IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: SPAM TEXT CLASSIFICATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106199
Register Paper ID - 208462
Title: SPAM TEXT CLASSIFICATION
Author Name(s): Sowmya Racha, Sai Kiran Maggidi, Dr. Sunil Bhutada
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b570-b576
Year: June 2021
Downloads: 1247
The Internet has changed the way of communication. Out of each type of communication, e-mails are more likely to be exploited. Messages, instant text messages, and online messages visiting have become a vital part of our lives. Spamming has become a threat that negatively affects e-mail. E-mail threats are an extremely significant issue in today's life. Also, many consequences are likely to cause productivity loss, occupy memory in mailboxes, viruses threat, and materials containing harmful information for a specific category of users. Destroy the stability of mail servers. As a result, users spend much time sorting incoming mails and deleting undesirable correspondence. Most of the time, spam calls are the aim of advertisements. While this helps to extend customers, it's often unwanted communication to several of us. While reaching consumers in a sizable amount so that the overall public presentation of their information could seem harmless, it's essential to recall that spam messages, in many cases, include non-commercial propagation or prohibited content. These can put the customer at the receiving end in peril.
Licence: creative commons attribution 4.0
Spam Messgaes, Spamers, Deep Learning, Machine Learning Algorithm, Accuracy.
Paper Title: DESIGN OF IOT BASED SMART RATION DISPENSING SYSTEM USING LOADCELL FEEDBACK TO PREVENT RATION FRAUDULENCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106198
Register Paper ID - 208485
Title: DESIGN OF IOT BASED SMART RATION DISPENSING SYSTEM USING LOADCELL FEEDBACK TO PREVENT RATION FRAUDULENCE
Author Name(s): Shivaanivarsha N, Vigita S, Santhini V
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b563-b569
Year: June 2021
Downloads: 1285
The present system for Ration shops has many disadvantages. They have low processing speed. They have less man power, so the filling and the packing of products takes a lot of time. And some of the ration dealers weigh the products less compared to what was requested by the customer. This paper aims in providing an automatic filling machine which fills all the products requested by the customer, simultaneously, thus reducing the time consumed per customer. This machine works on the feedback of loadcell, which provides high weight accuracy, thus eliminating the risk for the customers getting cheated.
Licence: creative commons attribution 4.0
Loadcell, ESP8266, Servomotor, Ultrasonic sensor, ESP8266 webserver
Paper Title: SURVEY PAPER ON DIFFERENT TYPES OF PREDICTION ALGORITHM FOR AIR QUALITY INDEX AND COMPARATIVE STUDY ON TYPES OF ALGORITHMS USED
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106197
Register Paper ID - 208560
Title: SURVEY PAPER ON DIFFERENT TYPES OF PREDICTION ALGORITHM FOR AIR QUALITY INDEX AND COMPARATIVE STUDY ON TYPES OF ALGORITHMS USED
Author Name(s): Diana George, Jayakrishnan.R, Sam G.Benjamin, ManoLekshmi.I
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b557-b562
Year: June 2021
Downloads: 1246
Air pollution is considered to be a major concern of the day.Many researches has been demonstrated on various fields on regarding air pollution and seeking a stable solution for the problem.Early prediction of air quality and to make it avail and aware to the society being an important aspect.This survey paper present about various machine learning algorithms for Air Quality Index Prediction and in-depth analysis of most relevant machine leaning algorithms available on the literature survey .The discussed techniques are Neural Networks, fuzzy a system, Support Vector Machine, Support Vector Machine for regression, fuzzy logic, Decision Trees, K-Nearest Neighbor,Naive Bayes,Random forest and Decision Trees.We are working on the algorithm with best accuracy.This will help the Government ,environmentalist and the general public to make the plans best.
Licence: creative commons attribution 4.0
Machine Learning, Prediction, Classification Technique, Decision Tree, Accuracy,Random forest.
Paper Title: AUGMENTING NETWORK INTRUSION DETECTION SYSTEM USING EXTREME GRADIENT BOOSTING(XGBOOST)
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106196
Register Paper ID - 208495
Title: AUGMENTING NETWORK INTRUSION DETECTION SYSTEM USING EXTREME GRADIENT BOOSTING(XGBOOST)
Author Name(s): R.Vijay, S.Manoj, V.P.Ravi Kanth, Y.Vikas, Dr.P.Indira Priyadarshini
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b550-b556
Year: June 2021
Downloads: 1317
There is a high rise in the design on the utility of Internet technological innovation functioning day by functioning day. This amazing improve ushers in a huge volume of info produced as well as handled. For apparent great factors, undivided focus is thanks for guaranteeing group security. An intrusion detection system plays an important role in the spot of the earlier mentioned protection. The detection of protection associated operates by utilizing Machine Learning (ML) is extensively investigated. Intrusion Detection Systems (IDSs) are safety aids used to determine malicious activity. Network Intrusion Detection Systems (NIDS) are among most well-known contexts of machine learning software program in the security region. IDSs is generally categorized working for lots of criteria. One of these basic- Positive Many Meanings- crucial components is the detection tactic, around terminology of what IDSs (and NIDSs) is signature-based or anomaly-based often. The former group detects attacks by checking out the info flow below analysis to patterns stashed at bay inside a signature site of recognized attacks. The later detects anomalies dealing with a sort of typical behaviour of monitored phone system and also flagging activity resting outside of the item as anomalous or suspicious. Signature-based IDSs can determine trendy hits with too much precision but do not recognize or perhaps search for new hits, while anomaly based IDSs have that ability. In this specific task we focus on anomaly-based society intrusion detection by employing XGBoost algorithm on KDD CUP 1999 info positioned to get the ideal outcomes. XGBoost is a fairly recently accessible machine learning strategy that is been operating boosting interest. It gotten Kaggle's Higgs Machine Learning Challenge, about different Kaggle competitions, because of the general functionality of its. The match procedure was constructing a method intrusion detector, a predictive model good at distinguishing between "bad" connections, referred to as intrusions or hits, as well as "good" everyday connections. This specific site features a normal variety of info being audited, incorporating an array of intrusions simulated inside a military neighborhood atmosphere. The very first KDD Cup 1999 dataset offered by UCI Machine Learning repository features forty-one qualities (thirty-four constant, and 7 categorical) and also offers 3,925,651 attacks (80.1 %) outside of 4,898,431 papers. The whole goal is studying the integrity of info and in addition have a much better accuracy in the prediction of info. In that manner, the volume of mischievous info drifting in a method might be reduced, making the network a secured area to transfer info. The more secure a channel is, the less instances where data might get hacked or manipulated.
Licence: creative commons attribution 4.0
XGBoost,Intrusion,Anomaly,Signature.
Paper Title: DOMESTIC VIOLENCE: A CRIME AGAINST WOMEN
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106195
Register Paper ID - 208295
Title: DOMESTIC VIOLENCE: A CRIME AGAINST WOMEN
Author Name(s): Dr. Ritu Agarwal
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b546-b549
Year: June 2021
Downloads: 1301
Abstract: Domestic violence is one of the crimes against women which might be related to their disadvantageous position in the society. Domestic violence refers to violence against women specially in matrimonial homes. The hassle is grossly under-reported. A range of causes were blamed for crimes against women. An inefficient law implementing agencies has frequently been jogged for the growing range of instances being reported. Also, psychiatric morbidity can perpetuate such crimes.?The act of domestic violence toward women is a?human rights violation?in addition to an illegal act under?law. It is consequently extensively taken into consideration a threat to women's rights via any lens. Greater gender equality can be accomplished if fundamental health needs are met and if cultural biases that permit for domestic violence in India stops. Women go through many types of physical and emotional?abuses?because of cruel, heinous and unlawful activities that happens with them in their homes. It has been seen through researches that women who've experienced domestic violence have a tendency to have more long-term mental problems and drug dependencies than others who do not face such problems. Domestic violence is greater in women belonging to low socio-economic status.?In India, decreasing domestic violence is vital not only from an ethical and human rights perspective but also due to apparent instrumental health benefits that might be gained from such reduction.
Licence: creative commons attribution 4.0
Key Words: Domestic Violence, Crime, Women, Causes, Consequences, Laws
Paper Title: TREATMENT OF CAR WASH WATER USING ELECTROCOAGULATION, CHEMICAL AND BIOLOGICAL PROCESS - A COMPARATIVE STUDY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106194
Register Paper ID - 208526
Title: TREATMENT OF CAR WASH WATER USING ELECTROCOAGULATION, CHEMICAL AND BIOLOGICAL PROCESS - A COMPARATIVE STUDY
Author Name(s): Sowmiya S, Ravathi M C
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b538-b545
Year: June 2021
Downloads: 1360
Waste water generated from car wash service station contributes to majority of environmental contamination because of the chemical characteristics present in the car wash water. This research work compares the effectiveness of treating car wash water collected from car wash station located in Coimbatore using naturally available water hyacinth, chemical(alum) and electrocoagulation (Cu - Cu, Cu - Al, Al - Al) method. Different parameters like pH, turbidity, Chemical oxygen demand, oil and grease, total organic carbon were characterized for the collected car wash water. Oil and grease, Chemical oxygen demand contributes to majority of pollution. Experimental results show that electro coagulation method have better removal efficiency of oil and grease, Chemical oxygen demand and turbidity. Maximum Chemical oxygen demand removal efficiency of 61% and oil and grease removal efficiency of 70% has been attained by electro coagulation method. Water hyacinth has also shown a good result with Chemical oxygen demand removal efficiency of 50% and oil and grease removal efficiency of 54.5%. Electrocoagulation method has been found to give better results for the treatment of car wash water.
Licence: creative commons attribution 4.0
Electrocoagulation, turbidity, Chemical oxygen demand, oil and grease, Total organic carbon, car wash water.
Paper Title: HOW MANY PEOPLE USE SOCIAL MEDIA & THEIR EFFECTS ON SOCIETY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106193
Register Paper ID - 208488
Title: HOW MANY PEOPLE USE SOCIAL MEDIA & THEIR EFFECTS ON SOCIETY
Author Name(s): Mr. Aditya S. Pawar, Mr. PRASAD K. HARDAS,, Mr. VIRAJ P. DEORE, Mr. ALAN ABHISHEK P. THOMAS
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b533-b537
Year: June 2021
Downloads: 1347
Social media is a new and accelerating phenomenon that has to begin its jump in the 21st century. What is social media? It is a way that lets the user interact with many other users over the internet and participate in social networking activities for fun and also functions in professional use, aids in information gathering. The kick start for social media can begin with the invention of the World Wide Web which is credited to Sir Tim Berners Lee that led to the formation of various other search engines and other social media sites such as Facebook YouTube Instagram and many others. In 2021 there were 3.96 billion active users of social media and that began with the first social networking site that was called 'six degrees.com'. But just like a coin social media has two sides on one hand it provides entertainment, knowledge gain, advertising, various jobs and industries. On the other hand, they can cause mental fatigue (if used excessively )along with physical health issues, it can also lead to the propagation of fake news and propaganda and a major issue is cyberbullying along with privacy issues that can be harmful in various ways. Social media is a whole different world that has its flaws and boons, and to be honest, it may not be possible to categories 'social media as a good thing or bad. Therefore we can conclude that proper care should be given towards social media (the whole internet too) so that we can be safe and healthy while using them.
Licence: creative commons attribution 4.0
Social media, 3.96 billion active users, side effects.
Paper Title: BLOCKCHAIN BASED ADAPTIVE TRUST MANAGEMENT IN INTERNET OF VEHICLES USING SMART CONTRACT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106192
Register Paper ID - 207870
Title: BLOCKCHAIN BASED ADAPTIVE TRUST MANAGEMENT IN INTERNET OF VEHICLES USING SMART CONTRACT
Author Name(s): HARINI S, AROCKIA SNEHA S, KAVIYA B, C. Vijayalakshmi
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b529-b532
Year: June 2021
Downloads: 1332
The Internet of Vehicles (IoV) provides the concept of coordination of vehicles for enhancing safety of both the driver and the vehicle and also increasing transportation performance. Vehicles are coordinated for avoiding collisions by communicating their positions when they become closer. The information about location is identified by their geographical positions or the ones in road maps. The system can also be made efficient by informing about traffic jams by sharing their locations and destination. In this way, traveling time can be reduced. However, IoV also have some security challenges, such as keeping safe from virtual hijacking. To avoid this, vehicles should detect and avoid the hijacked vehicles ignoring their communications. This system presents a technique for improving security by applying certain prioritization rules, using digital certificates, applying trust policies and incorporating them with block chain technology for detecting and avoiding hijacked vehicles. Based on trust values the corrupted messages are blocked by the system itself and broadcasting of fake messages is completely avoided, thereby enhancing the security.
Licence: creative commons attribution 4.0
Internet of Vehicles (IoV), VANET, Broadcasting messages, RSU, V2V communications
Paper Title: A SURVEY ON DIAGNOSIS OF SKIN CANCER BASED ON IMAGE PROCESSING USING MACHINE LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106191
Register Paper ID - 208385
Title: A SURVEY ON DIAGNOSIS OF SKIN CANCER BASED ON IMAGE PROCESSING USING MACHINE LEARNING
Author Name(s): Snehal Vijay Kamble, Dr. P.R. Gumble
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b523-b528
Year: June 2021
Downloads: 1401
In a human body, skin is the core part, which helps to cover the muscles, bones what's more with the entire body. These days numerous people are suffering from skin cancer. Malignant melanoma is the deadliest form of skin cancer. The most serious type of cancer is Melanoma, which is the enormous type of skin malignant growth and the extent of these skin cancer is increasing day by day. Melanoma can be easily treatable if detected in early stages. Clinical as well as automated methods are being used for melanoma diagnosis. Image-based computer aided diagnosis systems have great potential for early malignant melanoma detection. Recognizing the type of skin cancer automatically from the images can assist in the quick diagnosis and enhanced accuracy saving valuable time. This paper presents review on automated diagnosis of skin cancer by analyzing image using Image Processing techniques with applying intelligence using Machine Learning. The purpose of this bibliographic review is to provide researchers opting to work in implementing machine learning learning for cancer diagnosis a knowledge from scratch of the state-of-the-art achievements.
Licence: creative commons attribution 4.0
Skin Cancer, Skin Lesion, Melanoma, Image Processing, Machine Learning
Paper Title: A FRAMEWORK TO ANALYSE DIFFERENT APPLICATION WHICH IS USED TO IDENTIFY ENCRYPTED MEDIA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106190
Register Paper ID - 208493
Title: A FRAMEWORK TO ANALYSE DIFFERENT APPLICATION WHICH IS USED TO IDENTIFY ENCRYPTED MEDIA
Author Name(s): Shaminaz, Dr. Divya .T.L
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b513-b522
Year: June 2021
Downloads: 1311
Steganography Encryption is a technology which is used to hide any data or information as an embedded one within another file. Steganography was first used in 440BC. Its main purpose is to hide information from any third person. Data are hidden safely and for embedding data different tools are used where each tool uses different approaches to hide an information. This research is focused on how these technologies are misused by black hat hackers in order to make someone compromise his data and it is not a difficult task that any person who is master in hacking only can be done, it is something anyone can do that is why it is very difficult aspect to identify which image or audio or video is corrupted or embedded with malicious code.
Licence: creative commons attribution 4.0
Steganography encryption, embedding data, malicious code, technology misused
Paper Title: SIGNCRYPTION AND ITS PERSPECTIVES FOR NETWORK SECURITY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106189
Register Paper ID - 208475
Title: SIGNCRYPTION AND ITS PERSPECTIVES FOR NETWORK SECURITY
Author Name(s): Richa kunal Sharma, Dr. Nalini Kant Joshi
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b506-b512
Year: June 2021
Downloads: 1300
Licence: creative commons attribution 4.0
DES, AES, Elliptic curve, Signcryption, Unsigncryption, Key generation, Asymmetric algorithms.
Paper Title: WATER WASTAGE IN THE AGRICULTURAL SECTOR
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106188
Register Paper ID - 208482
Title: WATER WASTAGE IN THE AGRICULTURAL SECTOR
Author Name(s): Raghav Bansal, Ms. Nidhi Sengar, Ms. Vasudha Bahl, Dr. Amita Goel, Anamika Hans
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b503-b505
Year: June 2021
Downloads: 1280
Licence: creative commons attribution 4.0
Paper Title: ANALYSIS OF BANKS TOTAL FACTOR PRODUCTIVITY BY DISAGGREGATE LEVEL
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106187
Register Paper ID - 208479
Title: ANALYSIS OF BANKS TOTAL FACTOR PRODUCTIVITY BY DISAGGREGATE LEVEL
Author Name(s): Bhadrappa Haralayya, P S Aithal
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b488-b502
Year: June 2021
Downloads: 1282
The banks astute profitability examination features that private segment banks are the main entertainer as far as efficiency development over the timeframe and being the essential area in the general development of economy, they are performing in mindful way pursued by their partners. It has likewise been discovered that TFP approach shows variety in profitability change, consequently, affirming the nearness of extreme challenge, great sound working condition and distinctive social destinations among the banks . It has additionally been finished up from the quartile portrayals of the efficiency of business banks that the banks present in the fourth quartile goes about as the benchmark for the under resourced ones. Out of three possession gatherings, the banks underneath the normal are inadequate as far as the efficiency in keeping money activities. Hence, these banks should attempt the examination of their tasks and the board arrangements therefore to wipe out flimsiness in the profitability development. These banks additionally have the potential for development as far as efficiency as these banks have the inclination of advancing toward the upper quartiles ceaselessly.
Licence: creative commons attribution 4.0
Disaggregate level, Public sector banks, Private sector banks, Foreign sector banks.
Paper Title: PANCHAKARMA THERAPIES – A OUTLOOK IN MANAGEMENT OF VATAVYADHI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106186
Register Paper ID - 208517
Title: PANCHAKARMA THERAPIES – A OUTLOOK IN MANAGEMENT OF VATAVYADHI
Author Name(s): Dr Ankush Haushiram Gunjal, Dr Satish Digambar Urhe, Dr Tridev Arun Patil
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b485-b487
Year: June 2021
Downloads: 1314
Ayurveda is been in practice from ancient period for the management of various diseases related to mankind. It has its own approach for the management of the diseases based on concepts emerged as a result of observations and experimentation done by Acharayas. The basics described includes the Tridosha concept among which Vata Dosha is given the prime importance as it is essential for smooth functioning of body and for maintaining structural integrity of body elements. The Acharayas have described types of Vatavyadhi as Dhatukshayajanya & Margavrodhajanya. The Chikitsa varies according the type of Vatavyadhi i.e.Shamana & Shodhana. Panchakarma is mentioned as Shodhana Chikitsa Prakara which involves various therapeutic procedures beneficial in eliminating vitiated Vata and other Dosha in body resulting in permanent relief and non-recurrence of Vatavyadhis. So now a day Panchakarma therapies are being used worldwide in neuro-muscular and joint disorders which are correlated with Vatavyadhis mentioned in Ayurved classics.
Licence: creative commons attribution 4.0
Vata Dosha, Vatavyadhi, Panchakarma, neuro-muscular and joint disorders.
Paper Title: SENTENCE COMPLETION USING NLP TECHNIQUES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106185
Register Paper ID - 208010
Title: SENTENCE COMPLETION USING NLP TECHNIQUES
Author Name(s): Tanushree c hatmode, Prachi Y Duragkar, Radha H Khorgade, Ram B Jaiswal, Shubhashish S Charan
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b481-b484
Year: June 2021
Downloads: 1460
In this assignment, we plan to use and examine diverse strategies for automatic sentence finishing touch which consist of n-gram modeling, Latent Semantic Indexing and Recurrent Neural Networks. Results from the beyond studies reveal that the LSA version outperforms the traditional n-gram version fashions at the Microsoft Research Sentence Completion Challenge. The LSA version outperforms different non-neural community fashions. Hence, we are able to examine the consequences of the LSA version with RNN version and n-gram version to determine which ones play higher thinking about the size of the statistics. The strategies are first teach on a big corpus of un-annotated textual content, to then attempt to are expecting the lacking phrases within side the check set which includes hundreds of sentences wherein one phrase is lacking and 4 options for the lacking phrase.
Licence: creative commons attribution 4.0
Paper Title: REVIEW OF SOFT SWITCHED HIGH FREQUENCY BUCK CONVERTERS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106184
Register Paper ID - 208422
Title: REVIEW OF SOFT SWITCHED HIGH FREQUENCY BUCK CONVERTERS
Author Name(s): Ambuj Shukla, Aniket Maiti, Kishalay Bhattacharya, Sanchita Halder, Nilesh Kumar Biswas, Subhojyoti Majumder, Shubham Kumar, Biswamoy Pal
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b474-b480
Year: June 2021
Downloads: 1311
Modern power electronic converters must possess features like reduced size, high power density, high efficiency etc. By employing soft switching cells to existing converters, performance can be improved to a great extent. Soft switching converters aim to reduce switching loss, enabling a converter to operate with very high frequency. This facilitates reduction in size and volume of the converter that improves power density and efficiency of the converter. This paper reviews detailed study on different soft switching of DC-DC Buck converters to improve converter performance. The detailed operation of few soft switched buck converter topologies along with strengths and weaknesses have been discussed thoroughly.
Licence: creative commons attribution 4.0
Pulse Width Modulation (PWM), Zero Voltage Switching (ZVS), Zero Current Switching (ZCS), Snubber circuit, Zero Current Transition (ZCT), Soft Switching.
Paper Title: A SURVEY ON TECHNIQUES DEVELOPED IN CONTENT BASED IMAGE RETRIEVAL SYSTEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106183
Register Paper ID - 208368
Title: A SURVEY ON TECHNIQUES DEVELOPED IN CONTENT BASED IMAGE RETRIEVAL SYSTEM
Author Name(s): Miss.shalaka kangale
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b468-b473
Year: June 2021
Downloads: 1355
Multimedia content analysis is applied in different real-world computer vision applications, and digital images constitute a major part of multimedia data. In last few years, the complexity of multimedia contents, especially the images, has grown exponentially, and on daily basis, more than millions of images are uploaded at different archives such as Twitter, Facebook, and Instagram. To search for a relevant image from an archive is a challenging research problem for computer vision research community. The content based image retrieval aims to find the similar images from a large scale dataset against a query image. Generally, the similarity between the representative features of the query image and dataset images is used to rank the images for retrieval. In early days, various hand designed feature descriptors have been investigated based on the visual cues such as color, texture, shape, etc. that represent the images. This paper attempts to provide a comprehensive survey of the techniques developed content based image retrieval. This paper also analyzed the main aspects of various image retrieval and image representation models from low-level feature extraction to recent semantic deep-learning approaches. The important concepts and major research studies based on CBIR and image representation are discussed in detail, and future research directions are concluded to inspire further research in this area. Keywords: Content Based Image Retrieval, Semantic Gap, Machine Learning, Deep Learning,
Licence: creative commons attribution 4.0
image retrieval ,feature extraction
Paper Title: DRIVER ATTENTION ALERT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106182
Register Paper ID - 208436
Title: DRIVER ATTENTION ALERT
Author Name(s): K. Saicharan Reddy, Rahul Rao, Naveen Reddy, Dr. Sunil Bhutada, K. Vigneshwar Reddy
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b464-b467
Year: June 2021
Downloads: 1280
Licence: creative commons attribution 4.0
Driver, Detect, Frame, Face Detection, Drowsiness, Driver Fatigue, Image processing, OpenCV, Haarcascade Files.
Paper Title: VIRTUAL TOUR OF MCA RVCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106181
Register Paper ID - 208461
Title: VIRTUAL TOUR OF MCA RVCE
Author Name(s): Mamtha T, Usha J
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b459-b463
Year: June 2021
Downloads: 1249
In past few years virtual reality has emerged to become the centre of attraction for people. Virtual reality may change the way during which many of the common things are getting used today like it's already changed the gaming world by introducing virtual games. It provides an environment that's somehow look alike that it's real-world or we will say computer game provides a simulated real-world environment to its users. It is very popular technology in the field of gaming, but in this project, we will focus on how virtual reality can be beneficial for campus touring of MCA Department-RVCE in particular, it can bring the feeling of reality and immersion to the user as if they are traveling in actual, but in reality, they are only experiencing the tour through VR headset. A headset itself helps to provide the 3D look, it can help people to have exhilarating experience without visiting that place in real and it can greatly influence the visitors due to its interactive nature.The sequence of the work will be carried out by stitching the normal images to get the panoramic images using Insta360 software and importing the panoramic images to the unity assets,then Importing the several packages required for Virtual reality to the unity assets and finally coding the required functions using C# language.The main aim of the project is to mimic real world by computer generated environment and engage all the sense of people using very powerful and compelling technology that is Virtual Reality. We hope that users can explore the infrastructure and facilities provided in the department of MCA RVCE with the user friendly interface which is also the expected improvement to an existing system.
Licence: creative commons attribution 4.0
Virtual Reality (VR), Virtual tour, RVCE.
Paper Title: SOLAR WIND HYBRID POWER GENERATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2106180
Register Paper ID - 208392
Title: SOLAR WIND HYBRID POWER GENERATION
Author Name(s): Snehal Namdev Mitake, Ruturaj Rajendra Bandal, Pragati Anil Kamble, Jaydip Jaysing Sathe, Ajay Toraskar
Publisher Journal name: IJCRT
Volume: 9
Issue: 6
Pages: b455-b458
Year: June 2021
Downloads: 1314
Energy has playing an important role in human life and economic development. World total annual energy consumption is increased. While fossil fuel (coal, oil, natural gas) provides three quarter of total. At current energy consumption rate proven coal reserve should last for about 200 years, Oil for approximately 40 years and natural gas for annual 60 years with the contradiction between rapid development. Now a days Non-conventional Power generation is one of the fastest growing sectors. So we select the solar wind hybrid power generation. The sun is the ultimate source of limitless solar energy in the form of light and heat. In a solar power generation system solar panel absorb sunrays and convert it into DC current, that will be used to charge battery. Also wind energy is limitless from the nature. Wind turbine rotate due to the force of wind and its rotor connected with generator also rotate and give AC current. This project involves the solar wind hybrid power generation that will be used to generate electricity. This system will provide the basic electricity requirement for the house. Solar power and wind energy are free making this system viable long-term solution for electrification. Purpose of investment in solar wind hybrid power generation project is to enter in development of green energy technology, which is the only ultimate source of energy for future generation.
Licence: creative commons attribution 4.0
Solar energy, wind energy, Hybrid Energy, DC current, PWM charge controller, Vertical axis wind turbine (VAWT), Electricity
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 13 | Issue 10 | Month- October 2025)