Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 11 | Issue 3

Volume 11 | Issue 3 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: Defending Against DDoS Attacks Using Ant Colony Optimization

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303946

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303946

  Register Paper ID - 233654

  Title: DEFENDING AGAINST DDOS ATTACKS USING ANT COLONY OPTIMIZATION

  Author Name(s): R.M. Mallika, P.Lavanya, M. Peddaiah, K. Lohith, P.Lokeswari

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h988-h994

 Year: March 2023

 Downloads: 141

 Abstract

The importance of the DDoS issue and the rise in the frequency, sophistication, and power of assaults have prompted the development of several prevention techniques. Each suggested preventive measure differs from the others in certain specific benefits and drawbacks. In this study, we categorise the many defences against potential DDoS assaults that have been put forth in the literature and evaluate the advantages and disadvantages of each defence. It is preferred to consider that the number of maximum continuous DoS attacks in both the S-C and the C-A channels is bounded because of the cost effect of attacks. In this project on Distributed denial of service (DoS) attacks in cyber-systems, DoS attacks exist in between the sensor and controller communications and the controller-to-actuator communications. Then, a successful security control technique is developed to counter two-channel DoS attacks, fully utilising the hardware to guarantee that control inputs are periodically captured during each time slot. A security controller that includes both the present and future control inputs is designed at the same time. The addressed CPS can be stable under 2-channel DoS attacks while maintaining control effectiveness under an appropriate security control strategy and security controller. Last but not least, simulations and tests are provided to show the viability of the suggested active security control approach.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DoS attacks, Security transmission policy, Actively defend, Security control, Experiments, Cyber-physical systems.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Emergence And Growing Potentiality Of Small Tea Cultivators Towards Employment Generation In Assam

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303945

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303945

  Register Paper ID - 233658

  Title: EMERGENCE AND GROWING POTENTIALITY OF SMALL TEA CULTIVATORS TOWARDS EMPLOYMENT GENERATION IN ASSAM

  Author Name(s): Monali Borah

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h980-h987

 Year: March 2023

 Downloads: 154

 Abstract

This paper discusses the emergence and growing potentiality of the small tea cultivators in Assam towards employment generation. The tea industry in Assam has traditionally been dominated by large tea estates, but in recent years, small tea growers have emerged as a significant force in the sector. These small growers, often located in remote and underdeveloped regions, have been able to leverage modern technology and better cultivation practices to increase their yields and quality. As a result, they are contributing significantly to the state's tea production and employment generation. This study examines the factors driving the growth of small tea cultivators in Assam and the challenges they face. It also analyzes the potential of this sector to provide livelihoods for a large number of people in the region and contribute to the state's economic development.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Small tea growers, development, plantation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303944

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303944

  Register Paper ID - 233653

  Title: INTERNET OF THINGS (IOT) BASED SMART HEALTH CARE MEDICAL BOX FOR ELDERLY PEOPLE

  Author Name(s): B. Getthavani, B. Venkat Kethan, K. Vijay Kumar, P. Shanmuga Reddy, G. Santhosh

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h969-h979

 Year: March 2023

 Downloads: 136

 Abstract

Despite the delayed adoption of IoT (Internet of Things) in the healthcare industry compared to other sectors, IoT in medicine is destined to keep the people safe and healthy, with the primary goal being to reduce the cost of health care in the next years. An intelligent medication box linked to sensors and a server for routine health monitoring is suggested as part of a smart Internet of Things-based healthcare system. With the aid of this internet-connected smart pill box, patients can stay on top of their medical regimens and easily communicate with their doctors even when they can't be in the same room at the same time. The suggested medication box has an alert that will remind the patient to take their medication at the prescribed time. Information about the doctor and patient, including medical history, medications, and upcoming appointments, is maintained on a laptop that also serves as a server. The doctor and the patient both have their own login credentials to use on the server. The server also stores the patient's prescription history and body temperature for the convenience of the attending physician. If the doctor decides to make a modification to the patient's prescription, they will be informed via the patient's mobile app. In addition, the doctor is in a position to act quickly in the event of a medical emergency.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Health Care,Internet of Things (IoT), Body sensor network, LCD

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AUTOMATIC DETECTION AND CLASSIFICATION OF BREAST CANCER USING THE TRANSFER-LEARNING TECHNIQUE.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303943

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303943

  Register Paper ID - 233650

  Title: AUTOMATIC DETECTION AND CLASSIFICATION OF BREAST CANCER USING THE TRANSFER-LEARNING TECHNIQUE.

  Author Name(s): B. Geethavani, R. Ganeswari, N. Hyndavi, V. Bharath Kumar, P.G. Hanumateja

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h963-h968

 Year: March 2023

 Downloads: 147

 Abstract

Cancer is one of the most deadly diseases. In addition, breast cancer is the most common cancer in women and can be fatal if untreated. Despite substantial improvements in medical technology over the years, a biopsy is still the only effective way to find breast cancer. Pathologists can detect cancer using microscopic histology images. Visualizing cancer is a challenging task that requires a lot of skill, creativity, and focus. Hence, a quicker and more accurate way of detecting breast cancer is needed. As a result of advancements in machine learning and image processing, numerous sorts of research are being conducted to create an efficient partially or totally computer monitored diagnosing system. In this study, invasive ductal carcinoma was diagnosed and classified utilising


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Deep learning, convolutional neural network (CNN), VGG19, Inception, Resnet, and dataset of breast cancer images.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Group Data Sharing in Cloud Computing on Identity Based Encryption

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303942

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303942

  Register Paper ID - 233648

  Title: GROUP DATA SHARING IN CLOUD COMPUTING ON IDENTITY BASED ENCRYPTION

  Author Name(s): N.BABU, M. Sonali, D. Venkatesh, K. Subba Reddy, V. Sai Kumar

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h957-h962

 Year: March 2023

 Downloads: 133

 Abstract

One of the most popular ways to protect data secrecy in many real-world applications, such as cloud-based data storage systems, is using encryption technologies. However, the production of encrypted data in a largely "static" format may obstruct further data processing. For computation or other purposes, encrypted data might need to be "converted" into another format. The idea of encryptions witching was first put up for conversion, namely between Paillier and ElGamal encryptions, in order to allow encryption to be employed in another device equipped with a different encryption mechanism. The conversion between traditional identity-based and attribute-based encryptions is taken into consideration in this research, and it also makes a concrete construction suggestion using the proxy re-encryption technique. In the standard model, it is demonstrated that the design is CPA secure under the q-decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons show that, especially when the client's data is encrypted and outsourced to a distant cloud, our bridging technique lowers compute and communication costs on the client side. In practise, it is acceptable to incur the computational overhead associated with re-encryption (on the server side) and decryption (on the client side).


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CPA security, identity-based encryption, attribute-based encryption, encryption switching, data security.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A Trustworthy Block chain-based Domain Name System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303941

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303941

  Register Paper ID - 233646

  Title: A TRUSTWORTHY BLOCK CHAIN-BASED DOMAIN NAME SYSTEM

  Author Name(s): P. M. M. S. Chandu, M. Jashwanth, R. Gayathri, K. Jayakiran, G. Bhuvanesh

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h949-h956

 Year: March 2023

 Downloads: 141

 Abstract

T 2 DNS is a third-party DNS service that we created. T 2 DNS provides client trustworthiness evidence, protects clients from channel and server attackers, is compatible with the current Internet infrastructure, and introduces bounded overhead while serving client DNS queries. T 2 DNS uses an encryption and obfuscation hybrid protocol to protect user privacy, and Intel SGX is used to power its service proxy. Scaling the initialization procedure, limiting the obfuscation overhead, and fine-tuning useful system parameters are obstacles we successfully overcame. We develop a T 2 DNS prototype, and testing demonstrates that it is completely functional, has a manageable overhead when compared to alternative alternatives, and scales to the number of customers.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Ethereum, smart contracts, DNS security, block chains.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Block chain in Student Registration System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303940

