ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
IJCRT Journal front page | IJCRT Journal Back Page |
Paper Title: SIGNIFICANCE OF WOOL TRADE IN THE POLITICAL AND ECONOMICAL DEVELOPMENT OF LADAKH.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5467
Register Paper ID - 238832
Title: SIGNIFICANCE OF WOOL TRADE IN THE POLITICAL AND ECONOMICAL DEVELOPMENT OF LADAKH.
Author Name(s): Dr. Rinchen Dolma, Dr. Nazia Jabeen
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M425-M433
Year: May 2023
Downloads: 119
Abstract: Ladakh, a region in the northern India, has history that is connected with Trans-Himalayan trade. The region was at the nodal point of whole complex trade routes. These routes paved way for exchanges of ideas and commodities. One of the most significant articles that shaped the region's political and economic history was the wool trade. Such was the significance of wool trade that every authority fought for the monopoly of this trade. The major invasions that Ladakh faced from its neighbours were because of their interest in the wool trade.
Licence: creative commons attribution 4.0
Ladakh, Trade, wool trade, Kashmir
Paper Title: SECURE FILE STORAGE USING HYBRID CRYPTOGRAPHY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5466
Register Paper ID - 238637
Title: SECURE FILE STORAGE USING HYBRID CRYPTOGRAPHY
Author Name(s): Vaishnavee.S, Fathima.G, Dr. S. Latha
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M422-M424
Year: May 2023
Downloads: 122
Secure file storage is essential to protecting sensitive data from unauthorized access or tampering. Hybrid cryptography is a widely used technique combining the benefits of symmetric and asymmetric encryption to provide robust security. This study has been undertaken in order to provide an efficient way to secure confidential files and sensitive information. In general, either a strong encryption algorithm is used to protect files or either authentication is done, or digital signatures are used. This provides only midlevel security to the files. In the proposed system, all these security implications are provided along with access controls. Moreover, three strong symmetric encryption algorithms are used along with an asymmetric algorithm that secures the key. The Key Derivation Function generates the key using the password and hash. To add an additional layer of protection to the files, the cipher texts are digitally signed using a Digital Signature Algorithm. In this proposed research, the contents of the file are divided into 3 segments. Each segment is encrypted using a different symmetric algorithm. The first segment is encrypted using Advanced Encryption Standard (AES) Algorithm, the second segment is encrypted using Fernet Algorithm and the third segment is encrypted using ChaCha20 Algorithm. The Key Derivation function used is Argon2. This adds an additional layer of security as it provides better protection against brute-forcing attacks. The keys are digitally signed using ECDSA (Elliptic Curve Digital Signature Algorithm) and the keys and signature along with the cipher texts are stored in a password-protected zip file with access controls set in such a way that only the user can read/write the file. The password is provided by the user and the user must use it to recover his/her files. This file is uploaded/stored in the database with access controls. This method provides all kinds of security measures such as confidentiality, integrity, authentication, authorization, access controls, and non-repudiation.
Licence: creative commons attribution 4.0
Secure Storage, AES algorithm, Fernet Algorithm, ChaCha20 Algorithm, Digital Signature, ECDSA Algorithm, Key Derivation Function, Argon2.
Paper Title: An Innovative Approach To Crime Forecasting: Predicting And Preventing Crimes Using Computer Vision And Machine Learning Techniques
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5465
Register Paper ID - 238550
Title: AN INNOVATIVE APPROACH TO CRIME FORECASTING: PREDICTING AND PREVENTING CRIMES USING COMPUTER VISION AND MACHINE LEARNING TECHNIQUES
Author Name(s): Dr.Yazdani Hasan, Sumbul Afroz
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M410-M421
Year: May 2023
Downloads: 144
The topic of crime and the demand for effective deterrents are covered in the work. The rising issue of criminal activity has shown that conventional crime-solving methods are ineffectual. Consequently, there is a growing need to foresee crimes in advance or develop a "machine" that might help law enforcement personnel avoid crime. The suggestion is to use algorithms and techniques from computer vision and machine learning to overcome this problem. The paper provides concrete examples of applications of these strategies, providing motivation for additional investigation in this area. This investigation's main goal is to examine how combining ML and computer vision can enable law enforcement organisations to identify, stop, and solve crimes with unmatched precision and quickness. By utilising these cutting-edge technologies, law enforcement organisations might undergo a revolution and efficiently battle crime.
Licence: creative commons attribution 4.0
Machine Learning,computer vision,Artificial Intelligence,3D shape Model,Neural Network 1. PURPOSE
Paper Title: Interactive Music Recommendation System Based On Text And Speech Analysis
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5464
Register Paper ID - 238693
Title: INTERACTIVE MUSIC RECOMMENDATION SYSTEM BASED ON TEXT AND SPEECH ANALYSIS
Author Name(s): Isha G. Moykhede, Mosmee S. Patil, Om S. Mahajan, Gaurav S. Mantri, Prof. Dr. Preeti D. Bhamre
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M404-M409
Year: May 2023
Downloads: 119
Music is an integral part of our lives. In this era of technological advances, appropriate music recommendations are much needed as soothing music according to moods helps humans to relieve stress. The objective of this project is to develop a personalized system, where the user's current emotion is analyzed with the help of a bot. The bot will interact with user to identify the mood. By analyzing the tone of the text and speech used by the user, mood can be identified. Once the mood is identified, the application will recommend music based on the user's mood. The project utilizes the Rasa framework for chatbot interaction, allowing the user to have a more natural and interactive experience. The deep speech recognition layers are used for recognition of emotions through speech. The model is going to use a Natural Language Processing (NLP) Algorithm for textual analysis and Convolutional Neural Network (CNN) along with spectrogram analysis to predict the mood based on the tone of the user. To recommend music based on the emotions Last.FM API will be used.
Licence: creative commons attribution 4.0
Bot, NLP, Spectrogram, Recommendation System, Speech Emotion Recognition.
Paper Title: A Study To Assess Impact Of Parenting Style On Personal Growth In..Youth
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5463
Register Paper ID - 237806
Title: A STUDY TO ASSESS IMPACT OF PARENTING STYLE ON PERSONAL GROWTH IN..YOUTH
Author Name(s): Aastha Mehta, Dr. Annie Khanam
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M397-M403
Year: May 2023
Downloads: 105
Parenting style is a pattern of behaviors, attitudes, and approaches that a parent uses when interacting with and raising their child. Personal growth is a process of psychological maturation that involves learning from the mistakes we made and developing new strategies to understand better and adapt to the world. This study was aimed at providing a light on how parenting styles impact the overall personal growth of an individual. Although the parent's style of treating their children is very different in comparison to others but it is necessary to know how the child takes it. A quantitative study was done involving hundred participants of 10-30 years were considered in this research. Perceived Parenting Style Scale & Personal Growth Questionnaire was used as a measure of the study. It was found out that there was a negative relationship between parenting styles and personal growth.
Licence: creative commons attribution 4.0
Parenting style, Personal Growth, Negative Relationship
Paper Title: FORMULATION AND EVALUATION OF ORGANIC LIP BALM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5462
Register Paper ID - 238479
Title: FORMULATION AND EVALUATION OF ORGANIC LIP BALM
Author Name(s): Safura Samir Sayyed, Ghugarkar Prasad Gorakshnath, Kundan sawale, Saba shaikh
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M389-M396
Year: May 2023
Downloads: 134
HERBAL COSMETIC - This plays significant role in today's life. Moreover current trend is going green in all industries including Mainly cosmetic to adopt more natural way of life(1) The preferable choices and natural food herbal , medicines and natural curing practices for healthy life and also there is much demand for organic vegetable product. (2) The usage of herbal cosmetic has been used for folds in personal care system . Natural product have been used for folk medicine purpose throughout the whole world (3) These were used from thousands of years many of these have pharmacological properties such as antimicrobial anti-inflammatory and others. These are useful to human (4) Herbal extract are cultivated all over the world and is prime name is horticulture sector. Cosmetic made up of herbal extract for skin care and hair care is very popular for their reliability (5)
Licence: creative commons attribution 4.0
Paper Title: Costus speciosus (Ketaki) - A herb with numerous medicinal properties
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5461
Register Paper ID - 238729
Title: COSTUS SPECIOSUS (KETAKI) - A HERB WITH NUMEROUS MEDICINAL PROPERTIES
Author Name(s): Tina W. Pandel, Shailju G. Gurunani, Aditya R. Kaikade
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M366-M388
Year: May 2023
Downloads: 114
The Costus specious, often known as ketaki, is an important Ayurvedic and medicinal plant used to cure a number of diseases. Costus speciosus (koenex, retz.), an Indian Ayurvedic herb, has a long history of therapeutic use in Western medicine. It is being studied for its antioxidant, anticholinesterase, larvicidal, antihyperglycemic, antifungal, antibacterial, anti-inflammatory, analgesic, antipyretic, antidiuretic, estrogenic, and antistress effects, among other pharmacological traits. The rhizomes of these plants are often used to treat diabetes and are a replacement source of diosgenin. Along with examining the pharmacological and phytochemical properties of Costus specious. This study proposed that plants` medicinal and therapeutic effects should be studied, as well as their ornamental and herbal properties. As a result, the current study offers a thorough examination of the morphology, phytochemistry, and pharmacological characteristics of Costus specious in an attempt to offer guidance for future research.
Licence: creative commons attribution 4.0
Costus speciosus, Ketaki, Pharmacological activities, Medicinal value of Costus speciosus
Paper Title: REVIEW ON: ROAD SAFETY AUDIT ON NH-48 IN PUNE MAHARASHTRA
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5460
Register Paper ID - 238747
Title: REVIEW ON: ROAD SAFETY AUDIT ON NH-48 IN PUNE MAHARASHTRA
Author Name(s): Prof. Krantikumar Mhetre, Mr. Atharva Thuse, Mr. Sagar Selukar, Mr. Yash Shinde
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M363-M365
Year: May 2023
Downloads: 96
: India is a vast country that relies heavily on the highway network for national development. National highways are key transportation hubs and safety must be prioritized to avoid accidents. As the number of vehicles on the road increases, the chances of accidents increase. Accidents can be broadly classified into two categories: subjective factors and objective factors. Subjective factors relate to the mental state of drivers and pedestrians, while objective factors relate to road conditions and engineering aspects. Subjective factors cannot be controlled from the outside, but objective factors can be addressed through various corrective measures. This paper is complemented by objective factor analysis and description, visual road surveys and focuses on suggestions for improvement. Both primary and secondary data were collected to analyze the accident prone areas. Primary data was obtained through physical surveys conducted on NH-48 and secondary data (available data) from National Highways Authority of India (NHAI) in 2020-2021. The collected data were then analyzed using ranking, weight severity and crash density methods to identify random sunspots on NH-48. Then, after further investigation, appropriate corrective actions are suggested for each identified accident prone area. These measures cannot completely eliminate accidents, but they are aimed at minimizing accidents as much as possible.
Licence: creative commons attribution 4.0
Accidental Black spots, NH-48 (National -Highway 48), Ranking Method, Severity, Index Method, Accidental density method.
Paper Title: FORMULATION AND EVALUATION OF HERBAL TOOTH POWDER
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5459
Register Paper ID - 238588
Title: FORMULATION AND EVALUATION OF HERBAL TOOTH POWDER
Author Name(s): VISHAL SUBHASH EDAKE
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M346-M362
Year: May 2023
Downloads: 150
Herbal tooth powders consisting of various ingredients that are available in the market in a wide range. Hence modern methods focusing on these aspects are useful for the standardization of herbs and their formulations. Consumers believed by using herbal-based toothpowders are safe, effective, and less toxic. This study is thus aimed to provide an alternative to the consumer and formulate herbal tooth powder using Clove, Neem, Ritha, Babool, Tulasi, Black salt, Stevia Leaf, Cinnamon, Fennal, Allum, Mentha, Camphor. The oral cavity infections are the most common types of infections. Dental caries is an infectious disease, causes damage and infection of enamel and dentine. If it is not treated, the infection continues and will lead to tooth loss. The mouth contains normal ?lora of opportunistic bacteria that are normally non-pathogenic. The imbalance of this situation causes infection and tooth decay. Streptococcus mutants are considered as the main species involved in the development of dental caries. S. mutants, acid-producing bacteria, causes fermentation of carbohydrates which results in tooth decay. Therefore, in the present work, the following aspects of Herbal tooth powders were planned for the formulation, standardization of herbal tooth powder, and anti-bacterial screening of the extracts of herbal tooth powder.
Licence: creative commons attribution 4.0
TOOTH POWDER, HERBAL , HERBAL TOOTH, HERBAL POWDER,
Paper Title: STUDY ON ICT A QUALITY OF HIGHER EDUCATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5458
Register Paper ID - 237865
Title: STUDY ON ICT A QUALITY OF HIGHER EDUCATION
Author Name(s): Sneha Santosh Mishra
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M331-M345
Year: May 2023
Downloads: 100
Information and communication technology has been adopted as a positive technological change in almost every industry; and education industry has not been excluded from this revolution. Education is considered as an important key to the transformation & overall development of human life. In today's competitive world; being literate is not enough; perusing higher education is in demand. The quality of education can be enhanced when educational institutions embrace the innovative and quality ways for teaching & learning processes. ICT symbolizes 'new time' in the evolution of education. Usage of ICT in education industry includes using information & technology in the form of hardware, software & applications in collecting storing students' data, imparting knowledge through audio-visual aids, conducting examination & evaluation of students etc. To sum up, ICT can really be proved advantageous to enhance quality of higher education. Based on primary data; this paper aims at encouraging the use of ICT to enhance the quality of education by understanding the current status of ICT practice in educational institutions and identifying key benefits & challenges of ICT with special reference to institutes in Mumbai suburbs.
Licence: creative commons attribution 4.0
ICT, education industry, Quality, teaching & learning, revolution
Paper Title: A study on the saving and investment behaviour of home makers in Jogeshwari and Andheri region of Mumbai
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5457
Register Paper ID - 237866
Title: A STUDY ON THE SAVING AND INVESTMENT BEHAVIOUR OF HOME MAKERS IN JOGESHWARI AND ANDHERI REGION OF MUMBAI
Author Name(s): Dr. Jignesh Dalal
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M321-M330
Year: May 2023
Downloads: 114
A study on the saving and investment behaviour of home makers in Jogeshwari and Andheri region of Mumbai
Licence: creative commons attribution 4.0
A study on the saving and investment behaviour of home makers in Jogeshwari and Andheri region of Mumbai
Paper Title: 5G Wireless Backhaul Networks: Challenges and Research on Internet Traffic
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5456
Register Paper ID - 237867
Title: 5G WIRELESS BACKHAUL NETWORKS: CHALLENGES AND RESEARCH ON INTERNET TRAFFIC
Author Name(s): Ms.aparna jadhav
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M315-M320
Year: May 2023
Downloads: 95
The 5G backhaul will need to support a large bandwidth of devices and data, up to hundreds of gigabits of traffic from the core network. Building an efficient backhaul is critical to 5G to enable high speeds, large capacities and opening up a high bandwidth for numerous connected devices. Nowadays users demand faster speeds, quicker downloads, and quality internet connections everywhere they go. 5G backhaul enables devices to wirelessly connect wherever they are. Additionally, any type of device can connect including smart phones, smart cities, industrial equipment and medical devices. 5G Wi-Fi backhaul, or as a few seek advice from it, Wi-Fi transport, is a method for connecting broadband web, websites to the middle community in a Wi-Fi manner. In the case of cell networks, it is not unusual to attach a radio to community (RAN) tail site (e.g. a base station, end or node/GB) to the middle of the cell community - without the want to install optical fiber. It is used whilst high-pace wire line connectivity to telecom web web sites (generally through fiber optics) is unavailable, whilst fast deployment is required, and whilst a cost-green answer is needed. In fact, in step with a 5G Microwave Report, approximately 38% of all worldwide telecom web web sites might be linked to the relaxation of the community through Wi-Fi backhaul, with the aid of using 2025.
Licence: creative commons attribution 4.0
5G Wireless Backhaul Networks: Challenges and Research on Internet Traffic
Paper Title: Comparative Study of Ethereum and Bitcoin using Blockchain Technology
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5455
Register Paper ID - 237868
Title: COMPARATIVE STUDY OF ETHEREUM AND BITCOIN USING BLOCKCHAIN TECHNOLOGY
Author Name(s): Shivkumar R Chandey
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M312-M314
Year: May 2023
Downloads: 106
Bitcoin was launched in 2009, several new cryptocurrencies have been initiated with variations to Bitcoin's original design. Bitcoin still remains the most prominent actor in the market. The objective of the research paper is to determine whether the newer cryptocurrencies solves the problem arises in the digital world, Instead of evaluating several cryptocurrencies for this comparison, the crypto currency Ethereum has been chosen as a proxy for the others. Ethereum was started in 2014, is widely backed in the community and is second in line to Bitcoin when it comes to market capitalization. As a basis for the comparative analysis a rigorous study of the Bitcoin and Ethereum protocols have been performed, and parallel descriptions of the systems have been devised. Three problem have shaped the focus of the analysis: computational waste, concentration of power and ambiguity of transactions.
Licence: creative commons attribution 4.0
Cryptocurrency, Security, Blockchain, Bitcoin, Internet, Ethereum
Paper Title: A STUDY ON EFFECTIVENESS OF DIFFERENT MARKETING TECHNIQUES IN TERMS OF FASHIONPRODUCTS.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5454
Register Paper ID - 237870
Title: A STUDY ON EFFECTIVENESS OF DIFFERENT MARKETING TECHNIQUES IN TERMS OF FASHIONPRODUCTS.
Author Name(s): Ms. Zeal Manoj Kanani
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M302-M311
Year: May 2023
Downloads: 91
A Study on the Effectiveness of E- Learning Tools in the classroom.
Licence: creative commons attribution 4.0
A Study on the Effectiveness of E- Learning Tools in the classroom.
Paper Title: An Analytical Study On An Email Spam Detection
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5453
Register Paper ID - 237871
Title: AN ANALYTICAL STUDY ON AN EMAIL SPAM DETECTION
Author Name(s): Prof. Jyoti Choudhary
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M297-M301
Year: May 2023
Downloads: 108
Too many people today rely on emails and messages sent by strangers. Since anyone can leave emails and messages, spammers have a great opportunity to spam about our diverse interests. Spam fills your inbox with a bunch of ridiculous emails. Your internet speed will drop significantly. It steals useful information such as contact list details. Identifying these spammers and spam content can be a hot topic for research and tedious work. Spamming is the act of sending a large number of messages via email. Since the cost of spam is primarily borne by the recipient, it is effectively postage-based advertising. Spam is an economically viable type of commercial advertising as email can be a very cheap medium for senders. Using Bayes' theorem and a naive Bayesian classifier, this proposed model can declare whether a given message is spam or not, and often finds the sender's IP address as well.
Licence: creative commons attribution 4.0
Term Frequency, Naive Bayes, spam, ham, Language Toolkit.
Paper Title: Music Genre Classification using Deep Learning based pre-trained convolutional neural networks
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5452
Register Paper ID - 237872
Title: MUSIC GENRE CLASSIFICATION USING DEEP LEARNING BASED PRE-TRAINED CONVOLUTIONAL NEURAL NETWORKS
Author Name(s): Aparna Panigrahy
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M292-M296
Year: May 2023
Downloads: 108
Music Genre Classification using Deep Learning based pre-trained convolutional neural networks
Licence: creative commons attribution 4.0
Music Genre Classification using Deep Learning based pre-trained convolutional neural networks
Paper Title: Literacy and Health Practices Among Tribal Children - A Study
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5451
Register Paper ID - 237636
Title: LITERACY AND HEALTH PRACTICES AMONG TRIBAL CHILDREN - A STUDY
Author Name(s): K. UMASHANKER, Prof.T.MRUNALINI
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M287-M291
Year: May 2023
Downloads: 113
The Chenchus are Adivasi, their habitat is confined to the rocky hills and forested plateau of the Nallamala forest Range, extending on both sides of the Krishna River. They are the overwhelming majority of the speakers of the Dravidian tongue of Telugu. The Chenchus are characterized by a strong sense of independence and personal freedom. The current investigation delineates literacy and health practices prevalent among Chenchu group of Tribals in the state of Telangana. The main objective was to appraise the literacy and health practices among the tribal children. A sample of 120 was included from six tribal villages of Achampet region in Nagarkurnool District of Telangana State. Purposive sampling technique was used to identify the sample. An Interview schedule was prepared for Parents to elicit required information. The findings of the study demonstrated that there was no significant difference was found among the Parents on the literary and health practices among tribal children in the state of Telangana. Educational Implications as well as suggestions for further research were also portrayed.
Licence: creative commons attribution 4.0
Literacy; Health Practices; Tribal Children; Management; Health issues
Paper Title: Hand Written Equation Solver Using Convolution Neural Networks
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5450
Register Paper ID - 235749
Title: HAND WRITTEN EQUATION SOLVER USING CONVOLUTION NEURAL NETWORKS
Author Name(s): Suragouni Sreeja, B.Abhishek, A.Venkat Nivas, M.Yellamma
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M282-M286
Year: May 2023
Downloads: 147
Machine learning and deep learning have become increasingly important as a result of technological advancement. Handwriting recognition, robotics, artificial intelligence, and many more industries are now using machine learning and deep learning approaches. Such systems require data training, allowing our machine to learn and make the necessary predictions. In this research, a Handwritten Equation solver with a respectable accuracy of 98 percent is demonstrated. It was trained on handwritten digits and mathematical symbols using a Convolutional Neural Network and certain image processing techniques. The images of the digits 0 to 9, plus and minus signs (+), and handwritten symbols * make up the dataset. For the purpose of extracting the features, we shall use contour extraction. In this Project we build the model using convolutional neural network and train the model to evaluate the equations written by hand in this we use the dataset of numbers and operators written by hand. The input image of hand written equation is given the image is converted into gray background for this we use contour extraction for obtaining the features. The output is produced by the model by evaluating the equation.
Licence: creative commons attribution 4.0
Machine learning; Artificial Intelligence; Contour extraction
Paper Title: Manhole Monitoring System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5449
Register Paper ID - 236377
Title: MANHOLE MONITORING SYSTEM
Author Name(s): Y SAI TEJA, B PREMSINGH, A RANJITH KUMAR, N ANUPAMA RANI
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M278-M281
Year: May 2023
Downloads: 181
The sewage system must be monitored in order to maintain the city clean. Uneven sewage system monitoring causes drainage to become clogged. Blockages in the sewer system are a major source of sewer flooding and pollution. Workers may be involved in an accident as a result of their ignorance of the situation inside the manhole. To get the necessary output from the module, this model uses a regulator circuit, sensor driver circuit, microcontroller, serial communication devices, and IoT module. Our answer to this problem is an IoT system that warns municipal officials about overflowing drains immediately by notification at the city control centre, as well as citizens via a mobile app. The essential component of this system is a low-power IoT-based portable gadget that is mounted below the manhole cover. Nowadays, accidents due to broken and missing manhole covers are quite frequent. Manholes are not monitored properly in developing countries. These accidents can lead to serious injuries and also death. Hence, here we propose a system to overcome this problem. We have included an array of sensors for complete monitoring of the manhole cover so that such accidents can be prevented. This project includes a Tilt sensor, Level sensor for to measure the level of water which could need to crack information, a tilt sensor is introduced to indicate whether the manhole can tilt, in case of any alert due to any of the parameters we send an SMS to an APP trough wifi. Also, all the parameters are continuously updated on the APP.
Licence: creative commons attribution 4.0
Manhole, Sewage, microcontroller, Atmega328P, Tilt Sensor, Level Sensor
Paper Title: RESEARCH ON: PARTIAL REPLACEMENT OF CEMENT IN M25 GRADE OF CONCRETE BY PHOSPHOGYPSUM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRT23A5448
Register Paper ID - 238783
Title: RESEARCH ON: PARTIAL REPLACEMENT OF CEMENT IN M25 GRADE OF CONCRETE BY PHOSPHOGYPSUM
Author Name(s): Prof. Rakesh Kumar, Prathmesh Kodgirwar, Yadnesh Joshi, Shreeniwas Hajare
Publisher Journal name: IJCRT
Volume: 11
Issue: 5
Pages: M274-M277
Year: May 2023
Downloads: 94
Licence: creative commons attribution 4.0
PhosphoGypsum, dihydrate (CaSO4.2H2O), Hemihydrate (CaSO4.5H2O), Triple, superPhosphate
The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.
Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more International Journal of Creative Research Thoughts (IJCRT) ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved. Provide DOI and Hard copy of Certificate. Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author. Call For Paper (Volume 12 | Issue 5 | Month- May 2024)