Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 13 | Issue 9

Volume 13 | Issue 9 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: Quantum-Resistant Cryptography: Uniting Lattice-Based Encryption and Code-Based Error Correction for Enhanced Security

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02020

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02020

  Register Paper ID - 294055

  Title: QUANTUM-RESISTANT CRYPTOGRAPHY: UNITING LATTICE-BASED ENCRYPTION AND CODE-BASED ERROR CORRECTION FOR ENHANCED SECURITY

  Author Name(s): S.Nithiyanandam, J.Prince Raj

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 169-181

 Year: September 2025

 Downloads: 87

 Abstract

As quantum computing advances, traditional cryptographic methods face significant threats from quantum algorithms, necessitating the development of quantum-resistant encryption systems. This paper explores a modified cryptographic algorithm combining lattice-based encryption techniques with enhanced noise, larger key sizes, and increased modulus values to resist quantum attacks. Utilizing Google's Cirq quantum simulator, the robustness of the algorithm against quantum period-finding techniques is evaluated, showing minimal or no detectable periodicity. These findings underscore the effectiveness of the proposed method for quantum resistance. This framework is especially applicable to IoT and cloud environments, offering long-term data protection and resilience in noisy communication channels.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Quantum-Resistant Cryptography: Uniting Lattice-Based Encryption and Code-Based Error Correction for Enhanced Security

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: The Blockchain Paradox: Navigating the Twin Forces of Innovation and Threats

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02019

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02019

  Register Paper ID - 294056

  Title: THE BLOCKCHAIN PARADOX: NAVIGATING THE TWIN FORCES OF INNOVATION AND THREATS

  Author Name(s): S.Shamili, G.Nalinipriya

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 164-168

 Year: September 2025

 Downloads: 86

 Abstract

Blockchain technology has revolutionized digital security by enabling decentralized, tamper-resistant, and transparent data management. However, with its increasing adoption, blockchain faces a growing number of security threats, including smart contract vulnerabilities, 51% attacks, Sybil attacks, cross-chain interoperability risks, and the potential impact of quantum computing. Ensuring robust security in blockchain systems is crucial for applications such as things like decentralized finance (DeFi), tracking goods in the supply chain, and verifying digital identities.This survey provides a systematic review of blockchain security threats and mitigation strategies. We categorize vulnerabilities based on blockchain layers-- network, consensus, and application--and analyze emerging defense mechanisms. Advanced solutions such as artificial intelligence (AI)-driven anomaly detection, automated smart contract verification, Zero-Knowledge Proofs (ZKPs) for privacy preservation, and quantum-resistant cryptographic techniques are explored. Additionally, we discuss blockchain forensic artificial intelligence (AI)-driven anomaly detection, automated smart contract verification, Zero-Knowledge Proofs (ZKPs) for privacy preservation, and quantum- resistant cryptographic techniques. Additionally, blockchain forensic techniques are being developed to detect fraudulent activities and illicit transactions. This survey provides a comprehensive review of block-chain security threats and mitigation strategies. We categorize vulnerabilities based on blockchain layers--network, consensus, and application-- and analyze emerging defense mechanisms. By consolidating recent advancements and identifying open research challenges, this paper aims to guide future research in developing secure and resilient blockchain architectures. II. SECURTY THREATS IN BLOCKCHAIN techniques for detecting fraud and illicit transactions.By A. Network Layer Attacks consolidating recent advancements and identifying open research challenges, this paper serves as a roadmap for future research in blockchain security. Our analysis highlights the need for adaptive, AI-enhanced security frameworks and novel cryptographic approaches to address evolving threats. This survey aims to assist researchers and industry professionals in developing secure and resilient blockchain architectures for the next decade and application layers. Additionally, we explore AI- driven security mechanisms and cryptographic advancements to enhance blockchain security.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Blockchain security ,Smart contract vulnerabilities ,Quantum-resistant cryptography,AI-driven security.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Signspeak Speech To Sign Language Convertor

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02018

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02018

  Register Paper ID - 294057

  Title: SIGNSPEAK SPEECH TO SIGN LANGUAGE CONVERTOR

  Author Name(s): Joshua Sheron D, Rishab S, Siddhartha P, Uma P

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 158-163

 Year: September 2025

 Downloads: 82

 Abstract

This project aims to develop an advanced communication system called SignSpeak, designed to bridge the gap between spoken language and sign language, thereby promoting greater inclusivity for individuals with hearing and speech impairments in public interactions and official functions. In many real-world scenarios, the absence of sign language interpreters poses a significant communication barrier, often excluding hearing- impaired individuals from accessing essential information. The existing solutions involve stitching together video clips, based on the input text. These solutions are not scalable and moreover the actions rigid and lacks real time feedback loop. SignSpeak addresses this challenge by leveraging Automatic Speech Recognition and Natural Language Processing to capture and semantically interpret real-time speech input. The processed text is then translated into sign language using a Sign Language Generation model, which is rendered through an expressive virtual avatar capable of conveying sign language gestures accurately and naturally. By automating the entire speech-to-sign language conversion pipeline, the system eliminates the dependency on human interpreters, ensuring scalability, cost-effectiveness, and consistent accuracy across diverse environments such as government offices, hospitals, educational institutions, and public events. Ultimately, SignSpeak offers a robust, real-time, and scalable solution that enhances communication accessibility, promotes digital inclusivity, and empowers the hearing-impaired community by enabling equal participation in society through improved access to spoken information.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Indian Sign Language, Speech to Sign Language, ISL, Avatar-based Sign Language, Text to Sign Language, Speech Recognition, Digital Accessibility, Hearing Impairment Support, Human Computer Interaction

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Secure and Scalable Reverse Proxy with Load Balancer for Dynamic Network Management

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02017

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02017

  Register Paper ID - 294058

  Title: SECURE AND SCALABLE REVERSE PROXY WITH LOAD BALANCER FOR DYNAMIC NETWORK MANAGEMENT

  Author Name(s): Poorani S, Siva Prakash S, Sredesh V, Yogesh S U

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 152-157

 Year: September 2025

 Downloads: 77

 Abstract

In contemporary software frameworks, the ability to dynamically manage networks and ensure robust security is essential. This study introduces a secure and scalable reverse proxy server that incorporates sophisticated load balancing and extensive security measures to address these needs. The design features TLS/SSL termination, rate limiting, and a Web Application Firewall (WAF) to defend against threats like DDoS, SQL injection, and XSS. Additionally, it offers detailed logging for monitoring and troubleshooting. To enhance performance, the proxy utilizes HTTP caching and effective load balancing techniques, such as round-robin and weighted round-robin, to alleviate backend load and enhance response times. The archi- tecture is equipped with auto-scaling capabilities: internal load balancing among worker processes and external balancing across upstream servers ensure high availability and fault tolerance. For instance, health checks enable the proxy to identify failed servers and redirect traffic, maintaining service continuity during partial failures. The system was tested under various loads, showing that it efficiently distributes traffic and scales with demand while maintaining secure and resilient network operations.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Secure and Scalable Reverse Proxy with Load Balancer for Dynamic Network Management

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Streamline the Loan Journey with Smart Identity Checks

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02016

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02016

  Register Paper ID - 294059

  Title: STREAMLINE THE LOAN JOURNEY WITH SMART IDENTITY CHECKS

  Author Name(s): Srinithi Ganesh J, Yogesh S, Saranbalaji J B, Dr. S. Senthamizh Selvi

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 141-151

 Year: September 2025

 Downloads: 85

 Abstract

This project uses AI - powered ID checks to automate the loan waiver approval process for increased accuracy, security and efficiency. Key applicant's information such as the name, Aadhaar number, and PAN number is retrieved from the document image using optical character detection (OCR) and refined with specified named entity recognition (NER) in NLP. This data has been verified against applicant details from the database. By Residual-based facial recognition The model compares the applicant's live images with the ID document to ensure ID reliability. To ensure protection a multi factor authentication that is a unique password (OTP) is sent to email and SMS of the applicant to ensure genuine user. Economic justification is assessed by the usual engine, which uses bank documents to assess income, credits, criteria, loan history and land ownership. The system ensures regulatory compliance through encryption, reduces manual errors, and provides real-time analysis to administrators. The modular architecture can be easily integrated into state databases and banking systems and is optimized for low- resource environments with optical models. On the whole, the system offers a scalable, transparent, safe approach.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Loan Waiver, Identity Verification, OCR, Facial Recognition, ResNet, NER, OTP Authentication

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: JURIS.AI: A Legal Assistant for Understanding the Consumer Protection Act, 2019

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02015

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02015

  Register Paper ID - 294060

  Title: JURIS.AI: A LEGAL ASSISTANT FOR UNDERSTANDING THE CONSUMER PROTECTION ACT, 2019

  Author Name(s): Adithya Vikas A, Aparajitha P, Aravindhan S S, R. K. Kapilavani

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 129-140

 Year: September 2025

 Downloads: 86

 Abstract

The democratization of legal knowledge is a vital step toward ensuring that individuals can make informed decisions about their rights and responsibilities. This project, JURIS.AI, aims to make legal knowledge--particularly Indian consumer protection rights--accessible to all, regardless of legal expertise. Leveraging Natural Language Processing (NLP) and Machine Learning (ML), the project personalizes responses, provides comprehensive legal information, and breaks down complex legal terminology. By incorporating Large Language Models (LLMs) for interactive Q&A, and using techniques like Parameter-Efficient Fine-Tuning (PEFT) and Retrieval-Augmented Generation (RAG), the system ensures accurate, context-sensitive answers. Key features include a robust legal knowledge base, text-to-speech and speech-to-text accessibility, and step-by-step legal guidance. Notably, the system's performance is measured using the ROUGE score, improving from 0.69 (QLoRA) to 0.84 (QLoRA + RAG). This tool empowers users with varying levels of legal literacy to navigate the legal landscape confidently, offering practical legal assistance without specialized training.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Quantized Low Rank Adaptation (QLoRA), Retrieval-Augmented Generation (RAG), Parameter Efficient Fine Tuning (PEFT), Large Language Models (LLMs), ROUGE, Legal NLP, Consumer Protection Act.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Graph-Based Detection of Anomalous Health Insurance Claims Using Transformer-Augmented Embeddings

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02014

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02014

  Register Paper ID - 294061

  Title: GRAPH-BASED DETECTION OF ANOMALOUS HEALTH INSURANCE CLAIMS USING TRANSFORMER-AUGMENTED EMBEDDINGS

  Author Name(s): Dhanrithii D, Dr Suresh Kumar M

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 119-128

 Year: September 2025

 Downloads: 74

 Abstract

Health insurance fraud results in significant financial losses and necessitates scalable, intelligent detection methods. This work presents a modular and unsupervised framework for fraud detection in healthcare claims by integrating semantic feature extraction, heterogeneous graph modeling, and anomaly detection. Structured claim metadata and unstructured clinical narratives are embedded using transformer-based models to capture rich contextual information. These embeddings are incorporated into a heterogeneous graph that connects patients, providers, and claims, enabling the use of graph neural networks to learn complex relational patterns indicative of fraudulent behavior. A graph-based representation is constructed using synthetic yet realistic healthcare data generated in standard clinical formats. Contextual node embeddings are learned, and clustering methods are applied to identify latent behavioral patterns. Unsupervised anomaly detection techniques, including tree-based and distance-based models, are employed to flag suspicious entities. A provider-level risk scoring mechanism is introduced to prioritize investigation efforts. This framework is designed to operate without reliance on labeled data, ensuring adaptability to evolving fraud strategies and generalizability across diverse claim scenarios. Experimental evaluation shows the system's effectiveness in uncovering subtle fraud signatures, highlighting its potential as a robust alternative to traditional rule-based approaches.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

healthcare fraud detection, graph neural networks, transformer models, anomaly detection, semantic embeddings

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MULTILINGUAL HERITAGE ASSISTANT USING A RECURRENT LOCATION-AWARE TRANSFORMER APPROACH

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02013

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02013

  Register Paper ID - 294063

  Title: MULTILINGUAL HERITAGE ASSISTANT USING A RECURRENT LOCATION-AWARE TRANSFORMER APPROACH

  Author Name(s): Ramalingam T, Gousiga V S, Harish K, Bharat Kumar R J

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 112-118

 Year: September 2025

 Downloads: 75

 Abstract

In the rapidly evolving landscape of cultural tourism, offering real-time, multilingual, and personalized insights plays a pivotal role in enhancing the visitor experience, especially at historically rich and diverse locations such as those found across Tamil Nadu. This project presents an AI-powered voice assistant mobile application specifically designed to make heritage exploration more engaging, educational, and accessible for a wide range of users, including domestic and international tourists. The system integrates advanced natural language processing and machine learning technologies to interpret user queries in multiple Indian languages, whether spoken or typed, and respond with contextually relevant heritage information. At its core, the application employs a fine-tuned Mistral 7B transformer model to generate dynamic, human-like responses across various languages, while OpenAI's Whisper model ensures high-accuracy speech-to-text conversion for real-time voice interaction. Complementing this, the Google Text-to- Speech (gTTS) engine synthesizes natural-sounding audio responses, making the interface fully voice-driven and inclusive. Personalization is achieved through a GRU-based behavioral model that tracks and analyzes sequential user interactions, learning individual preferences to deliver tailored content and recommendations. The application incorporates real-time geolocation data and applies the Haversine distance formula to determine the user's proximity to various heritage sites, thereby offering hyperlocal suggestions and site-specific content. All user preferences, historical interactions, and metadata are efficiently managed using an SQLite database, ensuring smooth offline support and optimized performance in resource-constrained environments. Drawing from a structured heritage dataset in JSON format, the assistant provides rich narratives, historical facts, travel guidance, and site-specific tips, creating an immersive cultural experience.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

In the rapidly evolving landscape of cultural tourism, offering real-time, multilingual, and personalized insights plays a pivotal role in enhancing the visitor experience, especially at historically rich and diverse locations such as those found across Tamil Nadu. This project presents an AI-powered voice assistant mobile application specifically designed to make heritage exploration more engaging, educational, and accessible for a wide range of users, including domestic and international touri

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: From Noise to Insight: A Dual-Stage Deep Learning Approach for SAR Image Denoising and Colourisa- tion

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02012

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02012

  Register Paper ID - 294064

  Title: FROM NOISE TO INSIGHT: A DUAL-STAGE DEEP LEARNING APPROACH FOR SAR IMAGE DENOISING AND COLOURISA- TION

  Author Name(s): Arunima Muralitharan, Kartheesan Senthilkumar, Muralidharan S

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 105-111

 Year: September 2025

 Downloads: 81

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Synthetic Aperture Radar (SAR), Speckle Reduc- tion, Image Colourisation, Deep Learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: iLab: A Smart Campus Lab Automation System Using Cloud

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02011

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02011

  Register Paper ID - 294065

  Title: ILAB: A SMART CAMPUS LAB AUTOMATION SYSTEM USING CLOUD

  Author Name(s): Akhilesha G, Shyamalan V, Saai Harshaal N K, Anitha R

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 101-104

 Year: September 2025

 Downloads: 84

 Abstract

This paper presents iLab, a unified smart lab automation system for educational campuses that integrates multiple control modalities to optimize energy use. Key features include NFC-tag authentication for secure access to lighting, AI- driven occupancy monitoring via OpenCV computer vision to regulate HVAC based on real- time room usage, and an intuitive gesture-control interface for manual override of lights and air conditioning. All power usage and load data are continuously logged to a cloud analytics platform, enabling remote monitoring and data- driven optimization. Early evaluations suggest significant efficiency gains: preliminary tests indicate 30-40% reductions in lighting and HVAC energy consumption. By combining security (NFC access), computer vision, and cloud analytics, iLab offers a scalable, sustainable model for smart campus infrastructure. This multi-modal automation not only cuts operational costs but also advances campus sustainability goals through lower energy waste.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NFC, Computer Vision, Cloud Analytics, Energy Efficiency, Gesture Control, Smart Campus.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Smart Traffic Violation Detection and Challan Issuance

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02010

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02010

  Register Paper ID - 294067

  Title: SMART TRAFFIC VIOLATION DETECTION AND CHALLAN ISSUANCE

  Author Name(s): S. Varsha, Yuvaraj K, Varun Kumar R, Dr. S. Senthamizh Selvi

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 95-100

 Year: September 2025

 Downloads: 56

 Abstract

In modern urban environments, the enforcement of traffic regulations remains a significant challenge due to increasing vehicle density and limited enforcement personnel. This project presents a scalable, AI-driven traffic violation monitoring system that automates the detection, documentation, and notification of traffic offenses such as helmet non-compliance and stop-line crossing. The system leverages a YOLO-based object detection model for real-time analysis of CCTV feeds, coupled with image processing techniques for accurate violation identification. An integrated OCR-based ANPR module extracts license plate numbers from captured frames, enabling automated challan generation and offender identification. The backend, powered by a Flask server, manages violation records, initiates Stripe-based payment processing, and renders geo-visualizations through Google Maps API. To enhance field responsiveness, a GPS-enabled Android application tracks traffic officers and dispatches Firebase Cloud Messaging (FCM) alerts to nearby personnel upon violation detection. Additional features include WhatsApp notifications and Google Text-to-Speech (TTS) announcements to expand alert reach and improve engagement. Tested in simulated environments mimicking urban intersections, the system demonstrated high accuracy in de- tection and efficient communication workflows. With support for automated alerts, digital payments, and real-time enforcement coordination, the proposed architecture offers a comprehensive and responsive solution for modern traffic law enforcement systems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic Monitoring, YOLO, Helmet Violation, Stop-Line Detection, Firebase, Stripe, Android App, Smart City

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Smart Energy Management System Using ESP32 for Adaptive Fan Control and Voltage Anomaly Detection

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02009

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02009

  Register Paper ID - 294068

  Title: SMART ENERGY MANAGEMENT SYSTEM USING ESP32 FOR ADAPTIVE FAN CONTROL AND VOLTAGE ANOMALY DETECTION

  Author Name(s): P. Selvamani, Akilesh R, Ajay Narayanan K, Dhev S

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 83-94

 Year: September 2025

 Downloads: 60

 Abstract

Optimizing power consumption in a variety of applications, including HVAC, smart homes, and industrial systems, is imperative due to the growing demand for energy- efficient solutions. Significant energy waste from unnecessary motor operation frequently raises operating expenses and has an adverse effect on the environment. In order to overcome this difficulty, the project creates an intelligent energy management module that uses the current room temperature to dynamically regulate motor speed. The system makes sure motors only run when necessary, lowering power consumption and preserving ideal environmental conditions by using a sensor to continuously monitor the surrounding temperature and a microcontroller to proportionately adjust motor speed. By preventing abrupt oscillations, this proportional, smooth control enhances motor longevity and stability. The system is made to integrate easily with IoT platforms, allowing for improved automation and remote monitoring. Efficiency will be further increased by upcoming developments like cloud analytics and predictive control based on machine learning. By automating motor control and reducing wasteful energy use in temperature- sensitive applications, this project advances sustainable energy management.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Smart Energy Management, Internet of Things, Real-time Monitoring, Adaptive Fan Control, Human Presence Detection, Wireless Sensor Network, Energy Efficiency, Automation Voltage.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: OPTIMIZING ROOMMATE MATCHING FOR NEW RESIDENTS BY HARNESSING THE POWER OF CHATGPT CONVERSATIONAL GUIDANCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02008

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02008

  Register Paper ID - 294069

  Title: OPTIMIZING ROOMMATE MATCHING FOR NEW RESIDENTS BY HARNESSING THE POWER OF CHATGPT CONVERSATIONAL GUIDANCE

  Author Name(s): Tamizhselvan, Sredesh, Vinothiyalakshmi

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 73-82

 Year: September 2025

 Downloads: 73

 Abstract

Finding a compatible roommate, especially for university newcomers, is a persistent challenge. Current platforms rely on static profiles, limiting their ability to capture user preferences. This paper proposes a groundbreaking web application, the first to leverage Large Language Models (LLMs) for roommate matching. LLMs surpass traditional methods by enabling natural language dialogues. Users can explore potential matches based on lifestyle, communication styles, and cultural backgrounds through free-flowing conversation. This paper explores the theoretical foundation of the LLM- powered system, details its integration, and discusses the potential to revolutionize roommate matching, particularly for immigrant students.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Roommate Matching, Large Language Models (LLMs), Natural Language Processing (NLP), Conversational Search, University Students, Immigrant Students, Personalized Matching

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Real-time abnormal activity detection in psychiatric care using hybrid 3D CNN-LSTM and identity tracking

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02007

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02007

  Register Paper ID - 294070

  Title: REAL-TIME ABNORMAL ACTIVITY DETECTION IN PSYCHIATRIC CARE USING HYBRID 3D CNN-LSTM AND IDENTITY TRACKING

  Author Name(s): A Sahitya, P Srilekha, G Janakasudha, S Mithun

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 62-72

 Year: September 2025

 Downloads: 60

 Abstract

Continuous monitoring of psychiatric and elderly patients is essential for ensuring safety and timely intervention in critical healthcare environments. Many elderly patients may be unable to express pain whenever care is actually crucial. Traditional wearable-based systems often fall short due to discomfort, limited compliance, and inability to detect abnormal disturbances among patients in real-time. The World Health Organization (WHO) recommends a doctor to population ratio of 1:1000; however, India currently averages only 1 doctor per 1500 people. To address these limitations and bridge the gap in scenarios lacking human supervision, this paper proposes a non- intrusive, vision-based framework for real-time abnormal activity detection in elderly people and for psychiatric patient monitoring using a deep learning framework integrated with alert system. The system combines YOLOv8 and DeepSORT for identification and tracking the patient. For behavioral analysis, two deep learning models were compared: a shallow 3D Convolutional Neural Network (3D CNN) and a hybrid MobileNetV2 model combined with GRU (Gated Recurrent Unit). Experimental results demonstrate that the MobileNetV2-GRU model outperforms the shallow 3D CNN in fall detection and for violence detection, the MobileNetV2-LSTM model is employed due to its superior ability to capture temporal features. Upon detecting abnormality in patients, the system triggers real-time alerts to caregivers via the Twilio API. Future work will focus on improving the robustness of the identity tracking module and extending the framework to multi- subject environments.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Continuous monitoring of psychiatric and elderly patients is essential for ensuring safety and timely intervention in critical healthcare environments. Many elderly patients may be unable to express pain whenever care is actually crucial. Traditional wearable-based systems often fall short due to discomfort, limited compliance, and inability to detect abnormal disturbances among patients in real-time. The World Health Organization (WHO) recommends a doctor to population ratio of 1:1000; however,

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Smart Food Solutions: A Deep Learning Approach for Classifying Food, Identifying Allergens, and Analyzing Nutrition

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02006

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02006

  Register Paper ID - 294071

  Title: SMART FOOD SOLUTIONS: A DEEP LEARNING APPROACH FOR CLASSIFYING FOOD, IDENTIFYING ALLERGENS, AND ANALYZING NUTRITION

  Author Name(s): Dr. P. Janarthanan, Vinay Varshigan S J, Sunandita R, YerragoguRishitha

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 43-61

 Year: September 2025

 Downloads: 62

 Abstract

Efficient food identification systems face challenges with the wide range of food categories and the high computational demands associated with extremely complex dishes. There is a need for a real-time solution that not only detects the food but also identifies its possible allergens and nutritional content, enabling efficient identification before distribution to those in need. Such a solution should ensure safe, accurate, and effective food identification in advance. This helps not only to reduce food waste but also to combat hunger. The proposed system's performance is evaluated using a confusion matrix, which helps assess model accuracy by displaying correctly and incorrectly classified data points and highlighting misclassification patterns. In our work, the ResNet50 model shows 85-90% accuracy with a loss of 0.3 on simple food images, but accuracy decreases with more complex food items. In contrast, InceptionV3, benefiting from multi-scale processing, achieves 88-92% accuracy with a loss of 0.25, demonstrating higher precision and recall with visually complex dishes. When combining ResNet50 and InceptionV3 through a stacking ensemble, performance significantly increases, reaching an overall accuracy of 93%, showing a substantial enhancement in classification accuracy across diverse food images.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ResNet50, Inception V3, Allergen Detection, Food Image Classification, Stacking Ensemble, Food Detection, Nutritional Analysis.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EduVidGuard: An AI Video Validator for Education Platforms

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02005

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02005

  Register Paper ID - 294072

  Title: EDUVIDGUARD: AN AI VIDEO VALIDATOR FOR EDUCATION PLATFORMS

  Author Name(s): Phani Abhiram Gummadi, Dr. A. Arivoli, Dinesh Thallapaku, Rohit Reddy

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 41-42

 Year: September 2025

 Downloads: 58

 Abstract

This paper presents EduVidGuard, an innovative AI-based solution for validating the authenticity and educational relevance of video content on e-learning platforms. With the increasing prevalence of user-generated content, ensuring quality and topic alignment has become a significant challenge. EduVidGuard integrates advanced AI technologies that analyze both audio and visual aspects of videos to determine if they meet educational, accuracy, and contextual standards. It employs OpenAI Whisper for transcription and Tesseract OCR for visual code extraction, enabling an intelligent content review pipeline. This paper explores the architecture, functionality, evaluation, and potential implications of EduVidGuard in enhancing digital education integrity.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

EduVidGuard: An AI Video Validator for Education Platforms

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AI-Augmented DevOps for Real-Time Cognitive-Aware Automation

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02004

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02004

  Register Paper ID - 294073

  Title: AI-AUGMENTED DEVOPS FOR REAL-TIME COGNITIVE-AWARE AUTOMATION

  Author Name(s): Arivoli A., B. Satwika, Kadam Krishna

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 35-40

 Year: September 2025

 Downloads: 67

 Abstract

Modern DevOps pipelines prioritize speed, effi- ciency, and automation but often overlook the cognitive state of the human operators managing them. Prolonged deployment ses- sions and critical incident handling can lead to stress, fatigue, and distraction, increasing the likelihood of human-induced errors. This paper proposes an AI-Augmented DevOps framework that integrates real-time cognitive monitoring into CI/CD workflows. The system employs standard webcams for emotion recognition (DeepFace), eye aspect ratio-based fatigue detection (MediaPipe), and computer vision (OpenCV) to assess operator state. Based on detected cognitive strain, the framework can pause ongoing deployments or issue rest alerts via seamless integration with GitHub Actions. A Streamlit-based dashboard provides real- time visualization of cognitive metrics and operational status. Experimental evaluation in a simulated CI/CD environment demonstrated ?90% emotion detection accuracy, ?95% fatigue detection accuracy, and sub-2-second trigger latency, showing the potential of cognitive-aware DevOps systems in reducing operational risk and enhancing developer well-being.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DevOps, Cognitive Monitoring, AI-Augmented Automation, Emotion Detection, Fatigue Detection, Computer Vision, CI/CD

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Automated Pneumonia Classification in Chest Radiographs Using Dual-Stage Ensemble Learning and LIME Interpretability

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02003

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02003

  Register Paper ID - 294074

  Title: AUTOMATED PNEUMONIA CLASSIFICATION IN CHEST RADIOGRAPHS USING DUAL-STAGE ENSEMBLE LEARNING AND LIME INTERPRETABILITY

  Author Name(s): Pushpita Biswas, Aum Dubey, Anirudh Vyas M, Prof. Kalaavathi B

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 21-34

 Year: September 2025

 Downloads: 56

 Abstract

Pneumonia is an inflammatory condition of the lung primarily affecting the small air sacs known as alveoli caused by microorganism infection which can be viral or bacterial. It remains a critical public health concern worldwide, particularly in low resource settings, affecting severely specific age groups such as newborns & infants under 2 years old and adults above 65, due to their weak immune system. While Chest radiograph imaging is the most well-known screening approach used for detecting pneumonia in the early stages, its blurry and low illumination nature may call forth human error in manual diagnosis. Hence, the contribution of this work is the development of a two-stage pneumonia detection Expert System fusing the capabilities of both ensemble convolutional networks and the Transformer mechanism. In the first stage, a binary classification ensemble model is employed to detect whether a given chest X-ray indicates pneumonia or not. Upon a positive detection, the second stage activates a multi-class classification ensemble model that further categorizes the pneumonia into viral or bacterial, thus providing a finer level of diagnostic detail. The ensemble learning extracts strong features from the raw input X-ray images in two different scenarios: ensemble A (i.e., DenseNet201, Xception and InceptionResNet V2) and ensemble B (i.e., DenseNet201, Xception and VGG-16). The proposed ensemble deep learning model recorded 95.95% classification performance in terms of overall accuracy and F1-score for the binary classification task, while it achieved 88.57% for multi-classification task. To ensure that the diagnosis is not only automated but also interpretable to end-users, including healthcare professionals, the model is fed to an expert system where users can upload X-ray images, get a classification result and see the highlighted region which supports the diagnosis through Local Interpretable Model-Agnostic Explanations (LIME), a black box testing strategy. The proposed framework could provide promising and encouraging explainable identification performance compared to the individual or existing ensemble models building trust of users and healthcare professionals on the result.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Pneumonia, Chest X-Ray, Deep Learning, Explainable AI, Ensemble Model, LIME

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Adaptive Quantum-Cryptography-Based Defense Against Blackhole Attacks in Wireless Sensor Networks

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02002

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02002

  Register Paper ID - 294075

  Title: ADAPTIVE QUANTUM-CRYPTOGRAPHY-BASED DEFENSE AGAINST BLACKHOLE ATTACKS IN WIRELESS SENSOR NETWORKS

  Author Name(s): K.Adithi

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 12-19

 Year: September 2025

 Downloads: 60

 Abstract

Blackhole attacks in Wireless Sensor Networks (WSNs) pose significant threats to data integrity and network reliability. These attacks involve malicious nodes diverting or dropping data packets, disrupting communication, and compromising network integrity. Existing loopholes in wireless sensor network defences include vulnerabilities in encryption protocols and limited scalability of anomaly detection algorithms. By leveraging advanced cryptographic techniques and anomaly detection algorithms like Quantum cryptography, it aims to identify and mitigate the impact of malicious nodes within the network. Additionally, anomaly detection algorithms continuously monitor network behavior to detect deviations indicative of blackhole attacks. Through simulations and experimental factors, a defense mechanism to establish secure communication channels between sensor nodes and base stations, safeguarding data transmission against interception and manipulation is designed. This enhances the security posture of WSNs, resulting in the effectiveness of the approach in mitigating the impact of blackhole attacks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

WSN, Security, Black Hole, vulnerabilities, Quantum Cryptography

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: StrongHer - An Online Platform for Ensuring the Safety and Mental Well- being of Women and Children

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBG02001

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBG02001

  Register Paper ID - 294076

  Title: STRONGHER - AN ONLINE PLATFORM FOR ENSURING THE SAFETY AND MENTAL WELL- BEING OF WOMEN AND CHILDREN

  Author Name(s): Dr. S. Rajalakshmi, J. Bhuvana, Pooja TSR, Sakthisri A, Sharmila A

 Publisher Journal name: IJCRT

 Volume: 13

 Issue: 9

 Pages: 1-11

 Year: September 2025

 Downloads: 59

 Abstract

The protection and mental health of women and children continue to be pressing societal concerns, but while immense problems remain in the form of restricted access to mental healthcare, unawareness of legal rights, and inadequate provisions for emergency support mechanisms, immense problems still abound. The StrongHer project meets the above challenges through the creation of a secure, accessible, and integrated online platform. The platform provides virtual counselling services, mental health screenings using GAD-7 and PHQ-9 scales, gamified learning exercises that enhance legal awareness, and instant emergency response using IoT-based wearable devices. Sensitive medical records are stored securely using blockchain technology (Ethereum and IPFS) to maintain data privacy and integrity. Developed using ASP.NET Core MVC, Microsoft SQL Server, NodeMCU (IoT module), and blockchain integrations, StrongHer integrates the latest technologies to establish a digital safe space. The system empowers users by boosting their mental resilience, giving them timely support, encouraging legal literacy, and providing real-time emergency communication features. By combining counselling, legal aid, education, and emergency response within one environment, StrongHer is a complete solution to tackle the complex issues of vulnerable groups, thus making a significant contribution towards the safety and well-being of society.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Women and Child Safety, Mental Health Assessment, Blockchain- based Medical Record Storage, Emergency SOS Alert System, IoT-based Safety Devices, Virtual Counselling.

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 13 | Issue 12 | Month- December 2025)

Call For Paper December 2025
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A digital object identifier by DOI.org How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer