Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 8 | Issue 7

Volume 8 | Issue 7 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: PRIVACY BASED MULTIPLE LOCATION TRANSFORMATION USING ENCRYPTION FREE FRAMEWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007384

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007384

  Register Paper ID - 196870

  Title: PRIVACY BASED MULTIPLE LOCATION TRANSFORMATION USING ENCRYPTION FREE FRAMEWORK

  Author Name(s): Iswarya P, Padmapriya S

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3732-3739

 Year: July 2020

 Downloads: 1323

 Abstract

Recent advances in positioning techniques, small devices, GIS-based services, and ubiquitous connectivity, have enabled a large variety of location-based services able to tailor services according to the location of the individual requiring the service. Location information, however, if on one side is critical for providing customized services, on the other hand, if misused, can lead to privacy breaches. Location Privacy is the serious issue where the location can be easily traced with the given system. In images there will be metadata where it contains all the image details in at. At first the feature extraction will be made using Recurrent Neural Network (RNN) thus the location feature are get known. A dummy location is done with the Pseudo random Function and the metadata location is changed. The user can access only when the access is provided to them. Here the user access can be provided by the authority who they wish to share their location. Our scheme employs an entity, termed Function Generator, to distribute the spatial transformation parameters periodically, with which the users and the LSP(location service provider) can performs the mutual transformation between a real location and a pseudo location. Without the transforming parameters, the anonymizer cannot have any knowledge about a user�s real location. The main merits of our scheme include (1) no fully trusted entities are required; (2) each user can obtain accurate POIs, while preserving location privacy.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Location privacy, pseudo random function, privacy preserving, RNN extraction

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: VLSI ARCHITECTURE OF RECONFIGURABLE HARD DECISION VITERBI DECODER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007383

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007383

  Register Paper ID - 197124

  Title: VLSI ARCHITECTURE OF RECONFIGURABLE HARD DECISION VITERBI DECODER

  Author Name(s): N.Glory Priscilla, D.Vijayasri, Dr.M.Ramesh Patnaik

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3725-3731

 Year: July 2020

 Downloads: 1450

 Abstract

In order to control errors in data transmission through a noisy channel Viterbi algorithm has served as a powerful tool meant for interpreting the conventional codes. It is centred on extreme possibility algorithm for interpreting the data? While coming to hardware implementation of Viterbi algorithm became crucial as it drain large amount of assets because of its complexity. This paper confers the implementation of an efficient VHDL execution of a Viterbi decoder by means of the concept of pipelining to diminish the critical path. There by improving the operating frequency of the design and improving the through put using Modalism and Xilinx ISE tools for simulation and synthesis of modules respectively.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Error correcting code, convolutional codes, Viterbi algorithm, convolutional codes.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AI (NEURAL NETWORK) BATTERY MANAGEMENT SYSTEM FOR ELECTRIC VEHICLE.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007382

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007382

  Register Paper ID - 197096

  Title: AI (NEURAL NETWORK) BATTERY MANAGEMENT SYSTEM FOR ELECTRIC VEHICLE.

  Author Name(s): Shubhangi Gond

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3721-3724

 Year: July 2020

 Downloads: 1358

 Abstract

Engine drives vehicle by generating power. To generate this power engine need fuel. Imagine a vehicle without fuel is nothing but the piece of iron. Today where automotive world reach it was beautiful journey, this journey consists lots of ups and downs. Modern automotive face lots of challenges, out of all big challenge is �limited fuel source� �Fuel prices� etc. fuel prices rapidly increases now a days. So Automotive world is looking for substitute for fuel energy. For example, Solar energy, Battery energy, etc. A battery vehicle also called E-Vehicle. it is successful outputs of Automotive world over a fuel problem. In conventional vehicle it is easy to determine remaining fuel, you can check in fuel meter on dashboard. Also, Time required to Refill fuel in conventional vehicle is several minutes. however, in electric vehicle it is more challenging to monitor remaining energy and compared to conventional vehicle an electric vehicle needs several hours to refill rather than several minutes. Also, safety, operation, and even the life of the passenger depends on the battery system. Battery management system keep a continue eye on the key operational parameters during charging and discharging for example voltages, currents and the battery internal and ambient temperature. The BMS system would normally estimate and provide inputs to protection devices which would disconnect the battery from the load or charger any of the parameters like SOC, over charge, under charge, high temperature, become out of limits. All parameters are monitor and well manage with using Neural network algorithm will be implemented on MATLAB software for the process


