ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: VIRTUAL CLOTH FITTING IN 2D USING DEEP LEARING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020028
Register Paper ID - 223498
Title: VIRTUAL CLOTH FITTING IN 2D USING DEEP LEARING
Author Name(s): R.Palson Keneddy, Monishwar Roshan.B, Charan.M, Logesh, Jothi Krihnan.K
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 218-230
Year: June 2022
Downloads: 472
In online shopping, People would like to know how they look in a particular dress they tend to buy. To bring closer between in-store (offline) and online shopping and provide a realistic shopping experience to the consumers, a system is required to predict how people look in a particular garment that they tend to buy. Traditional approaches to make such a system were dealing with computer graphics where a 3D avatar of the person is created and various clothes are visualized on him/her. The usage of such approaches limits practical applications due to high computation and hardware requirements. This Project aims to build a fitting system such that, it visualizes people wearing new clothes without any 3D information, only using Images, in the same pose as they are standing in. This Project is composed of two modules one for changing the shape of cloth given in the input according to the personality and another module to attach this cloth onto the individual body. Using Efficient CNN based networks, which learns to predict the parameters for changing shape via spatial transformation is used in the first module. The shape changed cloth is passed on to the next module which is based on U-net architecture that predicts the mask where to attach the cloth, using this information the cloth is attached onto the body for generating final output images. The system is able to generate natural and rich images without much loss.
Licence: creative commons attribution 4.0
VIRTUAL CLOTH FITTING IN 2D USING DEEP LEARING
Paper Title: FACIAL MANIPULATION DETECTION USING U-NET
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020027
Register Paper ID - 223499
Title: FACIAL MANIPULATION DETECTION USING U-NET
Author Name(s): K.Varalakshmi, Dalish Princa William W
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 210-217
Year: June 2022
Downloads: 477
As advanced face synthesis and manipulation methods are made available, new types of fake face representations are being created which have raised significant concerns for their use in day-to-day life. Hence, it is crucial to identify the digitally altered facial images. A new method to identify the manipulated human faces and locate the region of manipulation is done using U-net Architecture. This manipulated image, created by altering the original image, along with the mask of alteration is used to train the model. Image padding, rectified linear activation, max pooling, up convolution are performed and thus output mask is obtained. The accuracy and dice score are calculated. Thus the area of manipulation done on the human face is found by using U-net.
Licence: creative commons attribution 4.0
Facial manipulation, U-net, area of manipulation, multi-class classification
Paper Title: STEGANALYSIS OF DIGITAL IMAGES USING DEEP FRACTAL NETWORK
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020026
Register Paper ID - 223500
Title: STEGANALYSIS OF DIGITAL IMAGES USING DEEP FRACTAL NETWORK
Author Name(s): Mr. Dharma Prakash, Chanikya Reddy, P. Sevith Reddy, M B. Akhil Kumar
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 204-209
Year: June 2022
Downloads: 472
In Cryptography, plain text is converted to encrypted text before it is sent, and it is converted to plain text after communication on the other side. Steganography is a method of hiding secret data, by embedding it into an audio, video, image, or text file. One technique is to hide data in bits that represent the same color pixels repeated in a row in an image file. By applying the encrypted data to this redundant data in some inconspicuous way, the result will be an image file that appears identical to the original image but that has "noise" patterns of regular, unencrypted data. In this project it proposes to encrypt the IoT networks data by Cryptography method and hide the encrypted message inside an image file using Steganography method as well increases the number of bits that can be saved within a pixel of an image. We are going to incorporate the usage of Convolutional neural networks in traditional steganography method to drastically increase the payload that can be transmitted through an image. Thus, in this project the Convolutional networks algorithm will be developed and trained in such a way to increase the payload of the data to be encrypted as well as safely decrypted to view the original message.
Licence: creative commons attribution 4.0
Steganography, Cloud storage, Fractal Net
Paper Title: LAND REGISTRATION USING BLOCK CHAIN METHOD
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020025
Register Paper ID - 223501
Title: LAND REGISTRATION USING BLOCK CHAIN METHOD
Author Name(s): R.Palson Kennedy, Delhi Babu.R, Gokula Krishnan.R, Balarishi.S
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 195-203
Year: June 2022
Downloads: 544
The process of land registration in any country is known to be a multistep process, since it entails the engagement of all stakeholders who will have a direct or indirect stake in the registration. The currently used land record title storage system raises major issues about data fraud, the security of highly sensitive data, and the risk of system failure due to natural disasters, such as the server used for data storage going down. Compared to the current approaches and procedures for land title management and data storage, blockchain is a cutting-edge technology and database that has the ability to completely address the problems that plague current systems. The basic and most important aspect of blockchain technology is that it is a decentralised network in which all data supplied by a single node are confirmed by all other available nodes, and only after a consensus is made can then the shared data be saved to the blockchain.There are various platforms being used for the creation of reliable, decentralised, transparent, immutable, and secure blockchain-based land registration and management systems. Smart contracts based on the Ethereum blockchain are gaining traction among these systems. Being a public blockchain platform, it allows anyone to participate in the blockchain ecosystem .
Licence: creative commons attribution 4.0
LAND REGISTRATION USING BLOCK CHAIN METHOD
Paper Title: SMART SENSING WITH MQTT MESH NETWORK
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020024
Register Paper ID - 223502
Title: SMART SENSING WITH MQTT MESH NETWORK
Author Name(s): S.Sarvanan, Pooja Shree.D, ThalabeethaAgnes.A, Yogeswari.N
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 187-194
Year: June 2022
Downloads: 479
A wireless mesh network (WMN) is a mesh network created through the connection of wireless access point (WAP) nodes installed at each network user's locale. The networking infrastructure is decentralized and simplified because each node need only transmit as far as the next node. WMNs may or may not be connected to the internet. Wireless mesh networks, which can also be a form of wireless ad hoc network (WANET), are often used for the following: connecting internet of things (IoT) devices, such as sensors, security systems, smart appliances and monitoring systems; building networks in developing communities that lack internet wiring infrastructure; and providing consistent wireless access to hospitals, educational campuses and warehouses. Wi-Fi and networking in temporary locations, such as construction Network Security Can be defined as measures taken to protect data during their transmission along the media. Whereas securing the internet means taking measures to protect data during their transmission over a collection of Interconnected networks. Network security is the most important issue in the vast field of wireless networks. In order to improve network security, there are number of products that are available in the market that use packet filtering. For a network administrator, packet filtering is an effective tool for security purposes but he/she has to have an in depth knowledge of the capability of this tool. Our firewall software contains a set of protocol for which the filters will be applied. We have devised a packet filtering firewall called Net app for Microsoft windows operating systems.
Licence: creative commons attribution 4.0
Smart Sensing with MQTT Mesh Network
Paper Title: DATA-DRIVEN DECISION SUPPORT FOR OPTIMIZING CYBER FORENSIC INVESTIGATIONS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020023
Register Paper ID - 223503
Title: DATA-DRIVEN DECISION SUPPORT FOR OPTIMIZING CYBER FORENSIC INVESTIGATIONS
Author Name(s): S.Jonisha, E Sharran, S Vignesh, AR .Sibi
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 181-186
Year: June 2022
Downloads: 453
Licence: creative commons attribution 4.0
DATA-DRIVEN DECISION SUPPORT FOR OPTIMIZING CYBER FORENSIC INVESTIGATIONS
Paper Title: ANIMAL REPELLENT SYSTEM FOR SMART FARMING USING ARTIFICIAL INTELLIGENCE AND DEEP LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020022
Register Paper ID - 223504
Title: ANIMAL REPELLENT SYSTEM FOR SMART FARMING USING ARTIFICIAL INTELLIGENCE AND DEEP LEARNING
Author Name(s): R.S.Abirami, MohanaSelvi.S, Narmadha.S, Anitha.S
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 173-180
Year: June 2022
Downloads: 576
Licence: creative commons attribution 4.0
Animal Recognition, Repellent, Artificial Intelligence, Edge Computing, Animal Detection, Deep Learning, DCNN
Paper Title: CONSUMER TO CONSUMER PRODUCT TRADING WITH STRATEGIC CONSUMER BEHAVIOUR USING PRIVATE BLOCK CHAIN TECHNIQUE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020021
Register Paper ID - 223505
Title: CONSUMER TO CONSUMER PRODUCT TRADING WITH STRATEGIC CONSUMER BEHAVIOUR USING PRIVATE BLOCK CHAIN TECHNIQUE
Author Name(s): Mr.S.S.Vasantha Raja, Nijanthan D, Raghul B, Roopesh S
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 165-172
Year: June 2022
Downloads: 441
Licence: creative commons attribution 4.0
CONSUMER TO CONSUMER PRODUCT TRADING WITH STRATEGIC CONSUMER BEHAVIOUR USING PRIVATE BLOCK CHAIN TECHNIQUE
Paper Title: FRAMEWORK FOR NON-CONTINUOUS SPACIOUS MECHANISM WITH TECHNICAL BEGATS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020020
Register Paper ID - 223506
Title: FRAMEWORK FOR NON-CONTINUOUS SPACIOUS MECHANISM WITH TECHNICAL BEGATS
Author Name(s): Divya M, Akila.S2, Keerthana.S, Keerthana.S, Mafishya Jaspher.J
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 157-164
Year: June 2022
Downloads: 443
Licence: creative commons attribution 4.0
Non-Continuous Spacious, resource monitoring, scheduling
Paper Title: BRAIN TUMOR DIAGONATION USING MACHINE LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020019
Register Paper ID - 223507
Title: BRAIN TUMOR DIAGONATION USING MACHINE LEARNING
Author Name(s): A.Vijay Narayanan, Sathiyaseelan.P, Sathish Kumar.P, Nizamuddin.S
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 150-156
Year: June 2022
Downloads: 441
Licence: creative commons attribution 4.0
BRAIN TUMOR DIAGONATION USING MACHINE LEARNING
Paper Title: REAL-TIME CRASH PREDICTION USING ADAPTIVE BOOSTING IN MACHINE LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020018
Register Paper ID - 223508
Title: REAL-TIME CRASH PREDICTION USING ADAPTIVE BOOSTING IN MACHINE LEARNING
Author Name(s): C.Kalaiarasi, Prasanth.K.C, Rakesh Kumar.T, Sakthivel.N
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 144-149
Year: June 2022
Downloads: 346
In this paper, we are going to look into the project which is going to be an advanced managing site which can be used to manage multiple educational institutions along with extra features like as with the exponentially increasing number of vehicles, road safety is a matter of huge concern. Road accidents kill 1.2 million people every year, It causes loss of lives and economical damage, which is a serious concern which needs to be solved, We have used machine learning algorithms to predict the severity of an accident occurring at a particular location and time. Factors like speed limit, age, weather, vehicle type, light conditions and day of the week have been used as parameters for training the model, We have created a web app for user input and output display and a notification is sent to the police to take preventive measures, The model will run with the input data and predicts the severity of an accident occurring at the respective location of the user, This model will play an important role in the planning and management of traffic and would help us reduce a lot of road accidents in the future.
Licence: creative commons attribution 4.0
REAL-TIME CRASH PREDICTION USING ADAPTIVE BOOSTING IN MACHINE LEARNING
Paper Title: AGRICULTURAL PRODUCT PRICE AND CROP CULTIVATION PREDICTION BASED ON DATA SCIENCE TECHNIQUE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020017
Register Paper ID - 223509
Title: AGRICULTURAL PRODUCT PRICE AND CROP CULTIVATION PREDICTION BASED ON DATA SCIENCE TECHNIQUE
Author Name(s): S.Jonisha, Dhanush B, Jayanth, Thiruvengadam.S
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 138-143
Year: June 2022
Downloads: 306
Licence: creative commons attribution 4.0
AGRICULTURAL PRODUCT PRICE AND CROP CULTIVATION PREDICTION BASED ON DATA SCIENCE TECHNIQUE
Paper Title: HUMAN SIGNATURE VERIFICATION USING CNN WITH TENSORFLOW
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020016
Register Paper ID - 223511
Title: HUMAN SIGNATURE VERIFICATION USING CNN WITH TENSORFLOW
Author Name(s): Dr.R.Palson Kennedy, Nithish Kumar, Vinodh Kumar, Yogesh
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 125-137
Year: June 2022
Downloads: 397
Licence: creative commons attribution 4.0
HUMAN SIGNATURE VERIFICATION USING CNN WITH TENSORFLOW
Paper Title: A PROVABLE CONTEXTUAL RETRIEVAL STRATEGY IN THE PUBLIC CLOUD USING OPTIMAL MATCHING OVER SECURED DATA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020015
Register Paper ID - 223512
Title: A PROVABLE CONTEXTUAL RETRIEVAL STRATEGY IN THE PUBLIC CLOUD USING OPTIMAL MATCHING OVER SECURED DATA
Author Name(s): Ms.S.Jonisha, Mohammed Alameen A, Guhan P, Mokinder S
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 117-124
Year: June 2022
Downloads: 335
Semantic searching over encrypted data is a crucial task for secure information retrieval in public cloud. It aims to provide retrieval service to arbitrary words so that queries and search results are flexible. In existing semantic searching schemes, the verifiable searching does not be supported since it is dependent on the forecasted results from predefined keywords to verify the search results from cloud, and the queries are expanded on plain text and the exact matching is performed by the extended semantically words with predefined keywords, which limits their accuracy. In this paper, we propose a secure verifiable semantic searching scheme. For semantic optimal matching on ciphertext, we formulate word transportation (WT) problem to calculate the minimum word transportation cost (MWTC) as the similarity between queries and documents, and propose a secure transformation to transform WT problems into random linear programming (LP) problems to obtain the encrypted MWTC. For verifiability, we explore the duality theorem of LP to design a verification mechanism using the intermediate data produced in matching process to verify the correctness of search results. Security analysis demonstrates that our scheme can guarantee verifiability and confidentiality. Experimental results on two datasets show our scheme has higher accuracy than other schemes.
Licence: creative commons attribution 4.0
A PROVABLE CONTEXTUAL RETRIEVAL STRATEGY IN THE PUBLIC CLOUD USING OPTIMAL MATCHING OVER SECURED DATA
Paper Title: ADAPTIVE AND FAULT – TOLERANT DATA PROCESSING IN HEALTHCARE IOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020014
Register Paper ID - 223513
Title: ADAPTIVE AND FAULT – TOLERANT DATA PROCESSING IN HEALTHCARE IOT
Author Name(s): Ms.B.Priya, Abinaya.S, Hemalatha.V, Kasthuri.A
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 110-116
Year: June 2022
Downloads: 315
The interconnection of the devices using network technologies form Internet of Things (IOT). IOT is the advanced technology useful for the medical health sector in many ways. In this system, the proposed design is to find out the reading of the human pulse sensor and alert the system, if the heartbeat of the victim is abnormal through a buzzer and also send the messages to the emergency contacts through Global system for Mobile (GSM) system. This system will also be connected to the Thing speak Cloud for the data processing with the help of Wi-Fi based microcontroller. The entire system can be used for easy evaluation of the doctor regarding the victim past medical heart beats. The data will be continuously active and stored in the cloud. The proposed system experimental values are reliable, user friendly and economical to use regularly.
Licence: creative commons attribution 4.0
Paper Title: VIRTUAL INSTITUTION MANAGEMENT USING COMBINED TECHNOLOGY ACCEPTANCE MODEL
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020013
Register Paper ID - 223514
Title: VIRTUAL INSTITUTION MANAGEMENT USING COMBINED TECHNOLOGY ACCEPTANCE MODEL
Author Name(s): Mr . Dharmaprakash, Santhosh Kumar, Rahul, Pichandigiri Munichandra
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 97-109
Year: June 2022
Downloads: 292
A advanced managing web site which can be used to manage multiple educational institutions along with extra features . like Providing notes in the same website for the student usage , Generating Report for all kind of analysis from academic to expenditure, Contact guardians of students directly through mail or sending them notification, Teachers can provide hand written notes to the students, give video lectures, and also schedule live classes to the students, Students can directly rise complaint, if they have any issues, All kind of departments and staffs can be managed using his web enabled application, Being an web enabled application it can be easily accessed from any device with internet connection.VCR is a web enabled application developed in PHP and powerful MYSQL database backend and storing a bulk data in big data . This paper Used the unified theory of acceptance and combined technology acceptance model use of SPSS 21 ,with seem and smart PLS V3 software used to test the proposed model.this paper proposed model for the electronic record management adoption to support the productivity and performance of higher professional education institution in the Yemeni context. To implement this application, educational institution do not need much expensive hardware and software, they just need an internet connection and a desktop with basic operating system and a browser.
Licence: creative commons attribution 4.0
VIRTUAL INSTITUTION MANAGEMENT USING COMBINED TECHNOLOGY ACCEPTANCE MODEL
Paper Title: REVIEW OF ADDRESS FIXED SYSTEM BASED ON LOCATION INTELLIGENCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020012
Register Paper ID - 223515
Title: REVIEW OF ADDRESS FIXED SYSTEM BASED ON LOCATION INTELLIGENCE
Author Name(s): Om Tiwari
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 87-96
Year: June 2022
Downloads: 327
The situation on the ground kept changing rapidly and without warning. In the absence of standardized address formats, users write the same address in many different ways, which may include alternate spellings, conflicting geographical information (e.g., two unrelated localities), or missing information (e.g., forgot to write pin code).The issues drawn from the observation and the civilian's personal diary are useful in understanding the social implications of tracking and monitoring. From the information recorded during the field observation, a number of inherent technical limitations in GPS were identified which add to the complexity of such related areas. The paper points out that human factors in location intelligence are often underestimated, while a thorough consideration of their role should create additional ground for effective business intelligence as well as intelligence applications.
Licence: creative commons attribution 4.0
location intelligence, decision making, human-centered approach, Address fix, Location Based Services
Paper Title: IOT AND GOOGLE ASSISTANT BASED WIRELESS NOTICE BOARD
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020011
Register Paper ID - 223516
Title: IOT AND GOOGLE ASSISTANT BASED WIRELESS NOTICE BOARD
Author Name(s): Ms.C.Kalaiarasi, K.Varalakshmi, Ananthi N, Nanthini K, Rekha TV
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 80-86
Year: June 2022
Downloads: 362
This proposed system presents a digital notice board using WiFi module. The idea behind this proposed system is to provide its users with a simple, fast and reliable way to put up important notices in an LCD where the user can send a message to be displayed in the LCD. The message can be sent through an Google Assistant application designed in this proposed system, through the WiFi module. So, notices can be put up in an LCD display from any location in the world. It uses a microcontroller for system control, WiFi based technology for communication and sends the message through the Google Assistant application. The proposed system consists of a Nodemcu, WiFi module, an LCD, and an Google Assistant application for user interface with the hardware. This device can be used anywhere irrespective of the place of deployment provided mobile network connectivity is available.
Licence: creative commons attribution 4.0
IOT AND GOOGLE ASSISTANT BASED WIRELESS NOTICE BOARD
Paper Title: FACIAL BASED AUTHENTICATION USING EIGENFACE, FISHERFACE, AND LOCAL BINARY PATTERN HISTOGRAM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020010
Register Paper ID - 223517
Title: FACIAL BASED AUTHENTICATION USING EIGENFACE, FISHERFACE, AND LOCAL BINARY PATTERN HISTOGRAM
Author Name(s): S.Saravanan, Hemapriyadharshan J, Kamaludeen M, Karthik N
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 74-79
Year: June 2022
Downloads: 327
Licence: creative commons attribution 4.0
FACIAL BASED AUTHENTICATION USING EIGENFACE, FISHERFACE, AND LOCAL BINARY PATTERN HISTOGRAM
Paper Title: OPTIMIZATION OF INTERNET SIGNALS USING QOS PREDICTION IN ARTIFICIAL INTELLIGENCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTS020009
Register Paper ID - 223518
Title: OPTIMIZATION OF INTERNET SIGNALS USING QOS PREDICTION IN ARTIFICIAL INTELLIGENCE
Author Name(s): K.Varalakshmi, Aadarsh.N, Alshaji.I, AbishakeG.J
Publisher Journal name: IJCRT
Volume: 10
Issue: 6
Pages: 67-73
Year: June 2022
Downloads: 322
In the fast-moving world, the internet plays a vital role in part of every individual, business, and sector. So the internet is ruling nooks and corners of the world. The main goal is to provide quality internet services without any interruptions. As we can see the falling in internet signals or lost signals may affect each individual to a gigantic business. So to provide a signal in the correct strength can overcome the issue of the quality services on both customer and internet provider side. Here we are implementing a recommendation system to optimize the quality of service to the persons or sectors who are using the internet. This makes the service providers satisfy the customer and increase the business process further with the help of the recommendation system. Based on locations every time the signal differs according to the locations and hence when a customer confronts the signal issues, the service provider equalises the query of the customer by providing the signal to the requested customer based on the location. By doing this, we are not only efficiently solving the problem of the customer but also increasing the customer counts by providing the quality of the internet providing services using the recommendation system
Licence: creative commons attribution 4.0
OPTIMIZATION OF INTERNET SIGNALS USING QOS PREDICTION IN ARTIFICIAL INTELLIGENCE
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 11 | Month- November 2024)