Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

Conference Proceeding - Advances in Computing, Communication and Recent Trends in Technology (ACCRT) - 2024
Volume 12 | Issue 5

  Paper Title: LANDMINE DETECTION AND INTIMATION ROBOT USING GSM AND GPS TECHNOLOGY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02181

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02181

  Register Paper ID - 260024

  Title: LANDMINE DETECTION AND INTIMATION ROBOT USING GSM AND GPS TECHNOLOGY

  Author Name(s): Prof.Hariprasad T L, Anusha T Belamkar, Farheen Fathima A, Manoj G S, Mahesh L

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1187-1191

 Year: May 2024

 Downloads: 77

 Abstract

The integration of GSM and GPS innovations permits for effective communication and exact area following, guaranteeing fast and precise reaction to recognized landmines. The real-time transmission of information empowers the base station to make educated choices and send assets successfully. Furthermore, the robot's capacity to check and cripple landmines remotely minimizes the hazard to human life included in manual demining operations. Furthermore, the Landmine Discovery and Insinuation Framework Robot's flexibility makes it appropriate for arrangement in different landscapes and situations. Its tough plan and all-terrain capabilities empower it to work in challenging conditions, counting unpleasant territory and unfavourable climate. This flexibility upgrades its viability in recognizing and neutralizing landmines in different geological areas, making it a profitable device for mine clearance operations around the world.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Intimation system, Metal detectors, Base station, Versatility, All-terrain capabilities.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MULTIPURPOSE NIGHT PATROL AND RESCUE ROBOT USING IoT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02180

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02180

  Register Paper ID - 260023

  Title: MULTIPURPOSE NIGHT PATROL AND RESCUE ROBOT USING IOT

  Author Name(s): Prof Ravi Kumar M, Preethi T, Harshitha M, Harshitha R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1181-1186

 Year: May 2024

 Downloads: 47

 Abstract

This paper aims to develop a multi-purpose surveillance robot to perform surveillance activities in industrial areas, militarized war zones or radioactive field areas with the objective of analyzing, governing and protecting the areas from unwanted threats. The use of robots and their role in our day-to-day life has been rapidly increasing since the day they were introduced to the world, further reducing the errors and life risk to humans. The objective is to design and develop an Internet of Things (IoT) based autonomous multi-purpose surveillance robot at a low cost that will roam around freely and give live updates about their surroundings by broadcasting video and information through the sensors installed. The sensors collect the data from the surroundings and send it to the Arduino microcontroller which can be seen by the user any time. This technology is controlled by the user remotely through any device such as mobile phone, tablet or laptop with the help of IoT based services. The entire project is built and monitored by wireless platform to minimalize the use of wire and help it work smoothly in remote places. Further improvements and advancements in this project can help in reducing life risk of valuable soldiers or identification of any hostage in unknown places.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino,IoT,multipurpose,Blynk

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANIMAL DETECTION IN TRAFFIC USING YOLO ALGORITHM ON RASPBERRY PI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02179

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02179

  Register Paper ID - 260022

  Title: ANIMAL DETECTION IN TRAFFIC USING YOLO ALGORITHM ON RASPBERRY PI

  Author Name(s): Dr.Shobha S, Prathamesh More, Saniya R, Prajwal, Rakshitha S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1174-1180

 Year: May 2024

 Downloads: 79

 Abstract

This project aims to develop an animal detection system for traffic monitoring using the YOLO (You Only Look Once) algorithm deployed on a Raspberry Pi. The system utilizes a pre-trained YOLO model to detect animals in real-time video streams captured by a camera module or USB webcam connected to the Raspberry Pi. Through a series of steps including setting up the Raspberry Pi, installing dependencies, configuring YOLO, writing detection code, optimizing for the Raspberry Pi's limited computational resources, and testing in controlled and real-world environments, the project aims to create an efficient and accurate solution for detecting animals in traffic scenarios. The system's implementation considers ethical implications, robustness against varying conditions, and documentation for future reference and dissemination.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Raspberry PI, YOLO, Animal Detection, Deep Learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPREHENSIVE REVIEW ON SOLAR WEATHER AND POLLUTION TRANSMITTER USING BUOY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02178

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02178

  Register Paper ID - 260020

  Title: A COMPREHENSIVE REVIEW ON SOLAR WEATHER AND POLLUTION TRANSMITTER USING BUOY

  Author Name(s): Sneh Rachna, Prem Kumar M, Aruna S, Nanditha S, Mohan S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1167-1173

 Year: May 2024

 Downloads: 73

 Abstract

In this project, we propose to design and build a buoy-based environmental monitoring system that runs on solar power and can measure aquatic environments' water quality indicators as well as meteorological conditions. A microcontroller, a wireless transmitter, weather sensors, water quality sensors, and solar panels are all integrated into the system on a buoy platform. The system is continuously powered by solar panels, which guarantees independent functioning and reduces the need for regular battery changes. While water quality sensors keep an eye on things like pH, dissolved oxygen, turbidity, and certain impurities in the water, weather sensors measure things like temperature, humidity, air pressure, wind speed, and wind direction. A microcontroller organizes data transmission via a wireless transmitter, interprets sensor data, and manages power. For real-time processing, the gathered data is sent to a distant station or server.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Microcontroller, Water Quality Sensors, Solar Panel Integration, Enclosure Aesthetics

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART TEXTILES FOR HEALTHCARE MONITORING SYSTEM USING ARDUINO

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02177

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02177

  Register Paper ID - 260019

  Title: SMART TEXTILES FOR HEALTHCARE MONITORING SYSTEM USING ARDUINO

  Author Name(s): Jayaprakash.S, Rashmitha Reddy R, Rachana N S, Priya S, Lekha P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1161-1166

 Year: May 2024

 Downloads: 69

 Abstract

A form-fitting textile contains an electrocardiography SoC, flexible electrodes, battery, and antenna. The clinical standard ECG, a 3-lead, is recorded by this "smart shirt". The data is safely sent wirelessly, using less than lmW and a flexible antenna and on-chip ISM band radio to provide secure, continuous cardiac monitoring on a smartphone. A practical and non-invasive method of tracking vital signs and identifying different health markers is provided by smart textiles, which have emerged as a viable solution for continuous healthcare monitoring. The latest developments in smart textile technology for heath monitoring are examined in this paper. It talks about how textiles can be equipped with sensors and actuators to monitor physiological data like respiration rate in real time. The study also looks at the difficulties in designing smart textiles, such as washability, comfort, and durability, and it presents creative solutions to these problems. Since the 3-lead ECG sensor measures heart rate by varying our muscle movements without interfering with the user's daily activities, this project creates a painless way for the body to sense the heart rate through the three contacts points that sense high muscle movements. The t-shirt's embedded connections produce a heart rate, display the current electrocardiogram (ECG) condition, and sound a buzzer to alert the wearer to various situations.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Electrocardiography (ECG), System-on-Chip (SoC), Flexible electrodes, 12-lead ECG, ISM band radio.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Analysis of Power Performance of Class E Amplifier for High Frequency Radio Applications

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02176

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02176

  Register Paper ID - 260017

  Title: ANALYSIS OF POWER PERFORMANCE OF CLASS E AMPLIFIER FOR HIGH FREQUENCY RADIO APPLICATIONS

  Author Name(s): Chaithra S, Nithya Priya, Pragna Vedi, Spoorthy M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1154-1160

 Year: May 2024

 Downloads: 62

 Abstract

We present a fully integrated single-stage power amplifier operating. Among all non-linear power amplifier classes, the class-E power amplifier stands out for its simplicity and high efficiency. In order to create the suggested power amplifier at 1.8V, this class was selected. Using the same transistors at the same frequency and output power, class-E amplifiers often operate with power losses that are around 2.3 lower than those of traditional class-B or class-C amplifiers. Because of the input waveform's strong driving, the common source transistor functions as a basic switch when in use. As long as the cascode bias voltage Vb is high enough to place transistor M2 in the triode region, the voltage can rise to a point where the common gate transistor is also switched. This configuration improves the amplifier's dependability by allowing for less swing in the drain-gate voltage. Our solution improves gain, bandwidth stability, and linearity over the operational spectrum by utilizing an inductively degraded common-source CMOS power amplifier in conjunction with a cascode topology. While noise figure typically holds less relevance in power amplifier design, we optimize the matching network to minimize noise figure and maximize power gain The suggested circuit has been successfully designed and implemented using Cadence Virtuoso tools at 45nm, 90nm & 180nm technology. This paper depicts a comparison of power of the RF Amplifier of Class E with respect to 180nm technology with the referenced paper[1] where the power consumption is observed as 10.69mWatts for 180nm where in our paper power consumption is reduced to 3.669uWatts.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CMOS (Complementary Metal Oxide Semiconductor), RF Amplifier (Radio Frequency Amplifier), SNR (Signal to noise ratio), comparison, performance evaluation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AQUATIC WASTE REMOVAL ROBOT USING NIR SENSOR AND RASPBERRY PI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02175

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02175

  Register Paper ID - 260016

  Title: AQUATIC WASTE REMOVAL ROBOT USING NIR SENSOR AND RASPBERRY PI

  Author Name(s): Prof Srinivasalu G, Gangothri M, Poojashree M, Manoj M Sangam, Shrujan M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1149-1153

 Year: May 2024

 Downloads: 74

 Abstract

This work presents an Aquatic Waste Cleaning Robot (AWRR) powered by a Raspberry Pi microprocessor and equipped with a near infrared (NIR) sensor. AWRR addresses the problem of water pollution with a system designed to identify and eliminate waste in water bodies. The Raspberry Pi allows real-time data processing and control, while near-infrared sensors detect waste based on spectral signatures. AWRR uses mechanical equipment to clear and locate debris and navigate waterways. Today's technology offers effective methods for wastewater management and can be used in many areas.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Trash management, intelligent trash, robotic lake cleaning, Raspberry Pi, and smart cities

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IOT BASED TRANSMISSION LINE FAULT DETECTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02174

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02174

  Register Paper ID - 260015

  Title: IOT BASED TRANSMISSION LINE FAULT DETECTION

  Author Name(s): Shakila D, Kusuma N, Komala M C, Meena A,, Monica R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1143-1148

 Year: May 2024

 Downloads: 69

 Abstract

This paper presents a comprehensive solution for fault detection in three-phase transmission lines utilizing ESP8266, a microcontroller-based platform, in conjunction with a GSM module for remote communication. Transmission line faults pose significant challenges to power system reliability and require swift detection and response mechanisms to minimize downtime and ensure uninterrupted power supply. Upon fault detection, the ESP8266 triggers the GSM module to transmit fault information to a central monitoring station or the person who is controlling the system, enabling remote monitoring and swift response to faults. Experimental results demonstrate the effectiveness and reliability of the proposed ESP8266 and GSM module-based fault detection system, highlighting its potential for deployment in real-world power distribution networks to enhance fault management and system resilience


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Transmission network, Three phase fault location, ESP8266, GSM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: VEHICLE SECURITY SYSTEM FOR ACCIDENT DETECTION, THEFT PREVENTION AND ENGINE LOCKING MECHANISM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02173

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02173

  Register Paper ID - 260014

  Title: VEHICLE SECURITY SYSTEM FOR ACCIDENT DETECTION, THEFT PREVENTION AND ENGINE LOCKING MECHANISM

  Author Name(s): Dr. Shivananda, Darshan D M, Harish G, Vinay Kumar M, Madhu kumar N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1136-1142

 Year: May 2024

 Downloads: 76

 Abstract

In today's fast-paced world, the safety and security of cars is critical. These issues are intended to be fully addressed by the Vehicle Security System for Accident Detection, Theft Prevention, and Engine Locking Mechanism project. This ground-breaking solution makes use of cutting-edge technology to lock the engine, stop theft, and identify accidents, giving car owners peace of mind and improving road safety in general. Modern sensors and clever algorithms are incorporated into the system to detect accidents in real-time, allowing for prompt aid and response. Strong anti-theft features, such as GPS tracking and immobilization systems, also protect the car from unwanted access and theft attempts.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Vehicle Security System, Accident Detection, Theft Prevention, Engine Locking Mechanism, Automotive Safety, Anti-Theft Technology, Vehicle Alarm System, GPS Tracking, Remote Locking, Collision Sensing

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: THE DESIGN AND VERIFICATION OF A 32-BIT RISC V PROCESSOR USING VEDIC MATHEMATICS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02172

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02172

  Register Paper ID - 260013

  Title: THE DESIGN AND VERIFICATION OF A 32-BIT RISC V PROCESSOR USING VEDIC MATHEMATICS

  Author Name(s): Girish H, Vajjala Sai Sree Hari, Ponde Lakshmi Narasimha, P N Shreya, Dadigala Bhargavi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1130-1135

 Year: May 2024

 Downloads: 80

 Abstract

Vedic multiplier architecture is used in the construction of a 32-bit RISC V processor to improve speed and decrease computational complexity. Its Vedic Sutra-based ALU and MAC units, which are implemented in Verilog HDL and simulated using the Xilinx design suite, lower power consumption and latency as compared to traditional architectures. Comprising of conventional components such as Control Unit, Register Bank, Programme Counter and Memory. The processor can carry out up to 16 instructions. It is an effective option for a variety of computer jobs since it provides increased speed, decreased power consumption, and reduced area utilisation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Reduced Instruction Set Computer, Von Neumann architecture, Verilog HDL, Vedic Mathematics, Urdhva-Tiryagbhyam Sutra.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AUTOMATIC MONITORING GADGET FOR BLOOD PRESSURE IN EXPECTING MOMS USING SUPINE PRESSOR EXAMINATIONS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02171

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02171

  Register Paper ID - 260012

  Title: AUTOMATIC MONITORING GADGET FOR BLOOD PRESSURE IN EXPECTING MOMS USING SUPINE PRESSOR EXAMINATIONS

  Author Name(s): Dr.G.Indumathi, Dr. Cyril Prasanna Raj. P, Dr. A. Chrispin Jiji, Shirisha GP, Sharada P, Spandana KJ, Usha SM

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1125-1129

 Year: May 2024

 Downloads: 53

 Abstract

Although prior research has frequently disregarded the effects of the pregnant uterus's mechanical constriction of the left renal vein, preeclampsia poses major health hazards to both mothers and infants. This work used two different approaches: first, it investigated the relationship between elevated blood pressure and renal damage and constriction of the left renal vein in mice. Secondly, it developed an automated version of the supine pressor test (SPT) to help pregnant women determine their preeclampsia risk. The results of the study conducted on mice suggested that acute renal failure and a considerable rise in blood pressure could be brought on by persistent renal vein stenosis. From a human perspective, the research noted that when non-pregnant women switched from sleeping on their left side to resting on their back, proving that expectant mothers were capable of doing the SPT on their own. In conclusion, this study provides a promising technique for the early diagnosis of preeclampsia in pregnant women and illuminates possible underpinnings of the condition.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Supine Pressor test, Mechanical compression, Renal necrosis, Blood pressure increase, Renal vein constriction, Preeclampsia, Early diagnosis

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ASIC IMPLEMENTATION OF RV32IMAC RISC- V SOC

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02170

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02170

  Register Paper ID - 260011

  Title: ASIC IMPLEMENTATION OF RV32IMAC RISC- V SOC

  Author Name(s): Dr.Cyril Prasanna Raj P, Divya R, Geetha V, Aishwarya K R, Mahalakshmi H

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1120-1124

 Year: May 2024

 Downloads: 68

 Abstract

This paper delves into the ASIC implementation of an RV32IMAC RISC-V System-on-Chip (SoC), focusing on its adaptation for diverse surveillance applications. By harnessing the capabilities of RISC-V architecture, the SoC is designed to offer a flexible and efficient platform for surveillance tasks in varied environments, including industrial sectors, war zones, and radioactive fields. Through meticulous architectural design and optimization strategies, the SoC achieves a balance between performance, power efficiency, and cost-effectiveness. Notably, it integrates specialized instructions tailored for surveillance operations, alongside robust support for sensor integration and real-time data processing. Furthermore, the SoC's implementation leverages advanced techniques to ensure reliability, scalability, and compatibility with emerging surveillance systems. With its ability to handle complex tasks autonomously and facilitate seamless communication via IoT-based services, the ASIC implementation of the RV32IMAC RISC-V SoC represents a significant advancement in the realm of surveillance technology, promising enhanced situational awareness and threat mitigation capabilities.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

RV32IMAC RISC-V System-on-Chip (SoC ), cost-effectiveness

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FPGA BASED HOME AUTOMATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02169

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02169

  Register Paper ID - 260010

  Title: FPGA BASED HOME AUTOMATION

  Author Name(s): Praveen Kumar KC, Mansi Sharma, Krithi R, U Rajendra, D Bharadwaj

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1115-1119

 Year: May 2024

 Downloads: 64

 Abstract

Focusing on FPGA-based home automation with the Basys 3 board, this project integrates sensors for temperature monitoring, door status detection, and remote-controlled operation of an LCD projector. Verilog programming facilitates real-time temperature monitoring, activating fans as necessary. Reed sensors detect door openings, automatically triggering light activation for enhanced convenience and security. Through FPGA control, users can remotely operate the LCD projector, enhancing home entertainment system flexibility and accessibility.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Home automation, FPGA board, Verilog, security

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Hardware Accelerator for Ground Penetrating Radar

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02168

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02168

  Register Paper ID - 260009

  Title: HARDWARE ACCELERATOR FOR GROUND PENETRATING RADAR

  Author Name(s): Dr. Cyril Prasannaraj P, Prof. Ravikumar M, Raghavendra P, Sachin C, Sachin P V, Sagar H P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1106-1114

 Year: May 2024

 Downloads: 73

 Abstract

Ground penetrating radar (GPR) image recognition accuracy and efficiency have been greatly enhanced by deep learning. A significant number of weight parameters must be specified, which requires lots of labeled GPR images. However, obtaining the ground-truth subsurface distress labels is challenging as they are invisible. The traditional data augmentation techniques, like rotating, scaling, cropping, and flipping, would change the GPR signals' real features and cause the model's poor generalization ability. When the annotated training GPR pictures are not enough, the datasets can be expanded using the suggested data augmentation techniques. When there are not enough annotated training GPR pictures, the datasets can be expanded using the suggested data augmentation techniques.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

GPR (Ground penetrating radar),GPR signal, GPR picture

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF DYNAMIC CAR CHARGING USING IOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02167

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02167

  Register Paper ID - 260008

  Title: IMPLEMENTATION OF DYNAMIC CAR CHARGING USING IOT

  Author Name(s): Dr. Sudha M S, Gagan Reddy H L, Goutham M, Naveen K, Ajay N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1099-1105

 Year: May 2024

 Downloads: 71

 Abstract

This article integrates a subscription-based strategy with a revolutionary technique to wireless dynamic car charging (WDCC). The system's seamless charging capabilities while vehicles are in motion are intended to meet the growing demand for effective electric vehicle (EV) charging infrastructure. The suggested approach does away with the requirement for conventional plug-in charging stations by wirelessly transferring electricity to EVs via inductive charging technology embedded in highways. Users can use the WDCC service through a subscription-based approach, which eliminates the burden of human intervention and enables convenient and ongoing payment. In addition to guaranteeing income creation for service providers, the subscription model gives EV owners freedom and cost. The suggested WDCC system's technical features, advantages, difficulties, and possible implementation methods are all covered in this study.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Wireless dynamic car charging (WDCC), Subscription-based model, Electric vehicles, Inductive charging technology

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SECURITY SYSTEM USING IRIS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02166

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02166

  Register Paper ID - 260007

  Title: SECURITY SYSTEM USING IRIS

  Author Name(s): Dr. C Usha, Chandan B K, Bharath Kumar M, Dhanush B M, Sunil M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1092-1098

 Year: May 2024

 Downloads: 72

 Abstract

Graphical password authentication methods have garnered attention as an alternative to traditional text-based passwords, aiming to improve both security and usability. Nonetheless, numerous existing graphical password systems encounter usability challenges, such as poor memorability and susceptibility to various attacks. In this study, we introduce an innovative graphical password authentication approach intended to mitigate these usability issues while upholding security standards. Our approach incorporates both image recognition and user-generated patterns to establish a multi-layered authentication framework. Initially, users select a memorable image from a predefined array of categories and subsequently overlay a personalized pattern onto the chosen image. We integrate advanced image processing techniques to bolster resistance against shoulder surfing and other potential attacks. Furthermore, we conducted a usability assessment involving a diverse participant pool to evaluate the efficacy of our proposed approach. The findings indicate noteworthy enhancements in memorability and user satisfaction when compared to existing graphical password systems. In summary, our approach presents a promising avenue for enhancing the usability of graphical passwords while maintaining robust security measures


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SECURITY SYSTEM USING IRIS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SELF-NAVIGATION ROBOTICS:MASTERING AUTONOMOUS PATH

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02165

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02165

  Register Paper ID - 260003

  Title: SELF-NAVIGATION ROBOTICS:MASTERING AUTONOMOUS PATH

  Author Name(s): Shyam Sundar V, Gangadasu Swetha, Darshan M R, Chandan K Singh, Chandana H C

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1085-1091

 Year: May 2024

 Downloads: 69

 Abstract

The goal of the project "Self-Navigation Robotics: Mastering Autonomous Path" is to create an intelligent robot car that can drive itself from a starting point to a user-specified destination while dynamically changing its course to avoid obstacles in real time. In order to accomplish flawless autonomous navigation in challenging surroundings, the project blends a powerful combination of sensor technologies, innovative algorithms, and hardware components. This study presents a unique camera module, LiDAR, ROS2, Gazebo, and Raspberry Pi self-navigating vehicle system. LiDAR enables accurate 3D mapping and obstacle recognition, while ROS2 provides seamless system integration and communication. Gazebo provides a reliable simulation environment for verifying system functionality prior to a system being physically deployed. The Raspberry Pi functions as the main processing unit, managing decision-making algorithms and combining sensor data. The camera module improves versatility in a range of circumstances by enhancing perception with visual signals in addition to LiDAR. More advancements are possible when the system architecture prioritizes scalability and real-time responsiveness. Experimental validation the system's autonomous navigation competency highlights its potential for robotics research and industrial automation applications.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Self-navigating automotive system, Camera module, LiDAR, ROS2, Gazebo, Raspberry Pi, 3D mapping, Obstacle identification, Simulation, Central computing unit, Sensor data fusion, Real-time responsiveness

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART SERICULTURE USING IMAGE PROCESSING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02164

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02164

  Register Paper ID - 260002

  Title: SMART SERICULTURE USING IMAGE PROCESSING

  Author Name(s): Nandini Kumari B, Raju, M Shivateja Goud, R Varun Reddy, Chandrashekar CH

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1080-1084

 Year: May 2024

 Downloads: 59

 Abstract

In this paper, Sericulture involves raising silkworms to produce silk and is crucial for India's development. Temperature and humidity are vital for healthy silkworm growth. We used a MEGA controller to monitor silkworms in real-time. Image processing helps identify infections of silkworms. The MEGA controller automates tasks like temperature control, reducing manual work for farmers. It also monitors the environment in the silkworm rearing room. Image processing detects color changes in silkworms, indicating the infections.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SMART SERICULTURE USING IMAGE PROCESSING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CAMOUFLAGE ROBOT FOR ADVANCED MILITARY APPLICATIONS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02163

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02163

  Register Paper ID - 260001

  Title: CAMOUFLAGE ROBOT FOR ADVANCED MILITARY APPLICATIONS

  Author Name(s): Dr. Shivapanchakshari T G, Prajwal C, Shashank M, Harshavardhan M, D Lava Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1075-1079

 Year: May 2024

 Downloads: 77

 Abstract

In contemporary times, significant resources are allocated towards implementing antiquated security measures to deter border trespassers. In high-risk areas where conventional military tactics may falter, various military entities employ robotic assistance. These military-grade robots are clandestinely deployed and outfitted with a suite of technologies including cameras, sensors, metal detectors, and camouflage. The primary objective of our system is to seamlessly blend into the surrounding environment, while also boasting additional functionalities such as an infrared sensor for intruder tracking and Wi-Fi connectivity for real-time data processing. Consequently, the proposed Wi-Fi system minimizes errors in defense operations, thereby bolstering national security against potential intruders.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Blending into environment, Military-grade Robots, IR (Infrared), WI-FI (wireless fidelity)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: 3-DIMENSIONAL SCANNER USING ARDUINO

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02162

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02162

  Register Paper ID - 260000

  Title: 3-DIMENSIONAL SCANNER USING ARDUINO

  Author Name(s): Dr. C. Usha, Karanam Vengal Naidu, Harsha Gowda S N, Surendra Reddy B, Goutham B H

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1069-1074

 Year: May 2024

 Downloads: 84

 Abstract

This project outlines a cost-effective 3D scanning solution utilizing Arduino Nano technology. It utilizes structured light to capture the geometry of objects. The hardware setup comprises an Arduino Nano microcontroller, a camera module, and a laser module for structured light projection. Software-wise, it employs an open-source computer vision library for image processing and depth map generation. The workflow involves system calibration to ensure optimal performance and accuracy. Once calibrated, the structured light pattern is projected onto the object, and images are captured by the camera. These images are then processed to extract depth information, enabling the reconstruction of the object's 3D model. The resulting point cloud data can be refined further for improved accuracy. To evaluate the scanner's performance, experiments are conducted with objects of various shapes and sizes. Metrics such as accuracy, resolution, and scanning speed are analysed to gauge its practical usability. Overall, the developed 3D scanner demonstrates its ability to generate detailed and accurate 3D models, making it suitable for applications like rapid prototyping, reverse engineering, and educational purposes.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Low-cost 3D scanner, Arduino Nano microcontroller, Rapid prototyping, Calibration for optimal performance.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A Review on Design of Low Power and High Speed ALU using FinFET and CMOS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02161

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02161

  Register Paper ID - 259999

  Title: A REVIEW ON DESIGN OF LOW POWER AND HIGH SPEED ALU USING FINFET AND CMOS

  Author Name(s): Veerappa Chikkagoudar, K N Harishankar, Parikshith K, Pavan Sharma V, Sam A I

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1065-1068

 Year: May 2024

 Downloads: 69

 Abstract

This paper shows a comparison of power requirement and delay consumed between the 4 - bit ALU that is designed using a fin-shaped field-effect transistor [FinFET] and the traditional CMOS to demonstrate a better and efficient 4 - bit ALU in terms of delay and power consumption. The aim of this work is provide a Comparative Analysis of Arithmetic Logic Unit (ALU) Performance using CMOS and FinFET Technologies. ALU is a fundamental component in digital circuits, performing arithmetic and logic operations. The transition from CMOS to FinFET technology has brought significant advancements in terms of power efficiency, speed, and scalability.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ALU (Arithmetic Logic Unit), CMOS (Complementary Metal Oxide Semiconductor), FinFET (Fin Field Effect Transistor), technology, comparison, performance evaluation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: WEATHER WIZARDS USING MACHINE LEARNING AND RASPBERRY Pi

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02160

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02160

  Register Paper ID - 259997

  Title: WEATHER WIZARDS USING MACHINE LEARNING AND RASPBERRY PI

  Author Name(s): Ravikumar M, Mouna S J, Modak Vignesh R, Likitha C K, K Deepa

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1060-1064

 Year: May 2024

 Downloads: 78

 Abstract

By combining cutting-edge sensors and machine learning on Raspberry Pi, the "Weather Wizards using Machine Learning and Raspberry Pi" initiative transforms weather forecasting. By implementing Random Forest algorithm we record temperature, humidity, precipitation, wind speed using four sensors namely (wind, temperature, humidity, rain) . We deliver real-time forecasts for sunny, cloudy, windy, and rainy days .This ground-breaking system represents a huge advancement in weather prediction, serving applications and businesses that depend on accurate and fast weather data


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Weather Forecasting, Machine Learning, Raspberry Pi, Real-Time data, Sensors.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: LINEAR MICROSTRIP ANTENNA ARRAY FOR 5G COMMUNICATION APPLICATIONS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02159

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02159

  Register Paper ID - 259996

  Title: LINEAR MICROSTRIP ANTENNA ARRAY FOR 5G COMMUNICATION APPLICATIONS

  Author Name(s): Tharun Tej D, Dr. Shivapanchakshari T G, Virupaksha G R, Shivakeerthi B T, Suhas S B

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1053-1059

 Year: May 2024

 Downloads: 55

 Abstract

In the world of wireless communication, there is an increasing demand for high-performance MIMO (Multiple Input Multiple Output) antenna systems tailored for smartphone applications. MIMO technology increases data rates, coverage, and reliability by using multiple antennas for transmission and reception. However, integrating MIMO antennas within the constraints of compact smartphone designs is fraught with difficulties, particularly in terms of guaranteeing adequate isolation between antenna parts to minimize interference. This work investigates the design and implementation of a MIMO antenna system specifically designed for smartphone applications in order to establish and maintain excellent isolation between antenna sections. Many design strategies are investigated, including better materials, decoupling techniques, and antenna element placement. In addition, recent advances in the fields of metamaterials, smartphone form factor integration, and micro antenna designs are discussed. Furthermore, the study addresses performance metrics including data throughput, power economy, and dependability, providing an understanding of the practical uses of these advancements. This paper's main objective is to promote MIMO antenna systems for smartphones by offering a comprehensive grasp of the challenges, solutions, and most recent developments in achieving high isolation within small form factors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Smartphone applications, High isolation.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HUMAN FOLLOWING ROBO USING RASPBERRY PI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02158

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02158

  Register Paper ID - 259995

  Title: HUMAN FOLLOWING ROBO USING RASPBERRY PI

  Author Name(s): Prof Roopa M, Ganadheeraj R, Jaywanth G, Padmashree R, Gayatri V K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1047-1052

 Year: May 2024

 Downloads: 55

 Abstract

This paper presents and focuses on the design and development of a A Human Following Robo (HFR) is a technology that can follow a human operator in an autonomous manner. Maintaining a constant distance and orientation in relation to the human operator is the major goal of the HFR. while navigating through indoor and outdoor environments. Key components of the system include computer vision for people recognition and tracking, obstacle avoidance mechanisms, and motion control strategies. The effectiveness of the proposed HFR system is evaluated through extensive simulations and real world experiments, demonstrating Its capacity to accurately track and follow a human operator in various scenarios. The results highlight the potential of HFRs as versatile and intelligent robotic assistants capable of enhancing human-machine interaction and productivity in diverse applications. The development of Human Following Robots (HFRs) represents a significant advancement in robotics technology, offering the potential to revolutionize various industries such as surveillance, healthcare, and entertainment. These robots are designed to autonomously track and follow human operators, facilitating seamless human-robot interaction and enhancing productivity in dynamic environments. This paper aims to explore the design, development, and evaluation of an HFR system capable of intelligently tracking and following a human operator. By leveraging a combination of sensors, actuators, and control algorithms, the HFR system enables intuitive and efficient navigation while maintaining a safe and consistent distance from the human operator.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Human Following Robo (HFR), Obstacle Avoidance, Object detection, Burning source code to processor

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF CONTROLLABLE NETMOVER ARM FOR LIFTING AND PLACING THE OBJECTS USING WIRELESS MODE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02157

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02157

  Register Paper ID - 259994

  Title: IMPLEMENTATION OF CONTROLLABLE NETMOVER ARM FOR LIFTING AND PLACING THE OBJECTS USING WIRELESS MODE

  Author Name(s): Lokesha A M, Akshay Kashyap S, Arun Kumar, Chethan Gowda V N, Dileep Kumar N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1042-1046

 Year: May 2024

 Downloads: 83

 Abstract

This paper focuses on the development of a versatile robotic arm with advanced functionalities, aiming to enhance automation in diverse industries. Integrating precision engineering and smart control systems, the robotic arm demonstrates agility and adaptability for various tasks, such as assembly, pick-and-place operations, and intricate manipulations. Employing state-of-the-art sensors and machine learning algorithms, the system ensures optimal performance and safety. This project contributes to the evolution of robotic technology, addressing real-world challenges and fostering efficiency in industrial processes. Developing a cutting-edge robotic arm is the primary objective of this project, aimed at revolutionizing automation across industries. Leveraging advanced materials and sophisticated control algorithms, the robotic arm exhibits unparalleled precision and adaptability. Integrating innovative sensing technologies and machine learning, it excels in complex tasks, offering a transformative solution for assembly lines, manufacturing, and research applications. This project underscores the pivotal role of robotics in shaping the future of automation, showcasing a versatile and intelligent robotic arm that pushes the boundaries of technological innovation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Robotic arm, Automation, Precision engineering, Machine learning algorithms, Industrial processes

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: WILDLIFE OBSERVATION ROBOT USING IOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02156

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02156

  Register Paper ID - 259992

  Title: WILDLIFE OBSERVATION ROBOT USING IOT

  Author Name(s): Hariprasad T L, M Likitha, Vani S, Ganavi C S, Apoorva B M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1033-1041

 Year: May 2024

 Downloads: 70

 Abstract

Wild animals become more aggressive when wounded because they're scared and confused and may think you're trying to capitalize on their vulnerable state. They're more likely to lash out and bite or scratch you than to accept your help. To address this, our project proposes an alerting system using YOLOv3, a real- time object detection algorithm based on deep convolutional neural networks, to classify and monitor animals that are hurt in Zoo or forests. This algorithm enables efficient identification and tracking of animals, aiding safeguarding wildlife observers and ensuring the preservation of wildlife in their natural habitats.By this wildlife monitoring robotic car using IOT, wildlife observers may get up and personal with wild creatures. An ESP32 is used in this system. The system receives these orders using a Wi-Fi module. We can capture the images of the wildlife continuously. And able to detect the wildlife.We are using the MLX9061an infrared thermometer designed for non-contact temperature sensing to measure the temperature of the animals and an ultrasonic non-contact type of sensor used to measure a wildlife's distance.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Image Processing, YOLO Algorithm, Convolutional Neural Network, COCO, ESP,UNO,IDE.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RASPBERRY PI VIDEO SURVEILLANCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02155

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02155

  Register Paper ID - 259991

  Title: RASPBERRY PI VIDEO SURVEILLANCE

  Author Name(s): Shakila D, Rohanth A R, Punith Kumar M S, Somesh N, Pramod Ramesh Hegde

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1027-1032

 Year: May 2024

 Downloads: 73

 Abstract

A Camera-Based Surveillance System utilizing Raspberry Pi proves highly advantageous for crime detection, monitoring various environments, and swiftly gathering evidence of illicit activities such as theft. This system is tailored for both residential and commercial spaces, ensuring prompt detection of any unauthorized actions.Operating on Raspberry Pi, equipped with a camera-based circuit, the system continuously scans its surroundings for motion. Upon detecting any motion, it promptly triggers an alert mode. This mode activates an alarm and captures images of the motion for future reference. Consequently, the system functions as an effective security measure, providing real-time monitoring and evidence collection. To further enhance its capabilities, integrating a GSM modem for alert SMS notifications or connecting to IoT for remote alarm activation can be considered. This augmentation ensures seamless communication of alerts to relevant parties, amplifying the system's effectiveness in safeguarding the monitored premises.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Raspberry Pi, GSM module, Stepper motor, webcam, PIR sensors, GPIO, Ethernet and USB

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPREHENSIVE REVIEW ON SMART AQUAPONICS SETUP WITH IoT-BASED FISH FEEDDING AND SURVEILLANCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02154

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02154

  Register Paper ID - 259990

  Title: A COMPREHENSIVE REVIEW ON SMART AQUAPONICS SETUP WITH IOT-BASED FISH FEEDDING AND SURVEILLANCE

  Author Name(s): Dr. Lakshmi C R, Raghavendra D C, Arun Kumar D S, Madhan H R, Mahesha S M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1021-1026

 Year: May 2024

 Downloads: 68

 Abstract

This paper introduces the Aquaponics Monitoring and Fish Feeding Automation System (AMFFAS) is an innovative solution leveraging the principles of Internet of Things (IoT) technology. AMFFAS aims to improve the efficiency and sustainability of aquaponics systems by automating fish-feeding processes and providing Inspection and coordination. The system comprises interconnected components, including IoT sensors, actuators, microcontrollers, and a central control unit. FFAAMS integrates an intelligent feeding system that dynamically adjusts feeding schedules and portion sizes based on factors like fish biomass, growth rates, and environmental conditions. This approach optimizes feed utilization, minimizing the risk of overfeeding and promoting healthy fish environments. Furthermore, AMFFAS offers Inspection and coordination through a user-friendly interface accessible via web or mobile applications. Aquaponics practitioners can remotely monitor system parameters, receive alerts for abnormal conditions, and adjust settings as needed. This feature enables proactive management of aquaponics systems, ultimately contributing to heightened productivity and sustainability.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Wireless dynamic-: Aquaponics, Fish Feeding Automation, IoT, Aquaponics system efficiency, Remote Monitoring

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF UNDERGROUND CABLE FAULT DETECTION BASED ON IOT WITH GPRS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02153

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02153

  Register Paper ID - 259989

  Title: IMPLEMENTATION OF UNDERGROUND CABLE FAULT DETECTION BASED ON IOT WITH GPRS

  Author Name(s): Abhishek M K, Dr. Sudha M S, Pavan V, Adithya R S, Akash Puzar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1014-1020

 Year: May 2024

 Downloads: 73

 Abstract

This paper's primary goal is to use an Arduino Mega microcontroller kit and Internet of Things devices to pinpoint the precise position of a fault in an underground wire. Instead of using overhead electrical lines, the metropolitan area uses an underground electrical cable wire. However, pinpointing the exact position of a break in an underground wire can be challenging, making repairs more challenging. Because of deterioration, subterranean conditions, vermin, etc., underground wires are vulnerable to malfunctions. Since we are unsure of the precise position of the problem, the entire cable needs to be dug out for inspection and fault repair. Our suggestion is to precisely locate the problem so that it can be rectified, making the repair process easier. A fault occurs when two lines are too close together; the network combination of the resistors determines the voltage that is produced at that location. After detecting the voltage change, the microcontroller alerted the user. The user receives information regarding the precise location where that voltage coincides. With the aid of a microcontroller, the fault's information is displayed on the LCD.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Microcontroller, Internet of things, Electrical cables, Cable fault, Aurdino mega, GSM module.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FPGA BASED HOME AUTOMATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02152

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02152

  Register Paper ID - 259988

  Title: FPGA BASED HOME AUTOMATION

  Author Name(s): Praveen Kumar KC, Mansi Sharma, Krithi R, U Rajendra, D Bharadwaj

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1009-1013

 Year: May 2024

 Downloads: 64

 Abstract

Centered on FPGA-based home automation utilizing the Basys 3 board, this project seamlessly integrates a suite of sensors tailored for temperature monitoring, door status detection, and remote-controlled operation of an LCD projector. Leveraging Verilog programming, the system ensures real-time temperature surveillance, with the capability to activate fans for optimal environmental control. Reed sensors are strategically deployed to detect door openings, triggering automated light activation, thus enhancing both convenience and security within the household. Empowered by FPGA control, users can remotely manipulate the lights, fans, and LCD projector, thereby augmenting the flexibility and accessibility of the home entertainment system


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Home automation, FPGA board, Verilog, security

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RC UNDER WATER EXPLORATION DRONE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02151

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02151

  Register Paper ID - 259987

  Title: RC UNDER WATER EXPLORATION DRONE

  Author Name(s): Dr.Shivananda, Sanjay reddy NS, Aravind reddy K, Gagan G, Faraz ahmed

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1000-1008

 Year: May 2024

 Downloads: 76

 Abstract

The project aims to develop an underwater inspection drone that can navigate easily underwater and allow us to vide live video footage underwater. The drone provides following advantages including: Easy to Navigate Underwater, 360 Degree Direction Control, Live Footage Viewing, Dual Motor Propulsion system, Lightweight and anti-rust design for long term usage. The RC drone uses 2 x motors for propulsion and a separate motor for depth/direction control. Both motors are attached with propellers to achieve this task. This mechanism makes use of a unique rudderless mechanism using motor drives to control 360 degree movement of the drone. This mechanism does not make use of ballast tanks to control buoyancy. The drone consists uses the 2 motors to provide front drive as well as for left right direction control. The 3rd motor is used to control the vertical alignment of the drone. This motor in combination with other 2 motors is used to dive in or bring up the drone. All motors and controller unit is enclosed in a water proof chamber. The drone now uses a camera to capture footages underwater. These footages are transmitted to the floating buoy unit from there user can connect via wifi to check the footages. The system makes use of a raspberry pi controller for footage transfer as well as wifi transmission. Also the buoy unit is used to pullout the drone in case it gets stuck or runs out of battery under water


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ballast tanks, RC,under water, buoy unit.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AN EVOLUTION OF UNDERWATER VEHICLE FOR UNDERWATER COMMUNICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02150

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02150

  Register Paper ID - 259986

  Title: AN EVOLUTION OF UNDERWATER VEHICLE FOR UNDERWATER COMMUNICATION

  Author Name(s): Chetan Naik J, Santhosh Kumar N, Vishnu G C, Chandana K N, Vinodh R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 992-999

 Year: May 2024

 Downloads: 65

 Abstract

The literature survey on underwater unmanned vehicles (UUVs) reveals a diverse array of applications stretching across underwater exploration, defense, and various commercial implementations. The technological landscape encompasses sonar-based navigation systems, acoustic communications, and adaptive control algorithms, which propel UUVs to undertake complex missions such as seabed mapping, oceanographic research, mine countermeasures, and offshore infrastructure inspection. Defense applications include mine warfare, autonomous surveillance, and reconnaissance missions. Moreover, commercial applications comprise underwater inspection, maintenance of subsea installations, and environmental monitoring. Advanced technologies are employed in UUVs, such as autonomous underwater vehicle (AUV) designs, sensor fusion, underwater acoustic communication systems, and high-precision navigation algorithms, reflecting the interdisciplinary nature and extensive potential of UUVs in addressing a wide spectrum of underwater challenges and opportunities. This paper compares the evolution of underwater vehicle with technology and advancement for the purpose of underwater communication.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Underwater unmanned vehicle, Autonomous underwater vehicle, Underwater communication.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SRAM Cell Design Using FinFET for Low Power and Delay

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02149

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02149

  Register Paper ID - 259985

  Title: SRAM CELL DESIGN USING FINFET FOR LOW POWER AND DELAY

  Author Name(s): Veerappa S C, S K Fazle Umar, Sai Dhanush R N, Syed Avaiz, Vishwa Periaswamy

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 984-991

 Year: May 2024

 Downloads: 72

 Abstract

This paper introduces an approach utilizing a fin-shaped field-effect transistor to illustrate the structure of a 6T SRAM cell. The primary goal is to enhance the presentation's competitive edge while concurrently reducing the power usage and read/write delay inherent in conventional 6T SRAM cell designs. Given the increasing demand for rapid mobile computing, traditional CMOS SRAM cell configurations face performance constraints and significant power demands. This research undertakes a thorough examination of power consumption and read/write delay parameters associated with low-power SRAM cell designs. Furthermore, an exhaustive comparative analysis is performed between 45nm nano-scaled technologies and the emerging FinFET-based 6T SRAM cells, with a particular emphasis on their respective power efficiency and operational speed characteristics.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SRAM Cell Design Using FinFET for Low Power and Delay

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN AND OPTIMIZATION OF SERDES IN CMOS 45NM TECHNOLOGY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02148

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02148

  Register Paper ID - 259984

  Title: DESIGN AND OPTIMIZATION OF SERDES IN CMOS 45NM TECHNOLOGY

  Author Name(s): Ravi Kumar M, Sanjai S, Shilpashree S, Shreyas N Kulal, Tinu M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 977-983

 Year: May 2024

 Downloads: 81

 Abstract

With the miniaturization of electronic devices, interconnects (the pathways for data flow) are not shrinking as fast as the devices themselves. This inefficiency leads to problems with power consumption, area usage, and signal interference (crosstalk). To address this issue, the paper explores the use of serial links, which transmit data one bit at a time, as a replacement for traditional parallel buses that send multiple bits simultaneously. Serial links offer several advantages, including fewer connection points (pins), lower power use, smaller physical connectors, and better resistance to noise. The proposed architecture is simulated using a standard CMOS technology and industry-recognized simulation tools. The simulations are set up to evaluate factors like power consumption and data processing speed (throughput) under realistic operating conditions. The paper then compares the performance of this new design with previously reported architectures, highlighting improvements in power savings, area usage, and overall functionality. By analyzing the simulation results and comparisons, the paper demonstrates the significant benefits of the proposed architecture in terms of reduced power consumption, efficient chip area utilization, and improved data processing. Finally, the paper concludes by summarizing the key findings and advancements achieved with this design.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SerDes, CDR, Serializer, De-serializer, TSPC Flip Flop.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART TRAFFIC DENSITY MANAGEMENT AND MONITORING SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02147

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02147

  Register Paper ID - 259983

  Title: SMART TRAFFIC DENSITY MANAGEMENT AND MONITORING SYSTEM

  Author Name(s): Prof. Nanditha S R, Anusha N M, Pallavi S H, Aishwarya M, Supriya S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 971-976

 Year: May 2024

 Downloads: 68

 Abstract

This flexibility upgrades its viability in recognizing and neutralizing landmines in different geological areas, making it a profitable device for mine clearance operations around the world. With the use of cutting-edge sensors and technology, the Smart Traffic Density Management and Monitoring System maximizes urban traffic flow. By adjusting traffic lights dynamically in response to real-time density data, it minimizes traffic and travel time. It offers government and commuter interfaces that are easy to use while smoothly integrating with the current infrastructure. Reliability, scalability, and flexibility to shifting traffic conditions are guaranteed by embedded system architecture. The technology also improves safety by pointing out potential dangers and encouraging other forms of transportation during rush hour. All things considered, it's a creative way to successfully control urban traffic and promote sustainable travel.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic, congestion, traffic light, vehicles

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANAESTHESIA BASED MACHINE CONTROL USING RASPBERRY PI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02146

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02146

  Register Paper ID - 259982

  Title: ANAESTHESIA BASED MACHINE CONTROL USING RASPBERRY PI

  Author Name(s): Prof. Shyam Sundar V, Sumeera Sultana N, Ashwit, Tanzil Ahmed, Chaitra S V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 966-970

 Year: May 2024

 Downloads: 63

 Abstract

This study suggests a method for using the Raspberry Pi, an inexpensive, multipurpose microprocessor, to operate anesthetic machines. In order to precisely provide anesthetic gases and vapors to patients during surgical procedures, anesthesia machines are essential medical equipment. Customization and integration with contemporary healthcare systems are frequently restricted by the proprietary hardware and software used by traditional anesthetic machines. Through the utilization of Raspberry Pi's capabilities, we offer an adaptable and economical approach to control anesthetic machines. Our system makes use of sensors to keep an eye on critical factors including oxygen content, pressure, and gas flow rates. It then provides real-time feedback to guarantee precise anesthetic delivery. By analyzing this data and modifying the machine's settings accordingly, the Raspberry Pi maximizes patient comfort and safety .Moreover, our methodology facilitates smooth integration with electronic health records


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Anesthesia, Raspberry Pi, Heartrate, Temperature, SPO2, Body Wetness, infusion.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CRYPTOGRAPHIC HARDWARE FOR EMBEDDED SYSTEMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02145

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02145

  Register Paper ID - 259980

  Title: CRYPTOGRAPHIC HARDWARE FOR EMBEDDED SYSTEMS

  Author Name(s): Dr Girish H, Anusha Dixith G, Aina Saba N, Anusha K V, Chandana M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 958-965

 Year: May 2024

 Downloads: 55

 Abstract

Developing a cryptography model that can translate legible writing from common language and converse is the aim of this research. For SoC level FPGA, the AES 128-bit symmetric cryptography technique is used to avoid malware in both hardware and software. The ideal AES design with an enhanced security scheme is also described in this study. The suggested model enables pipelined reusing of the same hardware. Furthermore, suggests expanding the use of dynamic key extraction in cryptosystems to increase randomness through the addition of outer layer security. A completely automated process for creating keys framework utilizing digital biometrics is utilized to produce a 256-bit key with enhanced randomness for 32 From the provided digital biometric, pixels are randomly selected, and the values of all the selected pixels are concatenated at random to generate a 256- bit encryption key.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

AES (Advanced Encryption Standard), FPGA (field programmable gate array), LUT (Look up table), Mbps (megabit per second), sub (sub bytes), shift (shift rows), mix (mix column), add (add round key).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOLAR ENERGISED SOLAR PANEL CLEANING ROBOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02144

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02144

  Register Paper ID - 259979

  Title: SOLAR ENERGISED SOLAR PANEL CLEANING ROBOT

  Author Name(s): Prof. Lokesha A. M, Madhu Singh K, R Dharshini, Srushti Sidaraddi, Sweekruthi Shetty R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 953-957

 Year: May 2024

 Downloads: 89

 Abstract

This design proposes a solar- powered robot for drawing solar panels, exercising solar energy for both power generation and drawing operations. The system integrates rechargeable batteries, a robotic platform with drawing mechanisms, and a mobile app for stoner control. It's ideal is to optimize solar panel performance by maintaining cleanliness without homemade intervention. The robot's cleaning mechanisms are designed for effectiveness and minimum panel damage. Control commands are transmitted via Bluetooth from the mobile app, enabling real- time monitoring and adaptation. The tone- sustaining power system ensures nonstop operation, suitable for remote or out- grid installations. Overall, this innovative result offers a cost-effective and sustainable approach to solar panel conservation


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino, Cleaning, sensors, Brushes, Bluetooth, Automation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GREEN CONCRETE STRENGTH CHARACTERISTICS THAT CONTRIBUTE TO SUSTAINABILITY AND ITS ENVIRONMENTALY BENIGN NATURE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02143

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02143

  Register Paper ID - 259951

  Title: GREEN CONCRETE STRENGTH CHARACTERISTICS THAT CONTRIBUTE TO SUSTAINABILITY AND ITS ENVIRONMENTALY BENIGN NATURE

  Author Name(s): Vinay Kumar S, Shakir Ali Malik, Suchithrahas C S, Prajwal, Eshwari H S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 946-952

 Year: May 2024

 Downloads: 69

 Abstract

To fulfill the demands of globalization in the construction of buildings and infrastructure, India has recently made a significant effort in constructing the infrastructure, including expressways, power projects, and industrial structures, among other things. Concrete and cement are commonly utilized in construction and building techniques across the globe. It is necessary to switch to green concrete from Ordinary Portland Cement (OPC), since OPC uses more energy and harms the environment. In this study fly ash is used as an alternate to OPC, as fly ash has a high silicate and alumina content, it combines with an alkaline solution to form an alumino-silicate gel, which bonds the aggregate and results in high-grade concrete. The concrete mix proportioning used is M30 GRADE and activation of geo polymer concrete is done using alkaline activators such as sodium hydroxide and sodium silicate solutions, finally checking the mechanical strength properties of GPC in comparison with conventional concrete


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Alkaline Activators, Durability, Fly ash, Strength.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MODELLING AND ANALYSIS OF STADIUM FOR A RETRACTABLE ROOF

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02142

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02142

  Register Paper ID - 259950

  Title: MODELLING AND ANALYSIS OF STADIUM FOR A RETRACTABLE ROOF

  Author Name(s): Chandrika P, Keerthana R, Rashmi T.M, Hruthik R, Santhosh V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 939-945

 Year: May 2024

 Downloads: 89

 Abstract

This study presents a detailed analysis of retractable roofs. The retractable roof is a versatile architectural feature designed to provide flexible shelter and climate control for various structures, such as stadiums, arenas, and outdoor spaces. This innovative technology allows for the seamless transition between open-air and covered environments, offering protection from adverse weather conditions while maintaining an open-air experience when desired. It aims at enhancing the overall spectator experience and ensuring uninterrupted gameplay, regardless of adverse weather conditions. This innovative system involves mechanized panels and sections that can be opened or closed. The length of retractable roofs increases with the demand for more flexible and light construction, and such requirements mark retractable roof structures more sensitive to wind actions. The project outlines the potential impact of this innovative solution on the sports industry and multipurpose events.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Analysis, design, modeling, roofing material, STAAD PRO, trusses, retractable, Stadium.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AN INNOVATIVE EXPERIMENTAL TECHNIQUE OF ADDITIVE EXTRUSION MEND FOR CRATERS IN PAVEMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02141

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02141

  Register Paper ID - 259949

  Title: AN INNOVATIVE EXPERIMENTAL TECHNIQUE OF ADDITIVE EXTRUSION MEND FOR CRATERS IN PAVEMENT

  Author Name(s): Nagendra N, Murali Mohan M V, Aaqib Reyaz, K Rupesh Kumar, Betharasi Deepika, Anusha K V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 933-938

 Year: May 2024

 Downloads: 95

 Abstract

Using lignin extract to mend craters has shown favorable results in addressing the challenges posed by pavement distresses on roads and highways. Traditional methods for repairing craters involve resource-intensive hot asphalt mixtures, resulting in temporary fixes. This project introduces an innovative approach using additive extrusion technology and lignin extracted from coconut coir for more efficient, cost-effective, and durable pavement repairs. By blending lignin with bitumen and incorporating urea formaldehyde polymer, this method helps in utilizing the full benefits of a pavement and offers a sustainable alternative to traditional materials. This eco-friendly solution not only strengthens road surfaces but also contributes to greener road maintenance practices, ensuring safer and increases the durability of pavements.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

AN INNOVATIVE EXPERIMENTAL TECHNIQUE OF ADDITIVE EXTRUSION MEND FOR CRATERS IN PAVEMENT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN & MANUFACTURE OF POROUS CONCRETE USING SUGARCANE FIBER FOR URBAN PAVEMENTS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02140

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02140

  Register Paper ID - 259948

  Title: DESIGN & MANUFACTURE OF POROUS CONCRETE USING SUGARCANE FIBER FOR URBAN PAVEMENTS

  Author Name(s): Sreevidhya raman, Harshavardhan Karanam, Karthik S, Ranjith Kumar S, Prajwal kumar N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 928-932

 Year: May 2024

 Downloads: 58

 Abstract

The focus of present researchers shifted towards utilizing local available alternative materials with binding properties in concrete as a cement replacement. Utilization of agricultural waste with pozzolanic properties in concrete will further aid for sustainability. Thus, the present study is initiated evaluate the mechanical of pervious concrete with sugarcane ash replacing cement. Porous concrete is gap graded concrete mix with minimum or no fine and which allow water to percolate in to the earth beneath the pavement. Porous concrete being used as structural layer in the pavement, the concrete mix shall require minimum structural strength, as well as the permeability properties. M20 concrete mix design process is adopted in the present study, with an assumption that the cement mortar just coats the aggregate and does not completely fill any voids. The dried sugar cane waste is incinerated at 2500 C to get the sugarcane ash, which is further sieved through 150 microns sieve, and the passing fraction is used in mix as a partial replacement for cement. Concrete cubes with sugar cane ash replacing cement in ratios of 0 %, 0.5 %, 1 %, and 1.5% by weight were prepared to evaluate the 7 days, 14 days and 28 days compressive strength. The compressive strength (N/m2) obtained for 0.5% is 112, 191, 120, 1% is 205,210,218. and 1.5% is 280,292,302 for 7, 14 and 28 days respectively.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Compressive Strength, Porous - Concrete, Sugarcane-Ash

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: "AN EXPERIMENTAL INVESTIGATION OF SELF CURING CONCRETE INCORPORATED WITH PEG - 400 AND PVA".

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02139

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02139

  Register Paper ID - 259944

  Title: "AN EXPERIMENTAL INVESTIGATION OF SELF CURING CONCRETE INCORPORATED WITH PEG - 400 AND PVA".

  Author Name(s): Murali Mohan M V, Anirudh B, Bandlapalli Lohith Kumar, Chethan Kumar G R, Nisarga C S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 923-927

 Year: May 2024

 Downloads: 64

 Abstract

Curing is said to be the method of maintaining minimum moisture content after construction to develop the desirable properties. In many situation curing is not possible so, to overcome those situation we are using chemicals to attain the process of curing. The chemicals like Poly-vinyl alcohol (PVA)and Poly ethylene glycol (PEG-400) contribute on cement by giving good Strength and hydration rate. This self curing agents gave better compressive strength and split tensile strength.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

"AN EXPERIMENTAL INVESTIGATION OF SELF CURING CONCRETE INCORPORATED WITH PEG - 400 AND PVA".

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GROUND DENSIFICATION FOR LIQUEFACTION MITIGATION USING GGBS COLUMNS ENCASED WITH GEOTEXTILE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02138

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02138

  Register Paper ID - 259943

  Title: GROUND DENSIFICATION FOR LIQUEFACTION MITIGATION USING GGBS COLUMNS ENCASED WITH GEOTEXTILE

  Author Name(s): Prof.Aruna T, Deeksha Tanu Sri M, Dileep N, Mohammad Shadman, Vamsi Hari P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 917-922

 Year: May 2024

 Downloads: 74

 Abstract

The process known as liquefaction, which occurs when there is an excess of "pore water pressure" and a drop in the frictional resistance of the soil after an earthquake, is what causes the solid ground to change into a liquid condition. Sands that are loose or somewhat wet and have poor drainage, such clayey or silty sands, are susceptible to liquefaction. The standard penetration test (SPT) and the cone penetration test (CPT), which are favoured to evaluate the liquefaction potential of soil, are examples of in-situ tests that are the foundation of common liquefaction evaluation techniques. Rearranging the soil particles into tighter arrangements increases density and is known as densification. Using the stone column strategy, soil stability is increased as part of the ground-up improvement process. To compress the soil and raise its density, drop a large weight onto the ground several times from a considerable height


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

densification, liquefaction, mitigation, stone column, pore water pressure

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TO ANALYSE THE COMPRESSION STRENGTH OF CONCRETE BY PARTIAL REPLACEMENT OF CEMENT WITH FLY ASH AND GGBS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02137

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02137

  Register Paper ID - 259942

  Title: TO ANALYSE THE COMPRESSION STRENGTH OF CONCRETE BY PARTIAL REPLACEMENT OF CEMENT WITH FLY ASH AND GGBS

  Author Name(s): Bhargava G, Murali Mohan M V, S Naveen, S Pavanesh, Shree Gaurav KU, Sharan G

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 912-916

 Year: May 2024

 Downloads: 69

 Abstract

This study is to analyze the compressive strength of concrete by partially replacing cement with Fly Ash and Ground Granulated Blast Furnace Slag (GGBS). The use of supplementary cementitious materials, such as Fly Ash and GGBS, in concrete production has gained significant attention due to its potential to enhance the sustainability and durability of concrete structures. This study is to work out the effect of mineral admixture GGBS and Fly ash in concrete of grade M-40 when it is added in & replaced for the fresh state and hardened state i.e. for workability and strength of concrete using OPC (43 grade). As mineral admixture GGBS and Fly ash have been added to OPC which varies from 20% and 40% at interval of 20% &40% by total weight of OPC, various range of addition and replacement of cement by GGBS and Fly Ash in the concrete. All mixes of concrete will examined for workability as slump test of fresh concrete. Hardened concrete is examined for Compressive strength for 7days,14days and 28 days. Slump will be analysed as compared to that of addition of GGBS & Fly ash.The research findings contribute to the understanding of the performance of concrete mixtures containing supplementary cementitious materials and offer practical recommendations for their utilization in construction. By addressing these objectives, this research endeavors to advance the knowledge and practice of sustainable concrete production and promote the responsible use of Fly Ash and GGBS in the construction industry.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cement, Coarse aggregates, Fine aggregates, Fly Ash, GGBS(GROUND GRANULATED BLAST- FURNACE SLAG)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGNED TABULATIVE COUPLING OF RC COMPRESSION MEMBERS-A SIMULATIVE APPROACH

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02136

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02136

  Register Paper ID - 259941

  Title: DESIGNED TABULATIVE COUPLING OF RC COMPRESSION MEMBERS-A SIMULATIVE APPROACH

  Author Name(s): Narasimha Murthy M R, Vinay Kumar S, Sanjana C, Sushmitha, Thimmaraju G S,Aravind Kumar S V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 906-911

 Year: May 2024

 Downloads: 77

 Abstract

In the present era design of any structural element would be a challenging task. Design of compression members being most challenging to decide the section is capable to withstand or bear the force applied on it. Hence design of Structural members are always designed based on number of trails and error method. While undertaking many trails, design calculations with their design checks proves a length and time consuming. Hence, in the present study efforts are put to build the stock of various design combinations of compression members by pre-assuming the sectional date and applying forces, moments on it. And suitable conclusion will be made at the end.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DESIGNED TABULATIVE COUPLING OF RC COMPRESSION MEMBERS-A SIMULATIVE APPROACH

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: COMPARATIVE STUDY OF PILED RAFT FOUNDATION ON SAND

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02135

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02135

  Register Paper ID - 259940

  Title: COMPARATIVE STUDY OF PILED RAFT FOUNDATION ON SAND

  Author Name(s): ARUNA T, K.V.S.B RAJU

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 895-905

 Year: May 2024

 Downloads: 56

 Abstract

In civil engineering and construction, a piled raft foundation, also referred to as a raft with piles or a piled mat foundation, is one kind of foundation structure. It is frequently used to poor soil conditions, such as soft clay, loose sand, and extremely compressible soils. To increase load carrying capacity and settlement, the piled raft foundation combines the advantages of deep foundations and shallow raft foundations. It's crucial to keep in mind, nevertheless, that the design and building of PRF need for meticulous engineering study and consideration of site-specific factors, including soil conditions, structural loads, and foundation system behaviour. The study focuses on the PRF system's vertical load carrying capacity and settlement reduction under both eccentric and concentric stress on sand. To find out how different pile alignment and length affected the PRF's ultimate load, small-scale model tests are carried out. The study's findings suggest that the PRF system can minimize differential settlement and boost the raft's load bearing capacity by carefully placing the piles in optimized position. The study specifically aimed at how changing the pile's length to diameter (L/D) ratio affected their ability to support loads. The results of the research work indicate that strategical placing the piles in the PRF system improve the load bearing capacity and reduce the settlement.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Piled raft foundation, cohesion less soil, Load improvement ratio

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RICE HUSK ASH AS A PARTIAL REPLACEMENT FOR CEMENT IN CONCRETE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02134

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02134

  Register Paper ID - 259939

  Title: RICE HUSK ASH AS A PARTIAL REPLACEMENT FOR CEMENT IN CONCRETE

  Author Name(s): Barnali Ghosh, Shilpa R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 888-894

 Year: May 2024

 Downloads: 76

 Abstract

Availability of conventional materials for concrete is cause for concern worldwide. In recent years significant global initiatives to use both local and waste materials in concrete has taken place. One of these materials is rice husk, which when incinerated under regulated conditions and if finely pulverized may be utilized as a substitution for cement in concrete. In order to understand the impact of Rice Husk Ash (RHA) on the mechanical and durability characteristics of concrete when used as a partial cement replacement, a thorough assessment of the relevant literature on Rice Husk Ash (RHA) is conducted. Due to its significant pozzolanic qualities, RHA has the ability to replace cement upto 30% without affecting the structural integrity of concrete. The main objective of this study is to find the optimum percentage of replacement of Rice Husk Ash based on compressive strength and flexural strength of concrete. Thus, the use of RHA as a partial alternative to cement in concrete can offer additional environmental benefits, such resource saving and the management of agricultural waste, while simultaneously encouraging a circular economy in the construction sector.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Rice Husk Ash, Partial replacement, Optimum Percentage

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EXPERIMENTAL INVESTIGATION ON COMPRESSIVE STRENGTH OF CONCRETE BY PARTIALLY REPLACING CEMENT BY GGBS AND RHA AND NATURAL SAND BY QUARRY DUST

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02133

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02133

  Register Paper ID - 259924

  Title: EXPERIMENTAL INVESTIGATION ON COMPRESSIVE STRENGTH OF CONCRETE BY PARTIALLY REPLACING CEMENT BY GGBS AND RHA AND NATURAL SAND BY QUARRY DUST

  Author Name(s): Meghana K H, Kashinath B J

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 880-887

 Year: May 2024

 Downloads: 75

 Abstract

In this paper, concrete of grade M40 is studied by using Ground Granulated Blast furnace Slag (GGBS)(10%, 20%, 30% and 40%) and Rice Husk Ash (RHA) (5%, 7.5% and 10%) as partial replacement of cement and by using Quarry dust(0%, 15%, 30%, 45%, 60%, 75%, 90% and 100%) as partial replacement of sand. Compressive Strength properties are studied. Study is carried out in three phases and the optimum replacement level is found out.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

GGBS, RHA, Quarry Dust, Compressive Strength

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: COMPARATIVE STUDY AND COST ANALYSIS ON CURING AGENTS FOR SELF CURING CONCRETE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02132

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02132

  Register Paper ID - 259923

  Title: COMPARATIVE STUDY AND COST ANALYSIS ON CURING AGENTS FOR SELF CURING CONCRETE

  Author Name(s): Tanu Shree, Narayanswamy KA

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 872-879

 Year: May 2024

 Downloads: 87

 Abstract

Curing of concrete is the process of maintaining satisfactory moisture content in concrete during its early stages to develop the desired properties. However good curing is not always practical in many cases the present study deals with the effect of polyethylene glycol (PEG)and poly-vinyl alcohol (PVA) on concrete and their contribution to strength which are carried out. The effect of admixtures in mechanical characteristic of concrete i.e., compressive strength, split tensile strength by varying the percentage of PVA and PEG-400 from 0% to 2.5% by weight of cement is studied for M30 grade of concrete and the optimum percentage of PEG and PVA in self-curing concrete with conventional concrete with water curing is compared. The optimum percentage with PEG is coated with PVA and strength analysis is done. Curing is one of the most important factors for achieving maximum desirable strength in concrete, concrete should be cured properly so that it is fully hydrated and loss of moisture inside the concrete should be reduced. Poly vinyl alcohol and polyethylene glycol-400 is locally available chemical which can be used as a self-curing agent in concrete so that moisture in the concrete can be maintained and concrete can be fully hydrated


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Self-curing concrete, polyethylene glycol, poly-vinyl alcohol, M30 grade

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PERFORMANCE COMPARISION OF TBC's & EBC's

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02131

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02131

  Register Paper ID - 259921

  Title: PERFORMANCE COMPARISION OF TBC'S & EBC'S

  Author Name(s): Sreenivas S, Bharath L, Kishor N, Vinay Kumar G V, Srinivasa M, Madhu B R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 860-871

 Year: May 2024

 Downloads: 73

 Abstract

This study presents a comprehensive comparison of thermal barrier coatings (TBCs) utilizing zirconia and environmental barrier coatings (EBCs) incorporating silicon carbide and aluminum oxide. Through rigorous experimental testing and computational analysis, key performance metrics including thermal insulation, erosion resistance, and durability are evaluated. The findings elucidate the distinctive strengths and weaknesses of each coating type, facilitating informed decision-making for optimal material selection in high-temperature applications


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

PERFORMANCE COMPARISION OF TBC's & EBC's

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: "POWER GENERATION THROUGH SPEED BREAKERS"

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02130

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02130

  Register Paper ID - 259919

  Title: "POWER GENERATION THROUGH SPEED BREAKERS"

  Author Name(s): Dr Bharath L, Dr Suneelkumar N Kulkarni, Akshay SM, Gagan kumar singh VS, Praveen V Awale, Mell Jepson.

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 853-859

 Year: May 2024

 Downloads: 78

 Abstract

A significant amount of energy is wasted by vehicles when they pass over speed breakers due to friction. However, this energy can be used to generate electricity. In this project, we propose a smart speed breaker system that captures energy from vehicles and converts it into electrical power.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CONVERTING BICYCLE TO e-BIKE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02129

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02129

  Register Paper ID - 259918

  Title: CONVERTING BICYCLE TO E-BIKE

  Author Name(s): Dr Bharath L, Prof Anand Kulkarni, Aakash G Manohar, Likith V, Vivek Gowda, Vinay Kumar G

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 847-852

 Year: May 2024

 Downloads: 53

 Abstract

Transforming non-motorized vehicles into motorized alternatives presents a compelling avenue for modernizing traditional transportation modes while upholding sustainability. This study investigates the integration of electric propulsion systems into non-motorized vehicles to enhance their efficiency, range, and ease of use. By bridging the gap between conventional and modern transport systems, this study aims to offer eco-conscious solutions aligned with contemporary needs. Our primary objective is to demonstrate the feasibility and potential benefits of this conversion process, thereby unlocking new possibilities for personal and commercial transportation. This report details the methodology, technical aspects, challenges, and outcomes of the conversion process, aiming to contribute to the discourse on sustainable transportation solutions and inspire future developments in this transformative field.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Non-motorized, Technical aspects, e-Bike.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Fabrication of Enhancing Vehicle Safety with Power Window Mechanism

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02128

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02128

  Register Paper ID - 259916

  Title: FABRICATION OF ENHANCING VEHICLE SAFETY WITH POWER WINDOW MECHANISM

  Author Name(s): Suhas U, Dr. Bharath L, Sajeed Hussain, K S MD Kaif, S R Vineeth

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 842-846

 Year: May 2024

 Downloads: 78

 Abstract

This paper discusses a new safety system for vehicles that integrates power window mechanisms with various sensors to enhance passenger safety in emergencies. The goal is to deploy the existing power window infrastructure to automate window operation in dangerous situations, facilitating a rapid and safe exit from the vehicle. The proposed system includes a control unit connected to multiple sensors, including tilt, water, air quality, fire, and gas sensors. These sensors monitor the vehicle's environment for signs of danger. The tilt sensor detects if the vehicle has rolled over or is at a severe angle, while the water sensor identifies submersion in water. The quality of the air sensor checks for harmful gases, and the fire and gas sensors alert to fire or high gas levels. If an emergency is detected, the control unit activates the electric window mechanism to open the windows, allowing passengers to exit safely. This system provides a cost-effective solution by utilizing existing power window technology, making it easier to implement in current vehicle designs. It adds an additional layer of safety, enabling quicker evacuation in emergencies. The integration of this system into vehicles can dramatically decreases the likelihood of accidents or other hazardous situations. In summary, this safety system utilizing power window mechanisms and various sensors shows great potential approach for improving vehicle safety. By leveraging existing technology, it offers a practical and efficient solution to enhance passenger safety in emergency scenarios.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Power Window Mechanism, Vehicle Safety, Emergency Sensors, Passenger Safety

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EVALUATION OF MICROSTRUCTURE AND HARDNESS OF Al-Mg-Si ALLOY REINFORCED WITH SiCp

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02127

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02127

  Register Paper ID - 259913

  Title: EVALUATION OF MICROSTRUCTURE AND HARDNESS OF AL-MG-SI ALLOY REINFORCED WITH SICP

  Author Name(s): Dr Bharath L, ProfManjuthan TV, Abel M, Hamid Raja Khan, Monica Fernandes D

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 835-841

 Year: May 2024

 Downloads: 89

 Abstract

In this paper, Al-Mg-Si alloy has been used as the matrix material to develop metal matrix composites with silicon carbide particle particulates as reinforcement material. The different mesh size of SiC particles was chosen by varying wt.% (1%, 3% and 5%) and preparation was done through the stir casting method. Microstructure evaluation has been done for the formed composite material. Taguchi's technique was used to find the optimization, Analysis of Variance (ANOVA) and mathematical model were generated through regression method to validate the experimental results obtained for hardness.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ANOVA, Hardness, Matrix, Composite

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: 3D PRINTING USING IOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02126

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02126

  Register Paper ID - 259910

  Title: 3D PRINTING USING IOT

  Author Name(s): Dr.Balaji K, Likith S, Ashis Kumar Sahoo, Kumar SG, Karthik N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 830-834

 Year: May 2024

 Downloads: 70

 Abstract

An abstract of 3D printing could highlight its transformative impact on various industries and disciplines. It would likely mention its ability to fabricate intricate objects layer by layer from digital designs, offering unprecedented flexibility and customization. Additionally, the abstract might discuss the diverse range of materials used in 3D printing, from plastics and metals to biomaterials, enabling applications in fields such as aerospace, healthcare, automotive, and consumer goods. Furthermore, it might touch upon emerging trends such as large-scale construction and the integration of artificial intelligence to optimize printing processes. Overall, the abstract would emphasize 3D printing's potential to revolutionize manufacturing, design, and innovation across numerous sectors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

3D PRINTING USING IOT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02125

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02125

  Register Paper ID - 259907

  Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT

  Author Name(s): Dr. Balaji K, Biswajit Nayak, Kavita Soren, Arpita Kumari, Madhushree R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 824-829

 Year: May 2024

 Downloads: 69

 Abstract

We examine the revolutionary effects of artificial intelligence (AI) on education in this thorough investigation, paying particular attention to the critical ideas of personalized learning and adaptive assessment. The research explains how education has changed historically. AI's integration into educational paradigms emphasizes how crucial it is to provide learners with learning experiences that are specifically personalized to them. It also explores the field of AI-powered adaptive assessment, explaining how it differs from traditional testing methods. The paper provides a comprehensive overview of this educational revolution by synthesizing case studies, existing literature, and developing trends.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02124

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02124

  Register Paper ID - 259906

  Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY

  Author Name(s): Dr. Balaji k, Mohammed Tauqir Ali T.M, Satyajit Mohanty, N.V. Rakesh, Viswa .M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 820-823

 Year: May 2024

 Downloads: 88

 Abstract

In today's corporate world, network and data security is a major concern. Many different types of businesses, such as financial institutions, law firms, schools, healthcare, telecommunications, mining, and government organizations, have a strong demand for strategic data management techniques. Businesses lose sensitive data, such as biometric and financial information, to competitors and other parties as a result of hackers' activity. Businesses are losing millions of dollars as a result of malicious people gaining access to unprotected data. Businesses now place a great value on data security. Protection is required to guarantee information security. Using encryption algorithms to protect communications in these kinds of threads is one of the most important and practical solutions available. Performance and security are two factors that the developer must take into account while creating an extremely secure Android application. Android-based applications must perform better because Android smartphones have constrained resources. The most widely used secure encryption algorithms Rijndael, Serpent, and Two fish will be evaluated in this study to see which works best in order to overcome the issues.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

telecommunications, android, encryption algorithms

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BIOMETRICS USING PYTHON

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02123

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02123

  Register Paper ID - 259903

  Title: BIOMETRICS USING PYTHON

  Author Name(s): Dr. K Balaji, AnushreeGD, BhavanaShreeS, BhuvanaShreeBS, KavyaBN

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 815-819

 Year: May 2024

 Downloads: 70

 Abstract

Biometric authentication systems have gained significant attention due to their ability to provide secure and convenient access control. This project proposes a novel approach to biometric authentication using Python, leveraging machine learning techniques and computer vision algorithms. The system integrates facial recognition, fingerprint recognition, and voice recognition modalities to enhance authentication accuracy and robustness. The system begins by capturing biometric data from users through respective sensors(camera, fingerprint scanner, microphone). Preprocessing techniques are applied to clean and normalize the data, followed by feature extraction to extract unique biometric features. Machine learning models, such as Convolution Neural Networks (CNNs) and Support Vector Machines (SVMs), are trained on the extracted features to learn the patterns specific to each user. During the authentication phase, the system compares the input biometric data with the stored templates using appropriate similarity metrics. Fusion techniques are employed to combine the results from multiple modalities, enhancing the overall authentication accuracy and reliability. Keywords-recognition, authentication, security.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BIOMETRICS USING PYTHON

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02122

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02122

  Register Paper ID - 259901

  Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY

  Author Name(s): Dr. Balaji K, Ashwini P, Likhitha P, Jagadevi, Gnanapriya

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 809-814

 Year: May 2024

 Downloads: 58

 Abstract

Setting up an email account involves confirming ownership through a link sent to the provided email address. Personal questions, like favorite colors or pets' names, may also be asked for added security. Email services monitor login locations and usage patterns to detect suspicious activity. Two-factor authentication adds an extra layer of security by sending a code to the user's phone. Account recovery processes often include sending a reset link to an alternate email or mobile number. During email sessions, encryption and session management techniques are used to protect user data. Automatic logout may occur after a period of inactivity to prevent unauthorized access. These measures collectively ensure email account security and user verification.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

EMAIL AUTHENTICATION USING CRYPTOGRAPHY

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BRAIN COMPUTER INTERFACE UNDER AI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02121

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02121

  Register Paper ID - 259900

  Title: BRAIN COMPUTER INTERFACE UNDER AI

  Author Name(s): DR. Balaji K, P Srikanth, Tharun Reddy J, Mahesh Naik, R Bali Bai ,Nithin Kumar S M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 804-808

 Year: May 2024

 Downloads: 70

 Abstract

A brain-machine interface, also referred to as BCIs, is a type of technology that enables people to interact with technology through their brain. It allows them to bypass the need for physical controls by connecting their brain activity to external devices. These systems are able to interpret brain signals and translate them into commands for various devices, such as computers and robotic arms.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BRAIN COMPUTER INTERFACE UNDER AI

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BIG DATA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02120

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02120

  Register Paper ID - 259899

  Title: BIG DATA

  Author Name(s): DR. Balaji, Pallavi K G, Meghana U, Shwetha S, Manasa N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 801-803

 Year: May 2024

 Downloads: 65

 Abstract

Big Data is a term used to describe large and complex datasets that require powerful computing tools and analytics methods to extract meaningful insights. The rapid growth of data in the modern era has led to an explosion of Big Data sources including social media, sensor data, email logs, and more. This report provides a comprehensive over view of Big Data, including its definition, its characteristics, its sources, and its applications. We need big data when the user has large amount of data, it has noisy and inconsistency. Traditional data storage cannot able of handling large volume of data hence we need a big data analytic. In big data the data can be Structured type, Unstructured type and semi structured type. Big data has characteristics and it is also called as 5V's. We discuss the challenges posed by Big Data, including storage, retrieval, and analysis, and we describe several tools and technologies used to address these challenges.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DISEASE PREDICTION USING DATA MINING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02119

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02119

  Register Paper ID - 259897

  Title: DISEASE PREDICTION USING DATA MINING

  Author Name(s): DR.BALAJI.K, MONISHA P, MADHUSHREE S G, MOHAN KUMAR, SAMRAT RAJ

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 796-800

 Year: May 2024

 Downloads: 79

 Abstract

Data mining is described as sifting via very huge amount of records for beneficial information. Some of the vital and famous records mining techniques are classification, clustering, prediction. Data mining methods are used for range of applications. In health care industry, data mining plays an necessary position for predicting diseases. For detecting a sickness number of exams should be required from the patient. But the use of data mining method the wide variety of check be reduced. This reduced check plays an important position in time and performance. This method has an benefits and disadvantages. This paper analyzes how data mining techniques are used for predicting one of kind sorts of diseases. This paper reviewed the research papers which mainly targeted on predicting heart disease, Diabetes, breast cancer.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DISEASE PREDICTION USING DATA MINING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02118

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02118

  Register Paper ID - 259896

  Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES

  Author Name(s): Dr Balaji K, Kruthi P.J, Lekha V.S, Harshitha V, Keerthana E

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 792-795

 Year: May 2024

 Downloads: 71

 Abstract

In today's digital age, the concept of a connected world has transformed the way we interact, communicate, and conduct business. This paper explores the intricate web of connectivity that defines our modern society. From social media platforms to the Internet of Things, this presentation delves into the impact of interconnected technologies on individuals, businesses, and societies globally. Through an in-depth analysis of the benefits, challenges, and future implications of this connected world, we aim to shed light on the opportunities and risks associated with our increasingly interconnected digital landscape. Join us as we navigate through the complexities of the connected world and uncover the potential it holds for shaping our future. The advent of the connected world has ushered in a new era of technological innovation and societal transformation. This paper delves into the myriad opportunities and challenges presented by the interconnectedness facilitated by the digital landscape. It explores the implications of connectivity across various domains including communication, commerce, healthcare, education, and governance. From the proliferation of IoT devices to the rise of artificial intelligence, the paper examines how these advancements are reshaping industries, redefining human interactions, and influencing global dynamics. Additionally, it addresses the ethical, privacy, and security concerns arising from the unprecedented level of connectivity. Through a comprehensive analysis, this paper aims to provide insights into navigating the complexities of the connected world and harnessing its potential for the betterment of society.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DIGITAL FORENSIC

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02117

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02117

  Register Paper ID - 259894

  Title: DIGITAL FORENSIC

  Author Name(s): Dr Balaji K, Rahul P, Naveen Kumar, Sharath U, Nandeep

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 788-791

 Year: May 2024

 Downloads: 93

 Abstract

Crimes committed in electronic or digital spaces, particularly within cyberspace, have become widespread. Criminals utilize technology to carry out their unlawful activities, presenting novel challenges for law enforcement agents, legal practitioners, military personnel, and security specialists. Digital forensics has assumed a critical role in detecting and resolving crimes involving computers and digital assistance. This paper presents a brief overview of digital forensics, offering an introduction to its importance in tackling modern criminal activities.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DIGITAL FORENSIC

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ECTOLIFE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02116

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02116

  Register Paper ID - 259891

  Title: ECTOLIFE

  Author Name(s): Dr Balaji K, Lavanya V, Chandana M, Chethan kumar H V, Arpitha J K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 783-787

 Year: May 2024

 Downloads: 93

 Abstract

EctoLife the world's first artificial womb facility. This concept was designed by biotechnologist Hashem AI-Ghaili, the artificial womb facility is powered by renewable energy.EctoLife is designed to help countries that are suffering from low populations. Ectolife introduces a dynamic fusion of virtual reality (VR), augmented reality (AR), and mixed reality (MR) technologies into our everyday existence. This abstract concept aims to seamlessly integrate digital elements into our physical world, revolutionizing how we interact, learn, work, and entertain. Through ectolife, individuals immerse themselves in virtual environments, interact with digital objects, and engage with virtual entities as if they were part of their physical surroundings. This integration of virtual and real experiences redefines traditional boundaries, offering new avenues for communication, collaboration, and creativity. Beyond personal experiences, ectolife extends its impact across various sectors, including healthcare, gaming, education, and architecture. VR-assisted therapies improve patient rehabilitation, AR gaming enhances interactive entertainment, and MR facilitates real-time design prototyping in architecture.However, as ectolife evolves, it brings forth ethical, social, and existential considerations. Privacy concerns, data security issues, and the potential for over-reliance on virtual experiences raise important questions. Furthermore, the blurring of virtual and physical realities prompts reflection on identity, agency, and the nature of existence. Inconclusion, ectolife signifies a transformative shift, offering exciting possibilities while posing challenges. Embracing ectolife requires a balanced approach that harnesses its potential while addressing associated risks. As ectolife continues to unfold, it promises to reshape human experiences and advance society in unprecedented ways.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Website Blocker Using Python

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02115

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02115

  Register Paper ID - 259888

  Title: WEBSITE BLOCKER USING PYTHON

  Author Name(s): DR.BALAJI K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 778-782

 Year: May 2024

 Downloads: 74

 Abstract

According to the Google Search Statistics, Google processes more than 3.7 billion searches every day, with an average of 40000 searches per second. This illustrates our extreme dependency on the internet for all our daily tasks ranging from complex projects on space science to simplest queries like what is the right way to greet a person in the evening. Our searches are answered through interlinked web pages, known as websites. As of September 2022, there are over 1.98 billion websites available online. Apart from the benefits of having access to huge content and numerous resources on our fingertips, it can also be a great source of distraction and mismanagement of time. Constant online presence of an individual may affect an individual's ability of achieving professional and personal goals. Hence, website blocker is one effective tool that helps an individual take a conscious call on blocking a website. There may be many reasons for blocking a website, which will be discussed in the following sections of the paper. A website blocker, if effectively utilized, can enhance focus, productivity and value of time of an individual and the organization as well. Here, we propose a simple website blocker implementation in Python.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Website Blocker Using Python

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: An Introduction to Artificial Intelligence Tools in Various Domains

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02114

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02114

  Register Paper ID - 259887

  Title: AN INTRODUCTION TO ARTIFICIAL INTELLIGENCE TOOLS IN VARIOUS DOMAINS

  Author Name(s): Dr Balaji K, Naveena kumara K S, Naveen H S, Yashavanth achar, Raghunandan P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 770-777

 Year: May 2024

 Downloads: 84

 Abstract

This research paper introduces Artificial Intelligence tools and uses of the same in various domains. The importance of Artificial Intelligence in enhancing the efficiency and automation to solve complex problems is discussed, along with the various types of artificial intelligence tools available. The paper also covers the use of artificial intelligence in AI in Cyber security, AI in Education, AI in Agriculture, AI in Education, AI Smart cities, AI in Environmental conservation, AI in Sport Analytics. The paper concludes with a summary of the key takeaways and the potential impact of artificial intelligence tools in various domains. The paper aims to provide a comprehensive overview of artificial intelligence tools and to highlight their importance in various fields to develop new approaches in solving complex problems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

An Introduction to Artificial Intelligence Tools in Various Domains

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Cybersecurity using Python

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02113

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02113

  Register Paper ID - 259885

  Title: CYBERSECURITY USING PYTHON

  Author Name(s): Dr.Balaji K, M Shireesha, Aishwarya S, Kavya Shree K V, Gagana Shree M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 765-769

 Year: May 2024

 Downloads: 72

 Abstract

Cybersecurity is known for defending computers, servers, mobile device, electronic system, networks and data from malicious (misusing the insured computer systems). Python has emerged as a versatile and powerful tool in the field of cybersecurity, python is known for versatility offering a wide range of libraries and frameworks for various security task.This abstract involves into the application of python in cybersecurity, focusing on its role in penetration testing, network security, and malware analysis. Python effectiveness in network traffic analysis, intrusion(An Intrusion Detection System (IDS) maintains network traffic looks for unusual activity and alerts when it occurs), log analysis (Log analysis is the process of reviewing, interpreting and understanding computer-generated records called logs.) Enabling security professionals to monitor and defend against malicious activities (misuse of system resources) effectively


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cybersecurity using Python

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Artificial Intelligence in Healthcare

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02112

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02112

  Register Paper ID - 259884

  Title: ARTIFICIAL INTELLIGENCE IN HEALTHCARE

  Author Name(s): Dr.Balaji K, A Ravi Kumar Reddy, Jagan Mohan, Yashwanth Kumar Sai, Nanda

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 759-764

 Year: May 2024

 Downloads: 72

 Abstract

Goal of this systematic search is to offer an description of artificial intelligence's role in healthcare. Artificial intelligence has played a crucial influence in healthcare. A paradigm change in healthcare has take place due to increasing availability of healthcare data and rapid progress of analytics technology. Machine learning technologies such as assist vector machine, deep learning neural networks, and natural language processing manage structured data. Unstructured data is processed using natural language processing.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Artificial Intelligence in Healthcare

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02111

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02111

  Register Paper ID - 259881

  Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE

  Author Name(s): Dr. Balaji K, Mr. Samir Raza, Mr. Ratan J

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 754-758

 Year: May 2024

 Downloads: 83

 Abstract

Natural Language Processing (NLP) is the study of how computers and human languages interact is the focus of the artificial intelligence (AI) field of natural language processing, or NLP. It encompasses a range of techniques and strategies intended to give robots the capacity to understand, interpret, and generate natural language in a way that is beneficial and appropriate for a number of applications. Natural language processing (NLP) has evolved tremendously in recent years thanks to the availability of large datasets, powerful computer power, and sophisticated machine learning models. Natural language, or spoken and written human communication, is extremely difficult because of its complexity, context-dependence, and intrinsic ambiguity. By creating models and algorithms that are capable of analyzing and interpreting natural language data, natural language processing (NLP) aims to close the understanding gap between human language and computers. NLP's main objective is to provide computers the ability to do language-related activities including comprehending text, coming up with logical answers, extracting data, and communicating between languages. To accomplish these goals, NLP incorporates concepts from multiple academic fields, including as statistics, computational science, machine learning, and linguistics.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NEURAL NETWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02110

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02110

  Register Paper ID - 259880

  Title: NEURAL NETWORK

  Author Name(s): Dr.Balaji K, Vinil Monteiro, Tarun G, Tarun Kulakarni, Santosh Maddi, Syed Kaif

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 750-753

 Year: May 2024

 Downloads: 50

 Abstract

Neural networks, also known as artificial neural networks (ANNs) or simply neural networks, are a subset of machine learning that form the foundation of deep learning techniques. Which was inspired by the structure and function of the human brain, mimicking the way real neurons communicate. ANNs are composed of many interconnected basic processors, functioning in parallel. This paper explores artificial neural networks and their basic types, outlining the fundamental neuron and the artificial computer model. It discusses network structures, learning methods, and some of the most commonly used ANNs..


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NEURAL NETWORK

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02109

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02109

  Register Paper ID - 259878

  Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS

  Author Name(s): DR.BALAJI, Madhu suharika, Gouri Rangabhatt Joshi, Jameema Joy.S, Aishwarya S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 743-749

 Year: May 2024

 Downloads: 65

 Abstract

The project aims to implement two popular searching algorithms that is Depth-First-Search (DFS) and the Breadth-First-Search (BFS) in a web-based application using JSP and Spring Tool Suite. The user is presented with a form where they can input the starting and ending nodes, as well as choose between the BFS and DFS algorithms. When the user submits the form, a Java file takes the form data and saves it to another JSP file called register. If the selected algorithm is DFS, the Java code for DFS is executed, and likewise for BFS. While the code is running, the user is shown a progress indicator to let them know that the algorithm is processing. Once the algorithm has finished running, the user is directed to a results page where they can view the nodes explored and the path found. The results are displayed in an easy-to-read format, such as a table or list. The project also handles errors, such as when the user inputs a non-existent node, and alerts the user if no path was found. Overall, this project offers a convenient and user-friendly way for users to explore and search graphs using BFS and DFS algorithms. It showcases the use of JSP, Spring Tool Suite, and Java to create a web-based application that can handle complex data structures and algorithms


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BFS, JSP, SpringBoot. I.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02108

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02108

  Register Paper ID - 259877

  Title: PLAGIARISM CHECKER AND CLASSIFICATION OF FILES ON CLOUD USING SMART CLOUD

  Author Name(s): Dr.Balaji K, Divya .M, Krupa.B, Gouri.G, Arpita.P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 739-742

 Year: May 2024

 Downloads: 73

 Abstract

This study suggests a method to address the cloud duplication problem. The restricted amount of data storage that these service providers can offer is only partially utilized by the abundance of redundant and useless data on the internet. Inadequate cloud efficiency might result in far greater costs for service providers than anticipated. The fact that the data is kept on a server that may be located kilometres distant from the user presents another problem. This raises the price and efficiency even further. A smart cloud can assist with resolving these problems. By calculating the ratio between the proportions of two vectors, we can assign a categorization rating to the document.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ROBOTIC EVOLUTION IN MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02107

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02107

  Register Paper ID - 259875

  Title: ROBOTIC EVOLUTION IN MACHINE LEARNING

  Author Name(s): Dr.Balaji K, Inav Sultan, Subhalaxmi Dora, Harish S J, Harshith S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 734-738

 Year: May 2024

 Downloads: 69

 Abstract

The integration of robotics and machine learning has revolutionized the field of automation, enabling robots to perform complex tasks with unprecedented levels of autonomy and adaptability. This paper provides an in-depth exploration of the evolution of robotics in machine learning, tracing its historical development, current state, and future trends. We begin by examining the early developments in robotics, highlighting the limitations of pre-programmed robots and the need for more adaptive and intelligent systems. We then discuss the emergence of machine learning algorithms and their integration into robotic systems, leading to the development of robots capable of learning from data and improving their performance over time. The paper also explores the current state of robotics in machine learning, focusing on key technologies such as deep learning, reinforcement learning, and computer vision. We discuss how these technologies are being used to enhance robotic capabilities in various domains, including manufacturing, healthcare, and autonomous vehicles. Challenges and opportunities in integrating machine learning with robotics are also addressed. Technical challenges, such as the need for robust and efficient algorithms, as well as ethical and social implications, such as the impact of intelligent robots on the workforce, are discussed.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ROBOTIC EVOLUTION IN MACHINE LEARNING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Prevention of Vulnerable Virtual Machines against DDOS Attacks in the Cloud

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02106

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02106

  Register Paper ID - 259873

  Title: PREVENTION OF VULNERABLE VIRTUAL MACHINES AGAINST DDOS ATTACKS IN THE CLOUD

  Author Name(s): Dr.Balaji K, Tanushree M, Pavan Kalyan, Manik Rahul, Rohit

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 729-733

 Year: May 2024

 Downloads: 82

 Abstract

One of the biggest issues that has drawn a lot of research and development attention in recent years is cloud security. Notably, assailants will investigate exploits in a cloud system and infiltrate virtual machines to release more extensive Distributed Denial-of-Service attacks (DDoS). Early-stage tactics including multi-step exploitation, low-frequency vulnerability scanning, and turning found susceptible virtual machines into zombies are sometimes used in DDoS assaults. Finally, DDoS attacks are launched using the zombies that have been infected. When it comes to cloud systems, especially Infrastructure-as-a-Service (IaaS) clouds, zombie exploration attack detection is truly problematic. This might occur from cloud customers installing susceptible software on their virtual computers.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Attack graph model, NICE, distributed denial of service attack, cloud security, and cloud attacks

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: The Integral Role of Blockchains in Shaping Web 3.0 Navigating the Technological Frontier

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02105

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02105

  Register Paper ID - 259872

  Title: THE INTEGRAL ROLE OF BLOCKCHAINS IN SHAPING WEB 3.0 NAVIGATING THE TECHNOLOGICAL FRONTIER

  Author Name(s): Dr. Balaji K, Priyanka R, Sneha Thomas, Sharun P S, Sai Keerthana G

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 724-728

 Year: May 2024

 Downloads: 64

 Abstract

Web 3.0 has arisen as a disruptive force in the digital world, pushing for a decentralized and user-centered internet. This new age is marked by its peer-to-peer design, which decreases reliance on centralized authority while giving individuals ownership over their data and digital assets. Blockchain technology is essential to Web 3.0 because it provides a safe and trustless environment for transactions and data transfers via cryptography. Web 3.0 aims to address the limits of the present web (Web 2.0) by using new technologies such as blockchain, artificial intelligence (AI), and the Internet of Things (IoT). This study looks at the link between blockchain and Web 3.0, specifically the characteristics that make blockchain an important component of this disruptive paradigm. Moreover, the article outlines the primary challenges and research directions in blockchain intelligence, as compared to other technologies, and is supported by based on research arguments, contributing to the advancement of this field and laying the groundwork for the future of intelligent societies powered by Web 3.0. Blockchain technology is clearly integrated into molding the technological frontier, and so blockchain intelligence is critical to the growth of Web 3.0.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

The Integral Role of Blockchains in Shaping Web 3.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Virtual Reality (VR) and its Intersection with Python

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02104

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02104

  Register Paper ID - 259871

  Title: VIRTUAL REALITY (VR) AND ITS INTERSECTION WITH PYTHON

  Author Name(s): Dr. Balaji K, Gopinath C, Goutham G, HN Thejas, Hemanth Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 718-723

 Year: May 2024

 Downloads: 64

 Abstract

Virtual Reality (VR) stands at the forefront of technological innovation, offering immersive experiences across diverse domains such as gaming, education, and healthcare. This paper explores the intersection of VR and Python, shedding light on Python's role as a versatile language in VR development. Beginning with an introduction to VR and its wide-ranging applications, we delve into the suitability of python for VR, elucidating the key libraries and frameworks utilized in VR projects; including pygame, pyglet, and Panda3D. The paper then navigates through the process of crafting immersive VR environments with Python, encompassing techniques for rendering 3D scenes, managing user input, including audio elements. Emphasis is placed on enhancing interactivity and user experience within VR applications, with a focus on user interface design, gesture recognition, and interactive mechanics. Further enriching the discourse are case studies and examples showcasing real-world applications of python in VR, spanning educational simulations, training modules, and entertainment experiences. Additionally, the paper addresses the challenges inherent in VR development with Python, proposing potential solutions and prognosticating emerging trends and future directions in the realm of VR technology its integration with Python. In conclusion, this paper underscores the pivotal role of Python in advancing VR technology and its profound impact across various industries. By elucidating the synergy between Python's versatility and VR's immersive potential, this exploration paves the way for innovative developments and Transformative applications in the burgeoning landscape of virtual reality.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Virtual Reality (VR) and its Intersection with Python

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HONEYPOT IN NETWORK SECURITY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02103

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02103

  Register Paper ID - 259869

  Title: HONEYPOT IN NETWORK SECURITY

  Author Name(s): Dr Balaji k, Yashaswini G T, Rakshita Itagi, Sahana L, Shreya Ravi Shastri

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 713-717

 Year: May 2024

 Downloads: 71

 Abstract

A honeypot in network security is like a digital decoy or trap designed to detect, deflect, or study attempts at unauthorized use of information systems. It's essentially a system or resource set up to be attractive to attackers, mimicking real services and data, but isolated and monitored to gather information about their activities. The concept of honeypots, non-production systems designed to interact with cyber attackers to gather intelligence, has evolved over three decades alongside the increasing speed and reliance on the Internet. The challenge lies in actively monitoring numerous systems and reacting swiftly to diverse events. Before deploying a honeypot, it's crucial to clarify its objectives, understand the operating systems and services it will emulate, assess associated risks, and devise mitigation strategies. Additionally, having a plan in case of compromise is advisable. For production honeypots, a documented security policy addressing potential legal issues is essential. The paper explores the role of honeypots in understanding hacker motives, skills, and techniques, proposing an intrusion detection tool integrating existing methods with honeypot concepts. Certainly, the paper delves into the significance of honeypots in the realm of cyber security. It underscores the evolving landscape of network intrusion detection amidst the accelerating pace of networks and the pervasive reliance on the Internet. Honeypots, as highlighted, serve as invaluable tools for actively engaging with cyber attackers to glean insights into their tactics, techniques, and procedures. Lastly, the paper proposes leveraging the concept of honeypots to inform the design and development of intrusion detection tools. By integrating insights from honeypot interactions with existing detection techniques, it aims to enhance the efficacy of cyber security measures in thwarting malicious activities


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

HONEYPOT IN NETWORK SECURITY

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GENERATIVE AI IN VIRTUAL REALITY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02102

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02102

  Register Paper ID - 259868

  Title: GENERATIVE AI IN VIRTUAL REALITY

  Author Name(s): Dr. Balaji K, Yamuna Bose, Shreenidhi LR, PS Karuna Kumar, Nandish k

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 708-712

 Year: May 2024

 Downloads: 77

 Abstract

This paper initiates by providing a comprehensive study of the utilization of generative AI techniques within virtual reality (VR), encompassing facets like data collection, pre-processing, model training, drawbacks, and evaluation. It further scrutinizes various generative AI models and algorithms tailored for VR, elucidating their strengths and limitations in virtual reality creation and abstraction. The integration of generative AI has significantly enriched virtual reality and training experiences, amplifying the intricacy of product development by facilitating the generation of diverse content such as games, images, audio, and video. Through the analysis and assimilation of historical data, pertinent factors, and real-world inputs, generative AI demonstrates its capacity to fabricate intricate and realistic virtual objects and environments. Additionally, the paper delves into the multifaceted challenges and ethical dilemmas inherent in deploying generative AI in virtual reality, encompassing concerns like data privacy and algorithmic transparency. It also envisages future trajectories for research, advocating for interdisciplinary collaborations, user-centric studies, and the exploration of applications in education and entertainment. By presenting an overview of the fusion between virtual reality and generative AI, the paper contributes insights into enhancing the learning experience within the burgeoning metaverse technology while also offering strategies to augment the efficacy of generative AI in fostering creative content creation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

GENERATIVE AI IN VIRTUAL REALITY

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BATTERY MANAGEMENT SYSTEM FOR ELECTRIC VEHICLES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02101

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02101

  Register Paper ID - 259866

  Title: BATTERY MANAGEMENT SYSTEM FOR ELECTRIC VEHICLES

  Author Name(s): KG Nagaraja, HK Jagadish, Lokesh Rao, Ediga Adarsh, Srinath HN

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 701-707

 Year: May 2024

 Downloads: 71

 Abstract

The main component in an electric vehicle's battery is the Battery Management System (BMS). This system plays a major role in both safety and performance. It keeps an eye on the battery's health by constantly monitoring voltage, current, temperature, and other factors. This data is key to preventing damage from overcharging, over-discharging, or overheating, which can lead to fires or reduced battery life. The BMS acts like a conductor, regulating how the battery is charged and discharged, and can even isolate weak parts of the battery to prevent them from bringing down the whole system. the BMS also helps the battery perform at its best by balancing energy flow across all the cells within the battery pack, maximizing its efficiency and overall lifespan. By keeping a close eye on the battery's health and performance, the BMS ensures a safe and smooth ride for electric vehicles


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduion uno, Battery cells,Lcd display,Dc motor,.Matlab simulator.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOLAR POWERED COLD STORAGE USING PELTIER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02100

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02100

  Register Paper ID - 259865

  Title: SOLAR POWERED COLD STORAGE USING PELTIER

  Author Name(s): Ass.prof.KP Shiva Murthy, Rakshitha S R, Santhosh R, Vinutha S, Pallavi P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 693-700

 Year: May 2024

 Downloads: 76

 Abstract

In this paper the creation of cold storage systems powered by solar energy using peltier module is developed. This project involves an advancement in cold storage technology that combines flexibility and portability with solar energy's efficiency. The need for cold storage solution is growing. In the contemporary world particularly in rural areas and off-grid locations. The solar powered cold storage system might have a significant in an area including agriculture, medications in health centers, emergency supplies etc. Solar powered cold storage system using peltier provides a number of benefits over traditional refrigeration systems due to its light weight, environmental friendliness, silent operation etc.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Refrigeration, Peltier module, Water block

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Wireless charging of electrical vehicle on road

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02099

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02099

  Register Paper ID - 259864

  Title: WIRELESS CHARGING OF ELECTRICAL VEHICLE ON ROAD

  Author Name(s): Madhushree R, Chetan K C, Ganesh V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 685-692

 Year: May 2024

 Downloads: 77

 Abstract

Wireless Electric Vehicle Charging (WEVC) while drive is a ground breaking technologies aiming to enhance the practicality and efficiencies off electric vehicles (EVs). This methods eliminates the need for traditional plugs-in charging, allowing EVs to charge seamlessly while in motions. Through inductive power transfers, the vehicles receives electricity from embedded charging infrastructures on the roads. The system relies on electro-magnetic fields, enabling a continuous powers transfer to the EV's battery. WEVC not only addresses range anxiety by also contributes to a sustainable and conveniently EV ecosystem. Challenge such as efficiency optimizations, standardizations, and infrastructures deployments remain, emphasis the ongoing evolutions off this transformative technologies


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Transformer, Model car, Transducers, Receiver, transmitter

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GSM Based Prepaid Energy Meter With Automatic Billing And Power Theft Alert System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02098

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02098

  Register Paper ID - 259863

  Title: GSM BASED PREPAID ENERGY METER WITH AUTOMATIC BILLING AND POWER THEFT ALERT SYSTEM

  Author Name(s): Prof Sunil kumar P, Mohan R, Raja Pruthvi Nayaka, J Sai Pawan, Subramani T

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 673-684

 Year: May 2024

 Downloads: 75

 Abstract

GSM Based Prepaid Energy Meter with Automatic Billing and Theft Alert System" is a revolutionary project aimed at enhancing the efficiency and security of energy consumption management. This innovative system integrates GSM technology with traditional energy metering to provide a seamless and reliable solution.The system operates on a prepaid basis, allowing consumers to conveniently manage their energy usage by purchasing credits in advance. Through the integration of GSM technology, consumers can remotely recharge their energy meters using mobile phones, eliminating the need for physical interactions or manual interventions. Furthermore, the system incorporates an automatic billing feature, which generates accurate and timely invoices based on the energy consumed. This ensures transparent billing processes and eliminates disputes between consumers and utility providers. In addition to billing functionalities, the system is equipped with a theft alert mechanism that promptly notifies authorities in case of any tampering or unauthorized access to the energy meter. This enhances security measures and deters potential theft or misuse of electricity.Overall, the "GSM Based Prepaid Energy Meter with Automatic Billing and Theft Alert System" offers a comprehensive solution for efficient energy management, transparent billing, and enhanced security, ultimately contributing to sustainable energy practices and consumer empowerment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino,GSM SIM 800l,lCD Display,Power theft control,Analog Energy Meter.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOLAR WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02097

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02097

  Register Paper ID - 259862

  Title: SOLAR WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM

  Author Name(s): Prof.Archana K, Raghu P V, M C Sindhu priyanka, Anusha C

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 668-672

 Year: May 2024

 Downloads: 55

 Abstract

Wireless Power Transfer [WPT] using the magnetic induction technology Developed a novel solar wireless electrical vehicle charging system integrating renewable energy and wireless technology. The system efficiently harnesses solar power to wirelessly charge electric vehicles, ensuring sustainability and convenience. Employing advanced electromagnetic resonance, it enables seamless transfer of energy between the charging pad and the vehicle. Through optimization algorithms, it maximizes energy capture and minimizes environmental impact. The system boasts robustness, reliability, and scalability, offering a promising solution for the future of electric vehicle charging infrastructure. Extensive simulations and real-world testing validate its performance and feasibility. This innovative system represents a significant step towards greener transportation and a sustainable energy ecosystem. Because of this more frequent rate, the battery's charging is rapid and great efficient. It will improve the experience of driving an EV. Through the introduction of WPT in an electric-powered vehicle, the obstacles of charging duration, distance, and cost can be conveniently managed. The WPT age is growing swiftly in the last few years.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Solar Electric Vehicle, Renewable energy resources, Photovoltaic cell

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INVOLUNTARY DETECTION AND ALERTING OF POTHOLES AND HUMPS ON ROADS TO AID DRIVERS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02096

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02096

  Register Paper ID - 259860

  Title: INVOLUNTARY DETECTION AND ALERTING OF POTHOLES AND HUMPS ON ROADS TO AID DRIVERS

  Author Name(s): Sana K Abdul Gani, Idrees Ahmad Khan Pathan, Rameez Raja

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 662-667

 Year: May 2024

 Downloads: 64

 Abstract

Spotted potholes and speed bumps are among the main causes of car accidents. One important factor in the economics of the nation is its well-maintained road network. One may draw a comparison between the significance of blood veins for humans and the relevance of road infrastructure in society. The quality of the road surface should be regularly inspected and fixed as needed. This research uses a combination of cutting-edge computer vision algorithms and sensor technologies to create an extensive system for automatic identification and alerting of roadway potholes and humps. The concept entails equipping cars with a variety of sensors, including as GPS units and accelerometers, in order to gather data on road conditions in real time


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

INVOLUNTARY DETECTION AND ALERTING OF POTHOLES AND HUMPS ON ROADS TO AID DRIVERS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DUAL AXIS SOLAR TRACKING WITH IOT-BASED LOAD SHEDDING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02095

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02095

  Register Paper ID - 259802

  Title: DUAL AXIS SOLAR TRACKING WITH IOT-BASED LOAD SHEDDING

  Author Name(s): Sunil Kumar P, Dhanush D, K Abhishek, Patne Shirish Shivaji, Reddy Mallu P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 654-661

 Year: May 2024

 Downloads: 76

 Abstract

This project presents an innovative solution combining IoT technology with a dual-axis solar tracking system to optimize energy management through load shedding. Load shedding is essential for effective power distribution, especially in regions susceptible to energy shortages. The dual-axis solar tracking system enhances solar panel efficiency by dynamically adjusting its orientation to maximize sunlight exposure. Leveraging IoT capabilities, the system enables real-time monitoring and intelligent decision-making for load shedding based on energy demand and availability. This report outlines the design, implementation, and evaluation of the integrated system, showcasing promising results in energy efficiency and load-shedding effectiveness. The fusion of IoT and solar tracking technologies holds significant promise for addressing energy challenges and promoting sustainable energy practices in various settings.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduion uno, Battery cells,Lcd display,Dc motor,.Matlab simulator.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ONLINE MONITORING AND DETECTION OF FAULTS IN UNDERGROUND CABLES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02094

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02094

  Register Paper ID - 259801

  Title: ONLINE MONITORING AND DETECTION OF FAULTS IN UNDERGROUND CABLES

  Author Name(s): Prof. V K Gupta, Chandana NM, Harshitha, Shree Raksha P Hegde, Deeba Altaf

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 645-653

 Year: May 2024

 Downloads: 69

 Abstract

In urban areas, electrical cables run underground instead of running over, because it does not affected by any adverse effect of weather such as heavy rainfall, snow, thunder storm. Whenever a fault occurs within the underground cable, it is difficult to detect the exact location of the fault for the repair process of particular cable. The proposed system found the point of the exact location of fault. This project is intended to detect the location of the fault in underground cable lines from the base station to exact location in kilometres using an Arduino micro controller kit. In the urban areas, the electrical cable runs in undergrounds instead of overhead lines. Whenever the fault occurs in underground cable it is difficult to detect the exact location of the fault for process of repairing that particular cable. The proposed system finds the exact location of the fault. This system uses an Arduino microcontroller kit and a rectified power supply. Here the current sensing circuits made with a combination of resistors are interfaced to Arduino microcontroller kit to help of the internal ADC device for providing digital data to the microcontroller representing the cable length in kilometres . The fault creation is made by the set of switches. The relays are controlled by the relay driver. A 16*2 LCD display connected to the microcontroller to display the information. In case of short circuit the voltage across series resistor changes accordingly, which is then fed to an ADC to develop precise digital data to a programmed Arduino microcontroller kit that further displays exact fault location from the base station in kilometres. In this project we used IOT thing speak for monitoring. We can monitor through our android phone the WIFI IOT.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino microcontroller, LCD, ADC, Cable Fault, Relay, IOT.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN AND FABRICATION OF SOLAR POWER VACUUM CLEANER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02093

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02093

  Register Paper ID - 259799

  Title: DESIGN AND FABRICATION OF SOLAR POWER VACUUM CLEANER

  Author Name(s): Aruna YV, Anupama DN, Lavanya G, Ramya C

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 638-644

 Year: May 2024

 Downloads: 64

 Abstract

Since the non-renewable resources we now use are going to run out soon, renewable energy is crucial for the modern world. Saving these non renewable energy sources is one step closer with the solar-powered vacuum cleaner. We are more aware of and affected by the effects of climate change now than ever before. The technology that can support us in both our everyday lives and in preserving the environment. We present the Smart Solar dust collection as one workable option that can perfectly alter our way of life, if only slightly. A solar vacuum cleaner can aid in reducing pollution. To capture solar radiation, offer an improved surface for collecting dust, which benefits the environment


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DESIGN AND FABRICATION OF SOLAR POWER VACUUM CLEANER

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TRADITIONAL DATABASE AND ITS PAIN POINTS FOR IMAGE AND TEXT PROCESSING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02092

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02092

  Register Paper ID - 259797

  Title: TRADITIONAL DATABASE AND ITS PAIN POINTS FOR IMAGE AND TEXT PROCESSING

  Author Name(s): Priyanka Desai, Ajay T, Amit Ganesh Bhat, Deepak R, Lohith Kumar H M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 630-637

 Year: May 2024

 Downloads: 71

 Abstract

Efficiency is one of major aspect of the software industry ever since its beginning, serving end-users quickly, and benefiting service providers cost-effetely. All parties involve getting an efficient system. A database management system is a essential part of all software systems effectively, so it makes sense to benchmark the performance of different DBMSs to find the most reliable one. This approach systematically synthesizes results and compare DBMS performance, providing suggestions for industry and research. Database management systems are today's most effective mean to organize data and collects that data which can be used for search and update operations. However, many database systems are available on the market each having their advantages and disadvantages in terms of reliability, usability, security, and performance.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

TRADITIONAL DATABASE AND ITS PAIN POINTS FOR IMAGE AND TEXT PROCESSING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ACCIVUE: REAL TIME ROAD ACCIDENT DETECTION AND ALERT SYSTEM USING DEEP LEARNING NEURAL NETWORKS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02091

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02091

  Register Paper ID - 259796

  Title: ACCIVUE: REAL TIME ROAD ACCIDENT DETECTION AND ALERT SYSTEM USING DEEP LEARNING NEURAL NETWORKS

  Author Name(s): Vijayalaxmi R Y, Anshuman Kumar Dwivedi, Anubhav Agnihotri, Himanshu Prasad, Nabin Acharya

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 624-629

 Year: May 2024

 Downloads: 74

 Abstract

Accidents in India have emerged as a leading cause of fatalities, predominantly attributable to delayed assistance reaching victims rather than the accidents themselves. Particularly in areas with sparse and high-speed traffic like highways, victims often endure prolonged unattended periods, amplifying the risk of fatal outcomes due to delayed medical intervention. This paper introduces AcciVue, a proactive system designed to bolster road safety by employing a real-time accident detection mechanism. AcciVue integrates deep learning neural networks, including Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) networks[1], to analyze CCTV video feeds for timely accident detection. By promptly alerting nearby hospitals and police stations upon detection, AcciVue optimizes emergency response, mitigating accident repercussions and ultimately enhancing road user safety. This innovative approach showcases the transformative potential of deep learning technology in addressing the multifaceted challenges of road safety.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Accidents, Road Safety, Deep Learning, CNN, LSTM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVOLUTIONIZING TALENT ACQUISITION: ADVANCING RESUME CLASSIFICATION WITH ITERATIVE LEARNING TECHNIQUE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02090

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02090

  Register Paper ID - 259795

  Title: REVOLUTIONIZING TALENT ACQUISITION: ADVANCING RESUME CLASSIFICATION WITH ITERATIVE LEARNING TECHNIQUE

  Author Name(s): Asma Taj HA, Amith KB, Abdur Rehman

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 618-623

 Year: May 2024

 Downloads: 79

 Abstract

With the increasing volume of digital resumes, efficient and accurate classification is essential for effective talent acquisition.This research delves into the innovative application of gradient boosting algorithms, a subset of machine learning techniques, for the intricate task of resume classification in the domain of talent acquisition. Gradient boosting methodologies, renowned for their adeptness in iteratively refining predictive models by combining weak learners, present a compelling avenue for bolstering the precision and efficiency of resume categorization systems.Moreover, the research endeavors to unravel the interpretability of gradient boosting models, shedding light on their role in fostering transparency and equity in the recruitment ecosystem. Through this multifaceted inquiry, this study not only advances the frontier of machine learning applications in talent acquisition but also underscores the transformative potential of gradient boosting in revolutionizing resume classification practices, thereby empowering organizations to make data-driven and equitable hiring decisions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Resume, Classification, Machine Learning.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A SOCIAL DISTANCE MONITORING SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02089

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02089

  Register Paper ID - 259793

  Title: A SOCIAL DISTANCE MONITORING SYSTEM

  Author Name(s): Sudarsanan D, Prasun Kumar, Monish Krishna K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 612-617

 Year: May 2024

 Downloads: 82

 Abstract

Social distancing strategies are crucial for halting the development of various air born disease and maintain the distance for various causes. To disrupt the cycle of dissemination, social Distancing is often adhered to carefully. This study presents a technique that may be used to detect instances of social distance breaches in public spaces such as ATMs, malls, and hospitals. By using the suggested approach, it would be easy to keep an eye on people to make sure they are keeping their social distance in the monitored area and to notify them when someone does not adhere to the established boundaries. Installing the suggested deep learning technology-based system will allow coverage up to a predetermined, restricted distance. To complete the task, the algorithm uses real-time IP camera footage. The simulated model employs a YOLO model trained on the COCO dataset to detect individuals in the frame, then deep learning methods with the OpenCV library to estimate the distance between them.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Deep learning, OpenCV YOLO model, COCO dataset, Image processing,

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TRAFFIC PREDICTION FOR INTELLIGENT TRANSPORTATION SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02088

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02088

  Register Paper ID - 259791

  Title: TRAFFIC PREDICTION FOR INTELLIGENT TRANSPORTATION SYSTEM

  Author Name(s): Karangula Navya, Dhanush M, G Chaithanya Reddy, Harshith K, Dhanush M N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 606-611

 Year: May 2024

 Downloads: 57

 Abstract

Machine learning and feature extraction play a very importance in the Internet and health department. The traffic environment consists of everything that can affect traffic on the road, be it traffic lights, accidents, rallies, even road repairs that can cause a large amount of congestion. If we somewhat have imprecise prior information on all of the above and many other everyday situations that can affect traffic, then the driver or rider can make somewhat of an informative decision. Needless to say, it also helps in contributing to the future of autonomous vehicles! In the current decades, traffic data is significantly generated exponentially and we slightly have moved towards embracing big data concepts for transportation. This interesting fact really inspired us to somewhat work on the issue of traffic flow prediction, sort of based on traffic data and models.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic prediction, Intelligent Transportation Systems, Random Forest and KNN

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BREAST CANCER PREDICTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02087

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02087

  Register Paper ID - 259790

  Title: BREAST CANCER PREDICTION

  Author Name(s): Prof.Shivakumar.M, Kokila R, Likitha B S, Tharun N, Adishesha.R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 600-605

 Year: May 2024

 Downloads: 68

 Abstract

This final-year project aims to analyse and detect Breast Cancer . Womens are highly suffered from breast cancer,with huge medical problems caused by a treatment(Morbidity) and destined to die(Mortality). Due to lack of prediction models the accuracy of prediction or detection of breast cancer if difficulty. Because of this the prediction time and the patient duration for sustaing time need to be prolonged. Hence to predict early the technique or model is designed to give prediction accuracy exactly. In this SVM, DT, GaussianNB and KNN are the four algorithms used to predict breast cancer results compared with large and different datasets. The proposed model is selected to predict the result of many techniques and correct technique is used depending upon the treatment. This model is based on getting and future studies can be done to predict other methods it can be categorised on basisi of other methods.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Breast Cancer, Machine learning, Support Vector Machine, Decision Tree, KNN and GaussianNB.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INTEGRATING COMPUTER VISION IN GAME DESIGN: A MULTI-GAME MENU SYSTEM POWERED BY OPENCV

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02086

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02086

  Register Paper ID - 259788

  Title: INTEGRATING COMPUTER VISION IN GAME DESIGN: A MULTI-GAME MENU SYSTEM POWERED BY OPENCV

  Author Name(s): Megha Sharma, Sahil Raju Jadhav, M Shivashankar, Vinyas M S, Sharath M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 593-599

 Year: May 2024

 Downloads: 79

 Abstract

The rapid developments in machine learning and computer vision have revolutionized many industries, most notably the gaming business. This project makes use of OpenCV in conjunction with Tkinter, a popular Python GUI toolkit, to create an aesthetically pleasing and user-friendly menu system that enables simple and quick game selection. This project includes a menu that enhances interactivity inside four bespoke games (Quiz, Eat the Fruit, Rock-Paper-Scissors, and Number Guessing) by combining OpenCV's image recognition and gesture detection. These games strive to surpass user expectations and showcase the potential of computer vision in gaming by utilizing OpenCV's real-time responsiveness and dynamic interaction features. This invention raises the bar for interactive, user-centered game.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Computer Vision, OpenCV, Tkinter, Interactive Gaming, Game Selection Menu, Real-Time Interaction, Gesture Detection, Image Recognition, Gaming Innovation.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GENCHAT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02085

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02085

  Register Paper ID - 259786

  Title: GENCHAT

  Author Name(s): Priyanaka Desai, Sankarapu Jagati, Varshini C, Shrilakshmi D, SP Harshini Sheasha Sayee

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 587-592

 Year: May 2024

 Downloads: 72

 Abstract

Visually impaired people are not comfortable reading and writing. Hence, an application is being developed to enable blind individuals to read printed text with a camera by simply tapping on the screen using a speech engine. Additionally, a talking calculator has been designed so that visually impaired people can utilize it via voice commands. Alongside these features, several applications have been incorporated to assist blind individuals in their everyday lives. The application also displays the user's current location and provides weather information for any city or location. With the help of an object detection system, blind individuals can easily identify objects through the camera and listen to their names[1]. Furthermore, they can transfer money using a phone number or account number through a voice-based payment system implemented in the project. The application requires minimal effort from the user to be used effectively during daily activities. With the rapid growth of wireless communications, there is an increasing need for voice recognition techniques. Voice applications based on voice interfaces, recognition, and dialogue management can help users focus on their current tasks without requiring extra effort from their hands or eyes. The application listens to commands and responds with voice prompts.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

OCR recognition, Calculator, location detector, Weather detector, text-to speech, Object detection, android

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REAL-TIME MONITORING OF MACHINE HEALTH IN MANUFACTURING INDUSTRY -AN INDUSTRIAL IOT APPLICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02084

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02084

  Register Paper ID - 259785

  Title: REAL-TIME MONITORING OF MACHINE HEALTH IN MANUFACTURING INDUSTRY -AN INDUSTRIAL IOT APPLICATION

  Author Name(s): Jayashree N, Meghana D, Rakshitha A, Rohitha K N, Sharanya V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 579-586

 Year: May 2024

 Downloads: 71

 Abstract

This proposal advocates for the integration of Industrial Internet of Things (IoT) technologies in the industry to enhance production efficiency and sustainability. Leveraging smart monitoring through IoT-based equipment, the initiative focuses on optimizing energy usage, detecting early machine failures, and ensuring precise temperature control. Implementation involves energy meters for daily voltage regulation, thermal sensors for cost-effective failure detection, and temperature sensors for climate control. By reducing downtime, operational costs are minimized, environmental impact is lowered, and pharmaceutical production becomes more sustainable and economically viable. This innovative approach aligns with the industry's high demand, promoting enhanced product quality, safety, and overall efficiency. In simpler terms, our strategy utilizes smart monitoring to keep machines running smoothly, save costs, and maintain pharmaceutical production quality and safety


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Predictive Maintenance, Early detection, Reduce Downtime, Energy Optimization

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ENCRYPTION USING AES AND VISUAL CRYPTOGRAPHY THROUGH LSB

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02083

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02083

  Register Paper ID - 259784

  Title: ENCRYPTION USING AES AND VISUAL CRYPTOGRAPHY THROUGH LSB

  Author Name(s): Kavya V R, Nisarga S Gowda, Aishwarya P, Nafza A

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 573-578

 Year: May 2024

 Downloads: 64

 Abstract

A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever-increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need automatically translates to the requirement of increased network security and better and fast encryption algorithms. This paper addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half of the message is encrypted using AES and the second share of the message is embedded in the image using LSB.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ENCRYPTION USING AES AND VISUAL CRYPTOGRAPHY THROUGH LSB

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DISTANCE BASED TOLL WAY AUTOMATION: "USING RFID and ANPR FOR CONTACTLESS & QUEUELESS TOLLS"

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02082

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02082

  Register Paper ID - 259783

  Title: DISTANCE BASED TOLL WAY AUTOMATION: "USING RFID AND ANPR FOR CONTACTLESS & QUEUELESS TOLLS"

  Author Name(s): Shoma R S, Naveen Kumar C, Sangram Singh Thakur, Sharath N, Sridhar R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 567-572

 Year: May 2024

 Downloads: 92

 Abstract

"Distance-Based Toll Way Automation: Using RFID & ANPR for Contactless & Queue-less Tolls" presents a model aimed at showcasing an innovative approach to modernizing highway toll collection. Through the integration of Radio Frequency Identification (RFID) and Automatic Number Plate Recognition (ANPR) technologies, our model eliminates the need for physical toll gates, offering a contactless and queue-less tolling experience. Dynamic pricing mechanisms are introduced to ensure fairness in toll charges, promoting efficient resource allocation and optimizing revenue generation. By prioritizing data privacy and security, our model provides a user-friendly interface for commuters, enhancing overall satisfaction and promoting trust in the tolling system. While implemented at a demonstration scale, this model serves as a proof of concept for the feasibility and effectiveness of distance-based toll way automation. It represents a significant step towards realizing a more accessible, efficient, and equitable tolling infrastructure for highways, contributing to improved traffic management and urban mobility.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Toll way automation, RFID, ANPR ,Contactless toll collection, Queue-less tolls, Dynamic pricing, Highway infrastructure, Traffic management, Transportation technology, Tolling efficiency, Road safety, Urban mobility, Toll collection optimization

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTION OF DIABETIC EYE DISEASE FROM RETINAL IMAGES USING A DEEP LEARNING BASED ON CENTERNET AND DENSENET MODEL

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02081

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02081

  Register Paper ID - 259781

  Title: DETECTION OF DIABETIC EYE DISEASE FROM RETINAL IMAGES USING A DEEP LEARNING BASED ON CENTERNET AND DENSENET MODEL

  Author Name(s): Sapna, Jaipriya M, Pavithra Sri S, Kausalya V, Abhinaya K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 560-566

 Year: May 2024

 Downloads: 81

 Abstract

Diabetic patients are prone to eye disease called Diabetic Retinopathy that affects blood vessels of the retina of diabetic patients. Diabetic retinopathy stands as a foremost cause of vision impairment globally. The earliest diabetes-related changes in the retina are often imperceptible and have minimum impact in the vision and thus approximately one third of the diabetic patients have DR but show no symptoms, leading to the progression of the disease untreated. The complexity of screening methodologies for diabetic eye diseases and the shortage of adequately trained personnel render the development of effective screening-oriented treatments a financially burdensome endeavor. Our proposed framework demonstrates proficiency in accurately localizing and categorizing disease lesions within retinal images thus facilitating automated detection and recognition of diabetic retinopathy, thus enabling early detection for efficient treatment with low cost and high accuracy


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Diabetic Eye Disease, Diabetic Retinopathy, Deep Learning, Retinal Disease.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SIGNATURE FORGERY DETECTION USING ONE-SHOT LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02080

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02080

  Register Paper ID - 259779

  Title: SIGNATURE FORGERY DETECTION USING ONE-SHOT LEARNING

  Author Name(s): Bharani B R, Suman Singh, Nikhil Parag, Keerthana

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 554-559

 Year: May 2024

 Downloads: 62

 Abstract

Recently, the problem of signature forgery detection attracted significant attention due to various applications: banking, legal, and security . Existing methods require extensive volumes of data for training, making signature detection less accurate and convenient. This paper designs a novel methodology for signature forgery detection that requires one-shot learning.Furthermore, we introduce a novel similarity metric tailored for signature forgery detection, which captures the subtle differences between genuine and forged signatures. This metric facilitates the identification of forged signatures even in cases where the forgeries closely resemble genuine signatures.By training the siamese network on the genuine signature samples, we produced the synthetic forgery samples using sufficiently powerful data augmentation techniques which can allow the network to learn and easily differentiate between the genuine and the forgery signature samples. Our proposed method outperforms existing approaches and demonstrates a high potential for implementation in practice across various realms where the signature authentication needs for security and authenticity verfication.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Signature forgery detection, One-shot learning, Siamese neural networks, Data augmentation, Similarity metric

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Elevate the Online Shopping Experience using Augmented Reality (AR) and Artificial Intelligence (AI) for Enhanced Apparel Recommendations

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02079

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02079

  Register Paper ID - 259777

  Title: ELEVATE THE ONLINE SHOPPING EXPERIENCE USING AUGMENTED REALITY (AR) AND ARTIFICIAL INTELLIGENCE (AI) FOR ENHANCED APPAREL RECOMMENDATIONS

  Author Name(s): Loganathan D, Aman Kumar Mishra, Aniket Kumar, Janardhan M, Manikant Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 547-553

 Year: May 2024

 Downloads: 74

 Abstract

Utilizing cutting-edge technology solutions, the integration of Artificial Intelligence and Augmented Reality has significantly enhanced the traditional clothing shopping experience. Customers can virtually try on clothing and accessories, all from the comfort of their own homes. With specialized software and 3D modelling, customers can upload their images or avatars and virtually "try on" various outfits in real-time, achieving a higher degree of accuracy in sizing and fit predictions. This cutting-edge concept offers an immersive and highly interactive shopping experience, empowering customers to not only see how different clothing items fit and look on them but also providing accurate size recommendations through AI technology. Additionally, the integration of AR in virtual trial rooms enhances the virtual shopping experience by allowing customers to explore products in a more realistic and engaging way, ultimately enhancing their confidence in making online fashion purchases while reducing the need for physical store visits.(Abstract) Keywords-- Artificial Intelligence, 3D, machine learning, Augmented Reality


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Elevate the Online Shopping Experience using Augmented Reality (AR) and Artificial Intelligence (AI) for Enhanced Apparel Recommendations

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ATTENDANCE SYSTEM USING FACIAL RECOGNITION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02078

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02078

  Register Paper ID - 259776

  Title: ATTENDANCE SYSTEM USING FACIAL RECOGNITION

  Author Name(s): Megha Sharma, Gayathri M S, Gayathri Madhumitha G S, Kahkashan

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 542-546

 Year: May 2024

 Downloads: 86

 Abstract

The face is an important part of the human body, it recognizes people in huge gatherings. The recognition of face has gained the attention of many researchers and has subsequently become the standard benchmark in the human recognition space. An attendance system using facial recognition is a type of biometric technology. It identifies and verifies the identity of a person from a digital image. Accurate attendance records are critical to class evaluation. However, manual attendance tracking can lead to errors, missed students, or duplicate records. A class image is taken and the RECOGNIZER python file is run. Attendance is done by cropping the faces in the image and it is comapared with the database faces.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Python; OpenCV and Google API; Student attendance; Face recognition

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTION OF FAKE CURRENCY USING MACHINE LEARNING TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02077

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02077

  Register Paper ID - 259774

  Title: DETECTION OF FAKE CURRENCY USING MACHINE LEARNING TECHNIQUES

  Author Name(s): Karangula Navya, Baksam Chiranjeevi, Danush M, Hariharan M S, Lalith Kumar S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 536-541

 Year: May 2024

 Downloads: 72

 Abstract

The proliferation of fake currency presents a significant and multifaceted challenge, posing a genuine threat to both the welfare of individuals and the stability of our national economy. While counterfeit detection systems are prevalent in banks and corporate environments, their accessibility to the general public and small enterprises remains limited, leaving them susceptible to counterfeit currency. advanced image processing techniques. This currency verification system has been fully developed using the Python language within the Jupyter Notebook environment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Fake currency, counterfeit detection, image processing, feature extraction, Bruteforce matcher

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FIRE FIGHTING ROBOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02076

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02076

  Register Paper ID - 259773

  Title: FIRE FIGHTING ROBOT

  Author Name(s): Bharani B R, Vinay N, Vasu S, Yashas V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 531-535

 Year: May 2024

 Downloads: 84

 Abstract

This abstract presents a cutting-edge autonomous firefighting robot system designed to tackle the escalating challenges posed by fires worldwide. Integrating robotics, artificial intelligence, and advanced firefighting equipment, the system offers a versatile and effective solution for extinguishing fires while prioritizing the safety of both responders and civilians. Equipped with sensors for heat, smoke, and obstacle detection, the robot navigates complex environments with precision, swiftly locating and suppressing fires using high-pressure water cannons or foam dispensers. Powered by sophisticated algorithms for autonomous operation, the robot demonstrates remarkable adaptability and efficiency in dynamic firefighting scenarios. With built-in safety features and validated effectiveness through rigorous simulations and real-world experiments, this system represents a significant leap forward in firefighting technology, promising to enhance response capabilities and minimize risks in the face of escalating fire emergencies.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Firefighting robot, prototype, sensors, navigation, fire suppression

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: T20 CRICKET WORLD CUP 2024 PREDICTION USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02075

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02075

  Register Paper ID - 259771

  Title: T20 CRICKET WORLD CUP 2024 PREDICTION USING MACHINE LEARNING

  Author Name(s): Sudarsanan D, Mohammed Mafaaz Chandwale, Ryan Ahmed, Harsh Nath Mishra

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 526-530

 Year: May 2024

 Downloads: 85

 Abstract

This study applies machine learning (ML) techniques to predict Cricket World Cup winners, using historical data, team performances, and player stats. Comprehensive datasets from past tournaments are analyzed with algorithms like Random Forests and Logistic Regression, enhanced through cross-validation. Models are trained on diverse match scenarios and team performance data, aiming to forecast the champion accurately


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Component, formatting, style, styling, insert.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ENHANCING LIBRARY CHATBOT USING MACHINE LEARNING WITH READ ALOUD TECHNOLOGY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02074

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02074

  Register Paper ID - 259770

  Title: ENHANCING LIBRARY CHATBOT USING MACHINE LEARNING WITH READ ALOUD TECHNOLOGY

  Author Name(s): Loganathan D, Navya Shree A, Saatwik Naik, Sagar C, Usha V A

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 518-525

 Year: May 2024

 Downloads: 76

 Abstract

Enhancing Library Chatbot Using Machine Learning with Read-Aloud Technology project aims to enhance user experiences and Uses streamline Framework as it's Front end and leveraging conversational AI technology. This Chatbot will serve as a virtual assistant, providing users with quick and convenient access to information about library resources, such as books, opening hours, and events. Additionally, it will assist in answering common library-related questions, guiding users through the library's physical layout, and recommending books based on their preferences. The Chatbot will offer 24/7 support. It will incorporate natural language processing capabilities to understand and respond to user queries effectively and has Read-aloud technology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Library Chatbot, Read aloud Technology, machine learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NETWORK BREACH PREDICTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02073

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02073

  Register Paper ID - 259768

  Title: NETWORK BREACH PREDICTION

  Author Name(s): Kavya V R, Bhagya Ravi Kumar, Divya G R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 514-517

 Year: May 2024

 Downloads: 62

 Abstract

Establishing data for an Intrusion Detection System (IDS) typically entails configuring the actual working environment to explore potential attacks, a process that can be prohibitively costly. However, such software is crucial for safeguarding computer networks against unauthorized access, including from potential insiders. The task of training an intrusion detector involves developing a predictive model, often a classifier, capable of distinguishing between "bad" connections (intrusions or attacks) and "good" regular connections.To address the expense and complexity associated with real-world testing, this study focuses on predicting whether connections are under attack using the KDDCup99 dataset and various machine learning methods. The objective is to enhance packet connection predictions for better accuracy, particularly in identifying DOS, R2L, U2R, Probe, and overall attacks. This involves evaluating and comparing supervised classification algorithms to identify the most accurate predictive results. Additionally, the study assesses algorithm performance through classification reports, confusion matrices, and data prioritization.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NETWORK BREACH PREDICTION

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CANEGUIDEX: SMART OBSTACLE RECOGNITION AND VOICE ASSISTANT FOR THE BLIND

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02072

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02072

  Register Paper ID - 259767

  Title: CANEGUIDEX: SMART OBSTACLE RECOGNITION AND VOICE ASSISTANT FOR THE BLIND

  Author Name(s): Sunil Kumar K N, Mahalakshmi K, Gayathri T, Amulya A

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 506-513

 Year: May 2024

 Downloads: 81

 Abstract

"CaneGuideX" incorporates sophisticated equipment to assist the blind. It enhances safety and liberty for individuals exploring new situations by using smart obstacle detection algorithms to detect and evaluate their surrounds in real-time. It offers clear direction and thorough descriptions of barriers through voice aid, making navigation simple and effective. By providing thoughtful, proactive assistance, this ground-breaking technology transforms the way blind people use canes, allows them to move with assurance and independence. With its ability to extend the gap between those with blind people and the surroundings around them and promote greater diversity and autonomy in daily activities, CaneGuideX is a significant leap in accessibility technology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Obstacle Detection, YOLO, Deep Learning, Raspberry pi, Text-to-Speech(tts).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART VEHICLE PARKING SYSTEM ON FOG COMPUTING FOR EFFECTIVE RESOURCE MANAGEMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02071

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02071

  Register Paper ID - 259766

  Title: SMART VEHICLE PARKING SYSTEM ON FOG COMPUTING FOR EFFECTIVE RESOURCE MANAGEMENT

  Author Name(s): Shoma R S, Mubarak Pasha M, Rakesh M, Rakshith Kumara R, R Dhanush Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 501-505

 Year: May 2024

 Downloads: 84

 Abstract

The rising number of vehicles on roads has led to like increased demand for parking spaces, necessitating more efficient and super responsive parking systems. This abstract proposes a super cool smart car parking system utilizing fog computing technology to address so many latency issues inherent in those conventional systems! By employing a combination of many sensors, cameras, and edge devices, the proposed system gathers and processes parking-related data in really real-time, generating like really significant data volumes that require so efficient management! Fog computing extends cloud services to that network edge, reducing latency and congestion by processing data closer to its source. However, resource management remains a such as challenge in fog computing implementation, requiring effective allocation of computing resources across edge devices to really optimize throughput and reduce latency. This research contributes to the development of intelligent parking systems by proposing a fog computing-based approach that optimizes resource utilization and enables real-time processing for efficient parking management.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SMART VEHICLE PARKING SYSTEM ON FOG COMPUTING FOR EFFECTIVE RESOURCE MANAGEMENT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Voice Controlled Autonomous Vehicle For Physically Challenges Civilians

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02070

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02070

  Register Paper ID - 259765

  Title: VOICE CONTROLLED AUTONOMOUS VEHICLE FOR PHYSICALLY CHALLENGES CIVILIANS

  Author Name(s): Jayashree N, Mohammed Moin Ulla Khan, Nafisa Banu G, Poornima B, Sneha V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 495-500

 Year: May 2024

 Downloads: 83

 Abstract

They are used to doing work that humans cannot perform. Hand gestures and voice are two of the most powerful communication techniques. Robotics can be used in many of these scenarios to minimize human error and to make work safer and easier. Defense, industrial robotics, vehicle part assembling industries in the civil side and medical field for surgery are the major fields that prefer hand gesture/voice recognition robots. Robot devices are tougher to control with the help of buttons and switches. It will get difficult and tedious to operate buttons and remote controls.Our project deals with the interface of robots through voice and gesture control. The purpose of this gesture recognition and voice recognition method is to capture human hand gestures, voice and perform applications and move in an individual path that meets the user's demands. This project aims to use these two methods to control a robotic car from a long distance without using any physical contact.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Voice Controlled Autonomous Vehicle For Physically Challenges Civilians

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AUTOMATION ENGINE LOCKING THROUGH ALCOHOL DETECTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02069

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02069

  Register Paper ID - 259764

  Title: AUTOMATION ENGINE LOCKING THROUGH ALCOHOL DETECTION

  Author Name(s): Preethi S, Kaushik P, Kavya N, Kuruba Suresh, Madhuri R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 490-494

 Year: May 2024

 Downloads: 70

 Abstract

The current situation indicates that drunk driving is the primary cause of traffic accidents. Every manual effort aimed at curbing alcohol-related driving is undermined by law enforcement officials limited capabilities. Thus the requirements for an alcohol detection device that is not limited by time or space exists .This project describes the layout and focus of an Arduino UNO and ultrasonic sensor-based engine locking alcohol detector for automobiles. When the amount of alcohol in the alcohol detection sensor rises above a certain threshold, the equipment will continuously measure the alcohol content and cut off the vehicle's engine. The concept offers a practical way to reduce drink driving-related accidents.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino UNO, MQ3 Sensor, Buzzer, LED, DC Motor , Relay Switch

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SEARCH JOB ROLES WITH RIGHT SET OF SKILLS USING DATA ANALYSIS AND VISUALIZATION SYSTEM-SKILLSYNC.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02068

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02068

  Register Paper ID - 259763

  Title: SEARCH JOB ROLES WITH RIGHT SET OF SKILLS USING DATA ANALYSIS AND VISUALIZATION SYSTEM-SKILLSYNC.

  Author Name(s): Asma Taj H A, Shekh Md moinuddin, Syed shariq kamran, Selim jhangir, Murari kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 483-489

 Year: May 2024

 Downloads: 78

 Abstract

SkillSync is the bridge that connects talent to opportunity, offering an open-source platform where skills are showcased, discovered, and perfectly matched with the ideal job roles. This project seeks to revolutionize the way we approach the workforce, providing a plethora of benefits, including enhanced efficiency, reduced costs, and an expansive network of skills that now have the chance to shine


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Component, formatting, style, styling, insert.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NETWORK INTRUSION DETECTION SYSTEM USING ML

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02067

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02067

  Register Paper ID - 259762

  Title: NETWORK INTRUSION DETECTION SYSTEM USING ML

  Author Name(s): Anusha B, L S Sai Harika, Nikhil Kumar, Diksha Manu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 477-482

 Year: May 2024

 Downloads: 32

 Abstract

In the face of increasingly complex cyber threats, the necessity for robust Network Intrusion Detection Systems (NIDS) has never been greater. Conventional rule-based systems often struggle to keep pace with evolving attack methodologies, necessitating the integration of machine learning (ML) techniques to bolster detection capabilities. This paper puts forward an innovative NIDS approach that leverages ML algorithms to effectively detect and mitigate network intrusions. Our proposed system utilizes supervised learning algorithms trained on labelled network traffic data to differentiate incoming traffic as normal or malicious. By harnessing extensive labelled data, our system can discern intricate patterns and anomalies indicative of malicious activities, thereby enhancing detection accuracy and reducing false positives. Additionally, the system incorporates detection methods for anomalies in network traffic to uncover previously unseen threats by detecting deviations from established baseline behaviour. Key features of our NIDS include real-time monitoring, scalability to accommodate large network infrastructures, and adaptability to dynamic environments. Through Ongoing adaptation through the incorporation of fresh data and refinement of detection algorithms, our system offers proactive defence against a wide spectrum of cyber threats, including known and zero-day attacks. In our evaluation, we demonstrate the effectiveness of our ML-based NIDS through comprehensive experimentation on diverse datasets, demonstrating its enhanced effectiveness in comparison to traditional rule-based approaches. Our results underscore significant enhancements in both detection rates and false positive mitigation, underscoring the potential of ML in bolstering network security defences against evolving cyber threats.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NETWORK INTRUSION DETECTION SYSTEM USING ML

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STOCK MARKET PRICE PREDICTION USING DECISION TREE AND MACHINE LEARNING ALGORITHMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02066

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02066

  Register Paper ID - 259761

  Title: STOCK MARKET PRICE PREDICTION USING DECISION TREE AND MACHINE LEARNING ALGORITHMS

  Author Name(s): Shivakumar M, Syed Siddiq Pasha, Vikas, Chethan Reddy HR, Rahul SV

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 471-476

 Year: May 2024

 Downloads: 78

 Abstract

The main cause of this article is to find the great version to predict market charges. while we recollect the many strategies and adjustments to recall, we discover that strategies which includes random forests and support vector machines are ineffective. In this newsletter, we are able to recommend and examine a extra powerful technique to more appropriately are expecting the movement of items. First, we don't forget enterprise rate information from the previous year. The data set is pre-processed and adjusted for accurate evaluation. because of this, our article also specializes in preliminary information of the authentic facts. Secondly, after finishing the initial information, we are able to look at using random forests and assist vector machines on statistics units and the effects they produce. similarly, this study examines using these estimates within the real global and the problems associated with the accuracy of these values. the object additionally introduces gadget mastering fashions to expect the lifespan of competitive products. The successful supplying of merchandise will become a superb fee for companies and provide real answers to the issues faced by means of investors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

STOCK MARKET PRICE PREDICTION USING DECISION TREE AND MACHINE LEARNING ALGORITHMS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STUDENT CAREER GUIDANCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02065

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02065

  Register Paper ID - 259760

  Title: STUDENT CAREER GUIDANCE

  Author Name(s): Santosh M, Vidya, Sushma, Yogananda

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 466-470

 Year: May 2024

 Downloads: 75

 Abstract

Upon completing higher secondary education, students around the globe often find themselves at a crossroads, unsure of which career path to pursue. This pivotal moment demands a level of maturity and self-awareness that many students may not yet possess. As individuals progress through these stages, they inevitably confront the question of what to pursue post-graduation. Our proposed solution tackles this challenge with a computerized career guidance system. By objectively assessing individual skills, this system aims to predict the most suitable career path for each student. Through this process, we aim to provide clarity and direction as students navigate their academic and professional journey.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Counsell Career, Learning Algorithms for machines, Classification(key words)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART SAFETY MONITORING SYSTEM FOR SEWAGE WORKERS WITH TWO WAY COMMUNICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02064

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02064

  Register Paper ID - 259759

  Title: SMART SAFETY MONITORING SYSTEM FOR SEWAGE WORKERS WITH TWO WAY COMMUNICATION

  Author Name(s): Anusha.B, Shreyas M, Trishya V, Ventakesh Raju G, Y Shireesha

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 458-465

 Year: May 2024

 Downloads: 65

 Abstract

A large number of sanitation workers die every year due to erratic and lack of facilities available, and harmful toxic gases released while cleaning the sewage. This can include monitoring the environment for air quality, temperature, humidity, and sound levels, as well as tracking employee activity and movement. This project aims to develop an innovative Smart Safety Monitoring System (SSMS) for sewage workers, leveraging the capabilities of the Internet of Things (IoT) technology. Real time health monitoring systems for such workers will prove helpful. Sewage workers face numerous risks while performing their duties in confined and hazardous environments. The SSMS is designed to enhance their safety and improve communication. This real time health monitoring device will work in a sewage as a safety equipment. In this project, the device presented will monitor the pulse rate of a person using a pulse oximetry sensor, the methane concentration and the atmospheric oxygen concentration and provide alert to worker and exterior unit. when parameters deviate from the safe range. This parameters in real time will promptly alert the workers to stay safe and detect toxic gases before any harm.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SMART SAFETY MONITORING SYSTEM FOR SEWAGE WORKERS WITH TWO WAY COMMUNICATION

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INTELLIGENT FLOOD FORECASTING SYSTEM EMPOWERED BY MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02063

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02063

  Register Paper ID - 259758

  Title: INTELLIGENT FLOOD FORECASTING SYSTEM EMPOWERED BY MACHINE LEARNING

  Author Name(s): Dr Preethi S, Kausthub K S, Hemanth M U, Harshavardhan R, Likith A N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 453-457

 Year: May 2024

 Downloads: 43

 Abstract

A groundbreaking flood prediction system emerges, blending meteorological, hydrological, and geospatial data with crowd-sourced inputs, all harmonized within a dynamic machine learning structure. Rigorous assessments affirm its prowess, particularly noting the efficacy of a multi-layer perceptron artificial neural network (MLP ANN) setup in delivering precise forecasts. This pioneering methodology harbors promise in bolstering flood mitigation tactics, streamlining preemptive actions, and fortifying rescue endeavors. This cutting-edge approach marks a pivotal advancement in flood management, poised to revolutionize how communities respond to and mitigate the impacts of inundation events.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

INTELLIGENT FLOOD FORECASTING SYSTEM EMPOWERED BY MACHINE LEARNING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HEART DISEASE PREDICTION SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02062

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02062

  Register Paper ID - 259757

  Title: HEART DISEASE PREDICTION SYSTEM

  Author Name(s): Santosh M, Bindu K V, Bhagyalakshmi N, Arolene cynthia, Kausalya R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 446-452

 Year: May 2024

 Downloads: 70

 Abstract

Cardiovascular diseases, particularly heart disease, remain a leading cause of mortality worldwide, necessitating advanced diagnostic systems that leverage clinical data for early and accurate prediction. Machine Learning integration techniques, particularly ensemble methods, is a way that enhances the precision and reliability of predictive models for heart disease diagnosis. The complex nature of heart diseases demands a comprehensive analysis of clinical data to derive actionable insights. While traditional diagnostic approaches have relied on individual risk factors, the combination of diverse clinical parameters offers a more broad perspective, enabling a more understanding and prediction of cardiovascular outcomes.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Data Classification, Learning Algorithms for machines, Data Analysis

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CONVOLUTIONAL YOGA POSE ESTIMATOR

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02061

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02061

  Register Paper ID - 259756

  Title: CONVOLUTIONAL YOGA POSE ESTIMATOR

  Author Name(s): Vijayalaxmi Yalavagi, Impana S, Chethan M, Chandan L, Geetha Tadasad B

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 438-445

 Year: May 2024

 Downloads: 66

 Abstract

Yoga pose estimation is a computer vision technique used to predict the position/ pose of a part of the human body. This paper presents the framework to analyse and assess yoga postures by designing, developing, and implementing a Yoga Posture Detection System using computer vision and deep learning (DL) models such as CNN and VGG16. The study employs advanced image processing algorithms to extract information from images or videos of individuals performing yoga poses. We employed several postures which includes camel, downdog, goddess, plank, tree, and warrior2. With the use of a deep learning model that has been built, the system is able to precisely recognise and categorise different positions while providing instantaneous feedback on proper alignment, balance, and posture.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CONVOLUTIONAL YOGA POSE ESTIMATOR

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SPEECH BASED EMOTION RECOGNITION USING 1D AND 2D CNN LSTM NETWORKS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02060

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02060

  Register Paper ID - 259750

  Title: SPEECH BASED EMOTION RECOGNITION USING 1D AND 2D CNN LSTM NETWORKS

  Author Name(s): Dr Buddesab, Ajith Kumar SM, Akshay B, Hemanth SR, NJS Vallabh

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 431-437

 Year: May 2024

 Downloads: 70

 Abstract

To label this, a paper has been initiated to create a machine learning model for Speech emotion recognition (SER) involves the identification of emotions conveyed in spoken language through analysis of speech signals. With the growing popularity of voice assistants and smart speakers, SER has gained significant attention in recent years. One approach to SER is to use deep learning models such as "Convolutional Neural Networks " (CNNs) and Long Short-Term Memory (LSTM) networks. In this particular paper, we suggest a novel approach for SER using a 2D CNN- LSTM architecture. The proposed model first uses a 2D CNN to extract the relevant characterstics from the speech signal, followed by a LSTM network for sequence modeling. We evaluated our proposed model on the Berlin Emotional Speech Database (EMO-DB), achieving state-of-the-art results. We also balance our model's performance with other existing SER models and found that our suggested model outperformed them. Our speculative results shows that the proposed 2D CNN-LSTM architecture is an effective method for SER and can be used in real-world applications such as recognition of emotion from voice assistants, call centers, and customer service applications.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, LSTM, 2D CNN LSTM.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: COMPARATIVE ANALYSIS OF REINFORCEMENT LEARNING ALGORITHMS USING A PONG GAME

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02059

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02059

  Register Paper ID - 259749

  Title: COMPARATIVE ANALYSIS OF REINFORCEMENT LEARNING ALGORITHMS USING A PONG GAME

  Author Name(s): Dr.Varalatchoumy M, Dr. Buddesab, Manu R, B Madiha Hafsa, GV Sai Koushik, Kajal Singh

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 424-430

 Year: May 2024

 Downloads: 73

 Abstract

This paper conducts a comparative analysis of four reinforcement learning (RL) algorithms--Q-learning, Deep Q-Networks (DQN), SARSA, and Proximal Policy Optimization (PPO)--using the Pong game as a benchmark. Each algorithm's performance, convergence rate, and computational efficiency are evaluated. Results indicate that while Q-learning and SARSA exhibit simplicity, they struggle with discrete action spaces. DQN, with its capability to handle continuous action spaces, shows improved performance but requires longer training times. PPO demonstrates a balance between sample efficiency and computational complexity, achieving faster convergence and superior performance. This Examination sheds light on selecting appropriate RL algorithms for real-world applications.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Reinforcement Learning, Pong Game, Q-learning, DQN, SARSA, PPO, Comparative Analysis, Performance Evaluation, Convergence Rate, Computational Efficiency.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPARATIVE ANALYSIS OF VISION TRANSFORMERS AND BEiT MODELS FOR IMAGE CLASSIFICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02058

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02058

  Register Paper ID - 259747

  Title: A COMPARATIVE ANALYSIS OF VISION TRANSFORMERS AND BEIT MODELS FOR IMAGE CLASSIFICATION

  Author Name(s): R Geetha, Dr Buddesab, Deepa Shree L, Lisha M, P Aaditya,T Shivani

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 417-423

 Year: May 2024

 Downloads: 60

 Abstract

In recent years, transformer-based models have reshaped the landscape of computer visions, particularly in image classification tasks Vision Transformers (ViT) and BEiT (BERT Pre-Training of Image Transformers) stand out as notable examples, employing self-attention mechanisms. This paper presents a detailed comparative analysis of ViT and BEiT, aiming to elucidate their performance, strengths, weaknesses, and interpretability in image classification Through extensive experimentation across diverse benchmark datasets like CIFAR-10, CIFAR-100, and ImageNet[1], we evaluate the models based on classification accuracy, training efficiency, generalization capability, and robustness to adversarial perturbations Our findings offer insights at nuanced differences between ViT and BEiT, revealing ViT's efficiency and small-scale datasets, while highlighting BEiT's enhanced robustness to adversarial attacks and domain shifts Furthermore, we research the interpretability of learned representations and visualize attention patterns generated. The ability to capture meaningful image features and the comparative analysis not merely informs practitioners and researchers in computer visions but also paves the way for further advancements in transformer-based architectures for visual understanding.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Transformer-based Models, Vision Transformers, BEiT, Image Classification, Self-Attention Mechanisms, Comparative Analysis, Interpretability, Robustness, Adversarial Attacks, Computer Vision.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GENERATIVE AI (GEN AI) BASED VIDEO GENERATION FOR CLASSICAL DANCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02057

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02057

  Register Paper ID - 259745

  Title: GENERATIVE AI (GEN AI) BASED VIDEO GENERATION FOR CLASSICAL DANCE

  Author Name(s): Dr. D. Antony Louis Piriyakumar, Dr Buddesab, Girish Chandra Saxena, Mohammed Adnan, Vidya Bharti, Abhisekh Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 411-416

 Year: May 2024

 Downloads: 60

 Abstract

This paper introduces an innovative fusion of classical dance and artificial intelligence, focusing on the esteemed art form of Bharatanatyam. Our pioneering framework harnesses the power of Generative AI techniques to revolutionize both the creation and experience of Bharatanatyam performances. Through advanced machine learning models, textual descriptions are seamlessly translated into visually captivating dance sequences, effectively capturing the essence and intricacies of this ancient art form. The system not only facilitates the creation of choreography but also offers a user-friendly interface tailored for artists, enthusiasts, and learners alike, thereby fostering unprecedented engagement with Bharatanatyam. By meticulously preserving the grammatical structure and predefined steps inherent in Bharatanatyam, our approach ensures an authentic representation of this rich cultural heritage. Moreover, this project serves as a catalyst for revitalizing classical dance by infusing it with cutting-edge technology, while simultaneously encouraging creative exploration and interpretation. We firmly believe that this harmonious convergence of tradition and technology will not only redefine the boundaries of artistic expression but also significantly impact the future trajectory of cultural preservation and appreciation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Bharatanatyam, Generative AI, Dance Creation, Cultural Heritage, Artistic Expression.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DEEPFAKE VIDEO AND TEXT DETECTION USIG LSTM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02056

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02056

  Register Paper ID - 259744

  Title: DEEPFAKE VIDEO AND TEXT DETECTION USIG LSTM

  Author Name(s): Sumarani H, Dr. Buddesab, Darshil Shukla, Manish Kumar, Anand M Nambiar, Nitesh Kumar Sahu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 403-410

 Year: May 2024

 Downloads: 65

 Abstract

This paper presents a comprehensive framework for combating fake news by integrating deepfake video detection and text analysis techniques. With the proliferation of misinformation, especially through deepfake technology, there is an urgent need for robust detection methods. Our approach involves extracting text from social media posts, generating interrogative sentences, querying a web server for relevant information, and summarizing the authenticity of news, videos, or posts. By combining advanced AI algorithms for deepfake detection and text analysis, our framework offers a powerful solution to enhance the credibility of news sources and combat the spread of misinformation in digital media. Keywords-- Deepfake video detection, Text analysis, Fake news detection, Misinformation, Artificial intelligence (AI), Generative AI, Deep learning (DL), Natural language processing (NLP), social media, Web server querying, Factchecking, Digital media ecology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Deepfake video and Text Detection, LSTM, Artificial intelligence (AI), Generative AI, Deep learning (DL), Natural language processing (NLP).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Driver Drowsiness Detection Using Deep Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02055

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02055

  Register Paper ID - 259743

  Title: DRIVER DROWSINESS DETECTION USING DEEP LEARNING

  Author Name(s): Meghana M, P Anupama, Sandhya A, V Sadhana, Mrs. Ashalatha C R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 397-402

 Year: May 2024

 Downloads: 66

 Abstract

This paper presents a novel approach to driver sleep detection using deep learning techniques to enhance road safety. With the increasing number of accidents caused by drowsy driving, an effective detection system is needed. Our framework uses convolutional neural networks (CNNs) to analyze facial expressions, eye movements and head positions captured by an in-vehicle camera While extracting meaningful features from these inputs , the proposed model differentiates driver warning and sleep states accurately in real time. RNNs) are employed to further improve detection performance Extensive tests on various datasets demonstrate the efficiency and robustness of the proposed method under various lighting conditions and driver characteristics enable integration in onboard systems a it already exists without it. Overall, the proposed deep learning-based method provides a practical and reliable solution to enhance road safety by better detecting driver sleep in world conditions in the self-contained.Cambridge Institute of technology Bangalore, India


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Driver Drowsiness Detection Using Deep Learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Detection of Myocardial Infarction Using ECG Images

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02054

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02054

  Register Paper ID - 259742

  Title: DETECTION OF MYOCARDIAL INFARCTION USING ECG IMAGES

  Author Name(s): Dr.Buddesab, Bhavya Shree C S, Bhuvana C Basavanand, D V Veena, Varsha P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 390-396

 Year: May 2024

 Downloads: 64

 Abstract

This paper presents an innovative approach for myocardial infarction (MI) detection through an ensemble of three distinct models: Support Vector Machine (SVM), Random Forest, and Convolutional Neural Network (CNN). Trained on labeled electrocardiogram (ECG) image datasets, each model is individually optimized for effective discrimination between MI and non-MI cases. The models' unique strengths, encompassing SVM's handling of high-dimensional feature spaces, Random Forest's ensemble learning, and CNN's proficiency in hierarchical feature extraction, are strategically combined through the AdaBoost ensemble method. The resulting ensemble model is rigorously evaluated on a separate set of ECG images, demonstrating its enhanced diagnostic accuracy. Key performance metrics, including accuracy, precision, recall, and F1 score, are presented to assess the ensemble model's robustness in real-world clinical applications. This research contributes to the advancement of medical image classification by showcasing the potential of ensemble methods in improving myocardial infarction detection accuracy.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Myocardial infarction detection, Ensemble learning, Support Vector Machine (SVM), Random Forest, Convolutional Neural Network (CNN), AdaBoost, Electrocardiogram (ECG) images, Diagnostic accuracy, Feature extraction

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DIABETES PREDICTION USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02053

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02053

  Register Paper ID - 259741

  Title: DIABETES PREDICTION USING MACHINE LEARNING

  Author Name(s): Gaanavi H N, Madanika G, Prof. SumaRani H, Dr. Buddesab

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 384-389

 Year: May 2024

 Downloads: 70

 Abstract

In this paper we aim to develop an prediction system using machine learning to detect and classify the presence of diabetes in e-healthcare environment using Ensemble Decision Tree Algorithms for high feature selection. A significant attention has been made to the accurate detection of diabetes which is a big challenge for the research community to develop a diagnosis system to detect diabetes in a successful way in the e-healthcare environment. In this paper we aim to develop an prediction system using machine learning to detect and classify the presence of diabetes in e-healthcare environment using Ensemble Decision Tree Algorithms for high feature selection. A significant attention has been made to the accurate detection of diabetes which is a big challenge for the research community to develop a diagnosis system to detect diabetes in a successful way in the e-healthcare environment. The existing diagnosis systems have some drawbacks, such as high computation time, and low prediction accuracy. To handle these issues, we have proposed diagnosis system using machine learning methods, such as preprocessing of data, feature selection, and classification for the detection of diabetes disease in e- healthcare environment. Model validation and performance evaluation metrics have been used to check the validity of the proposed system. We have proposed a filter method based on the Decision Tree algorithm for highly important feature selection. Two ensemble learning Decision Tree algorithms, such as Ada Boost and Random Forest are also used for feature selection and compared the classifier performance with wrapper based feature selection algorithms also. Machine learning classifier Decision Tree has been used for the classification of healthy and diabetic subjects. The experimental results show that the Decision Tree algorithm based on selected features improves the classification performance of the predictive model and achieved optimal accuracy. Additionally, the proposed system performance is high as compared to the previous state-of-the-art methods. High performance of the proposed method is due to the different combinations of selected features set. Furthermore, the experimental results statistical analysis demonstrated that the proposed method would be effectively detected diabetes disease.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Ensemble learning Decision Tree algorithms, such as Ada Boost and Random Forest

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Real-Time Traffic Sign Recognition and Classification with Deep Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02052

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02052

  Register Paper ID - 259739

  Title: REAL-TIME TRAFFIC SIGN RECOGNITION AND CLASSIFICATION WITH DEEP LEARNING

  Author Name(s): Anusha K V, Dr Buddesab, Ananya V, Malavika G, Mehak Fathima

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 375-383

 Year: May 2024

 Downloads: 93

 Abstract

The assignment "class of site visitors signs and signs and symptoms using deep studying" represents a tremendous expand inside the situation of laptop imaginative and prescient with a completely unique cognizance on the recognition and kind of site visitors signs and symptoms. We used the energy of Python to resolve a complex visitors signal class trouble the usage of prominent models: the MobileNet and YOLOv5 architectures. The MobileNet structure done vast tiers of typical overall performance with a schooling accuracy of 97.00% and a validation accuracy of 98.00%. The quit end result is a set of four,100 seventy carefully curated snap shots overlaying fifty eight education of numerous road symptoms, which incorporates speed limits, site visitors signs and symptoms, prohibition symptoms and signs, threat warnings, and additional. the ones hours cover the overall range of site visitors rules and offer complete coverage of what is going to be stated. The YOLOv5 implementation introduced real-time road sign reputation using actual-time pictures and webcam statistics. The version changed into professional on a dataset containing 39 specific website online visitors sign instructions. those instructions encompass a enormous style of signs and signs and symptoms at the side of pedestrians, pace limits, warning and regulatory signs, and help you observe your mission to actual-international


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic Sign Recognition, Neural Network Architecture, Object Detection

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Parkinson's Disease Prognosis: Advancements in Early Detection Methods for Parkinson's Disease Enhancing Accuracy for Patient Outcomes

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02051

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02051

  Register Paper ID - 259738

  Title: PARKINSON'S DISEASE PROGNOSIS: ADVANCEMENTS IN EARLY DETECTION METHODS FOR PARKINSON'S DISEASE ENHANCING ACCURACY FOR PATIENT OUTCOMES

  Author Name(s): R Geetha, Rakshitha C, Surbhi Kumari, Meghana M Nayak

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 368-374

 Year: May 2024

 Downloads: 73

 Abstract

This paper proposes a novel approach utilizing machine-gaining knowledge of strategies and Xception architecture for PD detection, focusing on spiral and wave drawings, common diagnostic tools in clinical practice. Through a dataset collection process, including individuals with and without PD, preprocessed data were employed to train machine learning models. Results indicate promising performance, demonstrating the potential of machine learning and Xception architecture in early PD detection. This approach offers advanced accuracy and efficiency in diagnosis, ultimately leading to better patient outcomes and enhanced quality of life.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Parkinson's disease, Neurodegenerative disorder, Machine learning, Xception architecture, Early detection, Diagnosis, Spiral and wave drawings, Clinical practice, Image classification, Convolutional neural networks, Depthwise separable convolutions, Inception modules, Model performance

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Brain Stroke Prediction: A Comparative Analysis of XGBoost, LightGBM, CNN and CNN-LSTM Algorithms

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02050

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02050

  Register Paper ID - 259737

  Title: BRAIN STROKE PREDICTION: A COMPARATIVE ANALYSIS OF XGBOOST, LIGHTGBM, CNN AND CNN-LSTM ALGORITHMS

  Author Name(s): Dr.Varalatchoumy M, Dr. Buddesab, G Deepak, Avanish S Velidi, Chaitanya D,Suhas M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 360-367

 Year: May 2024

 Downloads: 70

 Abstract

This study provides an in-depth examination of sophisticated machine learning techniques for predicting brain strokes using the Healthcare Dataset Stroke Data. Brain stroke prediction is a critical task in healthcare, having the capacity to greatly enhance patient outcomes via early identification and intervention. In this study, We evaluate the effectiveness of four cutting-edge algorithms: Convolution-Based Neural network(CNN), CNN with Long Short-Term Memory (CNN-LSTM) architecture, XGBoost, and LightGBM. We evaluate these algorithms based on their predictive accuracy, sensitivity, specificity, and computational efficiency. Our research clarifies the advantages and disadvantages of each algorithm in the context of brain stroke prediction, providing valuable insights for healthcare practitioners and researchers seeking to leverage machine learning for early stroke detection. This dataset is used to predict whether a patient is likely to get stroke based on the input parameters like gender, age, and various diseases and smoking status. A subset of the original train data is taken using the filtering method for ML and Data Visualization purposes.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Brain stroke prediction, XGBoost, LightGBM, Convolution neural networks (CNN), CNN-LSTM, Early stroke detection, Data visualization, healthcare stroke dataset.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Battery Thermal Management in EV Using AI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02049

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02049

  Register Paper ID - 259736

  Title: BATTERY THERMAL MANAGEMENT IN EV USING AI

  Author Name(s): Prof. Syed hayath, Harsha Vardhan J, Himesh Badiger, Hitesh S, Lavaneeth A Ganji

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 353-359

 Year: May 2024

 Downloads: 52

 Abstract

The increasing popularity of the electric vehicles(EVs) has spurred the need for best battery thermal management systems to ensure optimal performance, longevity, and safety of energy storage systems. It focuses on leveraging Artificial Intelligence (AI) technologies, specifically the Multilayer Perceptron (MLP) algorithm, to enhance the efficiency of battery thermal management in EVs. I algorithms, such as MLP,offers the potential to model and predict the thermal behavior of batteries more accurately, allowing for real- time adjustments and improved control strategies. With the large-scale commercialization and growing market share of electric vehicles (EVs). Their focus has been on higher energy efficiency, an improved thermal performance, and optimized multi- material battery enclosure designs. The combination of simulation-based design optimize the battery pack and Battery Management-System (BMS) is evolving and has expanded to include novelties such as artificialintelligence/machine learning (AI/ML) to improveefficiencies in design, manufacturing, and operations for their application in EVs and energy storage systems. Specific to BMS, these advanced concepts enable a more accurate prediction of battery performance such as its State of Health(SOH), State of Charge(SOC), and State of Power(SOP). This study presents a comprehensive evaluation of the latest developments and technologies in battery design, thermal management, and the applicationof AI in Battery Management Systems(BMS) for electric vehicles (EVs).


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Battery Thermal Management in EV Using AI

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Fingerprint Spoof Detection using Convolutional Neural Networks

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02048

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02048

  Register Paper ID - 259732

  Title: FINGERPRINT SPOOF DETECTION USING CONVOLUTIONAL NEURAL NETWORKS

  Author Name(s): Shivaram A M, Sharath Gowda P, Shivakumar V, K Prajwal, Susheel Kumar S K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 348-352

 Year: May 2024

 Downloads: 83

 Abstract

With the growing use of authentication systems in the recent years, fingerprint spoof detection has become increasingly important. In this model, we use Convolutional Neural Networks (CNN) for fingerprint spoof detection. Our system is trained on the datasets used in The Liveness Detection Competition of years 2009, 2011 and 2013, which comprise almost 50,000 real and fake fingerprints images. The CNN is pre-trained on natural images and fine-tuned with the fingerprint images, CCN with random weights, and a classical Local Binary Pattern approach. The project shows that pretrained CNNs can yield state-of-the-art results with no need for architecture or hyperparameter selection. Dataset Augmentation is used to increase the classifiers performance, not only for deep architectures but also for shallow ones. We also report good accuracy on very small training sets (400 samples) using these large pre-trained networks. The model achieves an overall rate of 97.1% of correctly classified samples - a relative improvement of 16% in test error when compared with the best previously published results


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Fingerprint recognition, Feature extraction, Convolutional neural network

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CONVERTING PODCAST EPISODES INTO TEXT FORMAT AND SUMMARIZING THEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02047

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02047

  Register Paper ID - 259730

  Title: CONVERTING PODCAST EPISODES INTO TEXT FORMAT AND SUMMARIZING THEM

  Author Name(s): Dr. Sandeep Kumar, Mr. Arun S Adiga, Mr. R N Ravi, Mr. M Hitesh, Mr. Suhas B T

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 342-347

 Year: May 2024

 Downloads: 89

 Abstract

The "Converting podcast episodes into text format and summarizing them" project aims to automate the process of summarizing podcasts, making it convenient for users to quickly grasp the key points of lengthy audio content. The process begins with data collection, where podcast episodes are gathered either as transcripts or audio files. For transcripts, preprocessing techniques are applied to clean the text data, removing unnecessary characters and tags. For audio files, speech recognition tools are employed to convert spoken words into text. The summarization techniques primarily include both extractive and abstractive methods.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CONVERTING PODCAST EPISODES INTO TEXT FORMAT AND SUMMARIZING THEM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANIMAL SPECIES RECOGNITION USING TRANSFER LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02046

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02046

  Register Paper ID - 259729

  Title: ANIMAL SPECIES RECOGNITION USING TRANSFER LEARNING

  Author Name(s): Dr. Shashikumar D R, Bhuvan L Poojari, Muyeez Pasha, Pawan Kumar Patel R, Vivek Singh

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 331-341

 Year: May 2024

 Downloads: 59

 Abstract

Automatically identifying animal species in images is vital for ecology, conservation, and biodiversity studies. Deep learning, particularly convolutional neural networks (CNNs), has become a powerful tool for this task. We compared five pre-trained CNN models (AlexNet, VGG16, VGG19, ResNet50, InceptionV3) on a dataset of 20 animal species with 19 classes from KTH-Animal dataset and one class from Kaggle dataset. Our approach involved fine-tuning these models with pre-extracted features. We evaluated accuracy, precision, recall, F1 score, false acceptance rate (FAR), and false rejection rate (FRR).VGG16 achieved the highest accuracy (95.73%) and F1 score (0.94), excelling at correctly identifying animals with minimal misclassifications (FAR and FRR of 5% each). InceptionV3 followed closely (94.51% accuracy, 0.95 F1 score). AlexNet and ResNet50 showed a trade-off between precision and recall, making them potentially useful for specific needs. This study highlights the effectiveness of pre-trained features in CNNs for animal species recognition, especially after fine-tuning. This approach reduces reliance on large, labeled datasets, making it valuable for ecological applications with limited data. Our VGG16-based approach outperforms previous works, showcasing the potential of deep learning for animal species recognition


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Animal species recognition, deep convolutional neural networks, transfer learning, camera-trap, KTH dataset.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STOCKSAGE Stock Price analysis and prediction using Deep Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02045

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02045

  Register Paper ID - 259728

  Title: STOCKSAGE STOCK PRICE ANALYSIS AND PREDICTION USING DEEP LEARNING

  Author Name(s): Dr. Jayanthi MG, Aishwarya Iyer, Harshit Tibrewal, Himanshu Srivastava, Mohit Baroliya

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 323-330

 Year: May 2024

 Downloads: 67

 Abstract

Stocksage is a transformative project aimed at revolutionizing stock market participation. By tackling barriers like financial literacy and market complexities, it empowers users with cutting-edge tools. The platform integrates Web Development upon machine learning and regression algorithms for predictive insights, fosters financial literacy, and promotes inclusive and informed investment decisions, both nationally and globally. Beyond its technical sophistication, Stocksage aspires to be an educational resource, promoting financial literacy and understanding of stock market dynamics. By addressing the multifaceted challenges faced by investors, Stocksage endeavors to unlock the latent potential of the stock market, empowering individuals to make informed decisions and participate actively in wealth creation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Stock Market, Financial Literacy, Web Development, Machine Learning, Deep Learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Fake News Detection Using Deep Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02044

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02044

  Register Paper ID - 259727

  Title: FAKE NEWS DETECTION USING DEEP LEARNING

  Author Name(s): Dr. Sandeep Kumar, Allada Venkateshwar Rao, Mohammed Asif, Sabeel Ur Rahman, Shariq Mushtaq Bhat

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 313-322

 Year: May 2024

 Downloads: 56

 Abstract

Distinguishing between authentic and fraudulent information has grown more challenging in the modern information landscape owing to the quick spread of news via digital channels. This project creates and implements a system for detecting fake news that uses state-of-the-art deep learning techniques, specifically Long Short Term Memory (LSTM) neural networks, to address this issue


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Fake News, LSTM, Deep Learning, Neural Network

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Implementation of Citechgram using Cloud Computing and Web Technology

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02043

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02043

  Register Paper ID - 259726

  Title: IMPLEMENTATION OF CITECHGRAM USING CLOUD COMPUTING AND WEB TECHNOLOGY

  Author Name(s): Dr. Manjunatha S, Harshitha S, Manjuntha N, Mehnaz Banu A, Bharatesh Chandrasekhar Patel

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 302-312

 Year: May 2024

 Downloads: 78

 Abstract

Citechgram is a social media platform that draws its inspiration from Twitter and it serves Cambridge University students alone. In this research, we will discuss the possibilities of using cloud computing and web development technologies in building Citechgram. Citechgram can provide an adaptable, safe, and dynamic platform for Cambridge students to connect with each other, share ideas and create a vibrant online community by exploiting cloud-based infrastructure and strong web development frameworks.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

cloud services, Web Application, CITECHGRAM.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DOG BREED IDENTIFICATION AND CLASSIFICATION USING CONVOLUTION NEURAL NETWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02042

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02042

  Register Paper ID - 259725

  Title: DOG BREED IDENTIFICATION AND CLASSIFICATION USING CONVOLUTION NEURAL NETWORK

  Author Name(s): V. Sonia Devi, Anshu Satija, Hemanth Kumar K, Sakshi Jha, Vivek Kumar Upadhyay

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 296-301

 Year: May 2024

 Downloads: 81

 Abstract

This project focuses on developing a dog identification app using deep learning principles, particularly convolutional neural networks (CNN) and the Inception model. It begins with collecting and preprocessing datasets to optimize images for model training. Emphasis is placed on selecting the appropriate model architecture for precise classification. Mechanisms for detecting dogs in user-supplied images are implemented, and procedures for saving and deploying trained models through an API are established. The app aims to provide accurate identification and classification of dog breeds, catering to researchers studying both physical and behavioral traits. This deep learning-powered solution offers a practical means for canine breed classification, leveraging state-of-the-art image processing techniques.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Dog Identification, Deep Learning, Image Processing, CNN.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Facial Emotion Recognition Using CNN and Haar Cascade Classifier

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02041

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02041

  Register Paper ID - 259724

  Title: FACIAL EMOTION RECOGNITION USING CNN AND HAAR CASCADE CLASSIFIER

  Author Name(s): Mrs. Bhavana P, Aishwarya N, Asha R, Rajeshwari P, Usha Kumari

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 288-295

 Year: May 2024

 Downloads: 64

 Abstract

In computer vision, the field of face emotion for circumstances that comprises a pre-processing detection is expanding with the goal of identifying and comprehending human emotions from facial expressions. We provide a system in this project that combines the CNN (Convolutional Neural Network) and Haar Cascade classification techniques. A sizable dataset of labeled facial expressions is used to train the CNN model, which 21 then uses these characteristics and patterns to identify various emotions. It allows for accurate emotion categorization by extracting high-level abstract features from the input photos. However, the Haar Cascade classifier adds more data for emotional analysis by identifying face landmarks like the lips, nose, and eyes. This cyclical method makes it easier to analyze the emotional states.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Convolutional Neural Network, Haar Cascade Classifier, Facial Emotion.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Brain Tumor Detection Using CNN Through MRI Images

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02040

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02040

  Register Paper ID - 259723

  Title: BRAIN TUMOR DETECTION USING CNN THROUGH MRI IMAGES

  Author Name(s): Priyadarshini M, Anushka Patil, Sanjana M, Shilpa M, Vaishnavi R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 279-287

 Year: May 2024

 Downloads: 63

 Abstract

Convolutional Neural Networks (CNNs) play major role in accurately classifying brain tumors identified in medical scans such as MRI. This study presents a CNN architecture tailored specific task particular objective, contains convolutional layers to extract features followed by maximum pooling layers designed for dimensionality reduction. To prevent excessive fitting, dropout layers are employed strategically integrated, ensuring the generalizability of the model fitting. The task of classification involve using fully connected layers with the Softmax The activation function utilized in the suggested CNN architecture demonstrates effectiveness in Classifying brain tumors into three categories distinct types: meningioma, glioma, and pituitary tumors. Experimental evaluation reveals promising results, with the model achieving an overall classification accuracy of 98%. Specifically, it detects glioma with 96% accuracy, identifies no tumor with 99% accuracy, differentiates meningioma with 97% accuracy, and identifies pituitary tumors with 99% accuracy. The dataset comprises 3264 images, 90% of which are for training and 10% for testing. This method holds considerable potential to assist clinicians in accurate and timely diagnosis, thereby facilitating suitable treatment planning for patients with brain tumors. Further research can explore improvements to the network architecture and explore its applicability in different medical imaging datasets.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, maximum pooling layers, dropout layers, softmax activation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HYPER-ALGORITHMIC FOOD DETECTION FRAMEWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02039

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02039

  Register Paper ID - 259722

  Title: HYPER-ALGORITHMIC FOOD DETECTION FRAMEWORK

  Author Name(s): Rajesh Kumar S, Lavani Amaan Khan, Mayukh Das, Aditya Yadav, Kunal Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 268-278

 Year: May 2024

 Downloads: 82

 Abstract

This project presents an innovative application designed for both standalone and interconnected frameworks, aimed at the real-time automatic detection and localization of food items within dynamic scenes. By harnessing diverse configurations such as Single Shot Detection, Faster R-CNN, YOLO, EfficientDet, RetinaNet, and Mask R-CNN, this study employed A thoroughly managed dataset derived from various online repositories. These configurations were seamlessly integrated with food detection models and multiple convolutional network architectures, harnessing the power of multiple neural networks to enhance performance. Computer vision, an integral part of artificial intelligence, is employed to replicate human perception of three- dimensional structures in visual environments. Through the amalgamation of digital images and advanced deep learning models, this research aims to enable computers to interpret and comprehend the visual world, specifically focusing on the identification and classification of food items. Within the framework of the food industry, this paper highlights the significance of precise object recognition and classification, crucial for ensuring a nutritious diet and overall well-being. With the burgeoning advancements in nutritional science and the availability of diverse smartphone applications, the research aims to present a comprehensive framework capable of autonomously identifying, categorizing, and localizing food elements in various scenes and settings.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Deep Learning, SSD, EfficientDet, YOLO, Faster R- CNN, RetinaNet, Mask R-CNN

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: American Sign Language To Text Conversion Using CNN Model

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02038

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02038

  Register Paper ID - 259721

  Title: AMERICAN SIGN LANGUAGE TO TEXT CONVERSION USING CNN MODEL

  Author Name(s): Girija V, Akshay Kumar Singh, Nayab Sahil, Shibu Singh, Tulika Paul

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 261-267

 Year: May 2024

 Downloads: 75

 Abstract

Sign language is an essential communication language that helps individuals with hearing loss interact with others. Convolutional Neural Network is a useful tool for image processing tasks, including sign language recognition. This paper proposes a novel CNN-based approach to sign language to text translation. The CNN model is intended to effectively extract temporal and spatial properties from sign language containing video sequences. Convolutional layers are utilized to extract hierarchical features, while pooling layers are employed to decrease spatial dimensions without sacrificing important information. The model in this work is trained on a large dataset of sign language images, allowing strong representation learning for accurate translation. The CNN model has performed well in translating American Sign Language into text, according to test results. Using datasets of American Sign Language, the model surpasses previous methods and reaches high accuracy. In general, the suggested CNN-based approach for translating sign language to text provides a pathway between people who use sign language and others who are not familiar with it. By providing real-time translation capabilities, this tool can improve accessibility and inclusivity for the community in a range of situations, such as everyday communication, healthcare, and education. This research promotes more equality and integration for those with hearing loss and enhances assistive technologies.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Sign language recognition, Image processing, Deaf communication, Gesture-to-text conversion

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A Quality Assurance Framework for Evaluation of Text Generation Models

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02037

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02037

  Register Paper ID - 259720

  Title: A QUALITY ASSURANCE FRAMEWORK FOR EVALUATION OF TEXT GENERATION MODELS

  Author Name(s): Pushpanathan G, Nithin N, Santhosh Adavala, Shafath H Khan, Syed Mohammed Maaz

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 254-260

 Year: May 2024

 Downloads: 76

 Abstract

This paper presents a comprehensive Quality Assurance Framework designed specifically for text generation models. Our approach combines automated metrics such as BLEU, ROUGE, and perplexity scores with novel techniques for coherence and factuality assessment. We integrate human evaluation methodologies to ensure a balanced assessment of linguistic quality, coherence, factual accuracy, and diversity in generated texts. Through extensive experimentation across different text generation tasks, our framework demonstrates improved evaluation accuracy and provides valuable insights for model refinement and optimization, contributing to the advancement of trustworthy text generation models.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

A Quality Assurance Framework for Evaluation of Text Generation Models

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Novel Machine Learning Approaches for Benign and Malicious Network Traffic

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02036

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02036

  Register Paper ID - 259717

  Title: NOVEL MACHINE LEARNING APPROACHES FOR BENIGN AND MALICIOUS NETWORK TRAFFIC

  Author Name(s): Mr. Rakesh V.S., Amrutha Varshini Challa, Mamata G, Precilla Mary B, S D Shruthi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 244-253

 Year: May 2024

 Downloads: 80

 Abstract

Distributed denial of service (DDoS) threats represents a significant cybersecurity challenge, constituting a variant of denial of service (DoS) in which IP addresses are exploited to launch attacks to a specific host or victim. DDoS attacks, characterized by meticulous coordination, exploit compromised secondary victims to target one or more victim systems, ranging from large-scale enterprise servers to less. These threats incur significant bandwidth and power costs, leading to the compromise of confidential data. Therefore, developing advanced algorithms to accurately detect various DDoS cyber threats, while considering computational load, has become urgent. The majority of the research currently in publication approaches DDoS threat detection as a binary classification problem, that is ascertaining whether or not an attack has started. However, to effectively protect the network and minimize significant damage, it's critical to distinguish the specific type of DDoS attack targeting the network or system. This study presents a comprehensive classifier that combines the strengths of the four best-performing algorithms. A comparative analysis is performed, comparing the Classifier with different artificial intelligence and machine learning (AI and ML) algorithms. Its goal is to improve the identification of various kinds of DDoS threats by transforming the problem into a multi-label classification scenario. Through this approach, the research aims to contribute to the refinement of cybersecurity strategies, ensuring a deeper understanding and proactive defence against various DDoS cyber threats.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DDoS, cybersecurity, classification, multi-label, detection, attacks, algorithms, proactive defence, threat identification, network security.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Adaptive Solutions Transforming Lives for the Disabled People

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02035

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02035

  Register Paper ID - 259716

  Title: ADAPTIVE SOLUTIONS TRANSFORMING LIVES FOR THE DISABLED PEOPLE

  Author Name(s): Dr. Shilpa V, Archana V, Akshitha N, Pavithra V N, Sindhu K M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 237-243

 Year: May 2024

 Downloads: 77

 Abstract

The goal of this project is to promote inclusivity in social interactions and employment possibilities by addressing the communication issues that people who are blind, deaf, or mute confront. The suggested remedy consists of a two-way smart communication system made to make it easier for people with and without sensory impairments to communicate with each other. The initial component of the system provides an easy-to-use interface that helps people who are blind, deaf, or mute effectively communicate. To empower users with a range of sensory needs, the system makes use of cutting-edge technologies including gesture control, speech recognition, and haptic feedback. Voice instructions, tactile gestures, or both can be used by users to input messages. The system then converts these inputs into a textual and auditory format that is simple to comprehend, making the messages transmitted understandable to people with different levels of communication proficiency. With the use of machine learning algorithms, this interface enables accurate and speedy transcription of spoken words into text through speech-to-text conversion.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Inclusivity, Social Interactions, Employment opportunities, sensory impairments, gesture control, speech recognition, haptic feedback, Voice instructions, tactile gestures, user-friendly interface, machine learning algorithms, speech-to-text conversion

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TEXTUALIZING SIGN LANGUAGE USING DEEP LEARNING CNN MODEL

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02034

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02034

  Register Paper ID - 259715

  Title: TEXTUALIZING SIGN LANGUAGE USING DEEP LEARNING CNN MODEL

  Author Name(s): Shilpa S B, Chelvitha A, Peddineni Gnaana, Seethavari Sujana, Shilpa S R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 227-236

 Year: May 2024

 Downloads: 75

 Abstract

Textualizing Sign Language, the challenge purpose is to have a look at numerous techniques for effective inter-communication between Sign Language and its impact on communication. English Language. The version can identify almost every alphabet. Various gestures which include each palm have been added to our dataset. This model has big potential as it could interpret any gesture of diverse Sign Languages if provided in the dataset. The consumer can also upload extra gestures within the dataset, making it rather custom-designed. Further, the data exists to an application to convert the obtained textual content to speech.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Early Detection, Deep learning, CNN Algorithm, Image Processing.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CALORIE ESTIMATION OF FOOD AND BEVERAGES USING DEEP LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02033

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02033

  Register Paper ID - 259714

  Title: CALORIE ESTIMATION OF FOOD AND BEVERAGES USING DEEP LEARNING

  Author Name(s): Vasantha M, Nanditha P R, Keerthana D R, Sushmitha K C

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 219-226

 Year: May 2024

 Downloads: 55

 Abstract

The utilization of deep learning techniques in "Deep Learning-driven Food Recognition and Calorie Estimation for Intelligent Diet Monitoring" offers a unique method to improve diet monitoring and encourage healthy eating habits. The main goal of this initiative is to accurately identify various food items and estimate their calorie content in real-time, granting users access to intelligent and tailored diet monitoring features. By utilizing the Python programming language and the MobileNet architecture model for food recognition and calorie estimation, this project has achieved a remarkable level of precision in recognizing and categorizing different food items. Through the use of deep learning algorithms, the system can swiftly analyze input images on the web framework to pinpoint the specific food item within seconds. Additionally, the system can estimate the calorie content of the identified food, equipping users with essential information to effectively monitor their dietary intake. The intelligent diet monitoring capabilities of SmartBite empower users to make well-informed decisions regarding their food selections. By monitoring and evaluating their daily food consumption, users can gain valuable insights into their nutritional patterns, establish personalized objectives, and make necessary adjustments to attain a well-rounded and healthy diet.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Early Detection, Deep learning,CNN Algorithm, Image Processing.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RAILWAY TRACK FAULTS DETECTION USING DEEP LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02032

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02032

  Register Paper ID - 259713

  Title: RAILWAY TRACK FAULTS DETECTION USING DEEP LEARNING

  Author Name(s): Pushpalata Dubey, Shwetha B A, Suchitha M L, T S Usha Rani

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 213-218

 Year: May 2024

 Downloads: 67

 Abstract

We propose a computer vision-driven approach aimed at automating the detection of cracks on railway tracks to enhance inspection and security measures.Beginning with the acquisition of images using digital cameras, the system employs pre-processing methods like color transformation and noise removal to enhance image quality. Image segmentation isolates crucial regions using techniques such as Canny edge detection, while feature extraction utilizes advanced models like ResNet and Darknet to capture intricate patterns. Deep learning algorithms, including YOLOv5 and CNN, facilitate real-time object detection and classification, with YOLO focusing on high-probability areas and CNN performing classification based on extracted features. The proposed algorithm demonstrates a detection accuracy of 94.9% on the acquired images, with an overarching error rate of only 1.5%.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

YOLO, ResNet , DarkNet ,CNN

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTION OF CYBER BULLYING USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02031

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02031

  Register Paper ID - 259712

  Title: DETECTION OF CYBER BULLYING USING MACHINE LEARNING

  Author Name(s): Ms. Maria Kiran L, Divyashree S, Neelambika K Nadagoudra, Monalisa P Naik

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 206-212

 Year: May 2024

 Downloads: 66

 Abstract

Cyberbullying is a severe problem that impacts teens and adults on the internet.It has led to incidents like sadness and suicide.The demand for social media platform content regulation is expanding. To develop a model based on the use of natural language processing to identify cyberbullying in text data and machine learning, the following study uses data from two different types of cyberbullying: hate speech tweets from Twittter and comments based on personal assaults from Wikipedia forums. To determine the optimal strategy, three feature extraction techniques and four classifiers are examined. The model yields accuracy levels over 90%.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Wikipedia, Twitter, machine learning, hate speech, personal attacks, and cyberbullying

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BREAST CANCER DETECTION BASED ON CONVOLUTIONAL NEURAL NETWORKS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02030

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02030

  Register Paper ID - 259711

  Title: BREAST CANCER DETECTION BASED ON CONVOLUTIONAL NEURAL NETWORKS

  Author Name(s): Ms.Sharon J Christina, Deeksha C P, Teja N L, Gunashree B, Divya V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 199-205

 Year: May 2024

 Downloads: 67

 Abstract

The most common kind of cancer in women, breast cancer is bad for both physical and emotional health in those who have it.. Breast cancer remains a significant health concern worldwide, with early detection crucial for successful treatment. Due to complexities present in Breast Cancer images, image processing technique is required for detecting cancer. New deep learning techniques were needed for early breast cancer detection. Histopathological pictures are used as the dataset for this research. Breast tissue histopathological investigation is essential for the diagnosis of breast cancer. This project aims to develop a web application using Django, a Python-based web framework, for managing and viewing breast cancer histopathological images. Images are processed using histogram normalization techniques. This project implements the Convolutional Neural Network (CNN) model based on deep learning and helps in improving the efficiency of breast cancer diagnosis.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Early Detection, Deep learning, Histopathological Images, CNN Algorithm, Image Processing.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AN AMELIORATED METHOD FOR EMPLOYING IMAGE PROCESSING TO IDENTIFY BLOOD GROUP

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02029

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02029

  Register Paper ID - 259710

  Title: AN AMELIORATED METHOD FOR EMPLOYING IMAGE PROCESSING TO IDENTIFY BLOOD GROUP

  Author Name(s): Lokesh, Pragati N Gurav, G.Aashritha, Priya D, Sharada K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 193-198

 Year: May 2024

 Downloads: 64

 Abstract

An blood group measurement method is in high demand worldwide, with developing nations having the greatest need for this kind of technology. Building this solution would be a good use for image processing, which is the most widely used device in both resource-rich and resource-poor places. A noninvasive method of measuring blood group is proposed in this project. In order to determine blood groups, it is also compared how different data collection locations,CNN,biosignal processing methods, theoretical underpinnings, photoplethysmogram (PPG) signal and features extraction procedures, image processing algorithms, and detection models vary. The results of this research were then utilized to suggest practical strategies for developing a noninvasive point-of-care tool for blood group assessment based on image processing.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Non invasive, biosignal processing, photoplethysmogram ,Image Processing.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Heart Failure Prediction through Machine Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02028

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02028

  Register Paper ID - 259709

  Title: HEART FAILURE PREDICTION THROUGH MACHINE LEARNING

  Author Name(s): Ms.Ganga D Benal, Anjan Gowda S R, Rohith S V, Sushma V, Varsha S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 186-192

 Year: May 2024

 Downloads: 64

 Abstract

Machine learning has application in many different fields worldwide. It is crucial for healthcare professionals to utilize machine learning algorithms and data analysis tools in order to improve patient outcomes and provide more accurate diagnoses. Such knowledge, if anticipated well in advance, can provide physicians with vital intuitions, allowing them to adjust their diagnosis and method specific to each patient. Using machine learning techniques, we are attempting to predict potential cardiac disorders in humans. This study compares the effectiveness of variety of classifiers, comprising of the Random Forest, SVM, KNN, and logistic regression. We also provide an ensemble classifier that combines the best features of both strong and weak identified Modes to conduct hybrid classification, as it may need an abundance of features.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Machine learning, Heart failure.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PHISHING WEBSITE DETECTION USING DEEP LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02027

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02027

  Register Paper ID - 259708

  Title: PHISHING WEBSITE DETECTION USING DEEP LEARNING

  Author Name(s): Arun P, Ravi Teja N, Jayanth Gowda S, T Kesuchand Sushil Kumar, Divya Jyoti Bhuyan

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 175-185

 Year: May 2024

 Downloads: 64

 Abstract

The internet's explosive growth has resulted in a rise in cyberthreats, with phishing assaults presenting a serious risk to both people and businesses. Phishing websites aim to trick visitors into disclosing private information, including bank account information and login credentials. Real-time detection of these harmful websites is essential to protecting consumers' privacy and security when they are online. Online security is seriously threatened by the frequency of phishing attempts, in which malevolent actors try to obtain personal information by pretending to be reputable websites. In order to counter this threat, this project presents an extensible and open-source system that uses an artificial neural network (ANN) to detect phishing websites. The goal of the phishing website detection system is to accurately distinguish between legitimate and phishing websites, improving the capacity to safeguard internet users from malicious attacks


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

PHISHING WEBSITE DETECTION USING DEEP LEARNING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HUMAN STRESS DETECTION BASED ON SLEEPING HABITS USING MACHINE LEARNING ALGORITHMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02026

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02026

  Register Paper ID - 259706

  Title: HUMAN STRESS DETECTION BASED ON SLEEPING HABITS USING MACHINE LEARNING ALGORITHMS

  Author Name(s): Lakshmi Shree M S, Ranjitha M, Rebecca D, Shirisha H N, Shradha Sania J E

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 169-174

 Year: May 2024

 Downloads: 63

 Abstract

Stress, which is a more and more common part of contemporary life, can have a serious negative effect on a person's physical and mental health. Determining and tracking stress levels is therefore essential to improving general health and quality of life. The "Human Stress Detection Based on Sleeping Habits Using Machine Learning with Random Forest Classifier" project offers a cutting-edge and successful method for determining a person's degree of stress by looking at how they sleep. Utilizing the robust features of the Python programming language, the research makes use of the Random Forest Classifier algorithm, which is renowned for its adaptability and precision in classification assignments .This project's primary objective is to develop a reliable stress detection system 4 that can provide insightful data about people's stress levels, enabling timely interventions and promoting improved mental health. Numerous significant variables related to stress levels and sleep patterns are included in the dataset that was carefully chosen for the study. The user's snoring range, respiration rate, body temperature, limb movement rate, blood oxygen levels, eye movement, heart rate, number of hours slept, and stress levels--which are divided into five classes--are among these parameters. The classes are 0 (low/normal), 1 (medium low), 2 (medium), 3 (medium high), and 4 (high). By including these several criteria, a thorough examination of sleep patterns and their relationship to stress levels is ensured. The model was able to learn complex patterns from the dataset and forecast stress accurately based on the user's sleeping patterns, as seen by the high accuracy that was attain. Research and treatments in medicine as well as personal health monitoring are just a few of the many possible uses for this stress detection system. People can take proactive steps to reduce stress, enhance sleep quality, and promote general well-being by using the system to analyze their sleep patterns and receive insights into their stress levels


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Random Forest Classifier algorithm ,Decision Tree

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PLANT FOLIAGE ANALYSER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02025

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02025

  Register Paper ID - 259705

  Title: PLANT FOLIAGE ANALYSER

  Author Name(s): Mrs. Varalakshmi K V, Deekshith R, Gagan B R, M Karthik, Yogesh G S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 161-168

 Year: May 2024

 Downloads: 76

 Abstract

Agriculture is one of the main factor that decides the economic growth of any country. This is the one of the reasons that disease detection in plants plays an important role in agriculture field, as having disease in plants are quite natural. Plant disease identification is a significant process to prevent the losses in the quality and quantity of the agricultural product. It is essential to detect any disease in time to ensure healthy and proper growth of the plants prior to applying required treatment to the affected plants. Since manual detection of diseases costs a large amount of time and labour, it is inevitably prudent to have an automated system.With the worldwide increase in digital cameras and continuous improvement in computer vision domain, the automated techniques for detection of disease are highly possible. After necessary pre processing, the dataset was trained on using different deep learning algorithms. This approach of ours is to increase the productivity of crops in agriculture.We aim to raise awareness about the disease and also provide solutions to the disease using generative AI.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Agriculture, Plant disease, Deep learning algorithms, Generative AI

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HAND WRITTEN TEXT RECOGNITION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02024

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02024

  Register Paper ID - 259704

  Title: HAND WRITTEN TEXT RECOGNITION

  Author Name(s): Ayush Saxena, Mahesh Miskin, Praphul Kumar, Sharad Singh, Dr. Josephine Prem Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 153-160

 Year: May 2024

 Downloads: 62

 Abstract

The project's primary aim is to develop an efficient system specialized in recognizing handwritten text, facilitating the smooth conversion of handwritten text images into digital text format. Utilizing cutting-edge machine learning techniques and neural network architectures, the overarching goal is to construct a robust model capable of accurately identifying handwritten words and characters across a diverse spectrum of handwriting styles and languages. By achieving this objective, the project endeavors to simplify and enhance the digitization process of handwritten documents. This advancement will not only improve archival practices but also enhance the searchability and accessibility of significant handwritten content across historical and contemporary domains. Through innovative approaches and rigorous methodology, the project seeks to contribute to the broader field of Handwritten Text Recognition, driving forward advancements in technology and paving the way for more efficient and accurate solutions in the future..


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

HAND WRITTEN TEXT RECOGNITION

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HYBRID MACHINE LEARNING -BASED URL PHISHING DETECTION SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02023

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02023

  Register Paper ID - 259702

  Title: HYBRID MACHINE LEARNING -BASED URL PHISHING DETECTION SYSTEM

  Author Name(s): Dr.Shashikumar D R, Divya Krishna Poojari, M Sravani, Lahari A, Pooja Balagannavar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 145-152

 Year: May 2024

 Downloads: 65

 Abstract

This paper proposes a hybrid machine learning approach for URL phishing detection, combining supervised and unsupervised techniques. By leveraging features like domain information and employing models such as random forest and clustering algorithms, the system achieves high accuracy in identifying phishing URLs while minimizing false positives. This hybrid system offers robust protection against evolving phishing tactics, enhancing online security for users. Complementing the supervised approach, our system incorporates unsupervised learning techniques to uncover hidden structures within the data. Clustering algorithms, are utilized to group URLs based on similarity metrics derived from their feature representations. This unsupervised clustering aids in identifying anomalous patterns indicative of phishing behavior, thereby enhancing the system's ability to detect novel threats.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Hybrid machine learning, URL phishing detection, supervised learning, unsupervised learning, domain information, random forest, clustering algorithms, high accuracy, false positives, evolving tactics, online security

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MACHINE LEARNING POWERED FACIAL AGE AND GENDER ESTIMATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02022

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02022

  Register Paper ID - 259700

  Title: MACHINE LEARNING POWERED FACIAL AGE AND GENDER ESTIMATION

  Author Name(s): Dr.Sandeep kumar, Umair Farooq, Varsha R, S Hema, Shishira K S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 139-144

 Year: May 2024

 Downloads: 71

 Abstract

Machine learning-powered facial age and gender estimation utilizes advanced algorithms such as Support Vector Machine (SVM) or K Nearest Neighbor (KNN) to estimate age of a person and gender from features of face in human face. It relies on extensive datasets of labeled facial images, which undergo preprocessing activites such as face detection, alignment, and feature extraction. These tasks ensure the extraction of relevant facial features like landmarks and textures. The SVM/KNN algorithms are used on curated dataset to learn decision boundaries separating different age groups and genders. This training process enables the models to make accurate predictions based on facial characteristics. The technology benefits from its ability to automate age and gender estimation tasks with high accuracy, facilitating applications in various domains such as security, marketing, and healthcare. However, challenges such as bias in training data and variations in facial expressions can affect the reliability of predictions. Additionally, privacy concerns related to facial recognition technologies are important considerations in its deployment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Facial age and gender estimation, Machine learning, KNN Algorithm, Labeled dataset.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANIME STREAMING WEBSITE (ANIMEFLIX)

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02021

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02021

  Register Paper ID - 259699

  Title: ANIME STREAMING WEBSITE (ANIMEFLIX)

  Author Name(s): MV Hariprasad, Dr. Manjunatha S, M Pranay Reddy, N Krishna Reddy, Adhithya Shankar B S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 134-138

 Year: May 2024

 Downloads: 62

 Abstract

The "Animeflix" project outlines the design, development, and implementation of an Anime Streaming Website, leveraging modern web technologies such as TypeScript, HTML, CSS, and React for the frontend. The backend functionality is seamlessly integrated by directly importing data from an external API, ensuring a robust and dynamic streaming experience for anime enthusiasts.The frontend development is conducted using TypeScript, a statically-typed superset of JavaScript, to enhance code quality and maintainability. HTML and CSS are employed for creating a user-friendly and visually appealing interface, ensuring an immersive anime-watching experience for users. The backend architecture relies on importing data directly from an external API, eliminating the need for an independent backend server. This approach not only simplifies development but also ensures real-time updates and a vast library of anime content for users.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Animeflix, TypeScript, HTML, CSS, React, maintainability, user-friendly, visually appealing interface

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SECUREFACES: FACIAL AUTHENTICATION WITH DEEPFAKE DEFENSE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02020

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02020

  Register Paper ID - 259696

  Title: SECUREFACES: FACIAL AUTHENTICATION WITH DEEPFAKE DEFENSE

  Author Name(s): Jayanthi M G, Jai Surya R, Bhoomika M P, Danisha BN

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 127-133

 Year: May 2024

 Downloads: 77

 Abstract

SecureFaces stands out as a resolute guardian of online security in a time of digital interactions by fusing cutting-edge face authentication with a powerful Deepfake detecting tool. In this research, two powerful models--MesoNet for quick authentication and ResNetLSTM for increased accuracy--are shown. MesoNet and ResNetLSTM each address different user priorities. To ensure efficiency and data integrity, the system starts with an easy-to-use registration module that collects and safely stores facial data in MangoDB. Users can select between MesoNet and ResNetLSTM during the authentication process, depending on their unique needs, creating a customized identity verification strategy. SecureFaces is essentially an innovative cybersecurity solution that embodies trust, transparency, and adaptability in the digital sphere, going beyond simple facial authentication. This initiative acts as a beacon, guiding users through a trustworthy and safe authentication process as internet threats change


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cybersecurity, Facial Authentication, Deepfake, Machine Learning, Deep Learning, Artificial Intelligence.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CLOUD-BASED TYPES OF FACE MASK DETECTION USING CONVOLUTIONAL NEURAL NETWORKS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02019

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02019

  Register Paper ID - 259695

  Title: CLOUD-BASED TYPES OF FACE MASK DETECTION USING CONVOLUTIONAL NEURAL NETWORKS

  Author Name(s): Dr. Sandeep Kumar, Parinitha Reddy N, Ranjitha C, Deepthi Raj K R, Aishwaryasri J

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 115-126

 Year: May 2024

 Downloads: 76

 Abstract

The internet's The "Face Mask Detection Using Convolutional Neural Network" project presents an innovative solution leveraging computer vision and deep learning techniques to automate the detection and categorization of individuals based on their adherence to face mask mandates. The system utilizes convolutional neural networks (CNNs) for robust feature extraction and classification, allowing real-time analysis of images or video frames to determine whether individuals are wearing masks and, if so, the specific type of mask. The project addresses the crucial need for efficient monitoring and enforcement of mask-wearing protocols in various settings, including public spaces, healthcare facilities, retail environments, and educational institutions. The application of this technology contributes to public health and safety by providing an automated, reliable, and scalable solution to ensure compliance with face mask guidelines, mitigating the spread of infectious diseases and enhancing overall safety measures in diverse sectors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Face Mask Detection, Architecture, CNN

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Approaching Text Summarization Using ML And DNN

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02018

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02018

  Register Paper ID - 259691

  Title: APPROACHING TEXT SUMMARIZATION USING ML AND DNN

  Author Name(s): Prof Priyadarshini M, Pavan R, Punith K M, Naveen Kumar G S, Rajala Chirra Reddy

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 109-114

 Year: May 2024

 Downloads: 53

 Abstract

Extractive text summarization using Latent Semantic Analysis (LSA) involves analyzing the underlying structure of a document by creating a matrix of term-document relationships. The TFIDF (Term Frequency-Inverse Document Frequency) vectorizer is employed to highlight important words in the document, assigning weights based on their frequency and uniqueness. Machine learning algorithms leverage these vectorized representations to identify and extract key sentences or phrases, forming the basis of the summary. Additionally, Deep Neural Networks (DNN) come into play, employing intricate layers of interconnected nodes to learn and understand complex patterns within the text. The DNN further refines the summarization process, enhancing the model's ability to capture nuanced relationships and context. This fusion of traditional ML and DNN approaches results in a powerful summarization system capable of distilling large volumes of information into concise, informative abstracts.Keywords--CNN, maximum pooling layers, dropout layers, softmax activation


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

LSA, DNN, TF-IDF Vectorizer

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Sugarcane Disease Detection using Deep Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02017

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02017

  Register Paper ID - 259689

  Title: SUGARCANE DISEASE DETECTION USING DEEP LEARNING

  Author Name(s): Ms. V. Sonia Devi, Guru KiranV L, Vikas Vidya Sagar A, Yashas M P, Yashwanth H M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 102-108

 Year: May 2024

 Downloads: 69

 Abstract

The Sugar Cane is particularly crucial agricultural commodities in the world with a number of cuisines scattered across the globe, which are incomplete without it. In developing countries like India, Sugar Cane has spurred agriculture driven growth in the past century, when export of agricultural produce was the major source of foreign exchange. At times, the prices face a blow from the demand side, while at times facing drastic conditions on the supply side, owing to which, the prices of the commodity have seen a drastic fall. In such years, farmers often cannot afford the services of agricultural consultants for tasks such as of sicknesses of the leaves and addressing them at the earliest. The prescribed remedy is an inexpensive strategy which is easy use of image processing to detect leaf diseases in the leaves of Sugar Cane plants a way to streamline life for landowners in addition to consumers, since this would balance the prices at a median price. In this project, the affected leaves are captures as images using a camera. upon then, these photographs are adjusted. further using various methods and the key characteristics originate via them using various methods.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Sugar cane, Image Processing

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Virtual Assistance for Physical Fitness using Human Pose Estimation

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02016

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02016

  Register Paper ID - 259687

  Title: VIRTUAL ASSISTANCE FOR PHYSICAL FITNESS USING HUMAN POSE ESTIMATION

  Author Name(s): Radha R, Dhanush Kumar R, Shalini M B, Sharmila A, Sumalatha B R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 95-101

 Year: May 2024

 Downloads: 59

 Abstract

Approximately 39 percent of adult people on the planet are overweight. The fact presented above makes it clear how important and necessary exercise is. Exercise helps us maintain a healthy weight, a fit body, and a calm mind in addition to helping us lose weight. Regular exercise also keeps us active and improves blood circulation to keep our bodies in the same condition as when we used to visit the gym. It is expensive or not within everyone's reach to train under a trainer, visit the gym, take yoga courses, or both. Self-training is an additional option that provides pre-recorded yoga practice steps without any feedback. Without proper feedback about our postures, injuries can happen and it will do more harm than good and that's exactly where our project comes into play. These days, human position estimation is a widely pursued project in computer vision. The study of strategies and systems that retrieve an articulated body's stance is known as articulated pose estimation in computer vision. The course of determining the human body's location parts and joints in a given image is known as "articulated body pose estimation" in the context of this study. We study the many applications that we may put into practice with the data, which we received using a pre-trained posture estimation model called MediaPipe. Motion capture, gait analysis, anomaly detection, sign language recognition, and other uses are among them.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Human pose estimation, pose detection, pose estimation survey.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANIMAL SPECIES RECOGNITION USING TRANSFER LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02015

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02015

  Register Paper ID - 259683

  Title: ANIMAL SPECIES RECOGNITION USING TRANSFER LEARNING

  Author Name(s): Mrs. Bhavana P, Bumen Mangu, Jatin Thakan, Rahul Tiwari, VNasir A

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 87-94

 Year: May 2024

 Downloads: 72

 Abstract

The sign language is used by people with hearing / speech disabilities to express their thoughts and feelings. But normally, people find it difficult to understand hand gestures of the specially challenged people as they do not know the meaning of sign language. Our project aims to develop a system forsign language recognition using MediaPipe ,LSTM, and Keras. The proposed system utilizes a webcam to capture real-time video input of a person performing sign language gestures. MediaPipe is used to extract and track the hand landmarks and their movements in the video stream. The features are then processed using LSTM, which is a sequence modeling technique that captures the hand gestures. Finally, a deep learning LSTM model implemented in Keras and trained to recognize the different sign language gestures. The system can potentially be used to assist people with hearing. Long Short-Term Memory (LSTM) neural network architecture to get this remarkable feat. When someone performs sign language gestures in front of a camera, the system instantly recognizes and interprets those gestures.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Animal species recognition, deep convolutional neural networks, transfer learning, camera-trap, KTH dataset.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Noise Cancellation By Reinforcement Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02014

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02014

  Register Paper ID - 259682

  Title: NOISE CANCELLATION BY REINFORCEMENT LEARNING

  Author Name(s): Mr. Pushpanathan G, A Lovekeswar Rao, Aman Agrawal, Devansh Chauhan, Saqib Rashid Bhat

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 83-86

 Year: May 2024

 Downloads: 73

 Abstract

Around 5000 million peoples have trouble hearing properly. While hearing aids can help somewhat, many struggle to understand speech when there's background noise. We've come up with a smart computer program that can filter out that noise while keeping speech clear. It works so well that it brings the clarity of speech is hearing aid users up to the level of people with thoda hearing. Here's how it works: We trained a computer program using a lot of recordings of speech with peecheka noise. Then, we made it even better by letting the computer figure out the best way to do this on its own. This program is really good at filtering out noise and letting you hear speech clearly, even if you're in a noisy place. It's much better than older methods that needed multiple microphones. And here's the exciting part: This program works fast, like in real time on a regular laptop. So, in a few years, we might be able to put it right into hearing aids, making zindagi good for millions of people with hearing problems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Hearing, Noise, Train, Test.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Food AI-Calorie Detective

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02013

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02013

  Register Paper ID - 259681

  Title: FOOD AI-CALORIE DETECTIVE

  Author Name(s): Rajesh Kumar S, Amritangshu Dey, Prakash Kumar Nayak, Firos K, Satya Prakash

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 76-82

 Year: May 2024

 Downloads: 67

 Abstract

This paper makes use of deep learning techniques, specifically the ResNet-34 architecture, to present a novel method for estimating food volume and calories specifically for Indian cooked food items. The study looks at five common Indian dishes using computer vision to detect, categorize, and estimate volume of food. The procedure involves training a ResNet-34 model with a dataset that includes images of Indian foods such as biryani, curry, dal, roti, and samosas. Taking into consideration variations in preparation techniques and presentation styles, the model has been fine-tuned to accurately detect and classify these food items. Additionally, users can estimate the amount of food based on picture input thanks to the system's integration of volume estimation techniques. This feature is especially helpful for people who are watching their caloric intake or adhering to a diet. The outcomes of the experiments show how well the suggested method works for correctly recognizing Indian cooked labels, calculating their volumes, and estimating calories. The system's performance is evaluated across a broad range of datasets, showcasing its adaptability and reliability in diverse scenarios. All things considered, this work contributes to the field of food volume assessment and calorie estimation, especially as it relates to Indian cuisine, and offers a practical tool for monitoring nutrients and controlling diets.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Calorie estimation, Food classification, ResNet-34, Food Segmentation, Depth Network Training, Machine Learning, Health Monitoring OpenCV

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: VOICE RECOGNITION BASED HOME AUTOMATION SYSTEM FOR LOW RESOURCE LANGUAGE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02012

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02012

  Register Paper ID - 259678

  Title: VOICE RECOGNITION BASED HOME AUTOMATION SYSTEM FOR LOW RESOURCE LANGUAGE

  Author Name(s): Girija V, Nischai M, N Yashwanth, K Nitheesh, Bharath Sai

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 68-75

 Year: May 2024

 Downloads: 72

 Abstract

The " Voice recognition based I0T Home Automation System " is a cutting-edge loT project designed to revolutionize the way homeowners interact with their living spaces. This project, undertaken, has been crafted with the aim of bringing convenience and efficiency to everyday tasks through voice recognition technology and interconnected smart devices. By integrating voice commands through popular smart speakers, this system enables users to control a range of home devices, from lighting and climate control to security systems. With a strong focus on user privacy and data security, the project ensures that voice data is managed responsibly, and encryption measures are implemented for secure communication between the IOT hub and connected devices. The project boasts key features such as personalized voice commands, customization of routines, and real-time feedback. Users can create scenarios like "Movie night" that adjust multiple devices in a single command. A range of technologies, including cloud-based voice recognition services, IOT hubs, and end-device control mechanisms, are harnessed to create a seamless and intuitive experience for home owners. The "Smart Home Automation System" delivers numerous benefits, including enhanced convenience, energy efficiency, and improved quality of life. By simplifying daily tasks and promoting efficient energy use, it contributes to a more sustainable and comfortable living environment. As the project evolves, we anticipate implementing features to further enhance user experiences, such as integration with emerging smart devices and expansion of customization options.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

IOT, Smart Home, Voice Recognition, Automation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Machine Learning-Based Rainfall Prediction for Diverse Economic Regions

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02011

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02011

  Register Paper ID - 259677

  Title: MACHINE LEARNING-BASED RAINFALL PREDICTION FOR DIVERSE ECONOMIC REGIONS

  Author Name(s): Tammineni Ganesh Naidu, Kayyuru Sumanth Kumar, Nagothula Kalyan Babu, Tammineni Yaswanth Naidu, Ms. Shilpa S B

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 61-67

 Year: May 2024

 Downloads: 70

 Abstract

In our research, we harness the power of different computer algorithms to predict rainfall in various ecological zones of Ghana. We use data from the Ghana Meteorological Agency spanning four decades, from 1901 to 2015. We assess These algorithms' performance varies based on their accuracy in predicting rainfall, The speed at which they can operate these predictions, and their overall reliability. We find that Extreme Gradient Boosting, Random Forest, and Multilayer Perceptron algorithms excel across all three testing ratios, while K-Nearest Neighbour performs less effectively. Notably, Decision Tree proves to be the fastest in making predictions, but Multilayer Perceptron requires the most time. Our research provides valuable insights into the utilization of machine learning in tackling the complex rainfall prediction task in Ghana's diverse ecological regions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Rain prediction using computers, Ghana weather data, Accuracy check, CNN, Reliability evaluation, Accurate results._

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A NOVEL AND IMPROVED SCHEME FOR SOLVING 3x3 RUBIK'S CUBE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02010

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02010

  Register Paper ID - 259676

  Title: A NOVEL AND IMPROVED SCHEME FOR SOLVING 3X3 RUBIK'S CUBE

  Author Name(s): Rakesh V S, Mukul Singh, Imtiyaz Ahmed, K K Snehith Reddy, Manit Srivastava

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 54-60

 Year: May 2024

 Downloads: 68

 Abstract

This project aims to create a sophisticated Rubik's Cube solver by blending human-designed algorithms with computer-based methods. By understanding the cube's structure and using efficient algorithms like Thistlethwaite, the solver analyzes the cube in real-time. It employs machine learning and deep learning techniques to enhance its efficiency. The software generates user-friendly 3D models and visualizations to help users understand the process better. Extensive testing ensures accuracy, with future plans to integrate physical devices for an even better user experience, potentially revolutionizing Rubik's Cube solving.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Rubik's Cube, Thistlethwaite, CFOP Algorithm, CUDA Architecture, OpenCV

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02009

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02009

  Register Paper ID - 259675

  Title: INTRUSION DETECTION USING MACHINE LEARNING TECHNIQUE

  Author Name(s): Dr Shilpa V, Srinidhi G, Hannah Thomas, Vishnu Singh, Srinivas D

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 48-53

 Year: May 2024

 Downloads: 51

 Abstract

The internet connects the world, but also exposes it to numerous network threats. With the vast amount of information exchanged globally, ensuring the integrity and confidentiality of data has become increasingly challenging. Network security is essential in preventing easy breaches and unintended interference. One approach involves employing Intrusion Detection Systems, strategically positioned to monitor traffic from source to destination apps. However, balancing thorough screening with system efficiency is a concern. Integrating machine learning algorithms enhances flexibility and reliability in detecting and distinguishing between ordinary and malicious activities. The algorithms, logistic regression, Naive Bayes, K-Nearest Neighbour, and Decision Trees, are utilized in our research to optimize intrusion detection in Network Traffic Data, employing various evaluation methodologies to achieve the highest accuracy.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cyber-attack, distance relay, graph theory, multi-agent system, distributed system, deep neural network.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Safety Helmet Detection Model Based On Improved YOLO-M

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02008

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02008

  Register Paper ID - 259674

  Title: SAFETY HELMET DETECTION MODEL BASED ON IMPROVED YOLO-M

  Author Name(s): Ms. Maria Kiran L, Gangadhara M N, Nagendra K P, Naresh, Prajwal B

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 42-47

 Year: May 2024

 Downloads: 75

 Abstract

Integrating The goal of this project, "Safety Helmet Wearing Detection Model Based on Improved YOLO-M," is to develop a model for determining whether or not people are wearing safety helmets. Improving safety monitoring in diverse settings is the aim. In order to develop a safety helmet detection system with an enhanced YOLO-M model, a computer must be trained to identify whether or not people are wearing safety helmets in images or videos. This entails utilizing data, modifying the software, teaching it to comprehend helmets, and verifying that it functions well. Once it functions properly, you can employ it in locations where you wish to verify that individuals are donning safety helmets.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

YOLO-M (You Only Look Once for Multi-Object Detection

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOIL ANALYSIS AND CROP RECOMMENDATION USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02007

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02007

  Register Paper ID - 259671

  Title: SOIL ANALYSIS AND CROP RECOMMENDATION USING MACHINE LEARNING

  Author Name(s): Vasantha M, Vigneshwar Reddy, G Prem Sai, Kuruba Dinesh, Leela Sai

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 36-41

 Year: May 2024

 Downloads: 61

 Abstract

The goal of the project "Soil Analysis and Crop Recommendation Using Machine Learning" is to examine several approaches to soil analysis and crop recommendation. This model will forecast the greatest number of crops with a high degree of accuracy. It is essential to the survival and growth of the Indian economy.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Early Detection, Deep learning, CNN Algorithm, Image Processing.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Sign2Text & Text2Sign: Bridging Communication Barriers

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02006

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02006

  Register Paper ID - 259669

  Title: SIGN2TEXT & TEXT2SIGN: BRIDGING COMMUNICATION BARRIERS

  Author Name(s): Pushplata Dubey, Vishwadharini M, Vijaya Vittal Desai, Avirath G S, Vinod V Tallur

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 28-35

 Year: May 2024

 Downloads: 76

 Abstract

This paper presents a potential solution to break down communication barriers and promote inclusivity across various social and professional settings, bridging the gap between individuals with and without hearing impairments. The "Sign Language to Speech Conversion" and "Speech to Sign Language Conversion" initiative strives to create a real-time system that can translate Sign2Text & Text2Sign. The goal is to facilitate seamless two-way communication between individuals with hearing impairments and those without. The system will leverage advanced technologies CNN and RNNs to accurately recognize a wide range of gestures from sign language inputs. Furthermore, NLP models facilitate seamless translation of text. A key aspect is the real-time function of the system, minimizing delays in the translation process to enable instantaneous communication between ISL users and those relying on spoken language.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Spatial/temporal relationships, CNN, RNN, NLP

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TRAFFIC ACCIDENT RISK PREDICTION USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02005

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02005

  Register Paper ID - 259668

  Title: TRAFFIC ACCIDENT RISK PREDICTION USING MACHINE LEARNING

  Author Name(s): Ms.Ganga D Benal, Darshan G B, Jayapal reddy S, Manoj G V, Nandan K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 24-27

 Year: May 2024

 Downloads: 80

 Abstract

Traffic accidents pose significant threats to public safety and infrastructure. Predicting accident risk is crucial for implementing preventive measures and enhancing road safety. This study proposes a machine learning approach to predict traffic accident risk.The methodology involves the collection of extensive historical accident data, including factors such as weather conditions, road types, time of day, and traffic volume. Various machine learning algorithms are employed, including decision trees, random forests, and neural networks, to analyze and model the complex relationships between these factors and accident occurrence. Feature engineering techniques are applied to extract meaningful patterns and improve model performance. The performance of the models is evaluated using metrics.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic Accident Prediction Using Machine Learning.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Stock Market Prediction using GAN and Twitter Sentiment Analysis

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02004

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02004

  Register Paper ID - 259666

  Title: STOCK MARKET PREDICTION USING GAN AND TWITTER SENTIMENT ANALYSIS

  Author Name(s): J Sharon Christina, Bharani S, Devika B, Rajan C, Abishek A

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 19-23

 Year: May 2024

 Downloads: 76

 Abstract

Integrating Generative adversarial Networks (GANs) with Twitter sentiment analysis for stock market prediction. GANs are hired to generate sensible market situations, while sentiment analysis of Twitter information provides actual-time insights into public sentiment. by combining those strategies, the version ambitions to beautify prediction accuracy and seize market dynamics prompted via social media sentiment. The experiment evaluates the effectiveness of this method the use of ancient market data and Twitter sentiment analysis. consequences exhibit the capability of GAN-primarily based models in improving stock marketplace prediction by way of incorporating real-time sentiment analysis from social media structures like Twitter


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Stock Market Prediction, Generative Adversarial Networks (GANs)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MACHINE LEARNING-ENABLED FIERCE BLAZE PROLIFERATION ESTIMATING FROM INACCESSIBLE DETECTING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02003

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02003

  Register Paper ID - 259665

  Title: MACHINE LEARNING-ENABLED FIERCE BLAZE PROLIFERATION ESTIMATING FROM INACCESSIBLE DETECTING

  Author Name(s): Lokesh, Yashaswini U, Priyanka K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 14-18

 Year: May 2024

 Downloads: 77

 Abstract

Climate warming is making wildfires a greater menace. This project handles smoke and fire detection using a deep learning model built with Mobile-Net, a robust yet efficient architecture perfect for real-time applications. The model is trained using a vast library of images and videos that depict fire, smoke, and commonplace situations. Its great degree of precision in consistently differentiating between these groups makes it appropriate for a wide range of applications. Through the analysis of images and even live webcam feeds, the technology offers real-time fire and smoke detection. It can be utilized with surveillance systems, fire alarms, and emergency response systems due to its versatility. All things considered, by offering a precise and intuitive deep learning solution for smoke and fire detection, our research advances safety and security in a variety of scenarios


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Wildfire, Machine Learning, Fire Detection, Mobile-Net, Smoke, Video.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Diabetes Prediction Using Machine Learning and Chat-Bot

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02002

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02002

  Register Paper ID - 259664

  Title: DIABETES PREDICTION USING MACHINE LEARNING AND CHAT-BOT

  Author Name(s): Mr. Arun P., Yunish Sapkota, Muthineni Shashank, Kolli Venkata Abhishek

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 7-13

 Year: May 2024

 Downloads: 65

 Abstract

Diabetes, a widespread chronic condition globally, has spurred interest in using machine learning for prognosis and management. This effort aims to develop a predictive framework using machine learning tools, analyzing various data sources to identify at-risk individuals. By employing XGBoost and other machine learning algorithms, it processes large datasets efficiently. Additionally, it integrates a diabetes forecasting chatbot, offering personalized guidance based on individual risk factors. This system shows promise in enhancing diabetes management and health outcomes by accurately identifying high-risk individuals and providing tailored support. Overall, it underscores the potential of machine learning and chatbot technologies in improving chronic disease management.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Diabetes, Prediction, Machine Learning, Chat Bot.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTION OF ACCIDENTS USING R-CNN

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02001

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02001

  Register Paper ID - 259663

  Title: DETECTION OF ACCIDENTS USING R-CNN

  Author Name(s): Lakshmi Shree MS, M Pratibha, J Meghana, Sheetal U, Haiqha Sadaf

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1-6

 Year: May 2024

 Downloads: 105

 Abstract

A deals on accident detection, wherein we identify the characteristic attributes of objects in addition to detecting them as belonging to a class. More precisely, our goal is concurrently identifying the status of item class bounding boxes--safe, harmful, or crashed--and their detection on roadways. In order to accomplish this, we create a brand-new dataset and suggest a baseline technique for comparing accident detection tasks. Our Attention R-CNN accident detection network is designed with two streams: one for computing characteristic properties and the other for object detection with classes. We incorporate global contexts that are taken advantage of from the scene into the stream for object detection as an attention mechanism that gathers contextual information in the scene.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Bounding Boxes, image processing, Attention RCNN, Object Detection

  License

Creative Commons Attribution 4.0 and The Open Definition

Call For Paper June 2024
Indexing Partner
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
ISSN and 7.97 Impact Factor Details


ISSN
ISSN
ISSN: 2320-2882
Impact Factor: 7.97 and ISSN APPROVED
Journal Starting Year (ESTD) : 2013
ISSN
DOI Details

Providing A Free digital object identifier by DOI.one How to get DOI?
For Reviewer /Referral (RMS) Earn 500 per paper
Our Social Link
Open Access
This material is Open Knowledge
This material is Open Data
This material is Open Content
Indexing Partner

Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)

indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer
indexer