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Battery, Fuel, charging, Neural Network, Temperature, Automotive, Gasoline, BMS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: LIGHTWEIGHT SECURITY SOLUTION TO SECURE THE DATA IN IOT SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007381

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007381

  Register Paper ID - 196882

  Title: LIGHTWEIGHT SECURITY SOLUTION TO SECURE THE DATA IN IOT SYSTEM

  Author Name(s): Prabha Singh

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3715-3720

 Year: July 2020

 Downloads: 1317

 Abstract

The Internet of Things (IoT) is an interactive environment, which interconnects material things to the internet and provides advance and intelligent services to a wide range of applications. This kind of complex and dynamic system is often susceptible to attack during data transmission and processing. Therefore, it is essential to know the origin of data and to assure that the source is reliable and the integrity of data is maintained during transmission. However, the limitation on the resources and heterogeneous environment brings several challenges for securing the data in the IoT system. Traditional security solution becomes infeasible because of low energy devices in the IoT system. The purpose of this paper is to present a lightweight security solution for the IoT system by using the Received signal strength indicator. RSSI values would be used to generate the link fingerprint. By comparing the link fingerprints values of various nodes on the server, the presence of adversarial nodes in the system can be detected. This method required very less energy in comparison to the other conventional method.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Internet of Things, Security, RSSI, Link Fingerprint

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A SURVEY ON DIFFERENT TECHNIQUES AND ALGORITHMS FOR IMAGE INPAINTING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007380

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007380

  Register Paper ID - 196958

  Title: A SURVEY ON DIFFERENT TECHNIQUES AND ALGORITHMS FOR IMAGE INPAINTING

  Author Name(s): Hinal Patel, Alka patel

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3711-3714

 Year: July 2020

 Downloads: 1366

 Abstract

The process of restoring missing or deteriorated regions in an image is called an Image Inpainting. The purpose of digital image inpainting is to reconstructing the loss information according to surrounding image information and to get rid of larger objects from them. The target of image inpainting is to modifying the digital image in an undetectable manner that the changes are invisible to an observer. Image inpainting has various applications such as restoration of older films, removal of objects, red-eye correction, and removal of text. This paper critically examines and reviews methods of Image Inpainting algorithm such as Exemplar based, Diffusion-Based, Partial Differential Equations (PDE) based, Texture based and Hybrid based.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Image Inpainting, Object removal, Image reconstruction, Structure, Texture

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ????????? ?? ????????? ??? ??????? ??????? ???????????? ????????

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007379

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007379

  Register Paper ID - 196880

  Title: ????????? ?? ????????? ??? ??????? ??????? ???????????? ????????

  Author Name(s): Dr INDIRA KUMARI

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3705-3710

 Year: July 2020

 Downloads: 1309

 Abstract

????????? ?? ???????? ?? ??????? ?????????? ?? ??? ??? ??????? ??


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ARTIFICIAL INTELLIGENCE (AI), INTERNET OF THINGS (IOT) AND MACHINE LEARNING (ML) IN HEALTHCARE- A WAY FORWARD

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007378

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007378

  Register Paper ID - 195959

  Title: ARTIFICIAL INTELLIGENCE (AI), INTERNET OF THINGS (IOT) AND MACHINE LEARNING (ML) IN HEALTHCARE- A WAY FORWARD

  Author Name(s): Prashant, Vipula, Dr Nitin

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3695-3704

 Year: July 2020

 Downloads: 1433

 Abstract

The idea of intelligent, independently learning machines have always been a dream for human race. Healthcare generates a vast amount of useful data and The Internet of Things (IoT) makes this feasible and provides a big volume without human intervention. But it is not cost effective to generate and analyse every bit of available data. This is where Machine Learning and Artificial Intelligence (AI) come to rescue. These technological branches of science help in sifting data received from IOT interfaces. Though it seems tempting and achievable, yet combining IOT and AI is tedious. It requires a massive investment and selective expertise. The present review discusses the basics of Artificial Intelligence, Machine Learning and Internet of Things, along with their applications in the field of healthcare.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Artificial Intelligence (AI), Internet of Things (IoT) and Machine Learning (ML) in Healthcare- A Way Forward

