Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 11 | Issue 5

Volume 11 | Issue 5 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: SIGNIFICANCE OF WOOL TRADE IN THE POLITICAL AND ECONOMICAL DEVELOPMENT OF LADAKH.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5467

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5467

  Register Paper ID - 238832

  Title: SIGNIFICANCE OF WOOL TRADE IN THE POLITICAL AND ECONOMICAL DEVELOPMENT OF LADAKH.

  Author Name(s): Dr. Rinchen Dolma, Dr. Nazia Jabeen

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M425-M433

 Year: May 2023

 Downloads: 119

 Abstract

Abstract: Ladakh, a region in the northern India, has history that is connected with Trans-Himalayan trade. The region was at the nodal point of whole complex trade routes. These routes paved way for exchanges of ideas and commodities. One of the most significant articles that shaped the region's political and economic history was the wool trade. Such was the significance of wool trade that every authority fought for the monopoly of this trade. The major invasions that Ladakh faced from its neighbours were because of their interest in the wool trade.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Ladakh, Trade, wool trade, Kashmir

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SECURE FILE STORAGE USING HYBRID CRYPTOGRAPHY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5466

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5466

  Register Paper ID - 238637

  Title: SECURE FILE STORAGE USING HYBRID CRYPTOGRAPHY

  Author Name(s): Vaishnavee.S, Fathima.G, Dr. S. Latha

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M422-M424

 Year: May 2023

 Downloads: 122

 Abstract

Secure file storage is essential to protecting sensitive data from unauthorized access or tampering. Hybrid cryptography is a widely used technique combining the benefits of symmetric and asymmetric encryption to provide robust security. This study has been undertaken in order to provide an efficient way to secure confidential files and sensitive information. In general, either a strong encryption algorithm is used to protect files or either authentication is done, or digital signatures are used. This provides only midlevel security to the files. In the proposed system, all these security implications are provided along with access controls. Moreover, three strong symmetric encryption algorithms are used along with an asymmetric algorithm that secures the key. The Key Derivation Function generates the key using the password and hash. To add an additional layer of protection to the files, the cipher texts are digitally signed using a Digital Signature Algorithm. In this proposed research, the contents of the file are divided into 3 segments. Each segment is encrypted using a different symmetric algorithm. The first segment is encrypted using Advanced Encryption Standard (AES) Algorithm, the second segment is encrypted using Fernet Algorithm and the third segment is encrypted using ChaCha20 Algorithm. The Key Derivation function used is Argon2. This adds an additional layer of security as it provides better protection against brute-forcing attacks. The keys are digitally signed using ECDSA (Elliptic Curve Digital Signature Algorithm) and the keys and signature along with the cipher texts are stored in a password-protected zip file with access controls set in such a way that only the user can read/write the file. The password is provided by the user and the user must use it to recover his/her files. This file is uploaded/stored in the database with access controls. This method provides all kinds of security measures such as confidentiality, integrity, authentication, authorization, access controls, and non-repudiation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Secure Storage, AES algorithm, Fernet Algorithm, ChaCha20 Algorithm, Digital Signature, ECDSA Algorithm, Key Derivation Function, Argon2.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: An Innovative Approach To Crime Forecasting: Predicting And Preventing Crimes Using Computer Vision And Machine Learning Techniques

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5465

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5465

  Register Paper ID - 238550

  Title: AN INNOVATIVE APPROACH TO CRIME FORECASTING: PREDICTING AND PREVENTING CRIMES USING COMPUTER VISION AND MACHINE LEARNING TECHNIQUES

  Author Name(s): Dr.Yazdani Hasan, Sumbul Afroz

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M410-M421

 Year: May 2023

 Downloads: 144

 Abstract

The topic of crime and the demand for effective deterrents are covered in the work. The rising issue of criminal activity has shown that conventional crime-solving methods are ineffectual. Consequently, there is a growing need to foresee crimes in advance or develop a "machine" that might help law enforcement personnel avoid crime. The suggestion is to use algorithms and techniques from computer vision and machine learning to overcome this problem. The paper provides concrete examples of applications of these strategies, providing motivation for additional investigation in this area. This investigation's main goal is to examine how combining ML and computer vision can enable law enforcement organisations to identify, stop, and solve crimes with unmatched precision and quickness. By utilising these cutting-edge technologies, law enforcement organisations might undergo a revolution and efficiently battle crime.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Machine Learning,computer vision,Artificial Intelligence,3D shape Model,Neural Network 1. PURPOSE