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303940

  Register Paper ID - 233647

  Title: BLOCK CHAIN IN STUDENT REGISTRATION SYSTEM

  Author Name(s): K.Maheswari, C. Kavya, B. Mohan Sai, P. Madhusudhan, D. Mahidhar

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h944-h948

 Year: March 2023

 Downloads: 145

 Abstract

Blockchain enables us to design a decentralised environment free from interference from outside parties. Every completed transaction is permanently validated and recorded in a public ledger. We suggest a global platform for managing student data and attendance based on blockchain technology. It makes up an internationally reputable, decentralised network for managing student data, attendance, and file sharing that can provide security at the level of a school or higher educational institution.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Block chain in student management system, student registration system.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Virus Spreading Control over network by using Black and White Algorithm

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303939

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303939

  Register Paper ID - 233645

  Title: VIRUS SPREADING CONTROL OVER NETWORK BY USING BLACK AND WHITE ALGORITHM

  Author Name(s): B. Pavan Kumar, V. Dhanushya, A. Dileep, B. Anusha, N. Hithesh

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h937-h943

 Year: March 2023

 Downloads: 127

 Abstract

Although difficult, controlling viral propagation over intricate networks on a tight budget has received a lot of attention. In order to restrict viral spread, this article seeks to answer the combinatorial, discrete resource allocation problems (RAPs). A co-evolutionary algorithm with network-community-based decomposition is offered as an evolutionary divide-and-conquer method to address the challenges of growing network scales and boost solving effectiveness. It is distinguished by its use of a community-based dividing strategy and cooperative co-evolutionary philosophy. Secondly, in order to decrease the time complexity, NCD-CEA separates a network into numerous communities using a modified community detection technique, resulting in a clustering of the variables that are most important to the solution. Then, the problem and the global swarm are divided into smaller problems and smaller swarms using low-dimensional Second, an alternate evolutionary strategy that promotes the evolution of sub swarms and the global swarm in turn, with sub solutions assessed by local fitness, is meant to produce high-quality solutions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Resource distribution, networked systems, spreading control, cooperative coevolution (CC).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Predicting Cervical Cancer Prognosis using a Health Recommendation System.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303938

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303938

  Register Paper ID - 233643

  Title: PREDICTING CERVICAL CANCER PROGNOSIS USING A HEALTH RECOMMENDATION SYSTEM.

  Author Name(s): R.G. Kumar, V. Pradeepa, B. Naga Bhushana, E. Nandakumar, Y. Pallavi

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h931-h936

 Year: March 2023

 Downloads: 157

 Abstract

The most common gynaecological malignancy that causes serious issues for women if left untreated is cervical cancer. This study exhibits various classification algorithms and demonstrates the benefit of feature selection methodologies for the most accurate cervical cancer disease prediction. The amount of patient digital system data in the healthcare industry is utilised to extract information and predict immune deficiency syndrome, which aids in patients' informed decision-making. To help patients understand the reports' material better, a health recommender system is employed. For feature selection in the proposed model, we employ wrapper techniques with the K Nearest Neighbor (KNN) classifier, and Multi Objective Algorithm (MOA) has been identified. is utilised in this system for feature selection as the most effective evolutionary algorithm to choose the key features with less complexity as compared to other conventional feature selection approaches. The dataset for the implementation and accuracy of the cervical cancer risk classification has been used as the assessment parameter.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

K-Nearest Neighbor Algorithm, Multi Objective Algorithm, Feature Selection, Prediction, Health Recommender System

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Content Integrity as Counter-Measure to Site Content Attacks

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303937

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303937

  Register Paper ID - 233641

  Title: CONTENT INTEGRITY AS COUNTER-MEASURE TO SITE CONTENT ATTACKS

  Author Name(s): J. Sridhar, T. Charan sai, Adarsh Dubey, P. Dinesh Reddy, T.D. Goutham Kumar

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h923-h930

 Year: March 2023

 Downloads: 131

 Abstract

This article discusses the Content Security Policy (CSP) header, which is now the most popular defence against Cross-Site Scripting (XSS) assaults. It is stressed that the CSP header implementation is a comparatively easy way to raise the security level of Internet-based communication between people and devices. This makes it possible to precisely define the communication parties and web service assets utilised in the environments where secure web services are essential, such as web applications and Internet of Things (IoT) networks. As straightforward and efficient reporting is a natural element of the CSP design, administrators can be alerted to active attacks practically immediately. On real-world situations, the advantages of implementing CSP for communication are shown, as well as how simple it is to spread CSP.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Information security, organisation personnel, security planning and control

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EFFECT OF FEW BACKGROUND VARAIBLES ON COVID CRISIS MANAGEMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303936

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303936

  Register Paper ID - 233639

  Title: EFFECT OF FEW BACKGROUND VARAIBLES ON COVID CRISIS MANAGEMENT

  Author Name(s): DR T PRADEEP KUMAR

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h917-h922

 Year: March 2023

 Downloads: 121

 Abstract

COVID-19 has been a global disruptor. In many cases due to uncertainty and limited information, the pandemic has created chaos across business and private activity; education is no exception. The reality of the limited flexibility of existing systems of teaching was immediately acknowledged by the closure of physical facilities and the subsequent migration to online teaching. In this perspective the present study explores the Effect of few background variables on covid crisis management. Objectives of the study were to find whether secondary school teachers with respect to Educational qualifications & Teaching Experience differ in their covid crisis management. Samples of 200 teachers belonging to secondary schools of Bangalore district, Karnataka during the academic year 2021-22 were selected. Data pertaining to the covid crisis management were collected through simple random sampling techniques through survey method. The tool used for the present study was covid crisis management scale developed by Dr. T. Pradeep Kumar (2021) was adopted. The separate variance model of t-test was used for testing the hypotheses for the significance of mean difference in the covid crisis management scores of various groups was compared. Results revealed that Secondary school teachers having bachelors and master degree, Junior and senior teaching experienced do not differ significantly on covid crisis management.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Covid, Pandemic, Variables, Management, Crisis

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Determinants and impact of modernization on family and mental health in India

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303935

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303935

  Register Paper ID - 233631

  Title: DETERMINANTS AND IMPACT OF MODERNIZATION ON FAMILY AND MENTAL HEALTH IN INDIA

  Author Name(s): DR.Y.ANITHA

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h911-h916

 Year: March 2023

 Downloads: 128

 Abstract

India is called as subcontinent historically, the Indian subcontinent has been likened to be a deep net into which various races and people have drifted and been caught and their diverse origin has dictated variety. Geographical conditions forced these varied people to stay together in a multiple society imposing on them what has been described by historians as "unity in diversity." Most of the societies in the region are predominantly patriarchal with women's role confined to house-hold. For the predominantly agricultural economies of India currently, rural development is the core issue of development in India. Currently, the whole world is in a flux of transformations in social structures, cultural values and behavioral patterns due to modernization process. People move around the world, migrate and return, live abroad and raise children abroad. They are bound to live together with other ethnic and cultural groups, the process of modernization has its impacts everywhere and India region is no exception. Cowgill has defined modernization as follows Modernization is the transformation of a total society a relatively rural way of life based on animate power, limited technology, relatively undifferentiated institutions , parochial and traditional outlook and values, toward a predominantly urban way of life based on inanimate source of power , highly developed scientific technology, high differentiated institutions matched by segmented individual roles, and a cosmopolitan outlook which emphasizes efficiency and progress.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

modernization, family, mental health, technology.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DEVELOPMENT OF DISPOSBLE HERBAL UNDER ARM PAD USING NATURAL AGRORESIDUAL MEDIUM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303934

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303934

  Register Paper ID - 233625

  Title: DEVELOPMENT OF DISPOSBLE HERBAL UNDER ARM PAD USING NATURAL AGRORESIDUAL MEDIUM

  Author Name(s): Divya.A, Indumathi.T.R

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h901-h910

 Year: March 2023

 Downloads: 124

 Abstract

Although it generates discolouration and a damp sensation, sweating is a sign of health. The modern man looks for answers to these issues. The design, manufacture, and performance evaluation of a disposable herbal underarm pad are covered in this work. This pad is not designed to prevent sweating; rather, it absorbs sweat and provides a dry feel. The article is divided into three main parts. The first part discusses the design and production of the pad, including a brief history of disposable pads and their use in daily life. The second part analyses the performance of the new pad; it has a dry feel, does not discolour or cause sweat staining, and is comfortable during wear. Finally, the third section discusses possible future designs for disposable underarm pads. The underarm pad consists of nonwoven fabrics skin contact layer, natural fibre core finished with herbal extract and a biofilm made with Manihot esculenta starch. To evaluate the performance of the pad, both objective and subjective tests were performed. Thickness and absorption tests were performed for objective evaluation of product. Male and female test volunteers were used for the subjective evaluations. The test volunteers tried the pads on and assessed how well they fit and comfort with the body, whether they deformed while being worn, and whether they felt dry afterward. A questionnaire was also employed to examine the individuals' perspectives on the pads. It was then established that the underarm pads function well in terms of strength and absorption in addition to having a nice fit and feeling dry after use.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Hyperhydrosis, Kenaf, Azadiracta Indica, Nyctanthes Arbor-Tristis, Manihot esculenta, disposable underarm pad.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Manipuri Dance and it's Complexity

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303933

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303933

  Register Paper ID - 233623

  Title: MANIPURI DANCE AND IT'S COMPLEXITY

  Author Name(s): Khangembam Khoni

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h897-h900

 Year: March 2023

 Downloads: 155

 Abstract

Abstract Manipuri Dance and its Complexity Dr. Khangembam Khoni Manipuri dance had been appreciated as one of the classical dances of India, still the study of the aesthetics of Manipuri dance is totally new. In fact, as of now, the study of dance aesthetics especially the dances of the Meiteis is quite controversial both in the place of its birth as well as in the rest of India. Part of the confusion lay in analyzing the evolution of the dances from its folk and primeval beginnings to a more sophisticated codified and structured form as a result of cultural assimilation with the world of Hinduism. In Manipur, as well as outside of Manipur not much of the studies had been done on the critical issues of how the culture of the Meiteis evolved from a primal setting to a refined form later in history. This may be due to the lack of study of cultural history in Manipur, though there had been extensive writings on the subject of Manipuri classical dances as being evolved from the Lai-Haraoba dances of old. The problem was the lack of structural study of the ancient dance form of the Meitei and how these structural features of the Manipuri non-Hindu dances were incorporated into the classical dances. On the other hand, dance gurus and traditional indigenous scholars and practitioners of the seventies were not agreeable to the assumption that the Manipuri classical dances evolved from an application of the principles of Sanskrit poetics, notably Natya Shastra. Though many contemporary studies in mainstream India as well as in educated Manipuri elite circles also contribute to this mainstream belief, the old teachers of Jawaharlal Nehru Manipur Dance Academy, established in 1954 under the auspices of late Prime Minster of India, still maintain a fond belief that Manipuri classical dances had its own codes, practices, gestural forms and movement behaviour, body postures etc. which was substantially refined by itself before the coming of Hinduism. They therefore firmly held that Manipuri dances itself was substantially of a high standard of sophistication, and that when Rajarshi Bhagyachandra (1763-1798) founded the Raas Leela, he only had to introduce all the existing movement forms within the new genre of performance. The problem therefore is to undertake a serious performative study of the dances of the Meiteis from the earliest times and attempt to discover certain principles of the conceptions of the laws of beauty as understood by the indigenous Manipuri and define those principles as they existed in historical times.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Keywords: Aesthetics of Manipuri dance, Challenges, Meiteis indigenous concept, Performative study, and Sanskrit poetics.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Identifying Miscreants in the Virtual Classroom

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303932

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303932

  Register Paper ID - 233618

  Title: IDENTIFYING MISCREANTS IN THE VIRTUAL CLASSROOM

  Author Name(s): N.BABU, P.HARSHITHA, P.HARITHA, V.AVINASH, P.M.DINESH

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h890-h896

 Year: March 2023

 Downloads: 136

 Abstract

By tracking the IP address of the anonymous participant, to identify the criminals who joined the class and inform the teacher of the information. Text mining is one of these and is crucial in online academic sessions. The process of extracting information from text is known as text mining. By posting and exchanging contents, an online academic platform offers valuable user-generated knowledge. Because many users experience information overload, identifying harmful contents from vast text streams is a critical challenge in academia. To address this issue, we suggest using fuzzy keyword matching techniques from machine learning methodologies in conjunction with lexical data analysis using text mining methods. We create a test system using a captured video through the internet, Using the data, locate the illegal participant by tracing their IP address illegal participant.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

words with a digital signature, honey. Hash code for sugar words.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A REVIEW ON MEDICINAL USES OF ZINGIBER OFFICINALE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303931

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303931

  Register Paper ID - 233616

  Title: A REVIEW ON MEDICINAL USES OF ZINGIBER OFFICINALE

  Author Name(s): Sachin Farkade, Shubhangi Manikpuriya, Gajanan Sanap

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h876-h889

 Year: March 2023

 Downloads: 158

 Abstract

Rhizome of Zingiber officinale( gusto) is considerably used in medicinal purpose. Ayurveda literatures highlight administration of gusto in both of transmissible andnon-communicable conditions. Recent advances in logical chemistry, cytology and microbiology recommend operation of gusto in colorful complaint conditions as well as recommendations in Ayurveda literature. The current study concentrated on review ethno medicinal value of 7. officinale including antiviral effect, radioprotective effect,anti-inflammatory effect, anticancer effect and antioxidant effect with special reference to Ayurveda recommendations. The study elaborates; gusto is effective in viral infections and revitalizing the body at complaint conditions according to both of Ayurveda and ultramodern generalities through enhancing appetite, impunity andre-boosting weakened physiological functions of the mortal body. Active constituents which available in gusto similar as 6- gingerole, 6- shogaol, 6- paradol. zingerole and zerumbone are responsible in upgrading enzyme conduct and balancing rotation through invigorating the body with physicalre-strengthening.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ginger, antipyretic, anti-inflammatory, anticancer, antioxidant

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: "Mugalkalin Shahi Mahilon ka Samajik wa Arthik Paristhiti ka Eitihasik Paripeksh"

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303930

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303930

  Register Paper ID - 233615

  Title: "MUGALKALIN SHAHI MAHILON KA SAMAJIK WA ARTHIK PARISTHITI KA EITIHASIK PARIPEKSH"

  Author Name(s): SHYAMALI FOUJDAR, Dr. Md. Rizwan

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h868-h875

 Year: March 2023

 Downloads: 224

 Abstract

Kisi Bhi Sabhyata ki Atma ko samajhne tatha uski upalabhdhiyon ewan shreshthata ka mulyankan karne ka sarbopari adhar ul kal ki istrion ke dasha ka adhyan karna hei. istrion ki dasha kisi bhi sabhyata ya sanskriti ka mapdanda mana ja sakta hei. Halanki Bharat mein istrion ka itihas atyanta gatishil raha hei. Is Lekh ke madhyam se Mugalkalin shahi istrion ki samajik wa arthik chhetra mein nibhai gaie bhumika tatthyon ki riti-riwaz mein parakhne ki chesta ki gaie hei.Mugal badshahon dwara mahilaon ke prati acharan,bewhar, adar, sammwan ewam sahanubhuti ki samiksha karne ka prayas kiya gaya hei. Bastra udyog, krishi,beipar ewam banijyo, bittiyo prawbandhan ewam sanchalan mein mahilaon ki bhumika ke yogdan ka tatthyon ke adhar par aanka gaya hei. Is lekh dwara parde ke pichhe hi sahi mayne par mahilaon dwara naribad ki "low" ko jalane ki prayash ki nirnayak rakha gaya.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Dahej pratha, Parda pratha, bahu bibah, Sheitanpura, Johar, jagir, Pargana, Bastra udyog, Mansab, Wanijyo.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TRACEABILITY AND MONITORING OF MEDICAL DEVICES USING NFT AND BLOCKCHAIN TECHNOLOGY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303929

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303929

  Register Paper ID - 233614

  Title: TRACEABILITY AND MONITORING OF MEDICAL DEVICES USING NFT AND BLOCKCHAIN TECHNOLOGY

  Author Name(s): V.Priyadharshini, V.Subasri, Dr.S.Praveen Kumar

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h860-h867

 Year: March 2023

 Downloads: 139

 Abstract

To implement block chain method for medical device production to verifying and tracking of medical device information. This creates a number of problems with data integrity, provenance, traceability, and openness relating to information and data about medical devices used in the healthcare supply chain. non-fungible token (NFT) based traceability system for medical devices that takes advantage of blockchain smart contracts, tokenization protocols, and a decentralized storage system. NFTs are used to represent the digital twin of the medical device. QR code were created for particular device and device details are stored in blockchain enabled server that have pre-established validation rules. All system users and stakeholders must first register and validate their identities using the suggested application. It tracks the production of medical device from manufacturers to traders that subsequently sell them to customers. Blocks of time stamped voting are stored on all systems across a value chain. Blockchain is a transaction ledger where members of a community record transfers of assets among them. The connection between two blocks is made the use of SHA-256 algorithm. Finally implement cryptography algorithm for encrypting device purchase details


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Secure Medical Device Information, QR Code Generation, Blockchain Technology, Authenticity Verification, Medical device purchase, DES Encryption.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Advanced Security Framework for Enabling Protection in Fingerprint Templates

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303928

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303928

  Register Paper ID - 233611

  Title: ADVANCED SECURITY FRAMEWORK FOR ENABLING PROTECTION IN FINGERPRINT TEMPLATES

  Author Name(s): R G. Kumar, P.CHANDANA, K.DIVYA, B.BHARGAV, K.C.S BALAJI

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h850-h859

 Year: March 2023

 Downloads: 135

 Abstract

Biometrics has arisen as an autonomous and trustworthy alternative to old technologies that relied on PINs or passwords, in which a subject's behavioural or physiological traits allow for his identification. One benefit of biometric characteristics is that they cannot be misplaced or forgotten. Although BTP technologies are used to create the biometric references for the registered subjects, it is still possible to impersonate a specific subject using a template obtained from a database without the BTP scheme realising it. The notion behind adding artificial templates to the system to thwart these attacks comes from the Honey words strategy. For the purpose of safeguarding conventional passwords when multiple password hashes are kept for each subject: the hash for hashes for the actual password as well as for imitation or honeypot words. More recently, a framework known as Honey Templates for the use of the honey words concept in biometric authentication systems was proposed, and a specific case study on face verification based on Eigen faces was applied on a small database, demonstrating its effectiveness in terms of both irreversibility and recognition performance.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Honey words, digital signature. Hash code for sugar words.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: THE IMPACT OF ANTI BULLYING INTERVENTION STRATEGIES ON STUDENT'S DEVELOPMENT BETWEEN THE AGE GROUP 11 TO 13 YEARS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2303927

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2303927

  Register Paper ID - 233609

  Title: THE IMPACT OF ANTI BULLYING INTERVENTION STRATEGIES ON STUDENT'S DEVELOPMENT BETWEEN THE AGE GROUP 11 TO 13 YEARS

  Author Name(s): Ms. Shikha Verma, Ms. Komal Arora

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 3

 Pages: h835-h849

 Year: March 2023

 Downloads: 158

 Abstract

Bullying is usually defined as a subset of aggressive behavior characterized by repetition and an imbalance of power (Olweus, 1993). The behavior involved is generally thought of as being repetitive, i.e., a victim is targeted a number of times over a period of time. Also, the victim cannot defend himself or herself easily, for one or more reasons. S/he may be outnumbered, made to feel smaller or less physically strong, or less psychologically resilient than the person(s) doing the bullying (Smith, 2000). In the past two decades, the problem of school bullying has received much attention among educational authorities, school teachers and researchers in many countries including India. Being bullied makes teenage children incredibly insecure. When any child is being bullied, he/she can feel constantly insecure which has a big, physical, mental and emotional impact. According to various researches bullying occurs for a large part within the school's perimeters which at times goes unnoticed. Our schools need to take a greater role in handling bullying. The schools are in a position to provide more protection and support to children and their parents and exhibit real capacity to be the positive force to diminish these occurrences. The students who are bullied or had been bullying others should not be a problem but a part of solution to the problem of bullying. Keeping this in view an action research was conducted with 40 students between the age group of 11-13 years who were either the victims or the bullies themselves. Various intervention strategies was designed and implemented and the impact for the same showed the better adjustments issues both in school and at home, better parental support, the increased levels of confidence and self-esteem along with reduced levels of anger which are the important components of holistic development.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Bullying, Interventions, Teenagers, School system, Holistic Development

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 5 | Month- May 2024)

Call For Paper May 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer