Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

  IJCRT Search Xplore - Search all paper by Paper Name , Author Name, and Title

Volume 9 | Issue 6

Volume 9 | Issue 6 | Month  
Downlaod After Publication
1) Table of content index in PDF
2) Table of content index in HTML 2)Table of content index in HTML
3) Front Page                     3) Front Page
4) Back Page                     4) Back Page
5) Editor Board Member 5)Editor Board Member
6) OLD Style Issue 6) OLD Style Issue
Chania Chania
IJCRT Journal front page IJCRT Journal Back Page

  Paper Title: BHARAT ME CHUNAV SUDHAR KI VASTAVIKATA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106875

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106875

  Register Paper ID - 212150

  Title: BHARAT ME CHUNAV SUDHAR KI VASTAVIKATA

  Author Name(s): Dr. Archana Gupta

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h380-h385

 Year: June 2021

 Downloads: 1086

 Abstract

BHARAT ME CHUNAV SUDHAR KI VASTAVIKATA


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BHARAT ME CHUNAV SUDHAR KI VASTAVIKATA

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FINANCING ALTERNATIVES FOR NON-PROFIT ORGANIZATIONS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106874

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106874

  Register Paper ID - 211488

  Title: FINANCING ALTERNATIVES FOR NON-PROFIT ORGANIZATIONS

  Author Name(s): Mr. Pranav sathya.M, Dr. Smitha V Shenoy

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h370-h379

 Year: June 2021

 Downloads: 1191

 Abstract

FINANCING ALTERNATIVES FOR NON-PROFIT ORGANIZATIONS


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

FINANCING ALTERNATIVES FOR NON-PROFIT ORGANIZATIONS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ADAPTIVE SELF PACED DEEP CLUSTERING WITH DATA AUGUMENTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106873

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106873

  Register Paper ID - 211171

  Title: ADAPTIVE SELF PACED DEEP CLUSTERING WITH DATA AUGUMENTION

  Author Name(s): VINNAKOTA GOWTHAMI PRIYA, K.VENKATESH

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h359-h369

 Year: June 2021

 Downloads: 1195

 Abstract

Deep clustering is one of the most prominent clustering techniques compared with superior clustering techniques by jointly performing feature learning and cluster assignment. Although numerous deep clustering algorithms have emerged in various applications, most of them fail to learn robust cluster-oriented features which in turn hurt the final clustering performance. In order to overcome all these problems, we try to propose a two-stage deep clustering algorithm by incorporating data augmentation and self-paced learning. In the first stage, we try to train the system with all the inputs which are required for identifying the post with category name and rank. In the next stage we just want to identify the test condition in which user try to recommend the post to others and combine a post based on category.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ADAPTIVE SELF PACED DEEP CLUSTERING WITH DATA AUGUMENTION

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PROVABLE DATA POSSESSION BY IDENTIFYING DUPLICATE OUTSOURCED DATA TRANSFER IN CLOUD COMPUTING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106872

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106872

  Register Paper ID - 211120

  Title: PROVABLE DATA POSSESSION BY IDENTIFYING DUPLICATE OUTSOURCED DATA TRANSFER IN CLOUD COMPUTING

  Author Name(s): PENMESTA SATYA BHAVANI, L. SOWJANYA

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h348-h358

 Year: June 2021

 Downloads: 1201

 Abstract

Cloud Computing is one of the practice of using a network of remote servers hosted on internet to store, access, retrieve data from remote machines not from local machines. As the data will be stored on remote server, the user will retrieve the data from that server at the time of need. So for that data storage and access the user need to pay the amount on rental basis, that is the main reason why the cloud is also known as PAUZ(I.e Pay As you Uze).As data is stored in remote system we need to have a facility to avoid the duplicate data not to be reside on that server systems, if this is not avoided the user need to pay excess amount for that duplicated storage. So in order to avoid this data duplication we need to apply a new principle called as Data Deduplication.This is one of the best data compression technique that was used for eliminating the duplicate copies of repeated data and this was widely used in recent cloud storage.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Provable Data Possession by Identifying Duplicate Outsourced Data Transfer in Cloud Computing

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DEMONSTRATE THE PERFORMANCE OF AN PASSIVE IP TRACEBACK MECHANISM OVER SPOOFED NETWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106871

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106871

  Register Paper ID - 211078

  Title: DEMONSTRATE THE PERFORMANCE OF AN PASSIVE IP TRACEBACK MECHANISM OVER SPOOFED NETWORK

  Author Name(s): MUCHAKARLA VENKATA RAO, A. DURGA DEVI

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h338-h347

 Year: June 2021

 Downloads: 1186

 Abstract

In current days there were a great deal of assaults that happen in the field of software engineering and data innovation during the procedure of information transmission from one area to other area. In spite of the fact that the information will be moved from one area to other with a substantial IPaddress and port number inside the system, there is an opportunity of happening assault during information transmission in any capacity. One among the few assaults is IP-Spoofing assault which goes under a few assaults that are accessible in writing. This IP-Spoofing assault comes in various manners dependent on their assault type. The procedure or strategy for making a web convention (IP) parcels with a phony IP-Address or obscure IP address and attempt to sends to another framework with an off-base or phony ID ipaddress is known as IP-Spoofing. In this proposed application we attempt to configuration PIT model known as Passive IP Trackback model in which if there is any Spoofing assault is discovered it will quickly backtraverse for one hub back to its past root and attempt to send the information to legitimate goal with the assistance of other moderate hubs. By directing different analyses on our proposed PIT model, we at last arrived at a resolution that our proposed model is effective in catching the area of IPSpoofers dependent on way backscatter informational index and as an expansion we have indicated the application under a recreation graph with hubs and their assault situation is recognized effectively through that diagram model.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Ipaddress. PIT Model, Backtraverse, Ipspoofers

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SECURE E-CUSTOMER RELATION MANAGEMENT IN DECENTRALIZED SERVER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106870

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106870

  Register Paper ID - 210962

  Title: SECURE E-CUSTOMER RELATION MANAGEMENT IN DECENTRALIZED SERVER

  Author Name(s): KOMBHAM SAI DIVYA, A.DURGA DEVI

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h326-h337

 Year: June 2021

 Downloads: 1178

 Abstract

Customer Relationship Management (CRM) software designed for businesses that is sell, service, and support Products. In Customer Relationship Management application Integrated marketing campaign management coordinates and increases capabilities to collect, analyze and act on marketing data, improving lead quality, cost per sale and overall return on marketing investments. Access to service data increases management's capabilities to analyze business, identify profitable opportunities, devise sales strategies, and drive top-line revenue growth. It is difficult to maintain all these B2B task manually. It will take lot of time to maintain these type of tasks and required heavy man power.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SECURE E-CUSTOMER RELATION MANAGEMENT IN DECENTRALIZED SERVER

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: K-NEAREST NEIGHBOUR SEARCH ALGORITHM BY USING RANDOM PROJECTION FORESTS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106869

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106869

  Register Paper ID - 211074

  Title: K-NEAREST NEIGHBOUR SEARCH ALGORITHM BY USING RANDOM PROJECTION FORESTS

  Author Name(s): KALIGITHI RAJANI, V.SARALA

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h318-h325

 Year: June 2021

 Downloads: 1196

 Abstract

Data mining is the process of extracting valuable information from a large data source and this is the primary step in the process of knowledge discovery. One among the best classification algorithm for classification is K-nearest neighbors (kNN) for the process of knowledge discovery. Inspired by the huge positive reviews about the tree-based methodology over the last decades, we try to develop a new method for data search under random projection forests (rpForests). Here the random forest projection method is mainly used to search the specified document randomly from the several groups and try to find out the document which is found or not. As we are using K-NN algorithm if the file is not found in one group the same file can be immediately search in opposite group in random manner and if the file is found the search will be immediately stopped at that point and the result will be displayed immediately. If the file is not found then the search continues till the end and the process terminates at the final stage if the file is not present in the entire groups.By conducting various experiments on our proposed model we finally came to a conclusion that our proposed approach is best in finding the solution to search the documents in random projection manner by using K-NN in an accurate manner.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Data Mining, Random Projection, Knowledge Discovery, Classification Algorithm, Positive Reviews.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FACE MASK DETECTION SYSTEM USING OPEN CV

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106868

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106868

  Register Paper ID - 210971

  Title: FACE MASK DETECTION SYSTEM USING OPEN CV

  Author Name(s): JONNADA SATYA PRIYA, B.SURYANARAYANA MURTHY

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h308-h317

 Year: June 2021

 Downloads: 1222

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Machine Learning Algorithms, Deep Learning Model

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TOWARDS FOG CENTRIC SECURE CLOUD STORAGE SCHEME

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106867

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106867

  Register Paper ID - 211070

  Title: TOWARDS FOG CENTRIC SECURE CLOUD STORAGE SCHEME

  Author Name(s): BATTU NAVYA, K.RAMBABU

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h293-h307

 Year: June 2021

 Downloads: 1146

 Abstract

Now a days cloud has become one of the fascinating domain in order to store and retrieve all the data from the remote machines rather from the local machines. In general cloud is always store the data in centralized server and all the users need to connect to the centralized server location for storing or accessing the data to and from the cloud server. Now a days fog computing is increasing its demand for data storage because, the fog computing is deployed at the edge of network, offering low error rates to users. In this project, we investigate an scheme by taking three fog nodes along with data owner and public cloud services(PCS) for storing and accessing the file in a secure manner. The proposed application provide a best feature to store and access the data from the cloud in a secure manner by utilizing the storage space and without wasting the storage space.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

TOWARDS FOG CENTRIC SECURE CLOUD STORAGE SCHEME

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A SECURE SEARCHABLE ENCRYPTION FRAMEWORK FOR DATA SECURITY USING PERSONAL DATA STORAGE (PDS) MODULE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106866

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106866

  Register Paper ID - 210976

  Title: A SECURE SEARCHABLE ENCRYPTION FRAMEWORK FOR DATA SECURITY USING PERSONAL DATA STORAGE (PDS) MODULE

  Author Name(s): KOTTU SATYA NAGA DIVYA, A.DURGA DEVI

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h284-h292

 Year: June 2021

 Downloads: 903

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

A Secure Searchable Encryption Framework for Data Security using Personal Data Storage (PDS) Module

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECT SPAM MESSAGES AND FAKE USERS IN ONLINE SOCIAL NETWORKS USING SUPPORT VECTOR MACHINES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106865

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106865

  Register Paper ID - 211066

  Title: DETECT SPAM MESSAGES AND FAKE USERS IN ONLINE SOCIAL NETWORKS USING SUPPORT VECTOR MACHINES

  Author Name(s): CHAVALA SIREESHA, K.RAMBABU

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h271-h283

 Year: June 2021

 Downloads: 897

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FACE RECOGNITION ATTENDANCE SYSTEM BASED ON REAL-TIME VIDEO PROCESSING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106864

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106864

  Register Paper ID - 210966

  Title: FACE RECOGNITION ATTENDANCE SYSTEM BASED ON REAL-TIME VIDEO PROCESSING

  Author Name(s): NAKKA JOYTHI, L. SOWJANYA

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h262-h270

 Year: June 2021

 Downloads: 913

 Abstract

Now a days almost all the colleges try to collect attendance based on either manual or some bio metric ways.So it is becoming a lot of effort to take all the attendance and maintain them.Hence in this application we try to take attendance based on real time video sequence by collecting the student face from web camera and then check with database and find out whether he is present or absent for that day.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

FACE RECOGNITION ATTENDANCE SYSTEM BASED ON REAL-TIME VIDEO PROCESSING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPARATIVE STUDY AND ANALYSIS OF DIFFERENT CMOS VLSI TECHNOLOGY USED FOR SRAM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106863

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106863

  Register Paper ID - 205502

  Title: A COMPARATIVE STUDY AND ANALYSIS OF DIFFERENT CMOS VLSI TECHNOLOGY USED FOR SRAM

  Author Name(s): Dr. Savita Patil, Vijaykumar Ari

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h258-h261

 Year: June 2021

 Downloads: 1288

 Abstract

This paper presents a comparative study and analysis between Various Nano meter CMOS technology used to implement the Radiated Hardened 14T-SRAM. The technology used in this paper include 65-nm, 28-nm, 22nm and 16nm technology. In order to design and Implement of 14T-SRAM that is used for Space applications, a precise CMOS technology and speed, power and area has been considered. A comparison has been made on basis of the CMOS technology, Area and Power between the simulation results. Comparison of these models have been made with proposed design CMOS Technology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CMOS, Power, Area, Technology, Radiation Hard By Design (RHBD),VLSI

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AI DEVICE THAT CAN DETERMINE ONE IDENTITY USING A CODE LANGUAGE AT RADIO FREQUENCY OVER UNSECURED PHONE CALL COMMUNICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106862

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106862

  Register Paper ID - 210341

  Title: AI DEVICE THAT CAN DETERMINE ONE IDENTITY USING A CODE LANGUAGE AT RADIO FREQUENCY OVER UNSECURED PHONE CALL COMMUNICATION

  Author Name(s): Ishaq Azhar Mohammed, Sikender Mohsienuddin Mohammad

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h254-h257

 Year: June 2021

 Downloads: 1007

 Abstract


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Artificial intelligence, IMSI Catcher. radio frequency, code language, Network, IoT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EMPOWERMENT OF RURAL WOMEN: PLACE OF ADULT EDUCATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106861

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106861

  Register Paper ID - 209837

  Title: EMPOWERMENT OF RURAL WOMEN: PLACE OF ADULT EDUCATION

  Author Name(s): Dr .s.vijaya vardhini

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h247-h253

 Year: June 2021

 Downloads: 1101

 Abstract

India is the most populous country in the world. Almost half of its population is women. If the country wants to develop itself both men and women should take active part in all the Developmental Programmes. If women are not brought into mainstream society, the policies or the programmes initiated by the National and respective State Governments may not result in achieving the expected out comes. Therefore, empowering the women folk is an essential requirement to make them as active participants in the developmental processes. Unfortunately the women in particular, more specifically the women belonging to SC, ST and Minorities are lagging behind in the economic and educational front. Further, they are alienated from the mainstream society and hence they are not taking active part in the developmental programmes as expected.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

empowerment, women development, individual challenges etc.,

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STEALTH SCANNING METHOD OF ANALYZING BOTNET

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106860

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106860

  Register Paper ID - 208256

  Title: STEALTH SCANNING METHOD OF ANALYZING BOTNET

  Author Name(s): Joshitha K, Dr Rashmi S

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h239-h246

 Year: June 2021

 Downloads: 1263

 Abstract

Generally botnet means it is a number of many device connected to an internet that will involve the working of more number of devices on a single BOT. The characteristics of Botnet mainly involve the detection and disruption of many programs that are mainly constructed using many clients. The main networks of Botnet involve the communication of peer to peer communication network which also performs the same function as the model of client server. This model is used to perform both as a distributed command and server of a centralized custom. Our work focus on the the scanning of the botnet that includes the method to visualize, correlate the behavioural characteristics of botnet in this network of internet related as global internet.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Radiation that involves internet background ,Block chain ,SDN, Botnet, involving the scanning for the purpose of probe, mainly the system of coordination.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STOCK PREDICTION USING SENTIMENT AND TECHNICAL ANALYSIS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106859

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106859

  Register Paper ID - 208951

  Title: STOCK PREDICTION USING SENTIMENT AND TECHNICAL ANALYSIS

  Author Name(s): Smit Kesarkar, Kaustubh Khadilkar, Khushi Singh, Mitali Kasurde, Pooja Mundhe

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h235-h238

 Year: June 2021

 Downloads: 1162

 Abstract

: Nowadays, with the rapid increase in prices, having more than one source of income has become extremely important. One not only needs to save money but also needs to tackle inflation and make sure the money stored is not losing its value while kept in lockers and banks. Money which is not wisely invested will lose its purchasing power in the long run against inflation. Mutual funds ,public provident funds ,gold ,silver ,saving schemes ,real estate ,cryptocurrency and stock market are few places where one can invest money. It has been observed people try to shy away from stock market simply because of lack of their knowledge in this respective field which has also caused various misconceptions. For a layman all the information will be overwhelming if he doesn't possess the required tools and knowledge to analyze the data. This has been the case when it comes to stock market investing since a long time. But with the recent development in deep learning and natural language processing, the gap can finally be filled. These are fast processing models which provide technical as well as sentiment analysis on the stock data using LSTM and LDA which subsequently aids the user in making decisions in stock markets.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Time Series Forecasting, Stock Prediction, LSTM Networks, Sentiment Analysis, LDA.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ``An Analysis Of Rainfall Impacts On Area Under Maize Crop In Ahmednagar District, Maharashtra``

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106858

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106858

  Register Paper ID - 209294

  Title: ``AN ANALYSIS OF RAINFALL IMPACTS ON AREA UNDER MAIZE CROP IN AHMEDNAGAR DISTRICT, MAHARASHTRA``

  Author Name(s): Mr. Namdeo Subhash Ghule, Dr. U. B. Pathre, Dr. M. V. Suryawanshi

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h229-h234

 Year: June 2021

 Downloads: 1131

 Abstract

Ahmednagar district is the largest district in Maharashtra state. Various crops are grown in this district. These include cash crops, food crops, and fodder crops. Maize is included in all three crop category. Maize is cultivated in the district during the three seasons - kharif, rabbi, and summer. Generally the seeds of various types of maize seed companies are used for cultivation such as African tall, Karvir, Rajarshree, Vijay, Mahabiz, Digvijay, Virat. The Rain is changing every year, with each month and season varying. The average rainfall during the period 2000 to 2014 is 82.03% during the monsoon, 14.78% in the north-east monsoon and winter period, and 3.19% in the summer. The Pearson correlation is therefore investigated by the rainfall in the period 2000 to 2014 and area under maize crop for the period 2000-01 to 2014-15.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Agriculture, Area, Maize Crop, Rainfall, Season.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AN EFFICIENT TOOL FOR ONLINE TEACHING USING OPENCV

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106857

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106857

  Register Paper ID - 209487

  Title: AN EFFICIENT TOOL FOR ONLINE TEACHING USING OPENCV

  Author Name(s): Gangadhara Rao

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h225-h228

 Year: June 2021

 Downloads: 1460

 Abstract

The main goal of computer vision is to identify and recognize different objects of various size, shape and position. The major problems faced by the computer vision is the illumination and the viewpoint of the object, Concerning this multiple studies on detecting and recognizing objects that showed a high level of accuracy and precision on these tasks. To facilitate object detection online the proposed work allows the user to track the movement of any cultured object of his/her choice. The user can even choose the colors of his choice to be displayed. By running the Application, the camera is activated thus enabling the user to draw in the air just by waving the tracker object. The drawing is also simultaneously visible on the white window. Instructor can choose any color of his choice displayed above to draw and also can clear the screen when needed. We will be using the computer vision techniques of OpenCV and Python to build this Application


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

OpenCV, Object Tracker, Computer Vision, Python

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPREHENSIVE STUDY OF CORONA VIRUS, IT'S DIAGNOSTIC TESTS, TREATMENT AND THERAPY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRT2106856

  Your Paper Publication Details:

  Published Paper ID: - IJCRT2106856

  Register Paper ID - 209478

  Title: A COMPREHENSIVE STUDY OF CORONA VIRUS, IT'S DIAGNOSTIC TESTS, TREATMENT AND THERAPY

  Author Name(s): Rajnandini Sanjay Bugale, Vipul M. Patil, Sachinkumar V. Patil

 Publisher Journal name: IJCRT

 Volume: 9

 Issue: 6

 Pages: h209-h224

 Year: June 2021

 Downloads: 1107

 Abstract

Following the emergence of Severe Acute Respiratory Syndrome (SARS) in 2002 and Middle East Respiratory Syndrome (MERS) in 2012, the world is now combating third large scale outbreak caused by coronavirus, the Coronavirus Disease 2019(COVID-19). Since Dec 2019, the global pandemic caused by highly infected novel coronavirus 2019(COVID-19) has been rapidly spreading. In this review we summarize the current diagnostic tools and therapeutic strategies for covid-19.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

COVID-19, Severe Acute Respiratory Syndrome Corona Virus 2 (SARS CoV-2), Diagnosis, Treatment, Vaccines.

  License

Creative Commons Attribution 4.0 and The Open Definition



All Published Paper Details Search Through Above Search Option.

About IJCRT

The International Journal of Creative Research Thoughts (IJCRT) aims to explore advances in research pertaining to applied, theoretical and experimental Technological studies. The goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in and around the world.


Indexing In Google Scholar, ResearcherID Thomson Reuters, Mendeley : reference manager, Academia.edu, arXiv.org, Research Gate, CiteSeerX, DocStoc, ISSUU, Scribd, and many more

International Journal of Creative Research Thoughts (IJCRT)
ISSN: 2320-2882 | Impact Factor: 7.97 | 7.97 impact factor and ISSN Approved.
Provide DOI and Hard copy of Certificate.
Low Open Access Processing Charges. 1500 INR for Indian author & 55$ for foreign International author.
Call For Paper (Volume 12 | Issue 3 | Month- March 2024)

Call For Paper March 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer