IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.
ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)
| IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Quantum-Resistant Cryptography: Uniting Lattice-Based Encryption and Code-Based Error Correction for Enhanced Security
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02020
Register Paper ID - 294055
Title: QUANTUM-RESISTANT CRYPTOGRAPHY: UNITING LATTICE-BASED ENCRYPTION AND CODE-BASED ERROR CORRECTION FOR ENHANCED SECURITY
Author Name(s): S.Nithiyanandam, J.Prince Raj
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 169-181
Year: September 2025
Downloads: 87
As quantum computing advances, traditional cryptographic methods face significant threats from quantum algorithms, necessitating the development of quantum-resistant encryption systems. This paper explores a modified cryptographic algorithm combining lattice-based encryption techniques with enhanced noise, larger key sizes, and increased modulus values to resist quantum attacks. Utilizing Google's Cirq quantum simulator, the robustness of the algorithm against quantum period-finding techniques is evaluated, showing minimal or no detectable periodicity. These findings underscore the effectiveness of the proposed method for quantum resistance. This framework is especially applicable to IoT and cloud environments, offering long-term data protection and resilience in noisy communication channels.
Licence: creative commons attribution 4.0
Quantum-Resistant Cryptography: Uniting Lattice-Based Encryption and Code-Based Error Correction for Enhanced Security
Paper Title: The Blockchain Paradox: Navigating the Twin Forces of Innovation and Threats
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02019
Register Paper ID - 294056
Title: THE BLOCKCHAIN PARADOX: NAVIGATING THE TWIN FORCES OF INNOVATION AND THREATS
Author Name(s): S.Shamili, G.Nalinipriya
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 164-168
Year: September 2025
Downloads: 86
Blockchain technology has revolutionized digital security by enabling decentralized, tamper-resistant, and transparent data management. However, with its increasing adoption, blockchain faces a growing number of security threats, including smart contract vulnerabilities, 51% attacks, Sybil attacks, cross-chain interoperability risks, and the potential impact of quantum computing. Ensuring robust security in blockchain systems is crucial for applications such as things like decentralized finance (DeFi), tracking goods in the supply chain, and verifying digital identities.This survey provides a systematic review of blockchain security threats and mitigation strategies. We categorize vulnerabilities based on blockchain layers-- network, consensus, and application--and analyze emerging defense mechanisms. Advanced solutions such as artificial intelligence (AI)-driven anomaly detection, automated smart contract verification, Zero-Knowledge Proofs (ZKPs) for privacy preservation, and quantum-resistant cryptographic techniques are explored. Additionally, we discuss blockchain forensic artificial intelligence (AI)-driven anomaly detection, automated smart contract verification, Zero-Knowledge Proofs (ZKPs) for privacy preservation, and quantum- resistant cryptographic techniques. Additionally, blockchain forensic techniques are being developed to detect fraudulent activities and illicit transactions. This survey provides a comprehensive review of block-chain security threats and mitigation strategies. We categorize vulnerabilities based on blockchain layers--network, consensus, and application-- and analyze emerging defense mechanisms. By consolidating recent advancements and identifying open research challenges, this paper aims to guide future research in developing secure and resilient blockchain architectures. II. SECURTY THREATS IN BLOCKCHAIN techniques for detecting fraud and illicit transactions.By A. Network Layer Attacks consolidating recent advancements and identifying open research challenges, this paper serves as a roadmap for future research in blockchain security. Our analysis highlights the need for adaptive, AI-enhanced security frameworks and novel cryptographic approaches to address evolving threats. This survey aims to assist researchers and industry professionals in developing secure and resilient blockchain architectures for the next decade and application layers. Additionally, we explore AI- driven security mechanisms and cryptographic advancements to enhance blockchain security.
Licence: creative commons attribution 4.0
Blockchain security ,Smart contract vulnerabilities ,Quantum-resistant cryptography,AI-driven security.
Paper Title: Signspeak Speech To Sign Language Convertor
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02018
Register Paper ID - 294057
Title: SIGNSPEAK SPEECH TO SIGN LANGUAGE CONVERTOR
Author Name(s): Joshua Sheron D, Rishab S, Siddhartha P, Uma P
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 158-163
Year: September 2025
Downloads: 82
This project aims to develop an advanced communication system called SignSpeak, designed to bridge the gap between spoken language and sign language, thereby promoting greater inclusivity for individuals with hearing and speech impairments in public interactions and official functions. In many real-world scenarios, the absence of sign language interpreters poses a significant communication barrier, often excluding hearing- impaired individuals from accessing essential information. The existing solutions involve stitching together video clips, based on the input text. These solutions are not scalable and moreover the actions rigid and lacks real time feedback loop. SignSpeak addresses this challenge by leveraging Automatic Speech Recognition and Natural Language Processing to capture and semantically interpret real-time speech input. The processed text is then translated into sign language using a Sign Language Generation model, which is rendered through an expressive virtual avatar capable of conveying sign language gestures accurately and naturally. By automating the entire speech-to-sign language conversion pipeline, the system eliminates the dependency on human interpreters, ensuring scalability, cost-effectiveness, and consistent accuracy across diverse environments such as government offices, hospitals, educational institutions, and public events. Ultimately, SignSpeak offers a robust, real-time, and scalable solution that enhances communication accessibility, promotes digital inclusivity, and empowers the hearing-impaired community by enabling equal participation in society through improved access to spoken information.
Licence: creative commons attribution 4.0
Indian Sign Language, Speech to Sign Language, ISL, Avatar-based Sign Language, Text to Sign Language, Speech Recognition, Digital Accessibility, Hearing Impairment Support, Human Computer Interaction
Paper Title: Secure and Scalable Reverse Proxy with Load Balancer for Dynamic Network Management
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02017
Register Paper ID - 294058
Title: SECURE AND SCALABLE REVERSE PROXY WITH LOAD BALANCER FOR DYNAMIC NETWORK MANAGEMENT
Author Name(s): Poorani S, Siva Prakash S, Sredesh V, Yogesh S U
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 152-157
Year: September 2025
Downloads: 77
In contemporary software frameworks, the ability to dynamically manage networks and ensure robust security is essential. This study introduces a secure and scalable reverse proxy server that incorporates sophisticated load balancing and extensive security measures to address these needs. The design features TLS/SSL termination, rate limiting, and a Web Application Firewall (WAF) to defend against threats like DDoS, SQL injection, and XSS. Additionally, it offers detailed logging for monitoring and troubleshooting. To enhance performance, the proxy utilizes HTTP caching and effective load balancing techniques, such as round-robin and weighted round-robin, to alleviate backend load and enhance response times. The archi- tecture is equipped with auto-scaling capabilities: internal load balancing among worker processes and external balancing across upstream servers ensure high availability and fault tolerance. For instance, health checks enable the proxy to identify failed servers and redirect traffic, maintaining service continuity during partial failures. The system was tested under various loads, showing that it efficiently distributes traffic and scales with demand while maintaining secure and resilient network operations.
Licence: creative commons attribution 4.0
Secure and Scalable Reverse Proxy with Load Balancer for Dynamic Network Management
Paper Title: Streamline the Loan Journey with Smart Identity Checks
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02016
Register Paper ID - 294059
Title: STREAMLINE THE LOAN JOURNEY WITH SMART IDENTITY CHECKS
Author Name(s): Srinithi Ganesh J, Yogesh S, Saranbalaji J B, Dr. S. Senthamizh Selvi
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 141-151
Year: September 2025
Downloads: 85
This project uses AI - powered ID checks to automate the loan waiver approval process for increased accuracy, security and efficiency. Key applicant's information such as the name, Aadhaar number, and PAN number is retrieved from the document image using optical character detection (OCR) and refined with specified named entity recognition (NER) in NLP. This data has been verified against applicant details from the database. By Residual-based facial recognition The model compares the applicant's live images with the ID document to ensure ID reliability. To ensure protection a multi factor authentication that is a unique password (OTP) is sent to email and SMS of the applicant to ensure genuine user. Economic justification is assessed by the usual engine, which uses bank documents to assess income, credits, criteria, loan history and land ownership. The system ensures regulatory compliance through encryption, reduces manual errors, and provides real-time analysis to administrators. The modular architecture can be easily integrated into state databases and banking systems and is optimized for low- resource environments with optical models. On the whole, the system offers a scalable, transparent, safe approach.
Licence: creative commons attribution 4.0
Loan Waiver, Identity Verification, OCR, Facial Recognition, ResNet, NER, OTP Authentication
Paper Title: JURIS.AI: A Legal Assistant for Understanding the Consumer Protection Act, 2019
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02015
Register Paper ID - 294060
Title: JURIS.AI: A LEGAL ASSISTANT FOR UNDERSTANDING THE CONSUMER PROTECTION ACT, 2019
Author Name(s): Adithya Vikas A, Aparajitha P, Aravindhan S S, R. K. Kapilavani
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 129-140
Year: September 2025
Downloads: 86
The democratization of legal knowledge is a vital step toward ensuring that individuals can make informed decisions about their rights and responsibilities. This project, JURIS.AI, aims to make legal knowledge--particularly Indian consumer protection rights--accessible to all, regardless of legal expertise. Leveraging Natural Language Processing (NLP) and Machine Learning (ML), the project personalizes responses, provides comprehensive legal information, and breaks down complex legal terminology. By incorporating Large Language Models (LLMs) for interactive Q&A, and using techniques like Parameter-Efficient Fine-Tuning (PEFT) and Retrieval-Augmented Generation (RAG), the system ensures accurate, context-sensitive answers. Key features include a robust legal knowledge base, text-to-speech and speech-to-text accessibility, and step-by-step legal guidance. Notably, the system's performance is measured using the ROUGE score, improving from 0.69 (QLoRA) to 0.84 (QLoRA + RAG). This tool empowers users with varying levels of legal literacy to navigate the legal landscape confidently, offering practical legal assistance without specialized training.
Licence: creative commons attribution 4.0
Quantized Low Rank Adaptation (QLoRA), Retrieval-Augmented Generation (RAG), Parameter Efficient Fine Tuning (PEFT), Large Language Models (LLMs), ROUGE, Legal NLP, Consumer Protection Act.
Paper Title: Graph-Based Detection of Anomalous Health Insurance Claims Using Transformer-Augmented Embeddings
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02014
Register Paper ID - 294061
Title: GRAPH-BASED DETECTION OF ANOMALOUS HEALTH INSURANCE CLAIMS USING TRANSFORMER-AUGMENTED EMBEDDINGS
Author Name(s): Dhanrithii D, Dr Suresh Kumar M
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 119-128
Year: September 2025
Downloads: 74
Health insurance fraud results in significant financial losses and necessitates scalable, intelligent detection methods. This work presents a modular and unsupervised framework for fraud detection in healthcare claims by integrating semantic feature extraction, heterogeneous graph modeling, and anomaly detection. Structured claim metadata and unstructured clinical narratives are embedded using transformer-based models to capture rich contextual information. These embeddings are incorporated into a heterogeneous graph that connects patients, providers, and claims, enabling the use of graph neural networks to learn complex relational patterns indicative of fraudulent behavior. A graph-based representation is constructed using synthetic yet realistic healthcare data generated in standard clinical formats. Contextual node embeddings are learned, and clustering methods are applied to identify latent behavioral patterns. Unsupervised anomaly detection techniques, including tree-based and distance-based models, are employed to flag suspicious entities. A provider-level risk scoring mechanism is introduced to prioritize investigation efforts. This framework is designed to operate without reliance on labeled data, ensuring adaptability to evolving fraud strategies and generalizability across diverse claim scenarios. Experimental evaluation shows the system's effectiveness in uncovering subtle fraud signatures, highlighting its potential as a robust alternative to traditional rule-based approaches.
Licence: creative commons attribution 4.0
healthcare fraud detection, graph neural networks, transformer models, anomaly detection, semantic embeddings
Paper Title: MULTILINGUAL HERITAGE ASSISTANT USING A RECURRENT LOCATION-AWARE TRANSFORMER APPROACH
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02013
Register Paper ID - 294063
Title: MULTILINGUAL HERITAGE ASSISTANT USING A RECURRENT LOCATION-AWARE TRANSFORMER APPROACH
Author Name(s): Ramalingam T, Gousiga V S, Harish K, Bharat Kumar R J
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 112-118
Year: September 2025
Downloads: 75
In the rapidly evolving landscape of cultural tourism, offering real-time, multilingual, and personalized insights plays a pivotal role in enhancing the visitor experience, especially at historically rich and diverse locations such as those found across Tamil Nadu. This project presents an AI-powered voice assistant mobile application specifically designed to make heritage exploration more engaging, educational, and accessible for a wide range of users, including domestic and international tourists. The system integrates advanced natural language processing and machine learning technologies to interpret user queries in multiple Indian languages, whether spoken or typed, and respond with contextually relevant heritage information. At its core, the application employs a fine-tuned Mistral 7B transformer model to generate dynamic, human-like responses across various languages, while OpenAI's Whisper model ensures high-accuracy speech-to-text conversion for real-time voice interaction. Complementing this, the Google Text-to- Speech (gTTS) engine synthesizes natural-sounding audio responses, making the interface fully voice-driven and inclusive. Personalization is achieved through a GRU-based behavioral model that tracks and analyzes sequential user interactions, learning individual preferences to deliver tailored content and recommendations. The application incorporates real-time geolocation data and applies the Haversine distance formula to determine the user's proximity to various heritage sites, thereby offering hyperlocal suggestions and site-specific content. All user preferences, historical interactions, and metadata are efficiently managed using an SQLite database, ensuring smooth offline support and optimized performance in resource-constrained environments. Drawing from a structured heritage dataset in JSON format, the assistant provides rich narratives, historical facts, travel guidance, and site-specific tips, creating an immersive cultural experience.
Licence: creative commons attribution 4.0
In the rapidly evolving landscape of cultural tourism, offering real-time, multilingual, and personalized insights plays a pivotal role in enhancing the visitor experience, especially at historically rich and diverse locations such as those found across Tamil Nadu. This project presents an AI-powered voice assistant mobile application specifically designed to make heritage exploration more engaging, educational, and accessible for a wide range of users, including domestic and international touri
Paper Title: From Noise to Insight: A Dual-Stage Deep Learning Approach for SAR Image Denoising and Colourisa- tion
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02012
Register Paper ID - 294064
Title: FROM NOISE TO INSIGHT: A DUAL-STAGE DEEP LEARNING APPROACH FOR SAR IMAGE DENOISING AND COLOURISA- TION
Author Name(s): Arunima Muralitharan, Kartheesan Senthilkumar, Muralidharan S
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 105-111
Year: September 2025
Downloads: 81
Licence: creative commons attribution 4.0
Synthetic Aperture Radar (SAR), Speckle Reduc- tion, Image Colourisation, Deep Learning
Paper Title: iLab: A Smart Campus Lab Automation System Using Cloud
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02011
Register Paper ID - 294065
Title: ILAB: A SMART CAMPUS LAB AUTOMATION SYSTEM USING CLOUD
Author Name(s): Akhilesha G, Shyamalan V, Saai Harshaal N K, Anitha R
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 101-104
Year: September 2025
Downloads: 84
This paper presents iLab, a unified smart lab automation system for educational campuses that integrates multiple control modalities to optimize energy use. Key features include NFC-tag authentication for secure access to lighting, AI- driven occupancy monitoring via OpenCV computer vision to regulate HVAC based on real- time room usage, and an intuitive gesture-control interface for manual override of lights and air conditioning. All power usage and load data are continuously logged to a cloud analytics platform, enabling remote monitoring and data- driven optimization. Early evaluations suggest significant efficiency gains: preliminary tests indicate 30-40% reductions in lighting and HVAC energy consumption. By combining security (NFC access), computer vision, and cloud analytics, iLab offers a scalable, sustainable model for smart campus infrastructure. This multi-modal automation not only cuts operational costs but also advances campus sustainability goals through lower energy waste.
Licence: creative commons attribution 4.0
NFC, Computer Vision, Cloud Analytics, Energy Efficiency, Gesture Control, Smart Campus.
Paper Title: Smart Traffic Violation Detection and Challan Issuance
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02010
Register Paper ID - 294067
Title: SMART TRAFFIC VIOLATION DETECTION AND CHALLAN ISSUANCE
Author Name(s): S. Varsha, Yuvaraj K, Varun Kumar R, Dr. S. Senthamizh Selvi
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 95-100
Year: September 2025
Downloads: 56
In modern urban environments, the enforcement of traffic regulations remains a significant challenge due to increasing vehicle density and limited enforcement personnel. This project presents a scalable, AI-driven traffic violation monitoring system that automates the detection, documentation, and notification of traffic offenses such as helmet non-compliance and stop-line crossing. The system leverages a YOLO-based object detection model for real-time analysis of CCTV feeds, coupled with image processing techniques for accurate violation identification. An integrated OCR-based ANPR module extracts license plate numbers from captured frames, enabling automated challan generation and offender identification. The backend, powered by a Flask server, manages violation records, initiates Stripe-based payment processing, and renders geo-visualizations through Google Maps API. To enhance field responsiveness, a GPS-enabled Android application tracks traffic officers and dispatches Firebase Cloud Messaging (FCM) alerts to nearby personnel upon violation detection. Additional features include WhatsApp notifications and Google Text-to-Speech (TTS) announcements to expand alert reach and improve engagement. Tested in simulated environments mimicking urban intersections, the system demonstrated high accuracy in de- tection and efficient communication workflows. With support for automated alerts, digital payments, and real-time enforcement coordination, the proposed architecture offers a comprehensive and responsive solution for modern traffic law enforcement systems.
Licence: creative commons attribution 4.0
Traffic Monitoring, YOLO, Helmet Violation, Stop-Line Detection, Firebase, Stripe, Android App, Smart City
Paper Title: Smart Energy Management System Using ESP32 for Adaptive Fan Control and Voltage Anomaly Detection
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02009
Register Paper ID - 294068
Title: SMART ENERGY MANAGEMENT SYSTEM USING ESP32 FOR ADAPTIVE FAN CONTROL AND VOLTAGE ANOMALY DETECTION
Author Name(s): P. Selvamani, Akilesh R, Ajay Narayanan K, Dhev S
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 83-94
Year: September 2025
Downloads: 60
Optimizing power consumption in a variety of applications, including HVAC, smart homes, and industrial systems, is imperative due to the growing demand for energy- efficient solutions. Significant energy waste from unnecessary motor operation frequently raises operating expenses and has an adverse effect on the environment. In order to overcome this difficulty, the project creates an intelligent energy management module that uses the current room temperature to dynamically regulate motor speed. The system makes sure motors only run when necessary, lowering power consumption and preserving ideal environmental conditions by using a sensor to continuously monitor the surrounding temperature and a microcontroller to proportionately adjust motor speed. By preventing abrupt oscillations, this proportional, smooth control enhances motor longevity and stability. The system is made to integrate easily with IoT platforms, allowing for improved automation and remote monitoring. Efficiency will be further increased by upcoming developments like cloud analytics and predictive control based on machine learning. By automating motor control and reducing wasteful energy use in temperature- sensitive applications, this project advances sustainable energy management.
Licence: creative commons attribution 4.0
Smart Energy Management, Internet of Things, Real-time Monitoring, Adaptive Fan Control, Human Presence Detection, Wireless Sensor Network, Energy Efficiency, Automation Voltage.
Paper Title: OPTIMIZING ROOMMATE MATCHING FOR NEW RESIDENTS BY HARNESSING THE POWER OF CHATGPT CONVERSATIONAL GUIDANCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02008
Register Paper ID - 294069
Title: OPTIMIZING ROOMMATE MATCHING FOR NEW RESIDENTS BY HARNESSING THE POWER OF CHATGPT CONVERSATIONAL GUIDANCE
Author Name(s): Tamizhselvan, Sredesh, Vinothiyalakshmi
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 73-82
Year: September 2025
Downloads: 73
Finding a compatible roommate, especially for university newcomers, is a persistent challenge. Current platforms rely on static profiles, limiting their ability to capture user preferences. This paper proposes a groundbreaking web application, the first to leverage Large Language Models (LLMs) for roommate matching. LLMs surpass traditional methods by enabling natural language dialogues. Users can explore potential matches based on lifestyle, communication styles, and cultural backgrounds through free-flowing conversation. This paper explores the theoretical foundation of the LLM- powered system, details its integration, and discusses the potential to revolutionize roommate matching, particularly for immigrant students.
Licence: creative commons attribution 4.0
Roommate Matching, Large Language Models (LLMs), Natural Language Processing (NLP), Conversational Search, University Students, Immigrant Students, Personalized Matching
Paper Title: Real-time abnormal activity detection in psychiatric care using hybrid 3D CNN-LSTM and identity tracking
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02007
Register Paper ID - 294070
Title: REAL-TIME ABNORMAL ACTIVITY DETECTION IN PSYCHIATRIC CARE USING HYBRID 3D CNN-LSTM AND IDENTITY TRACKING
Author Name(s): A Sahitya, P Srilekha, G Janakasudha, S Mithun
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 62-72
Year: September 2025
Downloads: 60
Continuous monitoring of psychiatric and elderly patients is essential for ensuring safety and timely intervention in critical healthcare environments. Many elderly patients may be unable to express pain whenever care is actually crucial. Traditional wearable-based systems often fall short due to discomfort, limited compliance, and inability to detect abnormal disturbances among patients in real-time. The World Health Organization (WHO) recommends a doctor to population ratio of 1:1000; however, India currently averages only 1 doctor per 1500 people. To address these limitations and bridge the gap in scenarios lacking human supervision, this paper proposes a non- intrusive, vision-based framework for real-time abnormal activity detection in elderly people and for psychiatric patient monitoring using a deep learning framework integrated with alert system. The system combines YOLOv8 and DeepSORT for identification and tracking the patient. For behavioral analysis, two deep learning models were compared: a shallow 3D Convolutional Neural Network (3D CNN) and a hybrid MobileNetV2 model combined with GRU (Gated Recurrent Unit). Experimental results demonstrate that the MobileNetV2-GRU model outperforms the shallow 3D CNN in fall detection and for violence detection, the MobileNetV2-LSTM model is employed due to its superior ability to capture temporal features. Upon detecting abnormality in patients, the system triggers real-time alerts to caregivers via the Twilio API. Future work will focus on improving the robustness of the identity tracking module and extending the framework to multi- subject environments.
Licence: creative commons attribution 4.0
Continuous monitoring of psychiatric and elderly patients is essential for ensuring safety and timely intervention in critical healthcare environments. Many elderly patients may be unable to express pain whenever care is actually crucial. Traditional wearable-based systems often fall short due to discomfort, limited compliance, and inability to detect abnormal disturbances among patients in real-time. The World Health Organization (WHO) recommends a doctor to population ratio of 1:1000; however,
Paper Title: Smart Food Solutions: A Deep Learning Approach for Classifying Food, Identifying Allergens, and Analyzing Nutrition
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02006
Register Paper ID - 294071
Title: SMART FOOD SOLUTIONS: A DEEP LEARNING APPROACH FOR CLASSIFYING FOOD, IDENTIFYING ALLERGENS, AND ANALYZING NUTRITION
Author Name(s): Dr. P. Janarthanan, Vinay Varshigan S J, Sunandita R, YerragoguRishitha
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 43-61
Year: September 2025
Downloads: 62
Efficient food identification systems face challenges with the wide range of food categories and the high computational demands associated with extremely complex dishes. There is a need for a real-time solution that not only detects the food but also identifies its possible allergens and nutritional content, enabling efficient identification before distribution to those in need. Such a solution should ensure safe, accurate, and effective food identification in advance. This helps not only to reduce food waste but also to combat hunger. The proposed system's performance is evaluated using a confusion matrix, which helps assess model accuracy by displaying correctly and incorrectly classified data points and highlighting misclassification patterns. In our work, the ResNet50 model shows 85-90% accuracy with a loss of 0.3 on simple food images, but accuracy decreases with more complex food items. In contrast, InceptionV3, benefiting from multi-scale processing, achieves 88-92% accuracy with a loss of 0.25, demonstrating higher precision and recall with visually complex dishes. When combining ResNet50 and InceptionV3 through a stacking ensemble, performance significantly increases, reaching an overall accuracy of 93%, showing a substantial enhancement in classification accuracy across diverse food images.
Licence: creative commons attribution 4.0
ResNet50, Inception V3, Allergen Detection, Food Image Classification, Stacking Ensemble, Food Detection, Nutritional Analysis.
Paper Title: EduVidGuard: An AI Video Validator for Education Platforms
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02005
Register Paper ID - 294072
Title: EDUVIDGUARD: AN AI VIDEO VALIDATOR FOR EDUCATION PLATFORMS
Author Name(s): Phani Abhiram Gummadi, Dr. A. Arivoli, Dinesh Thallapaku, Rohit Reddy
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 41-42
Year: September 2025
Downloads: 58
This paper presents EduVidGuard, an innovative AI-based solution for validating the authenticity and educational relevance of video content on e-learning platforms. With the increasing prevalence of user-generated content, ensuring quality and topic alignment has become a significant challenge. EduVidGuard integrates advanced AI technologies that analyze both audio and visual aspects of videos to determine if they meet educational, accuracy, and contextual standards. It employs OpenAI Whisper for transcription and Tesseract OCR for visual code extraction, enabling an intelligent content review pipeline. This paper explores the architecture, functionality, evaluation, and potential implications of EduVidGuard in enhancing digital education integrity.
Licence: creative commons attribution 4.0
EduVidGuard: An AI Video Validator for Education Platforms
Paper Title: AI-Augmented DevOps for Real-Time Cognitive-Aware Automation
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02004
Register Paper ID - 294073
Title: AI-AUGMENTED DEVOPS FOR REAL-TIME COGNITIVE-AWARE AUTOMATION
Author Name(s): Arivoli A., B. Satwika, Kadam Krishna
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 35-40
Year: September 2025
Downloads: 67
Modern DevOps pipelines prioritize speed, effi- ciency, and automation but often overlook the cognitive state of the human operators managing them. Prolonged deployment ses- sions and critical incident handling can lead to stress, fatigue, and distraction, increasing the likelihood of human-induced errors. This paper proposes an AI-Augmented DevOps framework that integrates real-time cognitive monitoring into CI/CD workflows. The system employs standard webcams for emotion recognition (DeepFace), eye aspect ratio-based fatigue detection (MediaPipe), and computer vision (OpenCV) to assess operator state. Based on detected cognitive strain, the framework can pause ongoing deployments or issue rest alerts via seamless integration with GitHub Actions. A Streamlit-based dashboard provides real- time visualization of cognitive metrics and operational status. Experimental evaluation in a simulated CI/CD environment demonstrated ?90% emotion detection accuracy, ?95% fatigue detection accuracy, and sub-2-second trigger latency, showing the potential of cognitive-aware DevOps systems in reducing operational risk and enhancing developer well-being.
Licence: creative commons attribution 4.0
DevOps, Cognitive Monitoring, AI-Augmented Automation, Emotion Detection, Fatigue Detection, Computer Vision, CI/CD
Paper Title: Automated Pneumonia Classification in Chest Radiographs Using Dual-Stage Ensemble Learning and LIME Interpretability
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02003
Register Paper ID - 294074
Title: AUTOMATED PNEUMONIA CLASSIFICATION IN CHEST RADIOGRAPHS USING DUAL-STAGE ENSEMBLE LEARNING AND LIME INTERPRETABILITY
Author Name(s): Pushpita Biswas, Aum Dubey, Anirudh Vyas M, Prof. Kalaavathi B
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 21-34
Year: September 2025
Downloads: 56
Pneumonia is an inflammatory condition of the lung primarily affecting the small air sacs known as alveoli caused by microorganism infection which can be viral or bacterial. It remains a critical public health concern worldwide, particularly in low resource settings, affecting severely specific age groups such as newborns & infants under 2 years old and adults above 65, due to their weak immune system. While Chest radiograph imaging is the most well-known screening approach used for detecting pneumonia in the early stages, its blurry and low illumination nature may call forth human error in manual diagnosis. Hence, the contribution of this work is the development of a two-stage pneumonia detection Expert System fusing the capabilities of both ensemble convolutional networks and the Transformer mechanism. In the first stage, a binary classification ensemble model is employed to detect whether a given chest X-ray indicates pneumonia or not. Upon a positive detection, the second stage activates a multi-class classification ensemble model that further categorizes the pneumonia into viral or bacterial, thus providing a finer level of diagnostic detail. The ensemble learning extracts strong features from the raw input X-ray images in two different scenarios: ensemble A (i.e., DenseNet201, Xception and InceptionResNet V2) and ensemble B (i.e., DenseNet201, Xception and VGG-16). The proposed ensemble deep learning model recorded 95.95% classification performance in terms of overall accuracy and F1-score for the binary classification task, while it achieved 88.57% for multi-classification task. To ensure that the diagnosis is not only automated but also interpretable to end-users, including healthcare professionals, the model is fed to an expert system where users can upload X-ray images, get a classification result and see the highlighted region which supports the diagnosis through Local Interpretable Model-Agnostic Explanations (LIME), a black box testing strategy. The proposed framework could provide promising and encouraging explainable identification performance compared to the individual or existing ensemble models building trust of users and healthcare professionals on the result.
Licence: creative commons attribution 4.0
Pneumonia, Chest X-Ray, Deep Learning, Explainable AI, Ensemble Model, LIME
Paper Title: Adaptive Quantum-Cryptography-Based Defense Against Blackhole Attacks in Wireless Sensor Networks
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02002
Register Paper ID - 294075
Title: ADAPTIVE QUANTUM-CRYPTOGRAPHY-BASED DEFENSE AGAINST BLACKHOLE ATTACKS IN WIRELESS SENSOR NETWORKS
Author Name(s): K.Adithi
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 12-19
Year: September 2025
Downloads: 60
Blackhole attacks in Wireless Sensor Networks (WSNs) pose significant threats to data integrity and network reliability. These attacks involve malicious nodes diverting or dropping data packets, disrupting communication, and compromising network integrity. Existing loopholes in wireless sensor network defences include vulnerabilities in encryption protocols and limited scalability of anomaly detection algorithms. By leveraging advanced cryptographic techniques and anomaly detection algorithms like Quantum cryptography, it aims to identify and mitigate the impact of malicious nodes within the network. Additionally, anomaly detection algorithms continuously monitor network behavior to detect deviations indicative of blackhole attacks. Through simulations and experimental factors, a defense mechanism to establish secure communication channels between sensor nodes and base stations, safeguarding data transmission against interception and manipulation is designed. This enhances the security posture of WSNs, resulting in the effectiveness of the approach in mitigating the impact of blackhole attacks.
Licence: creative commons attribution 4.0
WSN, Security, Black Hole, vulnerabilities, Quantum Cryptography
Paper Title: StrongHer - An Online Platform for Ensuring the Safety and Mental Well- being of Women and Children
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTBG02001
Register Paper ID - 294076
Title: STRONGHER - AN ONLINE PLATFORM FOR ENSURING THE SAFETY AND MENTAL WELL- BEING OF WOMEN AND CHILDREN
Author Name(s): Dr. S. Rajalakshmi, J. Bhuvana, Pooja TSR, Sakthisri A, Sharmila A
Publisher Journal name: IJCRT
Volume: 13
Issue: 9
Pages: 1-11
Year: September 2025
Downloads: 59
The protection and mental health of women and children continue to be pressing societal concerns, but while immense problems remain in the form of restricted access to mental healthcare, unawareness of legal rights, and inadequate provisions for emergency support mechanisms, immense problems still abound. The StrongHer project meets the above challenges through the creation of a secure, accessible, and integrated online platform. The platform provides virtual counselling services, mental health screenings using GAD-7 and PHQ-9 scales, gamified learning exercises that enhance legal awareness, and instant emergency response using IoT-based wearable devices. Sensitive medical records are stored securely using blockchain technology (Ethereum and IPFS) to maintain data privacy and integrity. Developed using ASP.NET Core MVC, Microsoft SQL Server, NodeMCU (IoT module), and blockchain integrations, StrongHer integrates the latest technologies to establish a digital safe space. The system empowers users by boosting their mental resilience, giving them timely support, encouraging legal literacy, and providing real-time emergency communication features. By combining counselling, legal aid, education, and emergency response within one environment, StrongHer is a complete solution to tackle the complex issues of vulnerable groups, thus making a significant contribution towards the safety and well-being of society.
Licence: creative commons attribution 4.0
Women and Child Safety, Mental Health Assessment, Blockchain- based Medical Record Storage, Emergency SOS Alert System, IoT-based Safety Devices, Virtual Counselling.
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 13 | Issue 12 | Month- December 2025)

