IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: ROLE OF LIBRARIANS IN CAPACITY BUILDING OF NURSES IN PUBLIC HEALTH SECTOR
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107743
Register Paper ID - 214400
Title: ROLE OF LIBRARIANS IN CAPACITY BUILDING OF NURSES IN PUBLIC HEALTH SECTOR
Author Name(s): DR SUMAN MUDDAPUR
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g838-g843
Year: July 2021
Downloads: 874
Licence: creative commons attribution 4.0
Health Professionals, Nurse Training, Information Literacy, Skill Training, Capacity Building, Public Health Sector
Paper Title: IMPACT OF ONLINE ADVERTISING ON FEMALE CONSUMERS, WITH REFERENCE TO THE CLOTHING INDUSTRY: A STUDY CONDUCTED IN BANGALORE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107742
Register Paper ID - 212326
Title: IMPACT OF ONLINE ADVERTISING ON FEMALE CONSUMERS, WITH REFERENCE TO THE CLOTHING INDUSTRY: A STUDY CONDUCTED IN BANGALORE
Author Name(s): Kulsum Misha Suhail, Dr. Bhargavi D. Hemmige
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g821-g837
Year: July 2021
Downloads: 1673
IMPACT OF ONLINE ADVERTISING ON FEMALE CONSUMERS, WITH REFERENCE TO THE CLOTHING INDUSTRY: A STUDY CONDUCTED IN BANGALORE
Licence: creative commons attribution 4.0
IMPACT OF ONLINE ADVERTISING ON FEMALE CONSUMERS, WITH REFERENCE TO THE CLOTHING INDUSTRY: A STUDY CONDUCTED IN BANGALORE
Paper Title: Theme of Multiculturalism in Khushvant Singh`s Train to Pakistan
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107741
Register Paper ID - 211959
Title: THEME OF MULTICULTURALISM IN KHUSHVANT SINGH`S TRAIN TO PAKISTAN
Author Name(s): Dr. Gopal B. Shelkikar
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g818-g820
Year: July 2021
Downloads: 1793
The novel presents the tragic tale of the partition period in Indian history. The partition was a political pronouncement, which had caused miseries and sufferings to the people from diverse communities and cultures, particularly the Sikhs, Hindus and Muslims. It had devalued humanistic values and principles and created a sense of hatred, antagonism and hostility among different communities and cultures. This is an analysis of Train to Pakistan form the socio-political perspective of multiculturalism. First we should study the history of partition, a necessary background to the analysis of the novel and later multiculturalism. The most recent MLA 8th edition has been used for citation and documentation.
Licence: creative commons attribution 4.0
multiculturalism, Communities, Cultures, ideology, politics, minority, etc.
Paper Title: SAJNASUTRA-SANCHARANVIDHIH
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107740
Register Paper ID - 211444
Title: SAJNASUTRA-SANCHARANVIDHIH
Author Name(s): Dr. Giridhari Panda
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g814-g817
Year: July 2021
Downloads: 1750
Abstract (???????) - ???????????????????? ?????? ?????????????? ?????? ???? ???? ?????????????? ????????? ????????? ?????? ??????? ????? ????????????? ? ????????????????????? ???????????????????? ???????? ??????? ????????? ????????? ??????? ???? ???????? ???????? ?????? ?????????????, ??????? ? ??? ??????? ???????? ???????, ??????? ??????? ?????????, ?????? ?? ???????????? ??????????????? ?? ??????????? ?????????????? ?????????????? ?????, ???? ??????????? ?????????????? ?????? ??? ????????? ???????? ?????????? ???????????? ??????????? ???????????????????? ?????????????? ???? ???????????????????????? ?????, ????? ????????????? ?????? ??????????? ???????????????????????????????? ??????? ? ??????????? ????????????????????? ??????????????????? ??????? ??????? ????????????? ?????? ??? ?? ????????? ??????????????? ??????????????? ??? ?????? ???????? ???????????? ?????????? ??????? ???????? ???????? ?????? ??????????????????? ????? ???? ??????????????? ???????? ??? ????? ?????? ???????????? ?????? ? ??????????????? ?????????????? ???????????? ????????????? ? ??????? ???????? ?????????? ????? ??? ????? ????????????????? ???? ???????????????? ????????????? ????????? ????????????? ????????? ?????????????????? ? ???????? ????? ?????????????? ??? ????? ??????????????? ??? ??????? ??????????? ????????? ??????? ?????????????? ?????????????? ??? ????????????????? ?????????????? ???????? ?????? ?????????????? ?????????????? ?????????? ????????????? ? ???????????????????? ?????????????? ?????????? ????????
Licence: creative commons attribution 4.0
Key Words- ???????,??????,???????,??????????????????????, ??????????????????????
Paper Title: MEDICAL IMAGE COMPRESSION USING DISCRETE WAVELET TRANSFORMATION (DWT)
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107739
Register Paper ID - 211119
Title: MEDICAL IMAGE COMPRESSION USING DISCRETE WAVELET TRANSFORMATION (DWT)
Author Name(s): GAJJELA DURGA RAO, V.SARALA
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g808-g813
Year: July 2021
Downloads: 1610
Licence: creative commons attribution 4.0
MEDICAL IMAGE COMPRESSION USING DISCRETE WAVELET TRANSFORMATION (DWT)
Paper Title: AUTOMATIC DATABASE SCHEMA GENERATION TOOL FOR EXECUTING SQL QUERIES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107738
Register Paper ID - 211118
Title: AUTOMATIC DATABASE SCHEMA GENERATION TOOL FOR EXECUTING SQL QUERIES
Author Name(s): DASARI HEMA PRASANTH, V.SARALA
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g800-g807
Year: July 2021
Downloads: 1644
The Automatic Database Schema Generation is a framework, which permits the engineers to concentrate on making the database utilizing the GUI interface .The client needs to satisfy the necessities in the interface and he can play out the database tasks which he needs and can make the database. This task focuses on making of a programmed database outline age. This task will be available to all designers and its office permits engineers to concentrate on making the database pattern based on JSP while letting the application worker characterize table dependent on the fields in JSP and connections between them. This framework gives the accompanying offices. This encourages the client to concentrate much on application viewpoints deserting the database aspects. This venture permits clients to create database composition age without having a lot of information on database aspects.
Licence: creative commons attribution 4.0
Automatic, Database, Schema, Generation
Paper Title: SECURITY OF WEB PAGES USING CAPTCHA TECHNIQUE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107737
Register Paper ID - 211117
Title: SECURITY OF WEB PAGES USING CAPTCHA TECHNIQUE
Author Name(s): DASARI BENRJEE, V.SARALA
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g790-g799
Year: July 2021
Downloads: 1637
In general for most of the web sites, there will be registration page for creating a profile and all the details need to be filled by the user who wish to register. But in some conditions the user may miss some fields empty and at that situation robots try to enter their illegal contents inside those fields and change the original contents. Hence there is no proper authentication for web pages in order to identify whether they are filled by user or robots. This project is a solution for improving the security of web forms from web bots (robots). This project delivers the best result than the existing system. The emphasis is on the CAPTCA (Completely Automated Public Turing test to tell Computers and Humans Apart) method that is most often used method. We are implementing a security method in java web programming.
Licence: creative commons attribution 4.0
SECURITY OF WEB PAGES USING CAPTCHA TECHNIQUE
Paper Title: DESIGN AND ANALYSIS OF CLOUD DATA SECURITY FOR MASSES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107736
Register Paper ID - 210965
Title: DESIGN AND ANALYSIS OF CLOUD DATA SECURITY FOR MASSES
Author Name(s): NAKARABOYINA SANKAR, L. SOWJANYA
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g777-g789
Year: July 2021
Downloads: 1636
In present days cloud has gained a lot of importance in storing and accessing the information through remote locations with the help of internet .The primary advantage of adopting this cloud computing domain for business and firms is mainly because the service can be accessed from anywhere, time independent and remote access with the help of secure internet connection. Since this was mostly adopted by several clients for storing and accessing their valuable information still it is having a problem like data theft to misuse the sensitive data by modifying the content illegally. Here we try to design DSaaS (Data Security as a Service) by integrating two main techniques called Data Encryption and Verification using TPA (Third Party Auditor) in order to protect the data from un-authorized users. This DSaaS service offered by a cloud platform enforces data security and privacy to data owners, even if there are any compromised applications or users present within the cloud storage .
Licence: creative commons attribution 4.0
DESIGN AND ANALYSIS OF CLOUD DATA SECURITY FOR MASSES
Paper Title: SECURING PATIENTS DATA STORAGE IN REAL WORLD CLOUD
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107735
Register Paper ID - 211081
Title: SECURING PATIENTS DATA STORAGE IN REAL WORLD CLOUD
Author Name(s): RALLABANDI SRI LAKSHMI KAMESWARI, L. SOWJANYA
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g768-g776
Year: July 2021
Downloads: 1543
In current days cloud has gotten one of the entrancing area so as to store and recover all the information from the distant machines rather from the neighborhood machines. With the notoriety of wearable gadgets, alongside the improvement of mists and cloud hand held innovation, there is a colossal increment for the clinical consideration so as to store and access the data distantly. Because of the rising innovation every single clinical organization attempt to store and access data inside the cloud worker, which leaves a way for the gatecrasher to hack the information un-approved way. So in this paper we attempt to recognize the gatecrasher who attempt to change or adjust the patient data illicitly during information stockpiling.
Licence: creative commons attribution 4.0
emerging technology, cloud server, hack , unauthorized manner.
Paper Title: SECURITY DATA IN INTERNET OF THINGS USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107734
Register Paper ID - 210975
Title: SECURITY DATA IN INTERNET OF THINGS USING CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES
Author Name(s): KOTA JAYA SRI, B.SURYANARAYANA MURTHY
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g757-g767
Year: July 2021
Downloads: 1122
Internet of Things (IoT) is a domain wherein which the transfer of data is taking place every single second. The security of these data is a challenging task; however, security challenges can be overcome with cryptography and steganography techniques. These techniques are crucial when dealing with user authentication and data privacy. In the proposed work, the elliptic Galois cryptography protocol is introduced and discussed. In this protocol, a cryptography technique is used to encrypt confidential data that came from different medical sources. Here we try to encrypt the Image and send through network from sender to receiver.
Licence: creative commons attribution 4.0
Internet of Things, cryptography, steganography, Image, Encryption, Decryption
Paper Title: INTRUSION DETECTION USING DANGER OR NORMAL MODE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107733
Register Paper ID - 211077
Title: INTRUSION DETECTION USING DANGER OR NORMAL MODE
Author Name(s): KOMMANA LAKSHMI NARAYANA, B.SURYANARAYANA MURTHY
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g738-g756
Year: July 2021
Downloads: 1132
Now a days there is a huge demand and interest in using path identifiers (PIDs) for data communication .These PIDs act as a inter-domain routing objects to avoid distributed denial-of service (DDoS) attacks. As we all know that path identifer are designed earlier , those are static in nature and hence it is very easy for the attackers to create any attack on a fixed path. To address this issue, in this present application we try to design and implement a novel path identifiers for data communication like dynamic D-PID, a framework that is not at all implemented in any DTNs till today. In DPID, the PID of an inter-domain path connecting two domains is kept secret and changes dynamically, so there is no chance for any attacker to identify which path the data is travelling and he cant able to convert nodes into faulty state. We simulated our application using socket programming language along with java network package to verify the effectiveness and cost. The results from both simulations and experiments show that dynamic nature of identifying faulty nodes and providing alternate path for data transfer can effectively prevent DDoS attacks.
Licence: creative commons attribution 4.0
INTRUSION DETECTION USING DANGER OR NORMAL MODE
Paper Title: DETECT AND IDENTIFY THE SHAMEFUL TWEETS ON TWITTER SOCIAL NETWORK
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107732
Register Paper ID - 211069
Title: DETECT AND IDENTIFY THE SHAMEFUL TWEETS ON TWITTER SOCIAL NETWORK
Author Name(s): BATHINA VIJAY KUMAR, K.RAMBABU
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g730-g737
Year: July 2021
Downloads: 1095
Nowadays almost all the users try to exchange their day to day updates in their life on online social networks like Facebook, Twitter, and a lot more. In general, the users want to tweet on some friend's tweets either in a positive manner or in a negative manner based on their original feelings. In a recent survey report, there are a lot of posts that are contained in shameful tweets with some shameful related comments and replies. These tweets may contain some times information about political, social, and financial life with some shameful related messages, hence there is no method to identify these types of tweets automatically and try to display these tweets separately. Hence in this proposed application, we try to design a new method that can able to identify the tweets and its inner meaning of those tweets and try to categorize the tweets into separate categories like positive, negative, and shameful. Here we try to use Feature Extraction Method along with SVM Classifier algorithm for classifying the shameful tweets and normal tweets individually.
Licence: creative commons attribution 4.0
DETECT AND IDENTIFY THE SHAMEFUL TWEETS ON TWITTER SOCIAL NETWORK
Paper Title: PLANT DISEASE IDENTIFICATION USING MACHINE LEARNING ALGORITHMS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107731
Register Paper ID - 211073
Title: PLANT DISEASE IDENTIFICATION USING MACHINE LEARNING ALGORITHMS
Author Name(s): BORRA PRASANTHI, V.SARALA
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g716-g729
Year: July 2021
Downloads: 1022
The Machine Learning (ML) field has gained its momentum in almost any domain of research and just recently has become a reliable tool in the medical domain. Identification of the plant diseases is the key to prevent the losses in the yield and quantity of the agricultural product. The studies of the plant diseases mean the study of visually observed patterns seen on the plant. Health monitoring and disease detection on the plant is very critical for the substantial growth. It is very difficult to identify the diseases on the plant manually and provide the treatment for that appropriate disease. It requires a tremendous amount of work experience and should be expertise in the plant diseases and also requires excessive time for processing. Here in this proposed application we try to find out the disease of the plant based on the inputs which we observe physically on any plant. For any plant there are 5 levels of disease occurrences: Stem Level, Leaves Level, Seed Level,Lessions Level, Plant Level. So any disease on the plant can be either of these five levels. We try to design an medical dictionary in which all the physical inputs are substituted according to any of the level and then try to detect which disease plant is suffered with and it will try to provide cure for that appropriate disease. Our evaluation results on the proposed method using ML approach for identifying diseases on plant able to identify the diseases accurately and try to provide a solution for the end users.
Licence: creative commons attribution 4.0
Plant Diseases, Machine Learning, Medical Diseases
Paper Title: ONLINE SHOPPING PREDICTION USING TRUSTABILITY GRAPH
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107730
Register Paper ID - 211007
Title: ONLINE SHOPPING PREDICTION USING TRUSTABILITY GRAPH
Author Name(s): SIRIPARAPU RAMYA, K.VENKATESH
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g707-g715
Year: July 2021
Downloads: 1053
Online shopping and opinion mining have gained more and more importance due to the emergence of the world wide web and a lot of e-commerce web sites. As we as a whole realize that clients are attempting to buy every single thing through online as opposed to visiting the shops legitimately for those things. Online business is becoming quicker than anticipated all things considered up over 98% analyzed before. As clients have the simplicity to purchase things without investing a lot of energy there are additionally a few hoodlums who attempt to extortion and get benefit in unlawful manners. As individuals are getting a charge out of the focal points from web based exchanging, programmers are additionally taking favorable circumstances to achieve criminal operations against certified clients so as to get deceptive benefit. In this paper we mainly design a online model which can able to detect and identify the user reviews in early manner based on users individual reviews and opinions for the products. Finally we show that this model can probably distinguish primitive e-commerce sites and current site and extensively decrease customer complaints which are based on real-world online fraud detection.
Licence: creative commons attribution 4.0
Real World, Online Fraud Detection, Reviews, Early Reviews , Individual, Online Model,Pro-Active.
Paper Title: FUNDAMENTAL VISUAL CONCEPT LEARNING FROM CORRELATED IMAGES AND TEXT ANNOTATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107729
Register Paper ID - 210970
Title: FUNDAMENTAL VISUAL CONCEPT LEARNING FROM CORRELATED IMAGES AND TEXT ANNOTATION
Author Name(s): GAJJELA DURGA RAO, V.SARALA
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g700-g706
Year: July 2021
Downloads: 1092
Heterogeneous web media consists of many visual concepts, such as objects, scenes and activities, that cannot be semantically decomposed. The task of learning fundamental visual concepts (FVCs) plays an important role in automatically understanding the elements that compose all visual media, as well as in applications of retrieval, annotation, etc.In this project we try to apply annotations for all the images which are uploaded in the online web by taking neighboring concept distributing (NCD) attribute ,in which those which are having some similar difference will be added with same type of annotation and then they are tagged.
Licence: creative commons attribution 4.0
FUNDAMENTAL VISUAL CONCEPT LEARNING FROM CORRELATED IMAGES AND TEXT ANNOTATION
Paper Title: GIVING BACK TO SOCIETY: CORPORATE SOCIAL RESPONSIBILITY AT NALCO AND IMFA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107728
Register Paper ID - 210895
Title: GIVING BACK TO SOCIETY: CORPORATE SOCIAL RESPONSIBILITY AT NALCO AND IMFA
Author Name(s): Surama Mohanty, Dr. Bidhu Bhusan Mishra
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g684-g699
Year: July 2021
Downloads: 1171
GIVING BACK TO SOCIETY: CORPORATE SOCIAL RESPONSIBILITY AT NALCO AND IMFA
Licence: creative commons attribution 4.0
GIVING BACK TO SOCIETY: CORPORATE SOCIAL RESPONSIBILITY AT NALCO AND IMFA
Paper Title: A STUDY ON EFFECTIVENESS OF TRAINING PROGRAMME AT HCL PERIPHERALS.,THATTANCHAVADY PUDUCHERRY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107727
Register Paper ID - 210182
Title: A STUDY ON EFFECTIVENESS OF TRAINING PROGRAMME AT HCL PERIPHERALS.,THATTANCHAVADY PUDUCHERRY
Author Name(s): S SONIYA
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g677-g683
Year: July 2021
Downloads: 1262
Training is a learning experience, in that it seeks a relatively permanent change in an individual which will improve his (or) her ability to perform on the job. We typically say training can change the skill, knowledge, attitude and social behavior. It means changing what employees know, how they work, their attitude towards their work or their interaction with their co-workers or their supervisors.
Licence: creative commons attribution 4.0
Perform, Interaction, Behavior, Leadership
Paper Title: INFLUENCE OF CREATIVE ADVERTISEMENTS ON CUSTOMER LOYALTY IN BANKING SECTOR
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107725
Register Paper ID - 210747
Title: INFLUENCE OF CREATIVE ADVERTISEMENTS ON CUSTOMER LOYALTY IN BANKING SECTOR
Author Name(s): Divya Mamtani, Dr. Preeti Singh
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g662-g671
Year: July 2021
Downloads: 1126
Now a days, creative advertisements plays very significant role to achieve the success among competitive advertising. Creative advertisements are helpful in generating a favourable response from consumers and build long term relationship with them. The purpose of this research is to identify the key factors of creative advertisements on customer loyalty in banking sector. This study will be beneficial to understand the perspective of consumers towards loyalty. The study is conducted among 147 individuals in the city of Indore to find out their perception towards creative advertisements. The study is based on primary data that were collected through closed ended questionnaire. The results were analysed with the help of factor analysis and regression analysis. Results of this study can help marketers, organizations and advertisers in formulating effective strategies to engage with the target market.
Licence: creative commons attribution 4.0
Creative advertisements, Customer loyalty, Consumers, Organizations, Advertisers, Effective strategies
Paper Title: A SYSTEMATIC REVIEW OF THE APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN AUTOIMMUNE DISEASES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107724
Register Paper ID - 210810
Title: A SYSTEMATIC REVIEW OF THE APPLICATIONS OF ARTIFICIAL INTELLIGENCE IN AUTOIMMUNE DISEASES
Author Name(s): Ishaq Azhar Mohammed
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g658-g661
Year: July 2021
Downloads: 1100
The purpose of this study is to present an overview of how artificial intelligence (AI) might be utilized to solve health problems caused by autoimmune illnesses. More than 80 kinds of autoimmune disorders impact a wide array of areas of the body. Diagnosis may sometimes be challenging since these symptoms might mimic those of other more prevalent diseases. Autoimmune system diseases are characterized by either unusually low or excessive immune system activities [1]. When the immune system becomes too active, the body fights and destroys its tissues. Immune deficiency disorders weaken the body's capacity to combat intruders and make infection vulnerable. The immune system may produce antibodies in reaction to an unexpected cause, which targets their tissues rather than combat infection. In general, autoimmune disorders are treated by decreasing immune system activation [1]. In the last decade, the treatment plan for self-immune illnesses has changed significantly, leading mainly from precision medicine to precise health and from precise efforts in the healthcare system [1,2]. To comprehend and apply these methods pragmatically, the motivations, gaps, and limits of precision medicine need to be understood. The importance of earning the confidence of the people and patients cannot be overstated, but it is important to recognize that innovations like artificial intelligence still necessitate context, which can only be made available by human intervention, or what is known as augmented machine learning.
Licence: creative commons attribution 4.0
Artificial Intelligence, Autoimmune diseases, Biomarkers, machine learning, genetics, genomes
Paper Title: ACCURACY ANALYSIS USING MACHINE LEARNING CLASSIFIERS FOR HARDWARE TROJAN DETECTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2107722
Register Paper ID - 210432
Title: ACCURACY ANALYSIS USING MACHINE LEARNING CLASSIFIERS FOR HARDWARE TROJAN DETECTION
Author Name(s): Mrs.V.Sree Lahari, R. Bharathi Jyothi, P. S. S. Keerthi, S. Sireesha, P. Krishna Priya
Publisher Journal name: IJCRT
Volume: 9
Issue: 7
Pages: g646-g652
Year: July 2021
Downloads: 1228
Licence: creative commons attribution 4.0
Feature Extraction,Random Forest Algorithm,Ada Boost Classifier,Decision Tree Algorithm, Gradient Boosting Algorithm, Decision Fusion
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 13 | Issue 10 | Month- October 2025)