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EXPERIENCE BUILDING POLICY DEVELOPMENT IN SOCIAL ENTERPRISES SOME STATES AND LESSONS FOR VIETNAM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007377

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007377

  Register Paper ID - 196830

  Title: EXPERIENCE BUILDING POLICY DEVELOPMENT IN SOCIAL ENTERPRISES SOME STATES AND LESSONS FOR VIETNAM

  Author Name(s): Hanh Thi Hai Nguyen

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3688-3694

 Year: July 2020

 Downloads: 1417

 Abstract

Social Enterprises (SE) are developing all around the world in increasing numbers, as confirmed by national and international statistics and analysis. Some countries have put efforts on creating new development policies in order to support this kind of enterprise and enhance their chances to make a better value. The concept of Social Enterprises appeared in Vietnam from the last decade and expanded its value to many worlds. In this study, we analyzed and collected some experiences from some countries and gave lessons properly for Vietnam


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Social Enterprises (SE), Development Policy, Lesson

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMAGE SEGMENTATION AND CLASSIFICATION FOR VISION BASED DETECTION AND TRACKING OF MOVING OBJECT IN VIDEO SURVEILLANCE.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007376

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007376

  Register Paper ID - 197137

  Title: IMAGE SEGMENTATION AND CLASSIFICATION FOR VISION BASED DETECTION AND TRACKING OF MOVING OBJECT IN VIDEO SURVEILLANCE.

  Author Name(s): Ms. Apurva P.Ghadge, Dr. R. D. Ghongade

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3681-3687

 Year: July 2020

 Downloads: 1327

 Abstract

Moving object detection and tracking field gains a vast interest in it. Most of the moving objects detection methods operate by trying a binary classifier to sub-windows of an image, after that a non-maximum suppression step comes where detections on overlapping sub-windows are eliminated. As the number of feasible sub-windows in even middling sized image datasets is very large, the classifier is usually learned on only a subset of the windows. This circumvent the computational complexity and difficulty of dealing with the entire set of sub-windows , however, this paper address that, it leads to sub-optimal detector performance. Specially , the main offering of this paper is the initiation of a new method, Max-Margin object detection (MMOD), for understanding how to detect objects in images. This method does not execute any sub sampling, but instead optimizes overall sub-windows. MMOD is used to enhance any object detection method which is linear in the learned parameters, such as Histogram of Oriented Gradient (HOG) or bag-of-visual-word models. Using this strategy we manifest substantial performance gains in publicly available data sets. We represent that a single firm HOG filter can overcome a set-of-the-art deformable part model on the object detection data set and benchmark when the HOG filter is assimilated via MMOD.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Python, Open CV component, video surveillance, detection, tracking, moving images, object detection

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: USE OF SOCIAL MEDIA IN EDUCATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007375

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007375

  Register Paper ID - 197108

  Title: USE OF SOCIAL MEDIA IN EDUCATION

  Author Name(s): Pramod Kumar Malik

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3674-3680

 Year: July 2020

 Downloads: 1390

 Abstract

Social media has become second nature to today's learners, so why not use it in the classroom. Today's younger generation is hooked on social media. If given the choice between Tweeting or textbooks, which would students choose? Many teachers think that if they allow their students to use social media in the classroom, students will be posting status updates about how their day is going, which would only detract from educational experiences. However, social media can be a powerful educational tool that provides unique and dynamic learning experiences to students and teachers alike. Social media are becoming the most important tools for interaction among people, where everybody can share, exchange, comment, discuss and create information and knowledge in a collaborative way.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Social Media, Education,Learner, Tweet

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPROVING SERVER EFFICIENCY USING VM CONSOLIDATION AND MIGRATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007374

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007374

  Register Paper ID - 196934

  Title: IMPROVING SERVER EFFICIENCY USING VM CONSOLIDATION AND MIGRATION

  Author Name(s): M.Anandakumar, S.Gowsalya, M.Bhavithra, E.Sathiya priya

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3666-3673

 Year: July 2020

 Downloads: 1303

 Abstract

Cloud storage is a cloud computing model in which data is accumulated on remote servers accessed from the internet. Cloud is sustained, promoted and guided by a cloud storage service provider on a storage server that is built on virtualization procedure. A cloud application is a software program where cloud based and local components attempt mutually. The cloud server routinely is posted in a remote data centre fulfilled by a third party cloud service infrastructure provider. Virtualization is one of the mean to designate the cloud resource precisely. The exploit of the system can be upgraded by using local negotiation based Virtual Machine (VM) consolidation mechanism. To assign the resources, VM migration and Self destruction entrance are resolved. Self destruction intend run out the space when it is pristine for prolonged time. By using co-located strategy, the VM is generated by assemble the pristine space from alternative VM. The pristine storage can be reborned by automatic memory control framework.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

AES, VM monitoring, VM migration, SLA, Self destruction.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ETHOSOMES AS NOVEL DRUG DELIVERY CARRIER-A REVIEW

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007373

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007373

  Register Paper ID - 197107

  Title: ETHOSOMES AS NOVEL DRUG DELIVERY CARRIER-A REVIEW

  Author Name(s): Preeti Anil Agarwal

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3657-3665

 Year: July 2020

 Downloads: 1330

 Abstract

Skin is the constitutional and largest organ of the human body and also manageable organ of human body. The outermost layer of the skin stratum corneum (SC) causes a barrier for high molecular weight drug and hydrophilic drugs. Trans Dermal Drug Delivery system (TDDS) are the dosage form which are self-reliant ,distinct dosage form which reaches the system circulation when applied to the skin thus first pass metabolism. The objective of TDDS is to cross the stratum corneum (SC) for which various methods have been used to increase the penetration of the drugs into the skin this reaching the system circulation. Ethosomes are the most promising or pioneering novel drug delivery system. Ethosomes are the novel drug delivery system which contain high concentration of ethanol and water thus which improves the bioavailability and skin permeability. Ethosomes are the novel phospholipids carriers which enable the drugs to reach the blood circulation which are made up of phospholipids. This article focuses on advantages , disadvantages, preparation method, its dosage form such as gels, patches, and creams . Method of characterization parameters are highlighted such as vesicle size, zeta potential, size distribution etc. Ethosomes are innovative carriers for delivery of therapeutic agents


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

transdermal, skin permeability, ethosomes

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A STUDY AND COMPARATIVE ANALYSIS OF SOME ADVANCED SYMMETRIC BLOCK CIPHER TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007372

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007372

  Register Paper ID - 196950

  Title: A STUDY AND COMPARATIVE ANALYSIS OF SOME ADVANCED SYMMETRIC BLOCK CIPHER TECHNIQUES

  Author Name(s): SHIPRA SRIVASTAVA, BINAYAK PARASHAR

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3654-3656

 Year: July 2020

 Downloads: 1306

 Abstract

Symmetric key algorithm also known as secret key, uses same key for encryption and decryption. In future we will have more powerful, faster and better technology, so there will be requirement of advanced cryptographic algorithm for information security. This paper discusses about some advanced cryptographic algorithm with their advantages and disadvantages.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Symmetric key algorithm, AES, GOST, Kuznyechik, Magma, CAST, Serpent, SEED

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INVADING MEDIA AND ERODING TRUST IN THE POST TRUTH WORLD

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007371

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007371

  Register Paper ID - 197077

  Title: INVADING MEDIA AND ERODING TRUST IN THE POST TRUTH WORLD

  Author Name(s): Dr.Chitra.V.S

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3648-3653

 Year: July 2020

 Downloads: 1298

 Abstract

In an age where truth is found to be multifaceted and removed from personal reality, the concept of post truth gains importance This paper is an attempt to trace out a definition of post-truth, its specific characteristics in relation to the human world, and the influence of media, especially social media�how far it creates and distorts truth and the possibilities and prospects of this aspect in the post-truth world. It also discusses the erosion of trust that has taken part as the invasion of media and the ways to be devised to exercise a control over this condition.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

post truth, personal reality, media

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SEISMIC RESISTANT STRUCTURE BY USING TUNED MASS DAMPER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007370

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007370

  Register Paper ID - 197032

  Title: SEISMIC RESISTANT STRUCTURE BY USING TUNED MASS DAMPER

  Author Name(s): Nishant Satpute, Dattatray Zod, Prajwal Dive, Pranay Bagade, Dishant Jambhulkar

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3643-3647

 Year: July 2020

 Downloads: 1297

 Abstract

This Current trends in construction industry demands taller and lighter structures, which are also more flexible and having quite low damping value. This increases failure possibilities and also problems from serviceability point of view. Now-a-days several techniques are available to minimize the vibration of the structure, out of the several techniques available for vibration control ,concept of using TMD is a newer one. This study was made to study the effectiveness of using TMD for controlling vibration of structure. At first a numerical algorithm was developed to investigate the response of a shear building fitted with a TMD. Then another numerical algorithm was developed to investigate the response of a 2D frame model fitted with a TMD. A total of three loading conditions were applied at the base of the structure. First one was a sinusoidal loading, the second one was corresponding to compatible time history as per spectra of IS-1894 (Part -1):2002 for 5% damping at rocky soil with (PGA = 1g) and the third one was 1940 El Centro Earthquake record with (PGA = 0.313g). From the study it was found that, TMD can be effectively used for vibration control of structures. TMD was more effective when damping ratio of the structure is less. Gradually increasing the mass ratio of the TMD results in gradual decrement in the displacement response of the structure.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Tuned mass damper, Vibration, Frame structure, Damping Ratio.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ADAPTABILITY TO VIRTUAL LEARNING ENVIRONMENT IN HIGHER EDUCATIONAL INSTITUTIONS: TEACHERS� PERSPECTIVE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007369

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007369

  Register Paper ID - 197069

  Title: ADAPTABILITY TO VIRTUAL LEARNING ENVIRONMENT IN HIGHER EDUCATIONAL INSTITUTIONS: TEACHERS� PERSPECTIVE

  Author Name(s): RAJAT BHATTACHARJEE, ARUNA DEV RROY

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3636-3642

 Year: July 2020

 Downloads: 1344

 Abstract

Digitalisation has revolutionised the educational world right from designing the course structure, course content to the delivery and assessment of the learners. While the developing countries had long adapted to the digital environment in the field of higher education, the onslaught of the current pandemic has made it a necessity in the Indian scenario. This paper seeks to examine teachers� adaptability towards learning in a virtual environment in higher educational institutions in Guwahati. The research focuses on three vital aspects regarding the teachers� perspective namely, their attitude, personal innovation and style of teaching. The study concludes that the teachers present a positive picture for suitable adaptation to virtual learning environment in the higher educational institutions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Attitude, higher educational institutions, teachers, virtual learning environment.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: THE EFFECTIVENESS OF LARGE SCALE SOCIAL RESTRICTION (LSSR) POLICY IN THE PREVENTION OF COVID-19 TRANSMISSION IN INDONESIA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007368

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007368

  Register Paper ID - 197017

  Title: THE EFFECTIVENESS OF LARGE SCALE SOCIAL RESTRICTION (LSSR) POLICY IN THE PREVENTION OF COVID-19 TRANSMISSION IN INDONESIA

  Author Name(s): Edy Nurcahyo, Sara Ida Magdalena Awi, Yogi Yasa Wedha, Holy One Singadimedja, Ahmad Rosidi

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3630-3635

 Year: July 2020

 Downloads: 1333

 Abstract

This article aims to describe the effectiveness of large scale social restrictions on the prevention of covid-19 transmission in Indonesia. Covid-19 is a very dangerous plague for the survival and progress of development in Indonesia. Therefore a large scale social Restriction policy is needed in order to prevent covid-19 transmission. The research method used is empirical law research. In this study using a case approach and legislation (statute approach). The analysis used is a qualitative analysis. The purpose of the LSSR policy is to prevent the widespread spreads of the Community Health Emergency disease that is happening among people in a certain area. The effectiveness of large scale social restrictions (LSSR) policies in Indonesia is still very weak due to several inhibiting factors, one of which is the level of public awareness.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Effectiveness, Policy, Large scale Social Restrictions, Prevention, Transmission, Covid-19

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW ON CORONA VIRUS (COVID-19) PANDEMIC, ITS GLOBAL EMERGENCY OUTBREAK AND ITS CONSEQUENCES IN INDIA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007367

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007367

  Register Paper ID - 197085

  Title: A REVIEW ON CORONA VIRUS (COVID-19) PANDEMIC, ITS GLOBAL EMERGENCY OUTBREAK AND ITS CONSEQUENCES IN INDIA

  Author Name(s): Dr.Sonia Mehrotra , Dr.Ragini Sehgal Sethi

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3618-3629

 Year: July 2020

 Downloads: 1344

 Abstract

The outbreak of COVID-19(Severe Acute Respiratory Syndrome Coronavirus- 2) caused threatening viral pneumonia by the end of year 2019. It affects the respiratory tract mainly by binding to the ACE-2 receptors and TMPRSS2, SARS-CoV-2 belongs to the genus Beta-coronavirus, caused the global epicentre in Wuhan, China, and then transformed into a pandemic affecting millions across the world. In India, The World Health Organization and The Central Government of India are ensuring detection and Administrative management of cases suffering from SARS-CoV-2. Recommended guidelines are released by the Central Government of India, Department of Health Research (DHR) and The Indian Council of Medical Research (ICMR). These organisations are able to control and measure the infection of SARS-CoV-2 in accordance to the guidelines of WHO and The Centre for Disease Control and Prevention (CDC) health care professionals and research scientists are trying to identify, isolate, collect specimen and identify the different courses of transmission in humans, manage affected cases of covid-19 by using these recommended guidelines. The detailed genomic sequence(Compare of SARS-CoV-2, SARS-CoV, and MERS-CoV), have many similarities and differences in their genomic structures based on its phylogenetic relationships and is useful for developing diagnostic kits, efficient anti corona virus drugs and also in development of vaccinations. The National Institutes of Health (NIH) providing funding opportunities on COVID-19 clinical trials. In this review article we are trying to focus all these points mainly in Indian perspective and our centre�s experiences that may help prevent the further spread of the pandemic.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Covid-19, lockdown, Indian Situation, recommended guidelines, SARS-CoV-2, SARS-CoV, and MERS-CoV

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FAKE REVIEW DETECTION USING MACHINE LEARNING TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007366

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007366

  Register Paper ID - 197030

  Title: FAKE REVIEW DETECTION USING MACHINE LEARNING TECHNIQUES

  Author Name(s): Sangamesh Gama, Abhinandan V, Aishwarya C A, Arshiya Sultana

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3613-3617

 Year: July 2020

 Downloads: 1438

 Abstract

Online reviews play a vital role in today�s business and commerce. In the world of e-commerce, reviews are the best signs of success and failure. Business that has good reviews get a lot of free exposure on websites and pages that have good reviews show up at top of the search results. Fake Reviews are everywhere online. Online fake reviews are the reviews which are written by someone who has not actually used the product or the services. Because of the cut-throat competitions, sellers are now willing to resort unfair means of making their product shine out .This work introduces some supervised machine learning techniques to detect fake online reviews and also be able to block the malicious users who post such reviews.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Fake Review Prediction, Machine Learning, Na�ve Bayes Classifier, Natural Language Processing (NLP)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TECHNOLOGY AND LANGUAGE PROGRESSION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2007365

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2007365

  Register Paper ID - 197115

  Title: TECHNOLOGY AND LANGUAGE PROGRESSION

  Author Name(s): Dr Kalpana S Singh

 Publisher Journal name: IJCRT

 Volume: 8

 Issue: 7

 Pages: 3608-3613

 Year: July 2020

 Downloads: 1311

 Abstract

Technology and Language Progression Abstract English language is always adapting, but these changes have come about more hastily as technology has developed in recent years. Rapidly growing influence of technology has altered the way in which we live and think. The cultural, social, and economic life of man has drastically changed. The transform was not limited to the technical things but also the very production and reception of literature. As human beings we develop our own ways to express new things, as well as adapting to different forms of communications. As the digital era has changed the way we communicate, it has also affected the way we use language. We delve deeper in to the ways digital devices have been changing our lives to see how this has affected the English language. In recent years, more and more of our communications are carried out via mobile devices, internet, and social media. These communication channels have introduced some new challenges to users, which have brought about changes in the use of language.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

English, language, technology,change

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 7 | Month- July 2024)

Call For Paper July 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer