Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications

INTERNATIONAL JOURNAL OF CREATIVE RESEARCH THOUGHTS - IJCRT (IJCRT.ORG)

International Peer Reviewed & Refereed Journals, Open Access Journal

IJCRT Peer-Reviewed (Refereed) Journal as Per New UGC Rules.

ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013

Call For Paper - Volume 14 | Issue 4 | Month- April 2026

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(CrossRef DOI)

Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 14 | Issue 4

Volume 14 | Issue 4 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: Aspect-Oriented Opinion Mining of Sindhi Media Titles Employing Intelligent Algorithms and Attention-Based Neural Architectures

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02015

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02015

  Register Paper ID - 304372

  Title: ASPECT-ORIENTED OPINION MINING OF SINDHI MEDIA TITLES EMPLOYING INTELLIGENT ALGORITHMS AND ATTENTION-BASED NEURAL ARCHITECTURES

  Author Name(s): Dr.N.Rajender, EJJIGIRI RISHIKA, DHARSHANAPU POOJITHA, MATTEPALLY ABHINAY RAJ

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 129-136

 Year: April 2026

 Downloads: 135

 Abstract

Because digital content is growing so quickly, sentiment analysis (SA) is now an important tool for figuring out how people feel and sorting through text data. Natural language processing (NLP) has come a long way, but low-resource languages, especially Sindhi, still haven't been studied enough because there aren't enough computational tools and annotated datasets. This study fills this gap by presenting the Sindhi News Headlines Dataset (SNHD), a new collection of data that has been labelled for both SA and category classification in eight areas: Crime, Economy, Entertainment, Health, Politics, Science & Technology, Social, and Sports. We compare different machine learning (ML), deep learning (DL), and transformer-based methods on SA and category classification tasks to see how well they work. We also use Explainable Artificial Intelligence (XAI) methods like Local Interpretable Model-Agnostic Explanations (LIME) to learn more about how models make decisions. The SNHD dataset shows that traditional ML models work better than DL and transformer-based models in experiments. Support Vector Machines with Radial Basis Function (SVM-RBF) is the best for SA (0.74 accuracy and weighted F-score), and the Ridge Classifier (RC) is the best for category classification (0.84 accuracy and weighted F-score). XLM-RoBERTa is one of the best transformer models for category classification, with an accuracy of 0.82 and a weighted F-score. These results set a standard for future research in Sindhi NLP and show how hybrid methods could help with problems that come up with low-resource languages. This work is a basic resource for NLP researchers who want to improve computational methods for Sindhi and other lesser-known languages.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Sentiment Analysis, Sindhi News Headlines Dataset (SNHD), Category-Based Classification, Machine Learning, Transformer Models, Explainable Artificial Intelligence, Low-Resource Language Processing

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Augmenting Digital Companion Capabilities via Integrated Sensory Intelligence for Affective State Identification

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02014

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02014

  Register Paper ID - 304373

  Title: AUGMENTING DIGITAL COMPANION CAPABILITIES VIA INTEGRATED SENSORY INTELLIGENCE FOR AFFECTIVE STATE IDENTIFICATION

  Author Name(s): Dr.Thanveer Jahan, MOLKAPURI HIMANSHU, BOLLAM SANJANA, GANDLA NAVYA

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 118-128

 Year: April 2026

 Downloads: 77

 Abstract

ecognising emotions is becoming more and more important for making interactions between people and computers better. This is because emotions are a big part of how people interact with each other and how they feel overall. Many industries need machines that can pick up on and respond to emotional cues like people do. Emotionally responsive agents are useful in many fields, such as education, healthcare, gaming, marketing, customer service, human-robot interaction, and entertainment. This study investigates the potential for improving virtual assistants through multimodal Artificial Intelligence (AI), employing diverse emotion recognition techniques to develop more empathetic and efficient systems. The suggested method uses facial expressions and written cues to make the system more aware of emotions and make users happy by having empathetic conversations. The Facial Emotion Recognition (FER) model was 71% accurate in real time, and the Textual Emotion Recognition (TER) model was 59% accurate in validation, showing that Multimodal Emotion Recognition (MER) works well. Our lightweight architecture makes sure that inference happens in real time and that facial and textual emotion recognition are combined with DialoGPT-based response generation. This shows that it works with large language models for empathetic dialogue, unlike previous multimodal emotion-aware systems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Multimodal Emotion Recognition; Facial Emotion Recognition; Textual Emotion Analysis; Affective Computing; Human-Computer Interaction; Empathetic Virtual Assistants;

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Composite Cooperative Framework for Identifying Carbon-Based Energy Generation Facilities Using Large-Scale Spatial Examination

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02013

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02013

  Register Paper ID - 302988

  Title: COMPOSITE COOPERATIVE FRAMEWORK FOR IDENTIFYING CARBON-BASED ENERGY GENERATION FACILITIES USING LARGE-SCALE SPATIAL EXAMINATION

  Author Name(s): Mrs.G.Vijayalaxmi, GUJILA CHARAN, GANGADARI HARIKA, VENGALA SRI HARIHARAN

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 110-117

 Year: April 2026

 Downloads: 78

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Web Text Classification, BERT (Bidirectional Encoder Representations from Transformers), BiGRU (Bidirectional Gated Recurrent Unit), Convolutional Neural Network (CNN), Attention Mechanism, Natural Language Processing,

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Conversational Digital Platform for Handling Academic Inquiries Related to Financial Obligations and Admission Processes

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02012

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02012

  Register Paper ID - 302947

  Title: CONVERSATIONAL DIGITAL PLATFORM FOR HANDLING ACADEMIC INQUIRIES RELATED TO FINANCIAL OBLIGATIONS AND ADMISSION PROCESSES

  Author Name(s): Dr.P.Latha, BOMMANABOINA TEJASWINI, GARREPALLY BHARGAV, BINGI GANESH

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 101-109

 Year: April 2026

 Downloads: 74

 Abstract

Because higher education institutions are changing so quickly to digital, students and university administration need to be able to talk to each other quickly and easily. Students often want to know about things like how to sign up for classes, how to pay for them, deadlines, academic rules, and other administrative tasks. But traditional manual systems often slow things down, make things less consistent, and give administrative staff more work to do. This project suggests using a chatbot to help students with questions about paying for and enrolling in college (CSM). The chatbot uses Machine Learning (ML) and Natural Language Processing (NLP) to understand and answer student questions quickly and accurately. The system offers automated help around the clock, making sure that students always get accurate, timely answers without having to rely on administrative staff. There are many parts to the chatbot, such as user interaction, natural language processing, machine learning adaptation, database management, response generation, and analytics tracking. These modules work together to understand what users are asking, get the right information from institutional databases, and give answers that are relevant to the situation. To check how well the system worked, we looked at usability metrics like response time, task completion time, and user satisfaction levels. Students said they had good experiences with the chatbot because it was easy to use, fast, clear, and they felt confident using it again. The solution cuts down on repetitive work for staff by a lot, and it also makes it easier for students to access and enjoy their work. The proposed chatbot system makes administration more efficient, makes sure that information is consistent, and makes the student experience better through smart automation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Chatbot System, Higher Education, Natural Language Processing (NLP), Machine Learning (ML),

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Large-Scale Language Model Powered Conversational System for Tertiary-Level Instruction in Data Repositories and Informational Architectures

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02011

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02011

  Register Paper ID - 302946

  Title: LARGE-SCALE LANGUAGE MODEL POWERED CONVERSATIONAL SYSTEM FOR TERTIARY-LEVEL INSTRUCTION IN DATA REPOSITORIES AND INFORMATIONAL ARCHITECTURES

  Author Name(s): Dr.Thanveer Jahan, ENGE KEERTHI, ELLANKI MANASWITHA, AMANCHA RONITH

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 91-100

 Year: April 2026

 Downloads: 78

 Abstract

Contribution: This study examines the advantages and obstacles associated with the development, implementation, and assessment of a large language model (LLM) chatbot, MoodleBot, within computer science educational environments. It shows how LLMs could be used in LMSs like Moodle to help with self-regulated learning (SRL) and help-seeking behaviour. Computer science teachers have a lot of trouble adding new tools to LMSs to make the learning environment more supportive and interesting. MoodleBot solves this problem by giving students and teachers a place to interact with each other. Questions for Research: This study examines two questions, notwithstanding challenges such as bias, hallucinations, and the reluctance of teachers and educators to adopt new AI technologies. (RQ1) How much do students think MoodleBot is a useful tool for helping them learn? (RQ2) How accurate are the answers that MoodleBot gives, and how well do they fit with the course content that has already been set? Methodology: This study examines pedagogical literature regarding AI-driven chatbots and employs the retrieval-augmented generation (RAG) methodology for the design and data processing of MoodleBot. The technology acceptance model (TAM) looks at how much users accept something by looking at things like how useful they think it is and how easy it is to use. Forty-six students took part, and thirty of them filled out the TAM questionnaire. Results: Chatbots that use LLM, like MoodleBot, can make teaching and learning a lot better. This study found that there was a high accuracy rate (88%) in helping with course-related tasks. Students' positive feedback shows that AI-powered educational tools work and can be used in real life. These results show that educational chatbots can be used in courses to make learning more personalised and make teachers' jobs easier, but automated fact-checking needs to get better.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Artificial Intelligence, Large Language Models, Retrieval-Augmented Generation, Learning Management Systems, AI Chatbot, Personalized Learning, Higher Education

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Cross-National Analysis of Online Inclusivity Across Regions Represented in the Latin American Intelligence Benchmark

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02010

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02010

  Register Paper ID - 302944

  Title: CROSS-NATIONAL ANALYSIS OF ONLINE INCLUSIVITY ACROSS REGIONS REPRESENTED IN THE LATIN AMERICAN INTELLIGENCE BENCHMARK

  Author Name(s): Dr.K.Rajashekar, BEJJENKI SRINIDHI, BOMMA AKHIL, ARELLI UDAY, GORRE SIDDHARTH

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 84-90

 Year: April 2026

 Downloads: 80

 Abstract

People all over the world are now paying attention to the deaths of mothers and children. In low- and middle-income countries, maternal mortality is high, especially among teens and young adults. Healthcare professionals can use CTGs to keep an eye on the mother's heartbeat during pregnancy to make sure the baby is still alive and avoid these deaths. This study utilised machine learning techniques to conduct a risk factor analysis aimed at decreasing child and maternal mortality. This study assessed seven machine learning algorithms. Accuracy, precision, and recall were used to compare how well different categorisation algorithms worked. The random forest is the most accurate of the other algorithms, with an accuracy rate of 99.98%. At first, the dataset was not balanced. After using under sampling and oversampling methods, all of the algorithms worked very well. A primary objective of the current study was to forecast the risk factors associated with child and maternal mortality utilising clinical data. Ultrasound devices work by sending out a pulse and reading the response. This analysis is a good and cost-effective choice for healthcare professionals who want to keep mothers and children from dying.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Maternal Mortality, Child Mortality Prediction, Machine Learning, Random Forest, Cardiotocography (CTG), Risk Factor Analysis, Clinical Data.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Edge-Level Wireless Signal-Driven Behavioral Identification System Using Neural Models

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02009

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02009

  Register Paper ID - 302942

  Title: EDGE-LEVEL WIRELESS SIGNAL-DRIVEN BEHAVIORAL IDENTIFICATION SYSTEM USING NEURAL MODELS

  Author Name(s): Mr.Salim Amirali Jiwani, FARDEEN KHAN, BOTHA RENU, ADELLI MANAS

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 74-83

 Year: April 2026

 Downloads: 72

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Wi-Fi-Based Human Activity Recognition (HAR), Channel State Information (CSI), Deep learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Systematic Examination of Malicious Digital Intrusions Within Electrical Infrastructures: Consequences, Identification Strategies, and Defensive Mechanisms

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02008

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02008

  Register Paper ID - 302940

  Title: SYSTEMATIC EXAMINATION OF MALICIOUS DIGITAL INTRUSIONS WITHIN ELECTRICAL INFRASTRUCTURES: CONSEQUENCES, IDENTIFICATION STRATEGIES, AND DEFENSIVE MECHANISMS

  Author Name(s): Mr.Salim Amirali Jiwani, ATIKE NAVYA, AIREDDY SATHWIK, AKKINAPELLY HARSHA VARDHAN

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 66-73

 Year: April 2026

 Downloads: 74

 Abstract

The modernisation of the traditional energy grid into an integrated platform is made easier by constant communication and advances in information technology. The Internet of Things (IoT) includes power systems, especially smart grid features and the ability for utilities to send new services to end users over a two-way communication channel. But relying too much on IoT-based communication systems has made security holes very serious. Also, cybercriminals are always interested in stealing important information from two people or devices, especially if they can do so by damaging the integrity, confidentiality, and authenticity of a communication channel for financial gain. Maintaining data security and preserving privacy in between two entities during the transmission or any data distribution are essential. To build a strong cyber security system, we need to look into the possible attacks and their effects. A lot of researchers have focused on finding and stopping these weak cyber attacks using advanced computing tools. This review article thoroughly investigated possible ways to address cyber security challenges such as smart meter security, end-users privacy, electricity theft cyber-attacks using blockchain and cryptography against communication attacks in smart grid. A lot of research has been done on how cyberattacks affect the security of power systems and how they affect the economy of deregulated energy markets. The resilience of security features and cryptographic techniques against diverse cyber-attacks is examined to propose uncharted cyber-attack avenues for future exploration. Specially, the study of real-world cyber security events, case studies, new findings and new scopes in diverse power industries are carried out. This review article has looked at more than 135 research papers. This paper primarily focuses on distribution-side cyberattacks, encompassing impact analysis, detection, and protection techniques.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cybersecurity, Machine Learning, Deep Learning, Intrusion Detection Systems, Network Security

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Augmenting Digital Companion Capabilities via Integrated Sensory Intelligence for Affective State Identification

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02007

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02007

  Register Paper ID - 302938

  Title: AUGMENTING DIGITAL COMPANION CAPABILITIES VIA INTEGRATED SENSORY INTELLIGENCE FOR AFFECTIVE STATE IDENTIFICATION

  Author Name(s): Dr.A.Swetha, MOLKAPURI HIMANSHU, BOLLAM SANJANA, GANDLA NAVYA

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 55-65

 Year: April 2026

 Downloads: 69

 Abstract

Recognising emotions is becoming more and more important for making interactions between people and computers better. This is because emotions are a big part of how people interact with each other and how they feel overall. Many industries need machines that can pick up on and respond to emotional cues like people do. Emotionally responsive agents are useful in many fields, such as education, healthcare, gaming, marketing, customer service, human-robot interaction, and entertainment. This study investigates the potential for improving virtual assistants through multimodal Artificial Intelligence (AI), employing diverse emotion recognition techniques to develop more empathetic and efficient systems. The suggested method uses facial expressions and written cues to make the system more aware of emotions and make users happy by having empathetic conversations. The Facial Emotion Recognition (FER) model was 71% accurate in real time, and the Textual Emotion Recognition (TER) model was 59% accurate in validation, showing that Multimodal Emotion Recognition (MER) works well. Our lightweight architecture makes sure that inference happens in real time and that facial and textual emotion recognition are combined with DialoGPT-based response generation. This shows that it works with large language models for empathetic dialogue, unlike previous multimodal emotion-aware systems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Recognising emotions is becoming more and more important for making interactions between people and computers better. This is because emotions are a big part of how people interact with each other and how they feel overall. Many industries need machines that can pick up on and respond to emotional cues like people do. Emotionally responsive agents are useful in many fields, such as education, healthcare, gaming, marketing, customer service, human-robot interaction, and entertainment. This study

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Safeguarding Atomic Energy Facilities Through Structured Technical Evaluation of Digital Protection Mechanisms

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02006

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02006

  Register Paper ID - 302937

  Title: SAFEGUARDING ATOMIC ENERGY FACILITIES THROUGH STRUCTURED TECHNICAL EVALUATION OF DIGITAL PROTECTION MECHANISMS

  Author Name(s): Dr.B.Sravan Kumar, SINGARAPU ABHINAV, DUDA VAMSHI, GUDI RAJU

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 47-54

 Year: April 2026

 Downloads: 76

 Abstract

As cyber attacks on industrial control systems become more common, it is more important than ever to use cyber security controls and check security against these attacks. Cyber attacks on nuclear power plants (NPPs) can cause not only economic loss, but also loss of life. So, to protect NPPs and other places from security threats, cyber security controls must be put in place. However, there aren't many resources available right now for protecting information, which is necessary to use all the controls needed to follow cyber security rules. To solve this problem, we need to find good cyber security controls and give each NPP enough resources to protect their information. NPPs use a different security control based on NEI 13-10 (Cyber Security Control Assessments) to protect their systems. However, this is not enough to show that the security controls have really reduced these threats or to show that they have really reduced these threats. To solve this problem, the Electric Power Research Institute (ETRI) came up with the technical assessment methodology (TAM), which can be used to give a quantitative score by looking at how possible cyber attacks could affect an asset and the security controls that go with it. This method lets you use differential security control based on the score to see if the security controls have really reduced the risks. In light of this context, the objective of this paper is to perform a comparative analysis of the outcomes obtained from the implementation of security controls and risk assessment utilising solely NEI 13-10, as well as both NEI 13-10 and TAM, on the plant protection system of the nuclear power reactor APR1400. This paper also talks about the areas for future research by talking about the TAM's limits and things to think about when using it.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cybersecurity, Nuclear Power Plants (NPP), Technical Assessment Methodology (TAM), Risk Assessment, Industrial Control Systems (ICS).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Protected Healthcare Imaging Exchange Methods: Digital Watermarking Techniques, Challenges, and Future Directions

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02005

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02005

  Register Paper ID - 302933

  Title: PROTECTED HEALTHCARE IMAGING EXCHANGE METHODS: DIGITAL WATERMARKING TECHNIQUES, CHALLENGES, AND FUTURE DIRECTIONS

  Author Name(s): Mr.Salim Amirali Jiwani, SIDDAMSHETTI SRILEKHA, KANKANALA NITHIN, SANGEPU BHANU PRAKASH

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 39-46

 Year: April 2026

 Downloads: 62

 Abstract

Healthcare professionals now frequently use medical documents due to the expansion of the Internet. To facilitate collaboration while safeguarding private patient data, secure medical image transmission and management are crucial. This study examines several approaches to securely exchanging medical data, emphasising both their benefits and drawbacks. We divide these strategies into two categories: distributed strategies like blockchain and federated learning, and centralised strategies like encryption and watermarking. This study also looks at how medical image watermarking has changed over time, from conventional approaches to sophisticated AI-based systems. Deep learning models are regarded as "black boxes," providing more resilience and flexibility than conventional methods known as "white boxes," which are straightforward and easy to understand. In order to handle the increasing complexity of threats while maintaining the diagnostic integrity of medical images, this analysis highlights the necessity of integrating contemporary technology. Additionally, our work contributes to the ongoing discussion on improving data security in medical imaging by offering a thorough classification of watermarking techniques and outlining future research directions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Medical Image Security, Digital Watermarking, Blockchain-Based Traceability, Federated Learning, AI-Driven Tamper Detection

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Cross-National Analysis of Online Inclusivity Across Regions Represented in the Latin American Intelligence Benchmark

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02004

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02004

  Register Paper ID - 302879

  Title: CROSS-NATIONAL ANALYSIS OF ONLINE INCLUSIVITY ACROSS REGIONS REPRESENTED IN THE LATIN AMERICAN INTELLIGENCE BENCHMARK

  Author Name(s): Dr.A.Swetha, AKKALA PRASHANTH, ENAGANDULA VINAY,, ALUVALA RAVICHANDRA

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 27-38

 Year: April 2026

 Downloads: 67

 Abstract

This study examines the correlation between the Latin American Artificial Intelligence Index (ILIA) and the Web Accessibility Index (WAIN) across 19 Latin American nations to assess the alignment of technological innovation with digital inclusivity. The ILIA gives a broad picture of how ready AI is by looking at things like infrastructure, data capacity, talent development, research and adoption, and governance structures. This index shows that some regions are better at digital transformation than others. For example, Uruguay, Chile, and Brazil are still ahead of the game when it comes to AI adoption because they have strong infrastructure and governance frameworks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Artificial Intelligence Readiness (ILIA), Web Accessibility Index (WAIN), WCAG 2.2 Compliance, Digital Inclusivity, Sustainable Digital Transformation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Interpretable Distributed Collaborative Architecture Strengthening Protection and Confidentiality in Networked Automotive Systems Under Persistent Sophisticated Intrusions

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02003

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02003

  Register Paper ID - 302877

  Title: INTERPRETABLE DISTRIBUTED COLLABORATIVE ARCHITECTURE STRENGTHENING PROTECTION AND CONFIDENTIALITY IN NETWORKED AUTOMOTIVE SYSTEMS UNDER PERSISTENT SOPHISTICATED INTRUSIONS

  Author Name(s): Dr.A.Swetha, CHADA SRIJA, ADUPA ROHITH, DASAROJU SAI KUMAR

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 18-26

 Year: April 2026

 Downloads: 69

 Abstract

As more and more autonomous and smart vehicles are used in ground transportation systems, new security problems arise. This change from operations run by people to those run by computers makes it easier for bad people to attack. As the Internet of Things (IoT) becomes more common in cars, they are always making and sharing a lot of data. Attackers can take advantage of this trend's weaknesses in complicated ways, like with Advanced Persistent Threats (APT). It is very important to be able to find APTs in vehicles that have IoT technology. To find these threats, we need better ways to do so. The urgent requirement for vehicle data privacy constrains conventional centralised Machine Learning (ML) methodologies. Also, there aren't many APT datasets available to the public in the vehicle field, which makes it harder to develop and test models. This is a big problem for cybersecurity in this area that is always changing. This study introduces an innovative Federated Deep Neural Network (FDNN) framework incorporating a privacy-preserving technique to address these challenges. The research emphasises the primary obstacles in APT detection and delineates its distinctive contributions to the domain. It talks about the research questions that are guiding the study. The UNSW-NB15, Edge-IIoTset, and CSE-CIC-IDS2018 datasets each represent a different stage of an APT attack. We use these datasets to look at and judge the framework that was made. For these datasets, the framework without the privacy-preserving technique gets APT detection accuracies of 97.32%, 96.81%, and 98.06%, respectively. But when the privacy-preserving technique is used, the framework's accuracies are 95.62%, 96.11%, and 95.63%, respectively. There are tables that show all of the results, as well as other evaluation metrics like Precision, False Positive Rate, and F1 Score. We use "Shapley Additive Explanations (SHAP)" analysis on the framework we made to find the most important features for finding APTs. This study validates the efficacy of a novel framework for identifying APTs in distributed vehicular contexts. The framework works well because it cuts down on the amount of data and the number of features. This was shown by extensive testing with several benchmark datasets. Future work will look into how well the framework can find APTs in different areas.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Federated Learning, Advanced Persistent Threats (APT), Connected Vehicles Security, Explainable Artificial Intelligence (XAI), Privacy-Preserving Deep Learning.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Non-Label-Dependent and Partially Guided Intelligent Structures for Multi-Category Equipment Degradation Identification

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02002

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02002

  Register Paper ID - 302860

  Title: NON-LABEL-DEPENDENT AND PARTIALLY GUIDED INTELLIGENT STRUCTURES FOR MULTI-CATEGORY EQUIPMENT DEGRADATION IDENTIFICATION

  Author Name(s): Dr.P.Latha, ARPUGONDA MAHENDAR, GUGULOTHU SUPRIYA, GATIKE SHAILESH VARMA

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 10-17

 Year: April 2026

 Downloads: 65

 Abstract

Tool condition monitoring (TCM) is very important in today's manufacturing because it makes sure that products are of high quality, cuts down on unplanned downtime, and makes production as efficient as possible. Over time, mechanical stress, heat, and friction cause cutting tools like milling cutters, drills, and lathes to wear down. Tool wear not only affects the size and surface quality of parts made, but it also raises production costs and can put workers' safety at risk. Most traditional TCM systems use manual inspection or supervised machine learning methods, which need a lot of labelled datasets. However, labelling data from industrial sensors takes a lot of time and work, and it is often not possible in real-world manufacturing settings, especially for machines that run on a continuous production schedule.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Tool Wear Recognition, Unsupervised Learning, Semi-Supervised Learning, Sensor Fusion, Predictive Maintenance.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Computational Linguistic Processing for Online Document Categorization Integrated With Hierarchical Neural Architectures

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTBP02001

  Your Paper Publication Details:

  Published Paper ID: - IJCRTBP02001

  Register Paper ID - 302945

  Title: COMPUTATIONAL LINGUISTIC PROCESSING FOR ONLINE DOCUMENT CATEGORIZATION INTEGRATED WITH HIERARCHICAL NEURAL ARCHITECTURES

  Author Name(s): Mrs.G.Vijayalaxmi, CHANDUPATLA NITHISH REDDY, ADOTHU MAHESH, DANDU RAHUL

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: 1-9

 Year: April 2026

 Downloads: 61

 Abstract

A significant amount of web text data, including news articles, blogs, social network status updates, online reports, and more, has been gathered along with the growth of the internet. Accurately classifying these web texts automatically is a crucial task in the fields of artificial intelligence and natural language processing. Numerous applications, including sentiment analysis, web filtering, automatic recommendation, and web information retrieval, are made possible by it. The issue is that it is challenging to accurately classify web text because of its complex semantic structures and distant relationships. Current word representations, like Word2Vec and GloVe, generate fixed word embeddings for each and every word. This paper presents a more advanced deep learning structure called BERT, BGCA, which combines BERT (Bidirectional Encoder Representations from Transformers), BiGRU (Bidirectional Gated Recurrent Unit), CNN (Convolutional Neural Network), and Attention in a web text classification problem to address the aforementioned problems. In order to help the model learn the syntax and semantics between words through bidirectional transformer architecture, BERT is used to obtain the contextual encoding of words in the web text. Contexts can be investigated both forward and backward using the BiGRU layer. The CNN layer is in charge of extracting important details and gram features from the text. and the focus is on capturing the importation of key terms. To confirm the effectiveness of the suggested model, BERT, BGCA, experiments were carried out on a sizable enough news dataset called THUCNews. Conventional embedding techniques (Word2Vec and GloVe) and BERT-based embedding were tested. According to the comparison results, the BERT significantly outperformed the static embedding techniques. On the 20 categories THUCNews news dataset, the high accuracy and F1 score (95.21%, 94.36%) and F, measure of 95.21% and 94.36%, respectively, demonstrate that the BERT, BGCA can achieve better classification results and be favourable to semantic representation when compared to other deep learning models like TextCNN. Therefore, it can be said that the BERT, BGCA method for large-scale web text classification is practical, scalable, and effective.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Web Text Classification, BERT (Bidirectional Encoder Representations from Transformers), BiGRU (Bidirectional Gated Recurrent Unit), Convolutional Neural Network (CNN), Attention Mechanism, Natural Language Processing,

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A STUDY ON WORKING CAPITAL MANAGEMENT AT JALARAM DOORS & HARDWARES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2604743

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2604743

  Register Paper ID - 305648

  Title: A STUDY ON WORKING CAPITAL MANAGEMENT AT JALARAM DOORS & HARDWARES

  Author Name(s): Buvendrasivam, Dr. M. Jayaseely

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: g373-g377

 Year: April 2026

 Downloads: 8

 Abstract

Working capital management is a very important part of financial management, which involves the management of short-term assets and liabilities of an organisation. This includes maintaining sufficient liquidity to conduct organisational activities in an efficient manner. In addition to this, this involves improving the profitability of the organisation. Working capital management plays an important role, especially in the manufacturing sector, because in such industries most of the funds are invested in inventories and receivables. In this study, working capital management strategies followed by JALARAM DOORS & HARDWARES, a manufacturing and trading organization involved in wooden doors manufacturing and hardware supply, have been studied. The study relies upon secondary data collected from financial statements of the organisation from 2021-22, 2022-23, and 2024-25. Financial ratio analysis will be conducted through the current ratio, inventory turnover ratio, and debtor's turnover ratio. From the findings, it is seen that although there are satisfactory levels of liquidity in the organization, there are some issues associated with the management of inventories and fluctuation in the profitability levels


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Working Capital, Liquidity, Inventory, Receivables, Profitability

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NeuroFence: A Lightweight AI-Based Intrusion Detection System for IoT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2604742

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2604742

  Register Paper ID - 306247

  Title: NEUROFENCE: A LIGHTWEIGHT AI-BASED INTRUSION DETECTION SYSTEM FOR IOT

  Author Name(s): Ghavte Ubada, Yusuf Kazi, Habib Kazi, Ansh Koli, Dr. Varsha Shah

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: g364-g372

 Year: April 2026

 Downloads: 5

 Abstract

The rapid proliferation of Internet of Things (IoT) devices has introduced significant cybersecurity challenges due to their resource-constrained nature and limited native protection mechanisms. Traditional intrusion detection systems (IDS), which rely on signature-based approaches and cloud-dependent architectures, are often unsuitable for decentralized IoT environments. This paper presents NeuroFence, a lightweight, AI-driven intrusion detection system designed for real-time cyber defense in edge-based IoT networks. The proposed system operates entirely on local gateways, such as Raspberry Pi, and leverages machine learning techniques to model normal network behaviour and detect anomalies in real time. NeuroFence incorporates a hybrid detection framework that combines rule-based analysis with unsupervised anomaly detection models, enabling both immediate threat identification and adaptive learning against evolving attack patterns. The system captures live network traffic, extracts features using sliding-window techniques, and evaluates traffic behaviour using models such as Isolation Forest and TinyML-based classifiers. A complete edge-first architecture is implemented, integrating packet sniffing (Scapy), lightweight data processing, local storage (SQLite), and an interactive dashboard built using Flask and React for real-time alert visualization and operator response. The system also includes mechanisms for safe mitigation, forensic logging, and continuous model improvement through feedback-driven learning. Experimental evaluation demonstrates that NeuroFence effectively detects anomalous IoT traffic with low latency and minimal computational overhead, making it suitable for deployment in resource-constrained environments such as smart homes, industrial IoT systems, and remote installations. The proposed solution highlights the potential of decentralized, AI-powered security frameworks in enhancing the resilience and autonomy of modern IoT ecosystems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Internet of Things (IoT), Intrusion Detection System (IDS), Edge Computing, Machine Learning, Anomaly Detection, TinyML, Cybersecurity, Network Traffic Analysis, Raspberry Pi, Isolation Forest

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Spatio - Temporal Analysis of Land Use Pattern in Fatehpur District

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2604741

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2604741

  Register Paper ID - 306226

  Title: SPATIO - TEMPORAL ANALYSIS OF LAND USE PATTERN IN FATEHPUR DISTRICT

  Author Name(s): Dr. Malikhan Singh, Mr. Vijay Vardhan, Dr. Gaurav Yadav

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: g351-g363

 Year: April 2026

 Downloads: 8

 Abstract

Land use pattern is a reflection of the interrelationship between natural resources and human activities in a region. Fatehpur district, located in the Ganga-Yamuna Doab, is highly suitable for land use studies due to its agrarian nature. The present study is based on the spatio-temporal analysis of land resources in Fatehpur district. The main objective of the study is to understand the distribution, trends, and variability of different land use categories in the district--such as agricultural land, forest area, fallow and wasteland, pasture land, and built-up area. In this research, secondary data (district statistical handbook, land records, and census data) have been used to classify land use and analyze changes over time. The analysis clearly indicates that agriculture is the dominant land use in the district, occupying the largest proportion of the total area, whereas forest area is very limited. Due to urbanization and infrastructural development, there has been a gradual increase in built-up areas, which is putting pressure on agricultural land. The study also reveals that land use patterns are strongly influenced not only by physical factors--such as soil, climate, and water resources--but also by socio-economic factors like population growth, technological development, and market accessibility. Additionally, issues such as land degradation, declining groundwater levels, and imbalanced land use are emerging challenges in the region. Finally, the study emphasizes the need for sustainable land use management measures, such as agricultural diversification and the promotion of modern irrigation techniques, to ensure balanced and long-term utilization of resources in Fatehpur district.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Land Use Pattern, Spatio-Temporal Analysis, Fatehpur District

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Night Guardian: Empowering Women's Safety with Hand Sign-based Communication and AI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2604740

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2604740

  Register Paper ID - 306253

  Title: NIGHT GUARDIAN: EMPOWERING WOMEN'S SAFETY WITH HAND SIGN-BASED COMMUNICATION AND AI

  Author Name(s): A.Sravanthi, Ch.Supriya, D.Ratnavali, Dr.R.Shobarani, Dr.F.Jerald

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: g346-g350

 Year: April 2026

 Downloads: 9

 Abstract

Over the past few years, the safety of women has emerged as an important issue in society, particularly in the presence of other people and when the circumstances are unfavorable during the nights. As the number of harassment and emergency incidents increases, the need to find intelligent, non-obtrusive safety solutions that will work in real time is growing. The proposed project is called Night Guardian: Empowering Women Safety with Hand Sign-based Communication and AI and suggests a new solution that would be based on leveraging artificial intelligence and computer vision to provide immediate assistance in case of distress scenarios without having to engage with the user directly. The system is developed based on the latest technologies like MediaPipe and OpenCV to record and process real-time video feeds of a webcam. MediaPipe is applied in the correct hand landmark detection and keypoint extraction in order to determine hand gestures very precisely. These features are extracted and converted into numerical forms and input to machine learning algorithms like Random Forest, Support Vector Machine (SVM) and K-Nearest Neighbor (KNN). Performance measures such as precision, recall, and F1-score are used to train and test the models to be reliable at gesture recognition. After a distressing gesture has been identified, an alert system is automatically triggered. This involves raising a local alarm to draw attention locally and an automated email notification and a picture of the gesture to emergency contacts or authorities that are predetermined. The combination of these alert mechanisms is to make sure that there is quick response hence increasing the possibility of intervention in time. With the application of AI, the system can be continuously and effectively used even in dynamic environments. Altogether, the offered system will be an effective and scalable way to enhance the safety of women with the help of intelligent automation. It offers a quick, convenient, and free form of emergency communication by using machine learning and real-time gesture recognition to deliver a hands-free form of communication. This project, apart from fostering innovation in technology, helps to enhance social well being by making people be empowered with proactive safety tools.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Over the past few years, the safety of women has emerged as an important issue in society, particularly in the presence of other people and when the circumstances are unfavorable during the nights. As the number of harassment and emergency incidents increases, the need to find intelligent, non-obtrusive safety solutions that will work in real time is growing. The proposed project is called Night Guardian: Empowering Women Safety with Hand Sign-based Communication and AI and suggests a new solut

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Camera-Only Early Crop Stress Detection Using Temporal Visual Analysis, Hybrid Learning, and Explainable AI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2604739

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2604739

  Register Paper ID - 305354

  Title: CAMERA-ONLY EARLY CROP STRESS DETECTION USING TEMPORAL VISUAL ANALYSIS, HYBRID LEARNING, AND EXPLAINABLE AI

  Author Name(s): Mrs. R. Rukkumani, Jose Hiptlin N, Ramya Sree S, Arun Prasath M, Madhu Mitha V

 Publisher Journal name: IJCRT

 Volume: 14

 Issue: 4

 Pages: g335-g345

 Year: April 2026

 Downloads: 17

 Abstract

Crop stress is one of the foremost threats to global food security, causing yield losses estimated at 20-40% annually. Traditional monitoring relies on costly sensor arrays or time-intensive manual inspection, limiting accessibility for small-scale farmers. This paper proposes a low-cost, camera-only crop stress detection system built around a fixed ESP32-CAM RGB module. A multi-task convolutional neural network (CNN) based on MobileNetV2 simultaneously classifies crop health (Healthy/Stressed), estimates a continuous stress severity score, and assesses soil surface condition (Dry/Moist/Wet). Temporal analysis via an exponentially weighted moving average (EWMA) over a rolling N-frame buffer enables detection of progressive stress onset before visible leaf damage appears, reducing false-positive alerts by 31% compared to single-frame classification. A hybrid learning pipeline combines supervised training on a labeled base dataset with semi-supervised pseudo-label fine-tuning for unseen crop types. Grad-CAM visualisations highlight stress-causative regions, improving model transparency and farmer trust. The system achieved 93.4% binary classification accuracy, 89.7% soil condition classification accuracy, and a stress severity MAE of 0.06 on held-out test data.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Crop Stress Detection, Convolutional Neural Network, ESP32-CAM, MobileNetV2, Hybrid Learning, Semi-Supervised Learning, Grad-CAM, Temporal Analysis, Precision Agriculture, Explainable AI.

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 14 | Issue 4 | Month- April 2026)

Call For Paper April 2026
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A digital object identifier by DOI.org How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer