their tasks and the board arrangements therefore to wipe out flimsiness in the profitability development. These banks additionally have the potential for development as far as efficiency as these banks have the inclination of advancing toward the upper quartiles ceaselessly.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Disaggregate level, Public sector banks, Private sector banks, Foreign sector banks.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PANCHAKARMA THERAPIES – A OUTLOOK IN MANAGEMENT OF VATAVYADHI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106186

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106186

  Register Paper ID - 208517

  Title: PANCHAKARMA THERAPIES – A OUTLOOK IN MANAGEMENT OF VATAVYADHI

  Author Name(s): Dr Ankush Haushiram Gunjal, Dr Satish Digambar Urhe, Dr Tridev Arun Patil

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b485-b487

 Year: June 2021

 Downloads: 1314

 Abstract

Ayurveda is been in practice from ancient period for the management of various diseases related to mankind. It has its own approach for the management of the diseases based on concepts emerged as a result of observations and experimentation done by Acharayas. The basics described includes the Tridosha concept among which Vata Dosha is given the prime importance as it is essential for smooth functioning of body and for maintaining structural integrity of body elements. The Acharayas have described types of Vatavyadhi as Dhatukshayajanya & Margavrodhajanya. The Chikitsa varies according the type of Vatavyadhi i.e.Shamana & Shodhana. Panchakarma is mentioned as Shodhana Chikitsa Prakara which involves various therapeutic procedures beneficial in eliminating vitiated Vata and other Dosha in body resulting in permanent relief and non-recurrence of Vatavyadhis. So now a day Panchakarma therapies are being used worldwide in neuro-muscular and joint disorders which are correlated with Vatavyadhis mentioned in Ayurved classics.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Vata Dosha, Vatavyadhi, Panchakarma, neuro-muscular and joint disorders.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SENTENCE COMPLETION USING NLP TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106185

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106185

  Register Paper ID - 208010

  Title: SENTENCE COMPLETION USING NLP TECHNIQUES

  Author Name(s): Tanushree c hatmode, Prachi Y Duragkar, Radha H Khorgade, Ram B Jaiswal, Shubhashish S Charan

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b481-b484

 Year: June 2021

 Downloads: 1460

 Abstract

In this assignment, we plan to use and examine diverse strategies for automatic sentence finishing touch which consist of n-gram modeling, Latent Semantic Indexing and Recurrent Neural Networks. Results from the beyond studies reveal that the LSA version outperforms the traditional n-gram version fashions at the Microsoft Research Sentence Completion Challenge. The LSA version outperforms different non-neural community fashions. Hence, we are able to examine the consequences of the LSA version with RNN version and n-gram version to determine which ones play higher thinking about the size of the statistics. The strategies are first teach on a big corpus of un-annotated textual content, to then attempt to are expecting the lacking phrases within side the check set which includes hundreds of sentences wherein one phrase is lacking and 4 options for the lacking phrase.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

n-nlp , gram, rnn , lsa

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW OF SOFT SWITCHED HIGH FREQUENCY BUCK CONVERTERS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106184

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106184

  Register Paper ID - 208422

  Title: REVIEW OF SOFT SWITCHED HIGH FREQUENCY BUCK CONVERTERS

  Author Name(s): Ambuj Shukla, Aniket Maiti, Kishalay Bhattacharya, Sanchita Halder, Nilesh Kumar Biswas, Subhojyoti Majumder, Shubham Kumar, Biswamoy Pal

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b474-b480

 Year: June 2021

 Downloads: 1311

 Abstract

Modern power electronic converters must possess features like reduced size, high power density, high efficiency etc. By employing soft switching cells to existing converters, performance can be improved to a great extent. Soft switching converters aim to reduce switching loss, enabling a converter to operate with very high frequency. This facilitates reduction in size and volume of the converter that improves power density and efficiency of the converter. This paper reviews detailed study on different soft switching of DC-DC Buck converters to improve converter performance. The detailed operation of few soft switched buck converter topologies along with strengths and weaknesses have been discussed thoroughly.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Pulse Width Modulation (PWM), Zero Voltage Switching (ZVS), Zero Current Switching (ZCS), Snubber circuit, Zero Current Transition (ZCT), Soft Switching.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A SURVEY ON TECHNIQUES DEVELOPED IN CONTENT BASED IMAGE RETRIEVAL SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106183

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106183

  Register Paper ID - 208368

  Title: A SURVEY ON TECHNIQUES DEVELOPED IN CONTENT BASED IMAGE RETRIEVAL SYSTEM

  Author Name(s): Miss.shalaka kangale

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b468-b473

 Year: June 2021

 Downloads: 1355

 Abstract

Multimedia content analysis is applied in different real-world computer vision applications, and digital images constitute a major part of multimedia data. In last few years, the complexity of multimedia contents, especially the images, has grown exponentially, and on daily basis, more than millions of images are uploaded at different archives such as Twitter, Facebook, and Instagram. To search for a relevant image from an archive is a challenging research problem for computer vision research community. The content based image retrieval aims to find the similar images from a large scale dataset against a query image. Generally, the similarity between the representative features of the query image and dataset images is used to rank the images for retrieval. In early days, various hand designed feature descriptors have been investigated based on the visual cues such as color, texture, shape, etc. that represent the images. This paper attempts to provide a comprehensive survey of the techniques developed content based image retrieval. This paper also analyzed the main aspects of various image retrieval and image representation models from low-level feature extraction to recent semantic deep-learning approaches. The important concepts and major research studies based on CBIR and image representation are discussed in detail, and future research directions are concluded to inspire further research in this area. Keywords: Content Based Image Retrieval, Semantic Gap, Machine Learning, Deep Learning,


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

image retrieval ,feature extraction

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DRIVER ATTENTION ALERT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106182

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106182

  Register Paper ID - 208436

  Title: DRIVER ATTENTION ALERT

  Author Name(s): K. Saicharan Reddy, Rahul Rao, Naveen Reddy, Dr. Sunil Bhutada, K. Vigneshwar Reddy

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b464-b467

 Year: June 2021

 Downloads: 1280

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Driver, Detect, Frame, Face Detection, Drowsiness, Driver Fatigue, Image processing, OpenCV, Haarcascade Files.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: VIRTUAL TOUR OF MCA RVCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106181

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106181

  Register Paper ID - 208461

  Title: VIRTUAL TOUR OF MCA RVCE

  Author Name(s): Mamtha T, Usha J

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b459-b463

 Year: June 2021

 Downloads: 1249

 Abstract

In past few years virtual reality has emerged to become the centre of attraction for people. Virtual reality may change the way during which many of the common things are getting used today like it's already changed the gaming world by introducing virtual games. It provides an environment that's somehow look alike that it's real-world or we will say computer game provides a simulated real-world environment to its users. It is very popular technology in the field of gaming, but in this project, we will focus on how virtual reality can be beneficial for campus touring of MCA Department-RVCE in particular, it can bring the feeling of reality and immersion to the user as if they are traveling in actual, but in reality, they are only experiencing the tour through VR headset. A headset itself helps to provide the 3D look, it can help people to have exhilarating experience without visiting that place in real and it can greatly influence the visitors due to its interactive nature.The sequence of the work will be carried out by stitching the normal images to get the panoramic images using Insta360 software and importing the panoramic images to the unity assets,then Importing the several packages required for Virtual reality to the unity assets and finally coding the required functions using C# language.The main aim of the project is to mimic real world by computer generated environment and engage all the sense of people using very powerful and compelling technology that is Virtual Reality. We hope that users can explore the infrastructure and facilities provided in the department of MCA RVCE with the user friendly interface which is also the expected improvement to an existing system.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Virtual Reality (VR), Virtual tour, RVCE.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOLAR WIND HYBRID POWER GENERATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106180

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106180

  Register Paper ID - 208392

  Title: SOLAR WIND HYBRID POWER GENERATION

  Author Name(s): Snehal Namdev Mitake, Ruturaj Rajendra Bandal, Pragati Anil Kamble, Jaydip Jaysing Sathe, Ajay Toraskar

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: b455-b458

 Year: June 2021

 Downloads: 1314

 Abstract

Energy has playing an important role in human life and economic development. World total annual energy consumption is increased. While fossil fuel (coal, oil, natural gas) provides three quarter of total. At current energy consumption rate proven coal reserve should last for about 200 years, Oil for approximately 40 years and natural gas for annual 60 years with the contradiction between rapid development. Now a days Non-conventional Power generation is one of the fastest growing sectors. So we select the solar wind hybrid power generation. The sun is the ultimate source of limitless solar energy in the form of light and heat. In a solar power generation system solar panel absorb sunrays and convert it into DC current, that will be used to charge battery. Also wind energy is limitless from the nature. Wind turbine rotate due to the force of wind and its rotor connected with generator also rotate and give AC current. This project involves the solar wind hybrid power generation that will be used to generate electricity. This system will provide the basic electricity requirement for the house. Solar power and wind energy are free making this system viable long-term solution for electrification. Purpose of investment in solar wind hybrid power generation project is to enter in development of green energy technology, which is the only ultimate source of energy for future generation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Solar energy, wind energy, Hybrid Energy, DC current, PWM charge controller, Vertical axis wind turbine (VAWT), Electricity

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 13 | Issue 10 | Month- October 2025)

Call For Paper October 2025
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A digital object identifier by DOI.org How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer