ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: Defending Against DDoS Attacks Using Ant Colony Optimization
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303946
Register Paper ID - 233654
Title: DEFENDING AGAINST DDOS ATTACKS USING ANT COLONY OPTIMIZATION
Author Name(s): R.M. Mallika, P.Lavanya, M. Peddaiah, K. Lohith, P.Lokeswari
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h988-h994
Year: March 2023
Downloads: 141
The importance of the DDoS issue and the rise in the frequency, sophistication, and power of assaults have prompted the development of several prevention techniques. Each suggested preventive measure differs from the others in certain specific benefits and drawbacks. In this study, we categorise the many defences against potential DDoS assaults that have been put forth in the literature and evaluate the advantages and disadvantages of each defence. It is preferred to consider that the number of maximum continuous DoS attacks in both the S-C and the C-A channels is bounded because of the cost effect of attacks. In this project on Distributed denial of service (DoS) attacks in cyber-systems, DoS attacks exist in between the sensor and controller communications and the controller-to-actuator communications. Then, a successful security control technique is developed to counter two-channel DoS attacks, fully utilising the hardware to guarantee that control inputs are periodically captured during each time slot. A security controller that includes both the present and future control inputs is designed at the same time. The addressed CPS can be stable under 2-channel DoS attacks while maintaining control effectiveness under an appropriate security control strategy and security controller. Last but not least, simulations and tests are provided to show the viability of the suggested active security control approach.
Licence: creative commons attribution 4.0
DoS attacks, Security transmission policy, Actively defend, Security control, Experiments, Cyber-physical systems.
Paper Title: Emergence And Growing Potentiality Of Small Tea Cultivators Towards Employment Generation In Assam
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303945
Register Paper ID - 233658
Title: EMERGENCE AND GROWING POTENTIALITY OF SMALL TEA CULTIVATORS TOWARDS EMPLOYMENT GENERATION IN ASSAM
Author Name(s): Monali Borah
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h980-h987
Year: March 2023
Downloads: 154
This paper discusses the emergence and growing potentiality of the small tea cultivators in Assam towards employment generation. The tea industry in Assam has traditionally been dominated by large tea estates, but in recent years, small tea growers have emerged as a significant force in the sector. These small growers, often located in remote and underdeveloped regions, have been able to leverage modern technology and better cultivation practices to increase their yields and quality. As a result, they are contributing significantly to the state's tea production and employment generation. This study examines the factors driving the growth of small tea cultivators in Assam and the challenges they face. It also analyzes the potential of this sector to provide livelihoods for a large number of people in the region and contribute to the state's economic development.
Licence: creative commons attribution 4.0
Small tea growers, development, plantation
Paper Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303944
Register Paper ID - 233653
Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE
Author Name(s): B. Getthavani, B. Venkat Kethan, K. Vijay Kumar, P. Shanmuga Reddy, G. Santhosh
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h969-h979
Year: March 2023
Downloads: 136
Despite the delayed adoption of IoT (Internet of Things) in the healthcare industry compared to other sectors, IoT in medicine is destined to keep the people safe and healthy, with the primary goal being to reduce the cost of health care in the next years. An intelligent medication box linked to sensors and a server for routine health monitoring is suggested as part of a smart Internet of Things-based healthcare system. With the aid of this internet-connected smart pill box, patients can stay on top of their medical regimens and easily communicate with their doctors even when they can't be in the same room at the same time. The suggested medication box has an alert that will remind the patient to take their medication at the prescribed time. Information about the doctor and patient, including medical history, medications, and upcoming appointments, is maintained on a laptop that also serves as a server. The doctor and the patient both have their own login credentials to use on the server. The server also stores the patient's prescription history and body temperature for the convenience of the attending physician. If the doctor decides to make a modification to the patient's prescription, they will be informed via the patient's mobile app. In addition, the doctor is in a position to act quickly in the event of a medical emergency.
Licence: creative commons attribution 4.0
Health Care,Internet of Things (IoT), Body sensor network, LCD
Paper Title: AUTOMATIC DETECTION AND CLASSIFICATION OF BREAST CANCER USING THE TRANSFER-LEARNING TECHNIQUE.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303943
Register Paper ID - 233650
Title: AUTOMATIC DETECTION AND CLASSIFICATION OF BREAST CANCER USING THE TRANSFER-LEARNING TECHNIQUE.
Author Name(s): B. Geethavani, R. Ganeswari, N. Hyndavi, V. Bharath Kumar, P.G. Hanumateja
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h963-h968
Year: March 2023
Downloads: 147
Cancer is one of the most deadly diseases. In addition, breast cancer is the most common cancer in women and can be fatal if untreated. Despite substantial improvements in medical technology over the years, a biopsy is still the only effective way to find breast cancer. Pathologists can detect cancer using microscopic histology images. Visualizing cancer is a challenging task that requires a lot of skill, creativity, and focus. Hence, a quicker and more accurate way of detecting breast cancer is needed. As a result of advancements in machine learning and image processing, numerous sorts of research are being conducted to create an efficient partially or totally computer monitored diagnosing system. In this study, invasive ductal carcinoma was diagnosed and classified utilising
Licence: creative commons attribution 4.0
Deep learning, convolutional neural network (CNN), VGG19, Inception, Resnet, and dataset of breast cancer images.
Paper Title: Group Data Sharing in Cloud Computing on Identity Based Encryption
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303942
Register Paper ID - 233648
Title: GROUP DATA SHARING IN CLOUD COMPUTING ON IDENTITY BASED ENCRYPTION
Author Name(s): N.BABU, M. Sonali, D. Venkatesh, K. Subba Reddy, V. Sai Kumar
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h957-h962
Year: March 2023
Downloads: 133
One of the most popular ways to protect data secrecy in many real-world applications, such as cloud-based data storage systems, is using encryption technologies. However, the production of encrypted data in a largely "static" format may obstruct further data processing. For computation or other purposes, encrypted data might need to be "converted" into another format. The idea of encryptions witching was first put up for conversion, namely between Paillier and ElGamal encryptions, in order to allow encryption to be employed in another device equipped with a different encryption mechanism. The conversion between traditional identity-based and attribute-based encryptions is taken into consideration in this research, and it also makes a concrete construction suggestion using the proxy re-encryption technique. In the standard model, it is demonstrated that the design is CPA secure under the q-decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons show that, especially when the client's data is encrypted and outsourced to a distant cloud, our bridging technique lowers compute and communication costs on the client side. In practise, it is acceptable to incur the computational overhead associated with re-encryption (on the server side) and decryption (on the client side).
Licence: creative commons attribution 4.0
CPA security, identity-based encryption, attribute-based encryption, encryption switching, data security.
Paper Title: A Trustworthy Block chain-based Domain Name System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303941
Register Paper ID - 233646
Title: A TRUSTWORTHY BLOCK CHAIN-BASED DOMAIN NAME SYSTEM
Author Name(s): P. M. M. S. Chandu, M. Jashwanth, R. Gayathri, K. Jayakiran, G. Bhuvanesh
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h949-h956
Year: March 2023
Downloads: 141
T 2 DNS is a third-party DNS service that we created. T 2 DNS provides client trustworthiness evidence, protects clients from channel and server attackers, is compatible with the current Internet infrastructure, and introduces bounded overhead while serving client DNS queries. T 2 DNS uses an encryption and obfuscation hybrid protocol to protect user privacy, and Intel SGX is used to power its service proxy. Scaling the initialization procedure, limiting the obfuscation overhead, and fine-tuning useful system parameters are obstacles we successfully overcame. We develop a T 2 DNS prototype, and testing demonstrates that it is completely functional, has a manageable overhead when compared to alternative alternatives, and scales to the number of customers.
Licence: creative commons attribution 4.0
Ethereum, smart contracts, DNS security, block chains.
Paper Title: Block chain in Student Registration System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303940
Register Paper ID - 233647
Title: BLOCK CHAIN IN STUDENT REGISTRATION SYSTEM
Author Name(s): K.Maheswari, C. Kavya, B. Mohan Sai, P. Madhusudhan, D. Mahidhar
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h944-h948
Year: March 2023
Downloads: 145
Blockchain enables us to design a decentralised environment free from interference from outside parties. Every completed transaction is permanently validated and recorded in a public ledger. We suggest a global platform for managing student data and attendance based on blockchain technology. It makes up an internationally reputable, decentralised network for managing student data, attendance, and file sharing that can provide security at the level of a school or higher educational institution.
Licence: creative commons attribution 4.0
Block chain in student management system, student registration system.
Paper Title: Virus Spreading Control over network by using Black and White Algorithm
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303939
Register Paper ID - 233645
Title: VIRUS SPREADING CONTROL OVER NETWORK BY USING BLACK AND WHITE ALGORITHM
Author Name(s): B. Pavan Kumar, V. Dhanushya, A. Dileep, B. Anusha, N. Hithesh
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h937-h943
Year: March 2023
Downloads: 127
Although difficult, controlling viral propagation over intricate networks on a tight budget has received a lot of attention. In order to restrict viral spread, this article seeks to answer the combinatorial, discrete resource allocation problems (RAPs). A co-evolutionary algorithm with network-community-based decomposition is offered as an evolutionary divide-and-conquer method to address the challenges of growing network scales and boost solving effectiveness. It is distinguished by its use of a community-based dividing strategy and cooperative co-evolutionary philosophy. Secondly, in order to decrease the time complexity, NCD-CEA separates a network into numerous communities using a modified community detection technique, resulting in a clustering of the variables that are most important to the solution. Then, the problem and the global swarm are divided into smaller problems and smaller swarms using low-dimensional Second, an alternate evolutionary strategy that promotes the evolution of sub swarms and the global swarm in turn, with sub solutions assessed by local fitness, is meant to produce high-quality solutions.
Licence: creative commons attribution 4.0
Resource distribution, networked systems, spreading control, cooperative coevolution (CC).
Paper Title: Predicting Cervical Cancer Prognosis using a Health Recommendation System.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303938
Register Paper ID - 233643
Title: PREDICTING CERVICAL CANCER PROGNOSIS USING A HEALTH RECOMMENDATION SYSTEM.
Author Name(s): R.G. Kumar, V. Pradeepa, B. Naga Bhushana, E. Nandakumar, Y. Pallavi
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h931-h936
Year: March 2023
Downloads: 157
The most common gynaecological malignancy that causes serious issues for women if left untreated is cervical cancer. This study exhibits various classification algorithms and demonstrates the benefit of feature selection methodologies for the most accurate cervical cancer disease prediction. The amount of patient digital system data in the healthcare industry is utilised to extract information and predict immune deficiency syndrome, which aids in patients' informed decision-making. To help patients understand the reports' material better, a health recommender system is employed. For feature selection in the proposed model, we employ wrapper techniques with the K Nearest Neighbor (KNN) classifier, and Multi Objective Algorithm (MOA) has been identified. is utilised in this system for feature selection as the most effective evolutionary algorithm to choose the key features with less complexity as compared to other conventional feature selection approaches. The dataset for the implementation and accuracy of the cervical cancer risk classification has been used as the assessment parameter.
Licence: creative commons attribution 4.0
K-Nearest Neighbor Algorithm, Multi Objective Algorithm, Feature Selection, Prediction, Health Recommender System
Paper Title: Content Integrity as Counter-Measure to Site Content Attacks
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303937
Register Paper ID - 233641
Title: CONTENT INTEGRITY AS COUNTER-MEASURE TO SITE CONTENT ATTACKS
Author Name(s): J. Sridhar, T. Charan sai, Adarsh Dubey, P. Dinesh Reddy, T.D. Goutham Kumar
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h923-h930
Year: March 2023
Downloads: 131
This article discusses the Content Security Policy (CSP) header, which is now the most popular defence against Cross-Site Scripting (XSS) assaults. It is stressed that the CSP header implementation is a comparatively easy way to raise the security level of Internet-based communication between people and devices. This makes it possible to precisely define the communication parties and web service assets utilised in the environments where secure web services are essential, such as web applications and Internet of Things (IoT) networks. As straightforward and efficient reporting is a natural element of the CSP design, administrators can be alerted to active attacks practically immediately. On real-world situations, the advantages of implementing CSP for communication are shown, as well as how simple it is to spread CSP.
Licence: creative commons attribution 4.0
Information security, organisation personnel, security planning and control
Paper Title: EFFECT OF FEW BACKGROUND VARAIBLES ON COVID CRISIS MANAGEMENT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303936
Register Paper ID - 233639
Title: EFFECT OF FEW BACKGROUND VARAIBLES ON COVID CRISIS MANAGEMENT
Author Name(s): DR T PRADEEP KUMAR
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h917-h922
Year: March 2023
Downloads: 121
COVID-19 has been a global disruptor. In many cases due to uncertainty and limited information, the pandemic has created chaos across business and private activity; education is no exception. The reality of the limited flexibility of existing systems of teaching was immediately acknowledged by the closure of physical facilities and the subsequent migration to online teaching. In this perspective the present study explores the Effect of few background variables on covid crisis management. Objectives of the study were to find whether secondary school teachers with respect to Educational qualifications & Teaching Experience differ in their covid crisis management. Samples of 200 teachers belonging to secondary schools of Bangalore district, Karnataka during the academic year 2021-22 were selected. Data pertaining to the covid crisis management were collected through simple random sampling techniques through survey method. The tool used for the present study was covid crisis management scale developed by Dr. T. Pradeep Kumar (2021) was adopted. The separate variance model of t-test was used for testing the hypotheses for the significance of mean difference in the covid crisis management scores of various groups was compared. Results revealed that Secondary school teachers having bachelors and master degree, Junior and senior teaching experienced do not differ significantly on covid crisis management.
Licence: creative commons attribution 4.0
Covid, Pandemic, Variables, Management, Crisis
Paper Title: Determinants and impact of modernization on family and mental health in India
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303935
Register Paper ID - 233631
Title: DETERMINANTS AND IMPACT OF MODERNIZATION ON FAMILY AND MENTAL HEALTH IN INDIA
Author Name(s): DR.Y.ANITHA
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h911-h916
Year: March 2023
Downloads: 128
India is called as subcontinent historically, the Indian subcontinent has been likened to be a deep net into which various races and people have drifted and been caught and their diverse origin has dictated variety. Geographical conditions forced these varied people to stay together in a multiple society imposing on them what has been described by historians as "unity in diversity." Most of the societies in the region are predominantly patriarchal with women's role confined to house-hold. For the predominantly agricultural economies of India currently, rural development is the core issue of development in India. Currently, the whole world is in a flux of transformations in social structures, cultural values and behavioral patterns due to modernization process. People move around the world, migrate and return, live abroad and raise children abroad. They are bound to live together with other ethnic and cultural groups, the process of modernization has its impacts everywhere and India region is no exception. Cowgill has defined modernization as follows Modernization is the transformation of a total society a relatively rural way of life based on animate power, limited technology, relatively undifferentiated institutions , parochial and traditional outlook and values, toward a predominantly urban way of life based on inanimate source of power , highly developed scientific technology, high differentiated institutions matched by segmented individual roles, and a cosmopolitan outlook which emphasizes efficiency and progress.
Licence: creative commons attribution 4.0
modernization, family, mental health, technology.
Paper Title: DEVELOPMENT OF DISPOSBLE HERBAL UNDER ARM PAD USING NATURAL AGRORESIDUAL MEDIUM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303934
Register Paper ID - 233625
Title: DEVELOPMENT OF DISPOSBLE HERBAL UNDER ARM PAD USING NATURAL AGRORESIDUAL MEDIUM
Author Name(s): Divya.A, Indumathi.T.R
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h901-h910
Year: March 2023
Downloads: 124
Although it generates discolouration and a damp sensation, sweating is a sign of health. The modern man looks for answers to these issues. The design, manufacture, and performance evaluation of a disposable herbal underarm pad are covered in this work. This pad is not designed to prevent sweating; rather, it absorbs sweat and provides a dry feel. The article is divided into three main parts. The first part discusses the design and production of the pad, including a brief history of disposable pads and their use in daily life. The second part analyses the performance of the new pad; it has a dry feel, does not discolour or cause sweat staining, and is comfortable during wear. Finally, the third section discusses possible future designs for disposable underarm pads. The underarm pad consists of nonwoven fabrics skin contact layer, natural fibre core finished with herbal extract and a biofilm made with Manihot esculenta starch. To evaluate the performance of the pad, both objective and subjective tests were performed. Thickness and absorption tests were performed for objective evaluation of product. Male and female test volunteers were used for the subjective evaluations. The test volunteers tried the pads on and assessed how well they fit and comfort with the body, whether they deformed while being worn, and whether they felt dry afterward. A questionnaire was also employed to examine the individuals' perspectives on the pads. It was then established that the underarm pads function well in terms of strength and absorption in addition to having a nice fit and feeling dry after use.
Licence: creative commons attribution 4.0
Hyperhydrosis, Kenaf, Azadiracta Indica, Nyctanthes Arbor-Tristis, Manihot esculenta, disposable underarm pad.
Paper Title: Manipuri Dance and it's Complexity
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303933
Register Paper ID - 233623
Title: MANIPURI DANCE AND IT'S COMPLEXITY
Author Name(s): Khangembam Khoni
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h897-h900
Year: March 2023
Downloads: 155
Abstract Manipuri Dance and its Complexity Dr. Khangembam Khoni Manipuri dance had been appreciated as one of the classical dances of India, still the study of the aesthetics of Manipuri dance is totally new. In fact, as of now, the study of dance aesthetics especially the dances of the Meiteis is quite controversial both in the place of its birth as well as in the rest of India. Part of the confusion lay in analyzing the evolution of the dances from its folk and primeval beginnings to a more sophisticated codified and structured form as a result of cultural assimilation with the world of Hinduism. In Manipur, as well as outside of Manipur not much of the studies had been done on the critical issues of how the culture of the Meiteis evolved from a primal setting to a refined form later in history. This may be due to the lack of study of cultural history in Manipur, though there had been extensive writings on the subject of Manipuri classical dances as being evolved from the Lai-Haraoba dances of old. The problem was the lack of structural study of the ancient dance form of the Meitei and how these structural features of the Manipuri non-Hindu dances were incorporated into the classical dances. On the other hand, dance gurus and traditional indigenous scholars and practitioners of the seventies were not agreeable to the assumption that the Manipuri classical dances evolved from an application of the principles of Sanskrit poetics, notably Natya Shastra. Though many contemporary studies in mainstream India as well as in educated Manipuri elite circles also contribute to this mainstream belief, the old teachers of Jawaharlal Nehru Manipur Dance Academy, established in 1954 under the auspices of late Prime Minster of India, still maintain a fond belief that Manipuri classical dances had its own codes, practices, gestural forms and movement behaviour, body postures etc. which was substantially refined by itself before the coming of Hinduism. They therefore firmly held that Manipuri dances itself was substantially of a high standard of sophistication, and that when Rajarshi Bhagyachandra (1763-1798) founded the Raas Leela, he only had to introduce all the existing movement forms within the new genre of performance. The problem therefore is to undertake a serious performative study of the dances of the Meiteis from the earliest times and attempt to discover certain principles of the conceptions of the laws of beauty as understood by the indigenous Manipuri and define those principles as they existed in historical times.
Licence: creative commons attribution 4.0
Keywords: Aesthetics of Manipuri dance, Challenges, Meiteis indigenous concept, Performative study, and Sanskrit poetics.
Paper Title: Identifying Miscreants in the Virtual Classroom
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303932
Register Paper ID - 233618
Title: IDENTIFYING MISCREANTS IN THE VIRTUAL CLASSROOM
Author Name(s): N.BABU, P.HARSHITHA, P.HARITHA, V.AVINASH, P.M.DINESH
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h890-h896
Year: March 2023
Downloads: 136
By tracking the IP address of the anonymous participant, to identify the criminals who joined the class and inform the teacher of the information. Text mining is one of these and is crucial in online academic sessions. The process of extracting information from text is known as text mining. By posting and exchanging contents, an online academic platform offers valuable user-generated knowledge. Because many users experience information overload, identifying harmful contents from vast text streams is a critical challenge in academia. To address this issue, we suggest using fuzzy keyword matching techniques from machine learning methodologies in conjunction with lexical data analysis using text mining methods. We create a test system using a captured video through the internet, Using the data, locate the illegal participant by tracing their IP address illegal participant.
Licence: creative commons attribution 4.0
words with a digital signature, honey. Hash code for sugar words.
Paper Title: A REVIEW ON MEDICINAL USES OF ZINGIBER OFFICINALE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303931
Register Paper ID - 233616
Title: A REVIEW ON MEDICINAL USES OF ZINGIBER OFFICINALE
Author Name(s): Sachin Farkade, Shubhangi Manikpuriya, Gajanan Sanap
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h876-h889
Year: March 2023
Downloads: 158
Rhizome of Zingiber officinale( gusto) is considerably used in medicinal purpose. Ayurveda literatures highlight administration of gusto in both of transmissible andnon-communicable conditions. Recent advances in logical chemistry, cytology and microbiology recommend operation of gusto in colorful complaint conditions as well as recommendations in Ayurveda literature. The current study concentrated on review ethno medicinal value of 7. officinale including antiviral effect, radioprotective effect,anti-inflammatory effect, anticancer effect and antioxidant effect with special reference to Ayurveda recommendations. The study elaborates; gusto is effective in viral infections and revitalizing the body at complaint conditions according to both of Ayurveda and ultramodern generalities through enhancing appetite, impunity andre-boosting weakened physiological functions of the mortal body. Active constituents which available in gusto similar as 6- gingerole, 6- shogaol, 6- paradol. zingerole and zerumbone are responsible in upgrading enzyme conduct and balancing rotation through invigorating the body with physicalre-strengthening.
Licence: creative commons attribution 4.0
ginger, antipyretic, anti-inflammatory, anticancer, antioxidant
Paper Title: "Mugalkalin Shahi Mahilon ka Samajik wa Arthik Paristhiti ka Eitihasik Paripeksh"
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303930
Register Paper ID - 233615
Title: "MUGALKALIN SHAHI MAHILON KA SAMAJIK WA ARTHIK PARISTHITI KA EITIHASIK PARIPEKSH"
Author Name(s): SHYAMALI FOUJDAR, Dr. Md. Rizwan
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h868-h875
Year: March 2023
Downloads: 224
Kisi Bhi Sabhyata ki Atma ko samajhne tatha uski upalabhdhiyon ewan shreshthata ka mulyankan karne ka sarbopari adhar ul kal ki istrion ke dasha ka adhyan karna hei. istrion ki dasha kisi bhi sabhyata ya sanskriti ka mapdanda mana ja sakta hei. Halanki Bharat mein istrion ka itihas atyanta gatishil raha hei. Is Lekh ke madhyam se Mugalkalin shahi istrion ki samajik wa arthik chhetra mein nibhai gaie bhumika tatthyon ki riti-riwaz mein parakhne ki chesta ki gaie hei.Mugal badshahon dwara mahilaon ke prati acharan,bewhar, adar, sammwan ewam sahanubhuti ki samiksha karne ka prayas kiya gaya hei. Bastra udyog, krishi,beipar ewam banijyo, bittiyo prawbandhan ewam sanchalan mein mahilaon ki bhumika ke yogdan ka tatthyon ke adhar par aanka gaya hei. Is lekh dwara parde ke pichhe hi sahi mayne par mahilaon dwara naribad ki "low" ko jalane ki prayash ki nirnayak rakha gaya.
Licence: creative commons attribution 4.0
Dahej pratha, Parda pratha, bahu bibah, Sheitanpura, Johar, jagir, Pargana, Bastra udyog, Mansab, Wanijyo.
Paper Title: TRACEABILITY AND MONITORING OF MEDICAL DEVICES USING NFT AND BLOCKCHAIN TECHNOLOGY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303929
Register Paper ID - 233614
Title: TRACEABILITY AND MONITORING OF MEDICAL DEVICES USING NFT AND BLOCKCHAIN TECHNOLOGY
Author Name(s): V.Priyadharshini, V.Subasri, Dr.S.Praveen Kumar
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h860-h867
Year: March 2023
Downloads: 139
To implement block chain method for medical device production to verifying and tracking of medical device information. This creates a number of problems with data integrity, provenance, traceability, and openness relating to information and data about medical devices used in the healthcare supply chain. non-fungible token (NFT) based traceability system for medical devices that takes advantage of blockchain smart contracts, tokenization protocols, and a decentralized storage system. NFTs are used to represent the digital twin of the medical device. QR code were created for particular device and device details are stored in blockchain enabled server that have pre-established validation rules. All system users and stakeholders must first register and validate their identities using the suggested application. It tracks the production of medical device from manufacturers to traders that subsequently sell them to customers. Blocks of time stamped voting are stored on all systems across a value chain. Blockchain is a transaction ledger where members of a community record transfers of assets among them. The connection between two blocks is made the use of SHA-256 algorithm. Finally implement cryptography algorithm for encrypting device purchase details
Licence: creative commons attribution 4.0
Secure Medical Device Information, QR Code Generation, Blockchain Technology, Authenticity Verification, Medical device purchase, DES Encryption.
Paper Title: Advanced Security Framework for Enabling Protection in Fingerprint Templates
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303928
Register Paper ID - 233611
Title: ADVANCED SECURITY FRAMEWORK FOR ENABLING PROTECTION IN FINGERPRINT TEMPLATES
Author Name(s): R G. Kumar, P.CHANDANA, K.DIVYA, B.BHARGAV, K.C.S BALAJI
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h850-h859
Year: March 2023
Downloads: 135
Biometrics has arisen as an autonomous and trustworthy alternative to old technologies that relied on PINs or passwords, in which a subject's behavioural or physiological traits allow for his identification. One benefit of biometric characteristics is that they cannot be misplaced or forgotten. Although BTP technologies are used to create the biometric references for the registered subjects, it is still possible to impersonate a specific subject using a template obtained from a database without the BTP scheme realising it. The notion behind adding artificial templates to the system to thwart these attacks comes from the Honey words strategy. For the purpose of safeguarding conventional passwords when multiple password hashes are kept for each subject: the hash for hashes for the actual password as well as for imitation or honeypot words. More recently, a framework known as Honey Templates for the use of the honey words concept in biometric authentication systems was proposed, and a specific case study on face verification based on Eigen faces was applied on a small database, demonstrating its effectiveness in terms of both irreversibility and recognition performance.
Licence: creative commons attribution 4.0
Honey words, digital signature. Hash code for sugar words.
Paper Title: THE IMPACT OF ANTI BULLYING INTERVENTION STRATEGIES ON STUDENT'S DEVELOPMENT BETWEEN THE AGE GROUP 11 TO 13 YEARS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT2303927
Register Paper ID - 233609
Title: THE IMPACT OF ANTI BULLYING INTERVENTION STRATEGIES ON STUDENT'S DEVELOPMENT BETWEEN THE AGE GROUP 11 TO 13 YEARS
Author Name(s): Ms. Shikha Verma, Ms. Komal Arora
Publisher Journal name: IJCRT
Volume: 11
Issue: 3
Pages: h835-h849
Year: March 2023
Downloads: 158
Bullying is usually defined as a subset of aggressive behavior characterized by repetition and an imbalance of power (Olweus, 1993). The behavior involved is generally thought of as being repetitive, i.e., a victim is targeted a number of times over a period of time. Also, the victim cannot defend himself or herself easily, for one or more reasons. S/he may be outnumbered, made to feel smaller or less physically strong, or less psychologically resilient than the person(s) doing the bullying (Smith, 2000). In the past two decades, the problem of school bullying has received much attention among educational authorities, school teachers and researchers in many countries including India. Being bullied makes teenage children incredibly insecure. When any child is being bullied, he/she can feel constantly insecure which has a big, physical, mental and emotional impact. According to various researches bullying occurs for a large part within the school's perimeters which at times goes unnoticed. Our schools need to take a greater role in handling bullying. The schools are in a position to provide more protection and support to children and their parents and exhibit real capacity to be the positive force to diminish these occurrences. The students who are bullied or had been bullying others should not be a problem but a part of solution to the problem of bullying. Keeping this in view an action research was conducted with 40 students between the age group of 11-13 years who were either the victims or the bullies themselves. Various intervention strategies was designed and implemented and the impact for the same showed the better adjustments issues both in school and at home, better parental support, the increased levels of confidence and self-esteem along with reduced levels of anger which are the important components of holistic development.
Licence: creative commons attribution 4.0
Bullying, Interventions, Teenagers, School system, Holistic Development
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 5 | Month- May 2024)