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Interactive Music Recommendation System Based On Text And Speech Analysis

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5464

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5464

  Register Paper ID - 238693

  Title: INTERACTIVE MUSIC RECOMMENDATION SYSTEM BASED ON TEXT AND SPEECH ANALYSIS

  Author Name(s): Isha G. Moykhede, Mosmee S. Patil, Om S. Mahajan, Gaurav S. Mantri, Prof. Dr. Preeti D. Bhamre

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M404-M409

 Year: May 2023

 Downloads: 119

 Abstract

Music is an integral part of our lives. In this era of technological advances, appropriate music recommendations are much needed as soothing music according to moods helps humans to relieve stress. The objective of this project is to develop a personalized system, where the user's current emotion is analyzed with the help of a bot. The bot will interact with user to identify the mood. By analyzing the tone of the text and speech used by the user, mood can be identified. Once the mood is identified, the application will recommend music based on the user's mood. The project utilizes the Rasa framework for chatbot interaction, allowing the user to have a more natural and interactive experience. The deep speech recognition layers are used for recognition of emotions through speech. The model is going to use a Natural Language Processing (NLP) Algorithm for textual analysis and Convolutional Neural Network (CNN) along with spectrogram analysis to predict the mood based on the tone of the user. To recommend music based on the emotions Last.FM API will be used.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Bot, NLP, Spectrogram, Recommendation System, Speech Emotion Recognition.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A Study To Assess Impact Of Parenting Style On Personal Growth In..Youth

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5463

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5463

  Register Paper ID - 237806

  Title: A STUDY TO ASSESS IMPACT OF PARENTING STYLE ON PERSONAL GROWTH IN..YOUTH

  Author Name(s): Aastha Mehta, Dr. Annie Khanam

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M397-M403

 Year: May 2023

 Downloads: 105

 Abstract

Parenting style is a pattern of behaviors, attitudes, and approaches that a parent uses when interacting with and raising their child. Personal growth is a process of psychological maturation that involves learning from the mistakes we made and developing new strategies to understand better and adapt to the world. This study was aimed at providing a light on how parenting styles impact the overall personal growth of an individual. Although the parent's style of treating their children is very different in comparison to others but it is necessary to know how the child takes it. A quantitative study was done involving hundred participants of 10-30 years were considered in this research. Perceived Parenting Style Scale & Personal Growth Questionnaire was used as a measure of the study. It was found out that there was a negative relationship between parenting styles and personal growth.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Parenting style, Personal Growth, Negative Relationship

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FORMULATION AND EVALUATION OF ORGANIC LIP BALM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5462

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5462

  Register Paper ID - 238479

  Title: FORMULATION AND EVALUATION OF ORGANIC LIP BALM

  Author Name(s): Safura Samir Sayyed, Ghugarkar Prasad Gorakshnath, Kundan sawale, Saba shaikh

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M389-M396

 Year: May 2023

 Downloads: 134

 Abstract

HERBAL COSMETIC - This plays significant role in today's life. Moreover current trend is going green in all industries including Mainly cosmetic to adopt more natural way of life(1) The preferable choices and natural food herbal , medicines and natural curing practices for healthy life and also there is much demand for organic vegetable product. (2) The usage of herbal cosmetic has been used for folds in personal care system . Natural product have been used for folk medicine purpose throughout the whole world (3) These were used from thousands of years many of these have pharmacological properties such as antimicrobial anti-inflammatory and others. These are useful to human (4) Herbal extract are cultivated all over the world and is prime name is horticulture sector. Cosmetic made up of herbal extract for skin care and hair care is very popular for their reliability (5)


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Oil bees wax honey balm

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Costus speciosus (Ketaki) - A herb with numerous medicinal properties

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5461

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5461

  Register Paper ID - 238729

  Title: COSTUS SPECIOSUS (KETAKI) - A HERB WITH NUMEROUS MEDICINAL PROPERTIES

  Author Name(s): Tina W. Pandel, Shailju G. Gurunani, Aditya R. Kaikade

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M366-M388

 Year: May 2023

 Downloads: 114

 Abstract

The Costus specious, often known as ketaki, is an important Ayurvedic and medicinal plant used to cure a number of diseases. Costus speciosus (koenex, retz.), an Indian Ayurvedic herb, has a long history of therapeutic use in Western medicine. It is being studied for its antioxidant, anticholinesterase, larvicidal, antihyperglycemic, antifungal, antibacterial, anti-inflammatory, analgesic, antipyretic, antidiuretic, estrogenic, and antistress effects, among other pharmacological traits. The rhizomes of these plants are often used to treat diabetes and are a replacement source of diosgenin. Along with examining the pharmacological and phytochemical properties of Costus specious. This study proposed that plants` medicinal and therapeutic effects should be studied, as well as their ornamental and herbal properties. As a result, the current study offers a thorough examination of the morphology, phytochemistry, and pharmacological characteristics of Costus specious in an attempt to offer guidance for future research.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Costus speciosus, Ketaki, Pharmacological activities, Medicinal value of Costus speciosus

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVIEW ON: ROAD SAFETY AUDIT ON NH-48 IN PUNE MAHARASHTRA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5460

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5460

  Register Paper ID - 238747

  Title: REVIEW ON: ROAD SAFETY AUDIT ON NH-48 IN PUNE MAHARASHTRA

  Author Name(s): Prof. Krantikumar Mhetre, Mr. Atharva Thuse, Mr. Sagar Selukar, Mr. Yash Shinde

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M363-M365

 Year: May 2023

 Downloads: 96

 Abstract

: India is a vast country that relies heavily on the highway network for national development. National highways are key transportation hubs and safety must be prioritized to avoid accidents. As the number of vehicles on the road increases, the chances of accidents increase. Accidents can be broadly classified into two categories: subjective factors and objective factors. Subjective factors relate to the mental state of drivers and pedestrians, while objective factors relate to road conditions and engineering aspects. Subjective factors cannot be controlled from the outside, but objective factors can be addressed through various corrective measures. This paper is complemented by objective factor analysis and description, visual road surveys and focuses on suggestions for improvement. Both primary and secondary data were collected to analyze the accident prone areas. Primary data was obtained through physical surveys conducted on NH-48 and secondary data (available data) from National Highways Authority of India (NHAI) in 2020-2021. The collected data were then analyzed using ranking, weight severity and crash density methods to identify random sunspots on NH-48. Then, after further investigation, appropriate corrective actions are suggested for each identified accident prone area. These measures cannot completely eliminate accidents, but they are aimed at minimizing accidents as much as possible.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Accidental Black spots, NH-48 (National -Highway 48), Ranking Method, Severity, Index Method, Accidental density method.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FORMULATION AND EVALUATION OF HERBAL TOOTH POWDER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5459

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5459

  Register Paper ID - 238588

  Title: FORMULATION AND EVALUATION OF HERBAL TOOTH POWDER

  Author Name(s): VISHAL SUBHASH EDAKE

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M346-M362

 Year: May 2023

 Downloads: 150

 Abstract

Herbal tooth powders consisting of various ingredients that are available in the market in a wide range. Hence modern methods focusing on these aspects are useful for the standardization of herbs and their formulations. Consumers believed by using herbal-based toothpowders are safe, effective, and less toxic. This study is thus aimed to provide an alternative to the consumer and formulate herbal tooth powder using Clove, Neem, Ritha, Babool, Tulasi, Black salt, Stevia Leaf, Cinnamon, Fennal, Allum, Mentha, Camphor. The oral cavity infections are the most common types of infections. Dental caries is an infectious disease, causes damage and infection of enamel and dentine. If it is not treated, the infection continues and will lead to tooth loss. The mouth contains normal ?lora of opportunistic bacteria that are normally non-pathogenic. The imbalance of this situation causes infection and tooth decay. Streptococcus mutants are considered as the main species involved in the development of dental caries. S. mutants, acid-producing bacteria, causes fermentation of carbohydrates which results in tooth decay. Therefore, in the present work, the following aspects of Herbal tooth powders were planned for the formulation, standardization of herbal tooth powder, and anti-bacterial screening of the extracts of herbal tooth powder.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

TOOTH POWDER, HERBAL , HERBAL TOOTH, HERBAL POWDER,

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STUDY ON ICT A QUALITY OF HIGHER EDUCATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5458

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5458

  Register Paper ID - 237865

  Title: STUDY ON ICT A QUALITY OF HIGHER EDUCATION

  Author Name(s): Sneha Santosh Mishra

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M331-M345

 Year: May 2023

 Downloads: 100

 Abstract

Information and communication technology has been adopted as a positive technological change in almost every industry; and education industry has not been excluded from this revolution. Education is considered as an important key to the transformation & overall development of human life. In today's competitive world; being literate is not enough; perusing higher education is in demand. The quality of education can be enhanced when educational institutions embrace the innovative and quality ways for teaching & learning processes. ICT symbolizes 'new time' in the evolution of education. Usage of ICT in education industry includes using information & technology in the form of hardware, software & applications in collecting storing students' data, imparting knowledge through audio-visual aids, conducting examination & evaluation of students etc. To sum up, ICT can really be proved advantageous to enhance quality of higher education. Based on primary data; this paper aims at encouraging the use of ICT to enhance the quality of education by understanding the current status of ICT practice in educational institutions and identifying key benefits & challenges of ICT with special reference to institutes in Mumbai suburbs.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ICT, education industry, Quality, teaching & learning, revolution

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A study on the saving and investment behaviour of home makers in Jogeshwari and Andheri region of Mumbai

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5457

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5457

  Register Paper ID - 237866

  Title: A STUDY ON THE SAVING AND INVESTMENT BEHAVIOUR OF HOME MAKERS IN JOGESHWARI AND ANDHERI REGION OF MUMBAI

  Author Name(s): Dr. Jignesh Dalal

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M321-M330

 Year: May 2023

 Downloads: 114

 Abstract

A study on the saving and investment behaviour of home makers in Jogeshwari and Andheri region of Mumbai


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

A study on the saving and investment behaviour of home makers in Jogeshwari and Andheri region of Mumbai

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: 5G Wireless Backhaul Networks: Challenges and Research on Internet Traffic

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5456

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5456

  Register Paper ID - 237867

  Title: 5G WIRELESS BACKHAUL NETWORKS: CHALLENGES AND RESEARCH ON INTERNET TRAFFIC

  Author Name(s): Ms.aparna jadhav

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M315-M320

 Year: May 2023

 Downloads: 95

 Abstract

The 5G backhaul will need to support a large bandwidth of devices and data, up to hundreds of gigabits of traffic from the core network. Building an efficient backhaul is critical to 5G to enable high speeds, large capacities and opening up a high bandwidth for numerous connected devices. Nowadays users demand faster speeds, quicker downloads, and quality internet connections everywhere they go. 5G backhaul enables devices to wirelessly connect wherever they are. Additionally, any type of device can connect including smart phones, smart cities, industrial equipment and medical devices. 5G Wi-Fi backhaul, or as a few seek advice from it, Wi-Fi transport, is a method for connecting broadband web, websites to the middle community in a Wi-Fi manner. In the case of cell networks, it is not unusual to attach a radio to community (RAN) tail site (e.g. a base station, end or node/GB) to the middle of the cell community - without the want to install optical fiber. It is used whilst high-pace wire line connectivity to telecom web web sites (generally through fiber optics) is unavailable, whilst fast deployment is required, and whilst a cost-green answer is needed. In fact, in step with a 5G Microwave Report, approximately 38% of all worldwide telecom web web sites might be linked to the relaxation of the community through Wi-Fi backhaul, with the aid of using 2025.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

5G Wireless Backhaul Networks: Challenges and Research on Internet Traffic

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Comparative Study of Ethereum and Bitcoin using Blockchain Technology

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5455

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5455

  Register Paper ID - 237868

  Title: COMPARATIVE STUDY OF ETHEREUM AND BITCOIN USING BLOCKCHAIN TECHNOLOGY

  Author Name(s): Shivkumar R Chandey

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M312-M314

 Year: May 2023

 Downloads: 106

 Abstract

Bitcoin was launched in 2009, several new cryptocurrencies have been initiated with variations to Bitcoin's original design. Bitcoin still remains the most prominent actor in the market. The objective of the research paper is to determine whether the newer cryptocurrencies solves the problem arises in the digital world, Instead of evaluating several cryptocurrencies for this comparison, the crypto currency Ethereum has been chosen as a proxy for the others. Ethereum was started in 2014, is widely backed in the community and is second in line to Bitcoin when it comes to market capitalization. As a basis for the comparative analysis a rigorous study of the Bitcoin and Ethereum protocols have been performed, and parallel descriptions of the systems have been devised. Three problem have shaped the focus of the analysis: computational waste, concentration of power and ambiguity of transactions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cryptocurrency, Security, Blockchain, Bitcoin, Internet, Ethereum

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A STUDY ON EFFECTIVENESS OF DIFFERENT MARKETING TECHNIQUES IN TERMS OF FASHIONPRODUCTS.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5454

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5454

  Register Paper ID - 237870

  Title: A STUDY ON EFFECTIVENESS OF DIFFERENT MARKETING TECHNIQUES IN TERMS OF FASHIONPRODUCTS.

  Author Name(s): Ms. Zeal Manoj Kanani

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M302-M311

 Year: May 2023

 Downloads: 91

 Abstract

A Study on the Effectiveness of E- Learning Tools in the classroom.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

A Study on the Effectiveness of E- Learning Tools in the classroom.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: An Analytical Study On An Email Spam Detection

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5453

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5453

  Register Paper ID - 237871

  Title: AN ANALYTICAL STUDY ON AN EMAIL SPAM DETECTION

  Author Name(s): Prof. Jyoti Choudhary

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M297-M301

 Year: May 2023

 Downloads: 108

 Abstract

Too many people today rely on emails and messages sent by strangers. Since anyone can leave emails and messages, spammers have a great opportunity to spam about our diverse interests. Spam fills your inbox with a bunch of ridiculous emails. Your internet speed will drop significantly. It steals useful information such as contact list details. Identifying these spammers and spam content can be a hot topic for research and tedious work. Spamming is the act of sending a large number of messages via email. Since the cost of spam is primarily borne by the recipient, it is effectively postage-based advertising. Spam is an economically viable type of commercial advertising as email can be a very cheap medium for senders. Using Bayes' theorem and a naive Bayesian classifier, this proposed model can declare whether a given message is spam or not, and often finds the sender's IP address as well.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Term Frequency, Naive Bayes, spam, ham, Language Toolkit.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Music Genre Classification using Deep Learning based pre-trained convolutional neural networks

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5452

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5452

  Register Paper ID - 237872

  Title: MUSIC GENRE CLASSIFICATION USING DEEP LEARNING BASED PRE-TRAINED CONVOLUTIONAL NEURAL NETWORKS

  Author Name(s): Aparna Panigrahy

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M292-M296

 Year: May 2023

 Downloads: 108

 Abstract

Music Genre Classification using Deep Learning based pre-trained convolutional neural networks


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Music Genre Classification using Deep Learning based pre-trained convolutional neural networks

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Literacy and Health Practices Among Tribal Children - A Study

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5451

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5451

  Register Paper ID - 237636

  Title: LITERACY AND HEALTH PRACTICES AMONG TRIBAL CHILDREN - A STUDY

  Author Name(s): K. UMASHANKER, Prof.T.MRUNALINI

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M287-M291

 Year: May 2023

 Downloads: 113

 Abstract

The Chenchus are Adivasi, their habitat is confined to the rocky hills and forested plateau of the Nallamala forest Range, extending on both sides of the Krishna River. They are the overwhelming majority of the speakers of the Dravidian tongue of Telugu. The Chenchus are characterized by a strong sense of independence and personal freedom. The current investigation delineates literacy and health practices prevalent among Chenchu group of Tribals in the state of Telangana. The main objective was to appraise the literacy and health practices among the tribal children. A sample of 120 was included from six tribal villages of Achampet region in Nagarkurnool District of Telangana State. Purposive sampling technique was used to identify the sample. An Interview schedule was prepared for Parents to elicit required information. The findings of the study demonstrated that there was no significant difference was found among the Parents on the literary and health practices among tribal children in the state of Telangana. Educational Implications as well as suggestions for further research were also portrayed.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Literacy; Health Practices; Tribal Children; Management; Health issues

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Hand Written Equation Solver Using Convolution Neural Networks

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5450

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5450

  Register Paper ID - 235749

  Title: HAND WRITTEN EQUATION SOLVER USING CONVOLUTION NEURAL NETWORKS

  Author Name(s): Suragouni Sreeja, B.Abhishek, A.Venkat Nivas, M.Yellamma

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M282-M286

 Year: May 2023

 Downloads: 147

 Abstract

Machine learning and deep learning have become increasingly important as a result of technological advancement. Handwriting recognition, robotics, artificial intelligence, and many more industries are now using machine learning and deep learning approaches. Such systems require data training, allowing our machine to learn and make the necessary predictions. In this research, a Handwritten Equation solver with a respectable accuracy of 98 percent is demonstrated. It was trained on handwritten digits and mathematical symbols using a Convolutional Neural Network and certain image processing techniques. The images of the digits 0 to 9, plus and minus signs (+), and handwritten symbols * make up the dataset. For the purpose of extracting the features, we shall use contour extraction. In this Project we build the model using convolutional neural network and train the model to evaluate the equations written by hand in this we use the dataset of numbers and operators written by hand. The input image of hand written equation is given the image is converted into gray background for this we use contour extraction for obtaining the features. The output is produced by the model by evaluating the equation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Machine learning; Artificial Intelligence; Contour extraction

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Manhole Monitoring System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5449

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5449

  Register Paper ID - 236377

  Title: MANHOLE MONITORING SYSTEM

  Author Name(s): Y SAI TEJA, B PREMSINGH, A RANJITH KUMAR, N ANUPAMA RANI

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M278-M281

 Year: May 2023

 Downloads: 181

 Abstract

The sewage system must be monitored in order to maintain the city clean. Uneven sewage system monitoring causes drainage to become clogged. Blockages in the sewer system are a major source of sewer flooding and pollution. Workers may be involved in an accident as a result of their ignorance of the situation inside the manhole. To get the necessary output from the module, this model uses a regulator circuit, sensor driver circuit, microcontroller, serial communication devices, and IoT module. Our answer to this problem is an IoT system that warns municipal officials about overflowing drains immediately by notification at the city control centre, as well as citizens via a mobile app. The essential component of this system is a low-power IoT-based portable gadget that is mounted below the manhole cover. Nowadays, accidents due to broken and missing manhole covers are quite frequent. Manholes are not monitored properly in developing countries. These accidents can lead to serious injuries and also death. Hence, here we propose a system to overcome this problem. We have included an array of sensors for complete monitoring of the manhole cover so that such accidents can be prevented. This project includes a Tilt sensor, Level sensor for to measure the level of water which could need to crack information, a tilt sensor is introduced to indicate whether the manhole can tilt, in case of any alert due to any of the parameters we send an SMS to an APP trough wifi. Also, all the parameters are continuously updated on the APP.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Manhole, Sewage, microcontroller, Atmega328P, Tilt Sensor, Level Sensor

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RESEARCH ON: PARTIAL REPLACEMENT OF CEMENT IN M25 GRADE OF CONCRETE BY PHOSPHOGYPSUM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT23A5448

  Your Paper Publication Details:

  Published Paper ID: - IJCRT23A5448

  Register Paper ID - 238783

  Title: RESEARCH ON: PARTIAL REPLACEMENT OF CEMENT IN M25 GRADE OF CONCRETE BY PHOSPHOGYPSUM

  Author Name(s): Prof. Rakesh Kumar, Prathmesh Kodgirwar, Yadnesh Joshi, Shreeniwas Hajare

 Publisher Journal name: IJCRT

 Volume: 11

 Issue: 5

 Pages: M274-M277

 Year: May 2023

 Downloads: 94

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

PhosphoGypsum, dihydrate (CaSO4.2H2O), Hemihydrate (CaSO4.5H2O), Triple, superPhosphate

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 5 | Month- May 2024)

Call For Paper May 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer