Journal IJCRT UGC-CARE, UGCCARE( ISSN: 2320-2882 ) | UGC Approved Journal | UGC Journal | UGC CARE Journal | UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, International Peer Reviewed Journal and Refereed Journal, ugc approved journal, UGC CARE, UGC CARE list, UGC CARE list of Journal, UGCCARE, care journal list, UGC-CARE list, New UGC-CARE Reference List, New ugc care journal list, Research Journal, Research Journal Publication, Research Paper, Low cost research journal, Free of cost paper publication in Research Journal, High impact factor journal, Journal, Research paper journal, UGC CARE journal, UGC CARE Journals, ugc care list of journal, ugc approved list, ugc approved list of journal, Follow ugc approved journal, UGC CARE Journal, ugc approved list of journal, ugc care journal, UGC CARE list, UGC-CARE, care journal, UGC-CARE list, Journal publication, ISSN approved, Research journal, research paper, research paper publication, research journal publication, high impact factor, free publication, index journal, publish paper, publish Research paper, low cost publication, ugc approved journal, UGC CARE, ugc approved list of journal, ugc care journal, UGC CARE list, UGCCARE, care journal, UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list 2020, ugc care approved journal, ugc care list 2020, new ugc approved journal in 2020, ugc care list 2021, ugc approved journal in 2021, Scopus, web of Science.
How start New Journal & software Book & Thesis Publications
Submit Your Paper
Login to Author Home
Communication Guidelines

WhatsApp Contact
Click Here

Conference Proceeding - Advances in Computing, Communication and Recent Trends in Technology (ACCRT) - 2024
Volume 12 | Issue 5

  Paper Title: LANDMINE DETECTION AND INTIMATION ROBOT USING GSM AND GPS TECHNOLOGY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02181

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02181

  Register Paper ID - 260024

  Title: LANDMINE DETECTION AND INTIMATION ROBOT USING GSM AND GPS TECHNOLOGY

  Author Name(s): Prof.Hariprasad T L, Anusha T Belamkar, Farheen Fathima A, Manoj G S, Mahesh L

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1187-1191

 Year: May 2024

 Downloads: 156

 Abstract

The integration of GSM and GPS innovations permits for effective communication and exact area following, guaranteeing fast and precise reaction to recognized landmines. The real-time transmission of information empowers the base station to make educated choices and send assets successfully. Furthermore, the robot's capacity to check and cripple landmines remotely minimizes the hazard to human life included in manual demining operations. Furthermore, the Landmine Discovery and Insinuation Framework Robot's flexibility makes it appropriate for arrangement in different landscapes and situations. Its tough plan and all-terrain capabilities empower it to work in challenging conditions, counting unpleasant territory and unfavourable climate. This flexibility upgrades its viability in recognizing and neutralizing landmines in different geological areas, making it a profitable device for mine clearance operations around the world.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Intimation system, Metal detectors, Base station, Versatility, All-terrain capabilities.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MULTIPURPOSE NIGHT PATROL AND RESCUE ROBOT USING IoT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02180

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02180

  Register Paper ID - 260023

  Title: MULTIPURPOSE NIGHT PATROL AND RESCUE ROBOT USING IOT

  Author Name(s): Prof Ravi Kumar M, Preethi T, Harshitha M, Harshitha R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1181-1186

 Year: May 2024

 Downloads: 131

 Abstract

This paper aims to develop a multi-purpose surveillance robot to perform surveillance activities in industrial areas, militarized war zones or radioactive field areas with the objective of analyzing, governing and protecting the areas from unwanted threats. The use of robots and their role in our day-to-day life has been rapidly increasing since the day they were introduced to the world, further reducing the errors and life risk to humans. The objective is to design and develop an Internet of Things (IoT) based autonomous multi-purpose surveillance robot at a low cost that will roam around freely and give live updates about their surroundings by broadcasting video and information through the sensors installed. The sensors collect the data from the surroundings and send it to the Arduino microcontroller which can be seen by the user any time. This technology is controlled by the user remotely through any device such as mobile phone, tablet or laptop with the help of IoT based services. The entire project is built and monitored by wireless platform to minimalize the use of wire and help it work smoothly in remote places. Further improvements and advancements in this project can help in reducing life risk of valuable soldiers or identification of any hostage in unknown places.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino,IoT,multipurpose,Blynk

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANIMAL DETECTION IN TRAFFIC USING YOLO ALGORITHM ON RASPBERRY PI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02179

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02179

  Register Paper ID - 260022

  Title: ANIMAL DETECTION IN TRAFFIC USING YOLO ALGORITHM ON RASPBERRY PI

  Author Name(s): Dr.Shobha S, Prathamesh More, Saniya R, Prajwal, Rakshitha S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1174-1180

 Year: May 2024

 Downloads: 166

 Abstract

This project aims to develop an animal detection system for traffic monitoring using the YOLO (You Only Look Once) algorithm deployed on a Raspberry Pi. The system utilizes a pre-trained YOLO model to detect animals in real-time video streams captured by a camera module or USB webcam connected to the Raspberry Pi. Through a series of steps including setting up the Raspberry Pi, installing dependencies, configuring YOLO, writing detection code, optimizing for the Raspberry Pi's limited computational resources, and testing in controlled and real-world environments, the project aims to create an efficient and accurate solution for detecting animals in traffic scenarios. The system's implementation considers ethical implications, robustness against varying conditions, and documentation for future reference and dissemination.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Raspberry PI, YOLO, Animal Detection, Deep Learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPREHENSIVE REVIEW ON SOLAR WEATHER AND POLLUTION TRANSMITTER USING BUOY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02178

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02178

  Register Paper ID - 260020

  Title: A COMPREHENSIVE REVIEW ON SOLAR WEATHER AND POLLUTION TRANSMITTER USING BUOY

  Author Name(s): Sneh Rachna, Prem Kumar M, Aruna S, Nanditha S, Mohan S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1167-1173

 Year: May 2024

 Downloads: 151

 Abstract

In this project, we propose to design and build a buoy-based environmental monitoring system that runs on solar power and can measure aquatic environments' water quality indicators as well as meteorological conditions. A microcontroller, a wireless transmitter, weather sensors, water quality sensors, and solar panels are all integrated into the system on a buoy platform. The system is continuously powered by solar panels, which guarantees independent functioning and reduces the need for regular battery changes. While water quality sensors keep an eye on things like pH, dissolved oxygen, turbidity, and certain impurities in the water, weather sensors measure things like temperature, humidity, air pressure, wind speed, and wind direction. A microcontroller organizes data transmission via a wireless transmitter, interprets sensor data, and manages power. For real-time processing, the gathered data is sent to a distant station or server.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Microcontroller, Water Quality Sensors, Solar Panel Integration, Enclosure Aesthetics

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART TEXTILES FOR HEALTHCARE MONITORING SYSTEM USING ARDUINO

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02177

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02177

  Register Paper ID - 260019

  Title: SMART TEXTILES FOR HEALTHCARE MONITORING SYSTEM USING ARDUINO

  Author Name(s): Jayaprakash.S, Rashmitha Reddy R, Rachana N S, Priya S, Lekha P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1161-1166

 Year: May 2024

 Downloads: 139

 Abstract

A form-fitting textile contains an electrocardiography SoC, flexible electrodes, battery, and antenna. The clinical standard ECG, a 3-lead, is recorded by this "smart shirt". The data is safely sent wirelessly, using less than lmW and a flexible antenna and on-chip ISM band radio to provide secure, continuous cardiac monitoring on a smartphone. A practical and non-invasive method of tracking vital signs and identifying different health markers is provided by smart textiles, which have emerged as a viable solution for continuous healthcare monitoring. The latest developments in smart textile technology for heath monitoring are examined in this paper. It talks about how textiles can be equipped with sensors and actuators to monitor physiological data like respiration rate in real time. The study also looks at the difficulties in designing smart textiles, such as washability, comfort, and durability, and it presents creative solutions to these problems. Since the 3-lead ECG sensor measures heart rate by varying our muscle movements without interfering with the user's daily activities, this project creates a painless way for the body to sense the heart rate through the three contacts points that sense high muscle movements. The t-shirt's embedded connections produce a heart rate, display the current electrocardiogram (ECG) condition, and sound a buzzer to alert the wearer to various situations.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Electrocardiography (ECG), System-on-Chip (SoC), Flexible electrodes, 12-lead ECG, ISM band radio.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Analysis of Power Performance of Class E Amplifier for High Frequency Radio Applications

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02176

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02176

  Register Paper ID - 260017

  Title: ANALYSIS OF POWER PERFORMANCE OF CLASS E AMPLIFIER FOR HIGH FREQUENCY RADIO APPLICATIONS

  Author Name(s): Chaithra S, Nithya Priya, Pragna Vedi, Spoorthy M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1154-1160

 Year: May 2024

 Downloads: 156

 Abstract

We present a fully integrated single-stage power amplifier operating. Among all non-linear power amplifier classes, the class-E power amplifier stands out for its simplicity and high efficiency. In order to create the suggested power amplifier at 1.8V, this class was selected. Using the same transistors at the same frequency and output power, class-E amplifiers often operate with power losses that are around 2.3 lower than those of traditional class-B or class-C amplifiers. Because of the input waveform's strong driving, the common source transistor functions as a basic switch when in use. As long as the cascode bias voltage Vb is high enough to place transistor M2 in the triode region, the voltage can rise to a point where the common gate transistor is also switched. This configuration improves the amplifier's dependability by allowing for less swing in the drain-gate voltage. Our solution improves gain, bandwidth stability, and linearity over the operational spectrum by utilizing an inductively degraded common-source CMOS power amplifier in conjunction with a cascode topology. While noise figure typically holds less relevance in power amplifier design, we optimize the matching network to minimize noise figure and maximize power gain The suggested circuit has been successfully designed and implemented using Cadence Virtuoso tools at 45nm, 90nm & 180nm technology. This paper depicts a comparison of power of the RF Amplifier of Class E with respect to 180nm technology with the referenced paper[1] where the power consumption is observed as 10.69mWatts for 180nm where in our paper power consumption is reduced to 3.669uWatts.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CMOS (Complementary Metal Oxide Semiconductor), RF Amplifier (Radio Frequency Amplifier), SNR (Signal to noise ratio), comparison, performance evaluation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AQUATIC WASTE REMOVAL ROBOT USING NIR SENSOR AND RASPBERRY PI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02175

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02175

  Register Paper ID - 260016

  Title: AQUATIC WASTE REMOVAL ROBOT USING NIR SENSOR AND RASPBERRY PI

  Author Name(s): Prof Srinivasalu G, Gangothri M, Poojashree M, Manoj M Sangam, Shrujan M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1149-1153

 Year: May 2024

 Downloads: 157

 Abstract

This work presents an Aquatic Waste Cleaning Robot (AWRR) powered by a Raspberry Pi microprocessor and equipped with a near infrared (NIR) sensor. AWRR addresses the problem of water pollution with a system designed to identify and eliminate waste in water bodies. The Raspberry Pi allows real-time data processing and control, while near-infrared sensors detect waste based on spectral signatures. AWRR uses mechanical equipment to clear and locate debris and navigate waterways. Today's technology offers effective methods for wastewater management and can be used in many areas.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Trash management, intelligent trash, robotic lake cleaning, Raspberry Pi, and smart cities

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IOT BASED TRANSMISSION LINE FAULT DETECTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02174

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02174

  Register Paper ID - 260015

  Title: IOT BASED TRANSMISSION LINE FAULT DETECTION

  Author Name(s): Shakila D, Kusuma N, Komala M C, Meena A,, Monica R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1143-1148

 Year: May 2024

 Downloads: 148

 Abstract

This paper presents a comprehensive solution for fault detection in three-phase transmission lines utilizing ESP8266, a microcontroller-based platform, in conjunction with a GSM module for remote communication. Transmission line faults pose significant challenges to power system reliability and require swift detection and response mechanisms to minimize downtime and ensure uninterrupted power supply. Upon fault detection, the ESP8266 triggers the GSM module to transmit fault information to a central monitoring station or the person who is controlling the system, enabling remote monitoring and swift response to faults. Experimental results demonstrate the effectiveness and reliability of the proposed ESP8266 and GSM module-based fault detection system, highlighting its potential for deployment in real-world power distribution networks to enhance fault management and system resilience


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Transmission network, Three phase fault location, ESP8266, GSM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: VEHICLE SECURITY SYSTEM FOR ACCIDENT DETECTION, THEFT PREVENTION AND ENGINE LOCKING MECHANISM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02173

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02173

  Register Paper ID - 260014

  Title: VEHICLE SECURITY SYSTEM FOR ACCIDENT DETECTION, THEFT PREVENTION AND ENGINE LOCKING MECHANISM

  Author Name(s): Dr. Shivananda, Darshan D M, Harish G, Vinay Kumar M, Madhu kumar N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1136-1142

 Year: May 2024

 Downloads: 156

 Abstract

In today's fast-paced world, the safety and security of cars is critical. These issues are intended to be fully addressed by the Vehicle Security System for Accident Detection, Theft Prevention, and Engine Locking Mechanism project. This ground-breaking solution makes use of cutting-edge technology to lock the engine, stop theft, and identify accidents, giving car owners peace of mind and improving road safety in general. Modern sensors and clever algorithms are incorporated into the system to detect accidents in real-time, allowing for prompt aid and response. Strong anti-theft features, such as GPS tracking and immobilization systems, also protect the car from unwanted access and theft attempts.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Vehicle Security System, Accident Detection, Theft Prevention, Engine Locking Mechanism, Automotive Safety, Anti-Theft Technology, Vehicle Alarm System, GPS Tracking, Remote Locking, Collision Sensing

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: THE DESIGN AND VERIFICATION OF A 32-BIT RISC V PROCESSOR USING VEDIC MATHEMATICS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02172

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02172

  Register Paper ID - 260013

  Title: THE DESIGN AND VERIFICATION OF A 32-BIT RISC V PROCESSOR USING VEDIC MATHEMATICS

  Author Name(s): Girish H, Vajjala Sai Sree Hari, Ponde Lakshmi Narasimha, P N Shreya, Dadigala Bhargavi

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1130-1135

 Year: May 2024

 Downloads: 170

 Abstract

Vedic multiplier architecture is used in the construction of a 32-bit RISC V processor to improve speed and decrease computational complexity. Its Vedic Sutra-based ALU and MAC units, which are implemented in Verilog HDL and simulated using the Xilinx design suite, lower power consumption and latency as compared to traditional architectures. Comprising of conventional components such as Control Unit, Register Bank, Programme Counter and Memory. The processor can carry out up to 16 instructions. It is an effective option for a variety of computer jobs since it provides increased speed, decreased power consumption, and reduced area utilisation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Reduced Instruction Set Computer, Von Neumann architecture, Verilog HDL, Vedic Mathematics, Urdhva-Tiryagbhyam Sutra.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AUTOMATIC MONITORING GADGET FOR BLOOD PRESSURE IN EXPECTING MOMS USING SUPINE PRESSOR EXAMINATIONS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02171

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02171

  Register Paper ID - 260012

  Title: AUTOMATIC MONITORING GADGET FOR BLOOD PRESSURE IN EXPECTING MOMS USING SUPINE PRESSOR EXAMINATIONS

  Author Name(s): Dr.G.Indumathi, Dr. Cyril Prasanna Raj. P, Dr. A. Chrispin Jiji, Shirisha GP, Sharada P, Spandana KJ, Usha SM

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1125-1129

 Year: May 2024

 Downloads: 140

 Abstract

Although prior research has frequently disregarded the effects of the pregnant uterus's mechanical constriction of the left renal vein, preeclampsia poses major health hazards to both mothers and infants. This work used two different approaches: first, it investigated the relationship between elevated blood pressure and renal damage and constriction of the left renal vein in mice. Secondly, it developed an automated version of the supine pressor test (SPT) to help pregnant women determine their preeclampsia risk. The results of the study conducted on mice suggested that acute renal failure and a considerable rise in blood pressure could be brought on by persistent renal vein stenosis. From a human perspective, the research noted that when non-pregnant women switched from sleeping on their left side to resting on their back, proving that expectant mothers were capable of doing the SPT on their own. In conclusion, this study provides a promising technique for the early diagnosis of preeclampsia in pregnant women and illuminates possible underpinnings of the condition.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Supine Pressor test, Mechanical compression, Renal necrosis, Blood pressure increase, Renal vein constriction, Preeclampsia, Early diagnosis

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ASIC IMPLEMENTATION OF RV32IMAC RISC- V SOC

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02170

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02170

  Register Paper ID - 260011

  Title: ASIC IMPLEMENTATION OF RV32IMAC RISC- V SOC

  Author Name(s): Dr.Cyril Prasanna Raj P, Divya R, Geetha V, Aishwarya K R, Mahalakshmi H

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1120-1124

 Year: May 2024

 Downloads: 155

 Abstract

This paper delves into the ASIC implementation of an RV32IMAC RISC-V System-on-Chip (SoC), focusing on its adaptation for diverse surveillance applications. By harnessing the capabilities of RISC-V architecture, the SoC is designed to offer a flexible and efficient platform for surveillance tasks in varied environments, including industrial sectors, war zones, and radioactive fields. Through meticulous architectural design and optimization strategies, the SoC achieves a balance between performance, power efficiency, and cost-effectiveness. Notably, it integrates specialized instructions tailored for surveillance operations, alongside robust support for sensor integration and real-time data processing. Furthermore, the SoC's implementation leverages advanced techniques to ensure reliability, scalability, and compatibility with emerging surveillance systems. With its ability to handle complex tasks autonomously and facilitate seamless communication via IoT-based services, the ASIC implementation of the RV32IMAC RISC-V SoC represents a significant advancement in the realm of surveillance technology, promising enhanced situational awareness and threat mitigation capabilities.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

RV32IMAC RISC-V System-on-Chip (SoC ), cost-effectiveness

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FPGA BASED HOME AUTOMATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02169

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02169

  Register Paper ID - 260010

  Title: FPGA BASED HOME AUTOMATION

  Author Name(s): Praveen Kumar KC, Mansi Sharma, Krithi R, U Rajendra, D Bharadwaj

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1115-1119

 Year: May 2024

 Downloads: 141

 Abstract

Focusing on FPGA-based home automation with the Basys 3 board, this project integrates sensors for temperature monitoring, door status detection, and remote-controlled operation of an LCD projector. Verilog programming facilitates real-time temperature monitoring, activating fans as necessary. Reed sensors detect door openings, automatically triggering light activation for enhanced convenience and security. Through FPGA control, users can remotely operate the LCD projector, enhancing home entertainment system flexibility and accessibility.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Home automation, FPGA board, Verilog, security

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Hardware Accelerator for Ground Penetrating Radar

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02168

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02168

  Register Paper ID - 260009

  Title: HARDWARE ACCELERATOR FOR GROUND PENETRATING RADAR

  Author Name(s): Dr. Cyril Prasannaraj P, Prof. Ravikumar M, Raghavendra P, Sachin C, Sachin P V, Sagar H P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1106-1114

 Year: May 2024

 Downloads: 158

 Abstract

Ground penetrating radar (GPR) image recognition accuracy and efficiency have been greatly enhanced by deep learning. A significant number of weight parameters must be specified, which requires lots of labeled GPR images. However, obtaining the ground-truth subsurface distress labels is challenging as they are invisible. The traditional data augmentation techniques, like rotating, scaling, cropping, and flipping, would change the GPR signals' real features and cause the model's poor generalization ability. When the annotated training GPR pictures are not enough, the datasets can be expanded using the suggested data augmentation techniques. When there are not enough annotated training GPR pictures, the datasets can be expanded using the suggested data augmentation techniques.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

GPR (Ground penetrating radar),GPR signal, GPR picture

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF DYNAMIC CAR CHARGING USING IOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02167

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02167

  Register Paper ID - 260008

  Title: IMPLEMENTATION OF DYNAMIC CAR CHARGING USING IOT

  Author Name(s): Dr. Sudha M S, Gagan Reddy H L, Goutham M, Naveen K, Ajay N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1099-1105

 Year: May 2024

 Downloads: 137

 Abstract

This article integrates a subscription-based strategy with a revolutionary technique to wireless dynamic car charging (WDCC). The system's seamless charging capabilities while vehicles are in motion are intended to meet the growing demand for effective electric vehicle (EV) charging infrastructure. The suggested approach does away with the requirement for conventional plug-in charging stations by wirelessly transferring electricity to EVs via inductive charging technology embedded in highways. Users can use the WDCC service through a subscription-based approach, which eliminates the burden of human intervention and enables convenient and ongoing payment. In addition to guaranteeing income creation for service providers, the subscription model gives EV owners freedom and cost. The suggested WDCC system's technical features, advantages, difficulties, and possible implementation methods are all covered in this study.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Wireless dynamic car charging (WDCC), Subscription-based model, Electric vehicles, Inductive charging technology

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SECURITY SYSTEM USING IRIS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02166

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02166

  Register Paper ID - 260007

  Title: SECURITY SYSTEM USING IRIS

  Author Name(s): Dr. C Usha, Chandan B K, Bharath Kumar M, Dhanush B M, Sunil M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1092-1098

 Year: May 2024

 Downloads: 167

 Abstract

Graphical password authentication methods have garnered attention as an alternative to traditional text-based passwords, aiming to improve both security and usability. Nonetheless, numerous existing graphical password systems encounter usability challenges, such as poor memorability and susceptibility to various attacks. In this study, we introduce an innovative graphical password authentication approach intended to mitigate these usability issues while upholding security standards. Our approach incorporates both image recognition and user-generated patterns to establish a multi-layered authentication framework. Initially, users select a memorable image from a predefined array of categories and subsequently overlay a personalized pattern onto the chosen image. We integrate advanced image processing techniques to bolster resistance against shoulder surfing and other potential attacks. Furthermore, we conducted a usability assessment involving a diverse participant pool to evaluate the efficacy of our proposed approach. The findings indicate noteworthy enhancements in memorability and user satisfaction when compared to existing graphical password systems. In summary, our approach presents a promising avenue for enhancing the usability of graphical passwords while maintaining robust security measures


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SECURITY SYSTEM USING IRIS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SELF-NAVIGATION ROBOTICS:MASTERING AUTONOMOUS PATH

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02165

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02165

  Register Paper ID - 260003

  Title: SELF-NAVIGATION ROBOTICS:MASTERING AUTONOMOUS PATH

  Author Name(s): Shyam Sundar V, Gangadasu Swetha, Darshan M R, Chandan K Singh, Chandana H C

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1085-1091

 Year: May 2024

 Downloads: 163

 Abstract

The goal of the project "Self-Navigation Robotics: Mastering Autonomous Path" is to create an intelligent robot car that can drive itself from a starting point to a user-specified destination while dynamically changing its course to avoid obstacles in real time. In order to accomplish flawless autonomous navigation in challenging surroundings, the project blends a powerful combination of sensor technologies, innovative algorithms, and hardware components. This study presents a unique camera module, LiDAR, ROS2, Gazebo, and Raspberry Pi self-navigating vehicle system. LiDAR enables accurate 3D mapping and obstacle recognition, while ROS2 provides seamless system integration and communication. Gazebo provides a reliable simulation environment for verifying system functionality prior to a system being physically deployed. The Raspberry Pi functions as the main processing unit, managing decision-making algorithms and combining sensor data. The camera module improves versatility in a range of circumstances by enhancing perception with visual signals in addition to LiDAR. More advancements are possible when the system architecture prioritizes scalability and real-time responsiveness. Experimental validation the system's autonomous navigation competency highlights its potential for robotics research and industrial automation applications.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Self-navigating automotive system, Camera module, LiDAR, ROS2, Gazebo, Raspberry Pi, 3D mapping, Obstacle identification, Simulation, Central computing unit, Sensor data fusion, Real-time responsiveness

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART SERICULTURE USING IMAGE PROCESSING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02164

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02164

  Register Paper ID - 260002

  Title: SMART SERICULTURE USING IMAGE PROCESSING

  Author Name(s): Nandini Kumari B, Raju, M Shivateja Goud, R Varun Reddy, Chandrashekar CH

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1080-1084

 Year: May 2024

 Downloads: 232

 Abstract

In this paper, Sericulture involves raising silkworms to produce silk and is crucial for India's development. Temperature and humidity are vital for healthy silkworm growth. We used a MEGA controller to monitor silkworms in real-time. Image processing helps identify infections of silkworms. The MEGA controller automates tasks like temperature control, reducing manual work for farmers. It also monitors the environment in the silkworm rearing room. Image processing detects color changes in silkworms, indicating the infections.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SMART SERICULTURE USING IMAGE PROCESSING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CAMOUFLAGE ROBOT FOR ADVANCED MILITARY APPLICATIONS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02163

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02163

  Register Paper ID - 260001

  Title: CAMOUFLAGE ROBOT FOR ADVANCED MILITARY APPLICATIONS

  Author Name(s): Dr. Shivapanchakshari T G, Prajwal C, Shashank M, Harshavardhan M, D Lava Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1075-1079

 Year: May 2024

 Downloads: 175

 Abstract

In contemporary times, significant resources are allocated towards implementing antiquated security measures to deter border trespassers. In high-risk areas where conventional military tactics may falter, various military entities employ robotic assistance. These military-grade robots are clandestinely deployed and outfitted with a suite of technologies including cameras, sensors, metal detectors, and camouflage. The primary objective of our system is to seamlessly blend into the surrounding environment, while also boasting additional functionalities such as an infrared sensor for intruder tracking and Wi-Fi connectivity for real-time data processing. Consequently, the proposed Wi-Fi system minimizes errors in defense operations, thereby bolstering national security against potential intruders.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Blending into environment, Military-grade Robots, IR (Infrared), WI-FI (wireless fidelity)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: 3-DIMENSIONAL SCANNER USING ARDUINO

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02162

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02162

  Register Paper ID - 260000

  Title: 3-DIMENSIONAL SCANNER USING ARDUINO

  Author Name(s): Dr. C. Usha, Karanam Vengal Naidu, Harsha Gowda S N, Surendra Reddy B, Goutham B H

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1069-1074

 Year: May 2024

 Downloads: 231

 Abstract

This project outlines a cost-effective 3D scanning solution utilizing Arduino Nano technology. It utilizes structured light to capture the geometry of objects. The hardware setup comprises an Arduino Nano microcontroller, a camera module, and a laser module for structured light projection. Software-wise, it employs an open-source computer vision library for image processing and depth map generation. The workflow involves system calibration to ensure optimal performance and accuracy. Once calibrated, the structured light pattern is projected onto the object, and images are captured by the camera. These images are then processed to extract depth information, enabling the reconstruction of the object's 3D model. The resulting point cloud data can be refined further for improved accuracy. To evaluate the scanner's performance, experiments are conducted with objects of various shapes and sizes. Metrics such as accuracy, resolution, and scanning speed are analysed to gauge its practical usability. Overall, the developed 3D scanner demonstrates its ability to generate detailed and accurate 3D models, making it suitable for applications like rapid prototyping, reverse engineering, and educational purposes.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Low-cost 3D scanner, Arduino Nano microcontroller, Rapid prototyping, Calibration for optimal performance.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A Review on Design of Low Power and High Speed ALU using FinFET and CMOS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02161

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02161

  Register Paper ID - 259999

  Title: A REVIEW ON DESIGN OF LOW POWER AND HIGH SPEED ALU USING FINFET AND CMOS

  Author Name(s): Veerappa Chikkagoudar, K N Harishankar, Parikshith K, Pavan Sharma V, Sam A I

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1065-1068

 Year: May 2024

 Downloads: 151

 Abstract

This paper shows a comparison of power requirement and delay consumed between the 4 - bit ALU that is designed using a fin-shaped field-effect transistor [FinFET] and the traditional CMOS to demonstrate a better and efficient 4 - bit ALU in terms of delay and power consumption. The aim of this work is provide a Comparative Analysis of Arithmetic Logic Unit (ALU) Performance using CMOS and FinFET Technologies. ALU is a fundamental component in digital circuits, performing arithmetic and logic operations. The transition from CMOS to FinFET technology has brought significant advancements in terms of power efficiency, speed, and scalability.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ALU (Arithmetic Logic Unit), CMOS (Complementary Metal Oxide Semiconductor), FinFET (Fin Field Effect Transistor), technology, comparison, performance evaluation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: WEATHER WIZARDS USING MACHINE LEARNING AND RASPBERRY Pi

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02160

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02160

  Register Paper ID - 259997

  Title: WEATHER WIZARDS USING MACHINE LEARNING AND RASPBERRY PI

  Author Name(s): Ravikumar M, Mouna S J, Modak Vignesh R, Likitha C K, K Deepa

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1060-1064

 Year: May 2024

 Downloads: 159

 Abstract

By combining cutting-edge sensors and machine learning on Raspberry Pi, the "Weather Wizards using Machine Learning and Raspberry Pi" initiative transforms weather forecasting. By implementing Random Forest algorithm we record temperature, humidity, precipitation, wind speed using four sensors namely (wind, temperature, humidity, rain) . We deliver real-time forecasts for sunny, cloudy, windy, and rainy days .This ground-breaking system represents a huge advancement in weather prediction, serving applications and businesses that depend on accurate and fast weather data


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Weather Forecasting, Machine Learning, Raspberry Pi, Real-Time data, Sensors.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: LINEAR MICROSTRIP ANTENNA ARRAY FOR 5G COMMUNICATION APPLICATIONS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02159

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02159

  Register Paper ID - 259996

  Title: LINEAR MICROSTRIP ANTENNA ARRAY FOR 5G COMMUNICATION APPLICATIONS

  Author Name(s): Tharun Tej D, Dr. Shivapanchakshari T G, Virupaksha G R, Shivakeerthi B T, Suhas S B

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1053-1059

 Year: May 2024

 Downloads: 122

 Abstract

In the world of wireless communication, there is an increasing demand for high-performance MIMO (Multiple Input Multiple Output) antenna systems tailored for smartphone applications. MIMO technology increases data rates, coverage, and reliability by using multiple antennas for transmission and reception. However, integrating MIMO antennas within the constraints of compact smartphone designs is fraught with difficulties, particularly in terms of guaranteeing adequate isolation between antenna parts to minimize interference. This work investigates the design and implementation of a MIMO antenna system specifically designed for smartphone applications in order to establish and maintain excellent isolation between antenna sections. Many design strategies are investigated, including better materials, decoupling techniques, and antenna element placement. In addition, recent advances in the fields of metamaterials, smartphone form factor integration, and micro antenna designs are discussed. Furthermore, the study addresses performance metrics including data throughput, power economy, and dependability, providing an understanding of the practical uses of these advancements. This paper's main objective is to promote MIMO antenna systems for smartphones by offering a comprehensive grasp of the challenges, solutions, and most recent developments in achieving high isolation within small form factors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Smartphone applications, High isolation.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HUMAN FOLLOWING ROBO USING RASPBERRY PI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02158

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02158

  Register Paper ID - 259995

  Title: HUMAN FOLLOWING ROBO USING RASPBERRY PI

  Author Name(s): Prof Roopa M, Ganadheeraj R, Jaywanth G, Padmashree R, Gayatri V K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1047-1052

 Year: May 2024

 Downloads: 148

 Abstract

This paper presents and focuses on the design and development of a A Human Following Robo (HFR) is a technology that can follow a human operator in an autonomous manner. Maintaining a constant distance and orientation in relation to the human operator is the major goal of the HFR. while navigating through indoor and outdoor environments. Key components of the system include computer vision for people recognition and tracking, obstacle avoidance mechanisms, and motion control strategies. The effectiveness of the proposed HFR system is evaluated through extensive simulations and real world experiments, demonstrating Its capacity to accurately track and follow a human operator in various scenarios. The results highlight the potential of HFRs as versatile and intelligent robotic assistants capable of enhancing human-machine interaction and productivity in diverse applications. The development of Human Following Robots (HFRs) represents a significant advancement in robotics technology, offering the potential to revolutionize various industries such as surveillance, healthcare, and entertainment. These robots are designed to autonomously track and follow human operators, facilitating seamless human-robot interaction and enhancing productivity in dynamic environments. This paper aims to explore the design, development, and evaluation of an HFR system capable of intelligently tracking and following a human operator. By leveraging a combination of sensors, actuators, and control algorithms, the HFR system enables intuitive and efficient navigation while maintaining a safe and consistent distance from the human operator.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Human Following Robo (HFR), Obstacle Avoidance, Object detection, Burning source code to processor

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF CONTROLLABLE NETMOVER ARM FOR LIFTING AND PLACING THE OBJECTS USING WIRELESS MODE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02157

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02157

  Register Paper ID - 259994

  Title: IMPLEMENTATION OF CONTROLLABLE NETMOVER ARM FOR LIFTING AND PLACING THE OBJECTS USING WIRELESS MODE

  Author Name(s): Lokesha A M, Akshay Kashyap S, Arun Kumar, Chethan Gowda V N, Dileep Kumar N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1042-1046

 Year: May 2024

 Downloads: 158

 Abstract

This paper focuses on the development of a versatile robotic arm with advanced functionalities, aiming to enhance automation in diverse industries. Integrating precision engineering and smart control systems, the robotic arm demonstrates agility and adaptability for various tasks, such as assembly, pick-and-place operations, and intricate manipulations. Employing state-of-the-art sensors and machine learning algorithms, the system ensures optimal performance and safety. This project contributes to the evolution of robotic technology, addressing real-world challenges and fostering efficiency in industrial processes. Developing a cutting-edge robotic arm is the primary objective of this project, aimed at revolutionizing automation across industries. Leveraging advanced materials and sophisticated control algorithms, the robotic arm exhibits unparalleled precision and adaptability. Integrating innovative sensing technologies and machine learning, it excels in complex tasks, offering a transformative solution for assembly lines, manufacturing, and research applications. This project underscores the pivotal role of robotics in shaping the future of automation, showcasing a versatile and intelligent robotic arm that pushes the boundaries of technological innovation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Robotic arm, Automation, Precision engineering, Machine learning algorithms, Industrial processes

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: WILDLIFE OBSERVATION ROBOT USING IOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02156

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02156

  Register Paper ID - 259992

  Title: WILDLIFE OBSERVATION ROBOT USING IOT

  Author Name(s): Hariprasad T L, M Likitha, Vani S, Ganavi C S, Apoorva B M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1033-1041

 Year: May 2024

 Downloads: 158

 Abstract

Wild animals become more aggressive when wounded because they're scared and confused and may think you're trying to capitalize on their vulnerable state. They're more likely to lash out and bite or scratch you than to accept your help. To address this, our project proposes an alerting system using YOLOv3, a real- time object detection algorithm based on deep convolutional neural networks, to classify and monitor animals that are hurt in Zoo or forests. This algorithm enables efficient identification and tracking of animals, aiding safeguarding wildlife observers and ensuring the preservation of wildlife in their natural habitats.By this wildlife monitoring robotic car using IOT, wildlife observers may get up and personal with wild creatures. An ESP32 is used in this system. The system receives these orders using a Wi-Fi module. We can capture the images of the wildlife continuously. And able to detect the wildlife.We are using the MLX9061an infrared thermometer designed for non-contact temperature sensing to measure the temperature of the animals and an ultrasonic non-contact type of sensor used to measure a wildlife's distance.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Image Processing, YOLO Algorithm, Convolutional Neural Network, COCO, ESP,UNO,IDE.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RASPBERRY PI VIDEO SURVEILLANCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02155

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02155

  Register Paper ID - 259991

  Title: RASPBERRY PI VIDEO SURVEILLANCE

  Author Name(s): Shakila D, Rohanth A R, Punith Kumar M S, Somesh N, Pramod Ramesh Hegde

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1027-1032

 Year: May 2024

 Downloads: 141

 Abstract

A Camera-Based Surveillance System utilizing Raspberry Pi proves highly advantageous for crime detection, monitoring various environments, and swiftly gathering evidence of illicit activities such as theft. This system is tailored for both residential and commercial spaces, ensuring prompt detection of any unauthorized actions.Operating on Raspberry Pi, equipped with a camera-based circuit, the system continuously scans its surroundings for motion. Upon detecting any motion, it promptly triggers an alert mode. This mode activates an alarm and captures images of the motion for future reference. Consequently, the system functions as an effective security measure, providing real-time monitoring and evidence collection. To further enhance its capabilities, integrating a GSM modem for alert SMS notifications or connecting to IoT for remote alarm activation can be considered. This augmentation ensures seamless communication of alerts to relevant parties, amplifying the system's effectiveness in safeguarding the monitored premises.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Raspberry Pi, GSM module, Stepper motor, webcam, PIR sensors, GPIO, Ethernet and USB

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPREHENSIVE REVIEW ON SMART AQUAPONICS SETUP WITH IoT-BASED FISH FEEDDING AND SURVEILLANCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02154

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02154

  Register Paper ID - 259990

  Title: A COMPREHENSIVE REVIEW ON SMART AQUAPONICS SETUP WITH IOT-BASED FISH FEEDDING AND SURVEILLANCE

  Author Name(s): Dr. Lakshmi C R, Raghavendra D C, Arun Kumar D S, Madhan H R, Mahesha S M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1021-1026

 Year: May 2024

 Downloads: 155

 Abstract

This paper introduces the Aquaponics Monitoring and Fish Feeding Automation System (AMFFAS) is an innovative solution leveraging the principles of Internet of Things (IoT) technology. AMFFAS aims to improve the efficiency and sustainability of aquaponics systems by automating fish-feeding processes and providing Inspection and coordination. The system comprises interconnected components, including IoT sensors, actuators, microcontrollers, and a central control unit. FFAAMS integrates an intelligent feeding system that dynamically adjusts feeding schedules and portion sizes based on factors like fish biomass, growth rates, and environmental conditions. This approach optimizes feed utilization, minimizing the risk of overfeeding and promoting healthy fish environments. Furthermore, AMFFAS offers Inspection and coordination through a user-friendly interface accessible via web or mobile applications. Aquaponics practitioners can remotely monitor system parameters, receive alerts for abnormal conditions, and adjust settings as needed. This feature enables proactive management of aquaponics systems, ultimately contributing to heightened productivity and sustainability.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Wireless dynamic-: Aquaponics, Fish Feeding Automation, IoT, Aquaponics system efficiency, Remote Monitoring

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF UNDERGROUND CABLE FAULT DETECTION BASED ON IOT WITH GPRS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02153

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02153

  Register Paper ID - 259989

  Title: IMPLEMENTATION OF UNDERGROUND CABLE FAULT DETECTION BASED ON IOT WITH GPRS

  Author Name(s): Abhishek M K, Dr. Sudha M S, Pavan V, Adithya R S, Akash Puzar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1014-1020

 Year: May 2024

 Downloads: 161

 Abstract

This paper's primary goal is to use an Arduino Mega microcontroller kit and Internet of Things devices to pinpoint the precise position of a fault in an underground wire. Instead of using overhead electrical lines, the metropolitan area uses an underground electrical cable wire. However, pinpointing the exact position of a break in an underground wire can be challenging, making repairs more challenging. Because of deterioration, subterranean conditions, vermin, etc., underground wires are vulnerable to malfunctions. Since we are unsure of the precise position of the problem, the entire cable needs to be dug out for inspection and fault repair. Our suggestion is to precisely locate the problem so that it can be rectified, making the repair process easier. A fault occurs when two lines are too close together; the network combination of the resistors determines the voltage that is produced at that location. After detecting the voltage change, the microcontroller alerted the user. The user receives information regarding the precise location where that voltage coincides. With the aid of a microcontroller, the fault's information is displayed on the LCD.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Microcontroller, Internet of things, Electrical cables, Cable fault, Aurdino mega, GSM module.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FPGA BASED HOME AUTOMATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02152

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02152

  Register Paper ID - 259988

  Title: FPGA BASED HOME AUTOMATION

  Author Name(s): Praveen Kumar KC, Mansi Sharma, Krithi R, U Rajendra, D Bharadwaj

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1009-1013

 Year: May 2024

 Downloads: 163

 Abstract

Centered on FPGA-based home automation utilizing the Basys 3 board, this project seamlessly integrates a suite of sensors tailored for temperature monitoring, door status detection, and remote-controlled operation of an LCD projector. Leveraging Verilog programming, the system ensures real-time temperature surveillance, with the capability to activate fans for optimal environmental control. Reed sensors are strategically deployed to detect door openings, triggering automated light activation, thus enhancing both convenience and security within the household. Empowered by FPGA control, users can remotely manipulate the lights, fans, and LCD projector, thereby augmenting the flexibility and accessibility of the home entertainment system


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Home automation, FPGA board, Verilog, security

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RC UNDER WATER EXPLORATION DRONE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02151

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02151

  Register Paper ID - 259987

  Title: RC UNDER WATER EXPLORATION DRONE

  Author Name(s): Dr.Shivananda, Sanjay reddy NS, Aravind reddy K, Gagan G, Faraz ahmed

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 1000-1008

 Year: May 2024

 Downloads: 166

 Abstract

The project aims to develop an underwater inspection drone that can navigate easily underwater and allow us to vide live video footage underwater. The drone provides following advantages including: Easy to Navigate Underwater, 360 Degree Direction Control, Live Footage Viewing, Dual Motor Propulsion system, Lightweight and anti-rust design for long term usage. The RC drone uses 2 x motors for propulsion and a separate motor for depth/direction control. Both motors are attached with propellers to achieve this task. This mechanism makes use of a unique rudderless mechanism using motor drives to control 360 degree movement of the drone. This mechanism does not make use of ballast tanks to control buoyancy. The drone consists uses the 2 motors to provide front drive as well as for left right direction control. The 3rd motor is used to control the vertical alignment of the drone. This motor in combination with other 2 motors is used to dive in or bring up the drone. All motors and controller unit is enclosed in a water proof chamber. The drone now uses a camera to capture footages underwater. These footages are transmitted to the floating buoy unit from there user can connect via wifi to check the footages. The system makes use of a raspberry pi controller for footage transfer as well as wifi transmission. Also the buoy unit is used to pullout the drone in case it gets stuck or runs out of battery under water


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ballast tanks, RC,under water, buoy unit.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AN EVOLUTION OF UNDERWATER VEHICLE FOR UNDERWATER COMMUNICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02150

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02150

  Register Paper ID - 259986

  Title: AN EVOLUTION OF UNDERWATER VEHICLE FOR UNDERWATER COMMUNICATION

  Author Name(s): Chetan Naik J, Santhosh Kumar N, Vishnu G C, Chandana K N, Vinodh R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 992-999

 Year: May 2024

 Downloads: 150

 Abstract

The literature survey on underwater unmanned vehicles (UUVs) reveals a diverse array of applications stretching across underwater exploration, defense, and various commercial implementations. The technological landscape encompasses sonar-based navigation systems, acoustic communications, and adaptive control algorithms, which propel UUVs to undertake complex missions such as seabed mapping, oceanographic research, mine countermeasures, and offshore infrastructure inspection. Defense applications include mine warfare, autonomous surveillance, and reconnaissance missions. Moreover, commercial applications comprise underwater inspection, maintenance of subsea installations, and environmental monitoring. Advanced technologies are employed in UUVs, such as autonomous underwater vehicle (AUV) designs, sensor fusion, underwater acoustic communication systems, and high-precision navigation algorithms, reflecting the interdisciplinary nature and extensive potential of UUVs in addressing a wide spectrum of underwater challenges and opportunities. This paper compares the evolution of underwater vehicle with technology and advancement for the purpose of underwater communication.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Underwater unmanned vehicle, Autonomous underwater vehicle, Underwater communication.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SRAM Cell Design Using FinFET for Low Power and Delay

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02149

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02149

  Register Paper ID - 259985

  Title: SRAM CELL DESIGN USING FINFET FOR LOW POWER AND DELAY

  Author Name(s): Veerappa S C, S K Fazle Umar, Sai Dhanush R N, Syed Avaiz, Vishwa Periaswamy

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 984-991

 Year: May 2024

 Downloads: 164

 Abstract

This paper introduces an approach utilizing a fin-shaped field-effect transistor to illustrate the structure of a 6T SRAM cell. The primary goal is to enhance the presentation's competitive edge while concurrently reducing the power usage and read/write delay inherent in conventional 6T SRAM cell designs. Given the increasing demand for rapid mobile computing, traditional CMOS SRAM cell configurations face performance constraints and significant power demands. This research undertakes a thorough examination of power consumption and read/write delay parameters associated with low-power SRAM cell designs. Furthermore, an exhaustive comparative analysis is performed between 45nm nano-scaled technologies and the emerging FinFET-based 6T SRAM cells, with a particular emphasis on their respective power efficiency and operational speed characteristics.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SRAM Cell Design Using FinFET for Low Power and Delay

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN AND OPTIMIZATION OF SERDES IN CMOS 45NM TECHNOLOGY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02148

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02148

  Register Paper ID - 259984

  Title: DESIGN AND OPTIMIZATION OF SERDES IN CMOS 45NM TECHNOLOGY

  Author Name(s): Ravi Kumar M, Sanjai S, Shilpashree S, Shreyas N Kulal, Tinu M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 977-983

 Year: May 2024

 Downloads: 172

 Abstract

With the miniaturization of electronic devices, interconnects (the pathways for data flow) are not shrinking as fast as the devices themselves. This inefficiency leads to problems with power consumption, area usage, and signal interference (crosstalk). To address this issue, the paper explores the use of serial links, which transmit data one bit at a time, as a replacement for traditional parallel buses that send multiple bits simultaneously. Serial links offer several advantages, including fewer connection points (pins), lower power use, smaller physical connectors, and better resistance to noise. The proposed architecture is simulated using a standard CMOS technology and industry-recognized simulation tools. The simulations are set up to evaluate factors like power consumption and data processing speed (throughput) under realistic operating conditions. The paper then compares the performance of this new design with previously reported architectures, highlighting improvements in power savings, area usage, and overall functionality. By analyzing the simulation results and comparisons, the paper demonstrates the significant benefits of the proposed architecture in terms of reduced power consumption, efficient chip area utilization, and improved data processing. Finally, the paper concludes by summarizing the key findings and advancements achieved with this design.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SerDes, CDR, Serializer, De-serializer, TSPC Flip Flop.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART TRAFFIC DENSITY MANAGEMENT AND MONITORING SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02147

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02147

  Register Paper ID - 259983

  Title: SMART TRAFFIC DENSITY MANAGEMENT AND MONITORING SYSTEM

  Author Name(s): Prof. Nanditha S R, Anusha N M, Pallavi S H, Aishwarya M, Supriya S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 971-976

 Year: May 2024

 Downloads: 127

 Abstract

This flexibility upgrades its viability in recognizing and neutralizing landmines in different geological areas, making it a profitable device for mine clearance operations around the world. With the use of cutting-edge sensors and technology, the Smart Traffic Density Management and Monitoring System maximizes urban traffic flow. By adjusting traffic lights dynamically in response to real-time density data, it minimizes traffic and travel time. It offers government and commuter interfaces that are easy to use while smoothly integrating with the current infrastructure. Reliability, scalability, and flexibility to shifting traffic conditions are guaranteed by embedded system architecture. The technology also improves safety by pointing out potential dangers and encouraging other forms of transportation during rush hour. All things considered, it's a creative way to successfully control urban traffic and promote sustainable travel.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic, congestion, traffic light, vehicles

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ANAESTHESIA BASED MACHINE CONTROL USING RASPBERRY PI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02146

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02146

  Register Paper ID - 259982

  Title: ANAESTHESIA BASED MACHINE CONTROL USING RASPBERRY PI

  Author Name(s): Prof. Shyam Sundar V, Sumeera Sultana N, Ashwit, Tanzil Ahmed, Chaitra S V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 966-970

 Year: May 2024

 Downloads: 145

 Abstract

This study suggests a method for using the Raspberry Pi, an inexpensive, multipurpose microprocessor, to operate anesthetic machines. In order to precisely provide anesthetic gases and vapors to patients during surgical procedures, anesthesia machines are essential medical equipment. Customization and integration with contemporary healthcare systems are frequently restricted by the proprietary hardware and software used by traditional anesthetic machines. Through the utilization of Raspberry Pi's capabilities, we offer an adaptable and economical approach to control anesthetic machines. Our system makes use of sensors to keep an eye on critical factors including oxygen content, pressure, and gas flow rates. It then provides real-time feedback to guarantee precise anesthetic delivery. By analyzing this data and modifying the machine's settings accordingly, the Raspberry Pi maximizes patient comfort and safety .Moreover, our methodology facilitates smooth integration with electronic health records


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Anesthesia, Raspberry Pi, Heartrate, Temperature, SPO2, Body Wetness, infusion.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CRYPTOGRAPHIC HARDWARE FOR EMBEDDED SYSTEMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02145

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02145

  Register Paper ID - 259980

  Title: CRYPTOGRAPHIC HARDWARE FOR EMBEDDED SYSTEMS

  Author Name(s): Dr Girish H, Anusha Dixith G, Aina Saba N, Anusha K V, Chandana M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 958-965

 Year: May 2024

 Downloads: 142

 Abstract

Developing a cryptography model that can translate legible writing from common language and converse is the aim of this research. For SoC level FPGA, the AES 128-bit symmetric cryptography technique is used to avoid malware in both hardware and software. The ideal AES design with an enhanced security scheme is also described in this study. The suggested model enables pipelined reusing of the same hardware. Furthermore, suggests expanding the use of dynamic key extraction in cryptosystems to increase randomness through the addition of outer layer security. A completely automated process for creating keys framework utilizing digital biometrics is utilized to produce a 256-bit key with enhanced randomness for 32 From the provided digital biometric, pixels are randomly selected, and the values of all the selected pixels are concatenated at random to generate a 256- bit encryption key.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

AES (Advanced Encryption Standard), FPGA (field programmable gate array), LUT (Look up table), Mbps (megabit per second), sub (sub bytes), shift (shift rows), mix (mix column), add (add round key).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOLAR ENERGISED SOLAR PANEL CLEANING ROBOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02144

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02144

  Register Paper ID - 259979

  Title: SOLAR ENERGISED SOLAR PANEL CLEANING ROBOT

  Author Name(s): Prof. Lokesha A. M, Madhu Singh K, R Dharshini, Srushti Sidaraddi, Sweekruthi Shetty R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 953-957

 Year: May 2024

 Downloads: 166

 Abstract

This design proposes a solar- powered robot for drawing solar panels, exercising solar energy for both power generation and drawing operations. The system integrates rechargeable batteries, a robotic platform with drawing mechanisms, and a mobile app for stoner control. It's ideal is to optimize solar panel performance by maintaining cleanliness without homemade intervention. The robot's cleaning mechanisms are designed for effectiveness and minimum panel damage. Control commands are transmitted via Bluetooth from the mobile app, enabling real- time monitoring and adaptation. The tone- sustaining power system ensures nonstop operation, suitable for remote or out- grid installations. Overall, this innovative result offers a cost-effective and sustainable approach to solar panel conservation


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino, Cleaning, sensors, Brushes, Bluetooth, Automation

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GREEN CONCRETE STRENGTH CHARACTERISTICS THAT CONTRIBUTE TO SUSTAINABILITY AND ITS ENVIRONMENTALY BENIGN NATURE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02143

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02143

  Register Paper ID - 259951

  Title: GREEN CONCRETE STRENGTH CHARACTERISTICS THAT CONTRIBUTE TO SUSTAINABILITY AND ITS ENVIRONMENTALY BENIGN NATURE

  Author Name(s): Vinay Kumar S, Shakir Ali Malik, Suchithrahas C S, Prajwal, Eshwari H S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 946-952

 Year: May 2024

 Downloads: 176

 Abstract

To fulfill the demands of globalization in the construction of buildings and infrastructure, India has recently made a significant effort in constructing the infrastructure, including expressways, power projects, and industrial structures, among other things. Concrete and cement are commonly utilized in construction and building techniques across the globe. It is necessary to switch to green concrete from Ordinary Portland Cement (OPC), since OPC uses more energy and harms the environment. In this study fly ash is used as an alternate to OPC, as fly ash has a high silicate and alumina content, it combines with an alkaline solution to form an alumino-silicate gel, which bonds the aggregate and results in high-grade concrete. The concrete mix proportioning used is M30 GRADE and activation of geo polymer concrete is done using alkaline activators such as sodium hydroxide and sodium silicate solutions, finally checking the mechanical strength properties of GPC in comparison with conventional concrete


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Alkaline Activators, Durability, Fly ash, Strength.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: MODELLING AND ANALYSIS OF STADIUM FOR A RETRACTABLE ROOF

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02142

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02142

  Register Paper ID - 259950

  Title: MODELLING AND ANALYSIS OF STADIUM FOR A RETRACTABLE ROOF

  Author Name(s): Chandrika P, Keerthana R, Rashmi T.M, Hruthik R, Santhosh V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 939-945

 Year: May 2024

 Downloads: 212

 Abstract

This study presents a detailed analysis of retractable roofs. The retractable roof is a versatile architectural feature designed to provide flexible shelter and climate control for various structures, such as stadiums, arenas, and outdoor spaces. This innovative technology allows for the seamless transition between open-air and covered environments, offering protection from adverse weather conditions while maintaining an open-air experience when desired. It aims at enhancing the overall spectator experience and ensuring uninterrupted gameplay, regardless of adverse weather conditions. This innovative system involves mechanized panels and sections that can be opened or closed. The length of retractable roofs increases with the demand for more flexible and light construction, and such requirements mark retractable roof structures more sensitive to wind actions. The project outlines the potential impact of this innovative solution on the sports industry and multipurpose events.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Analysis, design, modeling, roofing material, STAAD PRO, trusses, retractable, Stadium.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AN INNOVATIVE EXPERIMENTAL TECHNIQUE OF ADDITIVE EXTRUSION MEND FOR CRATERS IN PAVEMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02141

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02141

  Register Paper ID - 259949

  Title: AN INNOVATIVE EXPERIMENTAL TECHNIQUE OF ADDITIVE EXTRUSION MEND FOR CRATERS IN PAVEMENT

  Author Name(s): Nagendra N, Murali Mohan M V, Aaqib Reyaz, K Rupesh Kumar, Betharasi Deepika, Anusha K V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 933-938

 Year: May 2024

 Downloads: 175

 Abstract

Using lignin extract to mend craters has shown favorable results in addressing the challenges posed by pavement distresses on roads and highways. Traditional methods for repairing craters involve resource-intensive hot asphalt mixtures, resulting in temporary fixes. This project introduces an innovative approach using additive extrusion technology and lignin extracted from coconut coir for more efficient, cost-effective, and durable pavement repairs. By blending lignin with bitumen and incorporating urea formaldehyde polymer, this method helps in utilizing the full benefits of a pavement and offers a sustainable alternative to traditional materials. This eco-friendly solution not only strengthens road surfaces but also contributes to greener road maintenance practices, ensuring safer and increases the durability of pavements.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

AN INNOVATIVE EXPERIMENTAL TECHNIQUE OF ADDITIVE EXTRUSION MEND FOR CRATERS IN PAVEMENT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN & MANUFACTURE OF POROUS CONCRETE USING SUGARCANE FIBER FOR URBAN PAVEMENTS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02140

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02140

  Register Paper ID - 259948

  Title: DESIGN & MANUFACTURE OF POROUS CONCRETE USING SUGARCANE FIBER FOR URBAN PAVEMENTS

  Author Name(s): Sreevidhya raman, Harshavardhan Karanam, Karthik S, Ranjith Kumar S, Prajwal kumar N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 928-932

 Year: May 2024

 Downloads: 146

 Abstract

The focus of present researchers shifted towards utilizing local available alternative materials with binding properties in concrete as a cement replacement. Utilization of agricultural waste with pozzolanic properties in concrete will further aid for sustainability. Thus, the present study is initiated evaluate the mechanical of pervious concrete with sugarcane ash replacing cement. Porous concrete is gap graded concrete mix with minimum or no fine and which allow water to percolate in to the earth beneath the pavement. Porous concrete being used as structural layer in the pavement, the concrete mix shall require minimum structural strength, as well as the permeability properties. M20 concrete mix design process is adopted in the present study, with an assumption that the cement mortar just coats the aggregate and does not completely fill any voids. The dried sugar cane waste is incinerated at 2500 C to get the sugarcane ash, which is further sieved through 150 microns sieve, and the passing fraction is used in mix as a partial replacement for cement. Concrete cubes with sugar cane ash replacing cement in ratios of 0 %, 0.5 %, 1 %, and 1.5% by weight were prepared to evaluate the 7 days, 14 days and 28 days compressive strength. The compressive strength (N/m2) obtained for 0.5% is 112, 191, 120, 1% is 205,210,218. and 1.5% is 280,292,302 for 7, 14 and 28 days respectively.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Compressive Strength, Porous - Concrete, Sugarcane-Ash

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: "AN EXPERIMENTAL INVESTIGATION OF SELF CURING CONCRETE INCORPORATED WITH PEG - 400 AND PVA".

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02139

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02139

  Register Paper ID - 259944

  Title: "AN EXPERIMENTAL INVESTIGATION OF SELF CURING CONCRETE INCORPORATED WITH PEG - 400 AND PVA".

  Author Name(s): Murali Mohan M V, Anirudh B, Bandlapalli Lohith Kumar, Chethan Kumar G R, Nisarga C S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 923-927

 Year: May 2024

 Downloads: 138

 Abstract

Curing is said to be the method of maintaining minimum moisture content after construction to develop the desirable properties. In many situation curing is not possible so, to overcome those situation we are using chemicals to attain the process of curing. The chemicals like Poly-vinyl alcohol (PVA)and Poly ethylene glycol (PEG-400) contribute on cement by giving good Strength and hydration rate. This self curing agents gave better compressive strength and split tensile strength.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

"AN EXPERIMENTAL INVESTIGATION OF SELF CURING CONCRETE INCORPORATED WITH PEG - 400 AND PVA".

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GROUND DENSIFICATION FOR LIQUEFACTION MITIGATION USING GGBS COLUMNS ENCASED WITH GEOTEXTILE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02138

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02138

  Register Paper ID - 259943

  Title: GROUND DENSIFICATION FOR LIQUEFACTION MITIGATION USING GGBS COLUMNS ENCASED WITH GEOTEXTILE

  Author Name(s): Prof.Aruna T, Deeksha Tanu Sri M, Dileep N, Mohammad Shadman, Vamsi Hari P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 917-922

 Year: May 2024

 Downloads: 153

 Abstract

The process known as liquefaction, which occurs when there is an excess of "pore water pressure" and a drop in the frictional resistance of the soil after an earthquake, is what causes the solid ground to change into a liquid condition. Sands that are loose or somewhat wet and have poor drainage, such clayey or silty sands, are susceptible to liquefaction. The standard penetration test (SPT) and the cone penetration test (CPT), which are favoured to evaluate the liquefaction potential of soil, are examples of in-situ tests that are the foundation of common liquefaction evaluation techniques. Rearranging the soil particles into tighter arrangements increases density and is known as densification. Using the stone column strategy, soil stability is increased as part of the ground-up improvement process. To compress the soil and raise its density, drop a large weight onto the ground several times from a considerable height


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

densification, liquefaction, mitigation, stone column, pore water pressure

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TO ANALYSE THE COMPRESSION STRENGTH OF CONCRETE BY PARTIAL REPLACEMENT OF CEMENT WITH FLY ASH AND GGBS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02137

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02137

  Register Paper ID - 259942

  Title: TO ANALYSE THE COMPRESSION STRENGTH OF CONCRETE BY PARTIAL REPLACEMENT OF CEMENT WITH FLY ASH AND GGBS

  Author Name(s): Bhargava G, Murali Mohan M V, S Naveen, S Pavanesh, Shree Gaurav KU, Sharan G

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 912-916

 Year: May 2024

 Downloads: 163

 Abstract

This study is to analyze the compressive strength of concrete by partially replacing cement with Fly Ash and Ground Granulated Blast Furnace Slag (GGBS). The use of supplementary cementitious materials, such as Fly Ash and GGBS, in concrete production has gained significant attention due to its potential to enhance the sustainability and durability of concrete structures. This study is to work out the effect of mineral admixture GGBS and Fly ash in concrete of grade M-40 when it is added in & replaced for the fresh state and hardened state i.e. for workability and strength of concrete using OPC (43 grade). As mineral admixture GGBS and Fly ash have been added to OPC which varies from 20% and 40% at interval of 20% &40% by total weight of OPC, various range of addition and replacement of cement by GGBS and Fly Ash in the concrete. All mixes of concrete will examined for workability as slump test of fresh concrete. Hardened concrete is examined for Compressive strength for 7days,14days and 28 days. Slump will be analysed as compared to that of addition of GGBS & Fly ash.The research findings contribute to the understanding of the performance of concrete mixtures containing supplementary cementitious materials and offer practical recommendations for their utilization in construction. By addressing these objectives, this research endeavors to advance the knowledge and practice of sustainable concrete production and promote the responsible use of Fly Ash and GGBS in the construction industry.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cement, Coarse aggregates, Fine aggregates, Fly Ash, GGBS(GROUND GRANULATED BLAST- FURNACE SLAG)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGNED TABULATIVE COUPLING OF RC COMPRESSION MEMBERS-A SIMULATIVE APPROACH

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02136

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02136

  Register Paper ID - 259941

  Title: DESIGNED TABULATIVE COUPLING OF RC COMPRESSION MEMBERS-A SIMULATIVE APPROACH

  Author Name(s): Narasimha Murthy M R, Vinay Kumar S, Sanjana C, Sushmitha, Thimmaraju G S,Aravind Kumar S V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 906-911

 Year: May 2024

 Downloads: 157

 Abstract

In the present era design of any structural element would be a challenging task. Design of compression members being most challenging to decide the section is capable to withstand or bear the force applied on it. Hence design of Structural members are always designed based on number of trails and error method. While undertaking many trails, design calculations with their design checks proves a length and time consuming. Hence, in the present study efforts are put to build the stock of various design combinations of compression members by pre-assuming the sectional date and applying forces, moments on it. And suitable conclusion will be made at the end.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DESIGNED TABULATIVE COUPLING OF RC COMPRESSION MEMBERS-A SIMULATIVE APPROACH

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: COMPARATIVE STUDY OF PILED RAFT FOUNDATION ON SAND

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02135

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02135

  Register Paper ID - 259940

  Title: COMPARATIVE STUDY OF PILED RAFT FOUNDATION ON SAND

  Author Name(s): ARUNA T, K.V.S.B RAJU

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 895-905

 Year: May 2024

 Downloads: 141

 Abstract

In civil engineering and construction, a piled raft foundation, also referred to as a raft with piles or a piled mat foundation, is one kind of foundation structure. It is frequently used to poor soil conditions, such as soft clay, loose sand, and extremely compressible soils. To increase load carrying capacity and settlement, the piled raft foundation combines the advantages of deep foundations and shallow raft foundations. It's crucial to keep in mind, nevertheless, that the design and building of PRF need for meticulous engineering study and consideration of site-specific factors, including soil conditions, structural loads, and foundation system behaviour. The study focuses on the PRF system's vertical load carrying capacity and settlement reduction under both eccentric and concentric stress on sand. To find out how different pile alignment and length affected the PRF's ultimate load, small-scale model tests are carried out. The study's findings suggest that the PRF system can minimize differential settlement and boost the raft's load bearing capacity by carefully placing the piles in optimized position. The study specifically aimed at how changing the pile's length to diameter (L/D) ratio affected their ability to support loads. The results of the research work indicate that strategical placing the piles in the PRF system improve the load bearing capacity and reduce the settlement.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Piled raft foundation, cohesion less soil, Load improvement ratio

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: RICE HUSK ASH AS A PARTIAL REPLACEMENT FOR CEMENT IN CONCRETE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02134

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02134

  Register Paper ID - 259939

  Title: RICE HUSK ASH AS A PARTIAL REPLACEMENT FOR CEMENT IN CONCRETE

  Author Name(s): Barnali Ghosh, Shilpa R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 888-894

 Year: May 2024

 Downloads: 151

 Abstract

Availability of conventional materials for concrete is cause for concern worldwide. In recent years significant global initiatives to use both local and waste materials in concrete has taken place. One of these materials is rice husk, which when incinerated under regulated conditions and if finely pulverized may be utilized as a substitution for cement in concrete. In order to understand the impact of Rice Husk Ash (RHA) on the mechanical and durability characteristics of concrete when used as a partial cement replacement, a thorough assessment of the relevant literature on Rice Husk Ash (RHA) is conducted. Due to its significant pozzolanic qualities, RHA has the ability to replace cement upto 30% without affecting the structural integrity of concrete. The main objective of this study is to find the optimum percentage of replacement of Rice Husk Ash based on compressive strength and flexural strength of concrete. Thus, the use of RHA as a partial alternative to cement in concrete can offer additional environmental benefits, such resource saving and the management of agricultural waste, while simultaneously encouraging a circular economy in the construction sector.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Rice Husk Ash, Partial replacement, Optimum Percentage

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EXPERIMENTAL INVESTIGATION ON COMPRESSIVE STRENGTH OF CONCRETE BY PARTIALLY REPLACING CEMENT BY GGBS AND RHA AND NATURAL SAND BY QUARRY DUST

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02133

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02133

  Register Paper ID - 259924

  Title: EXPERIMENTAL INVESTIGATION ON COMPRESSIVE STRENGTH OF CONCRETE BY PARTIALLY REPLACING CEMENT BY GGBS AND RHA AND NATURAL SAND BY QUARRY DUST

  Author Name(s): Meghana K H, Kashinath B J

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 880-887

 Year: May 2024

 Downloads: 150

 Abstract

In this paper, concrete of grade M40 is studied by using Ground Granulated Blast furnace Slag (GGBS)(10%, 20%, 30% and 40%) and Rice Husk Ash (RHA) (5%, 7.5% and 10%) as partial replacement of cement and by using Quarry dust(0%, 15%, 30%, 45%, 60%, 75%, 90% and 100%) as partial replacement of sand. Compressive Strength properties are studied. Study is carried out in three phases and the optimum replacement level is found out.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

GGBS, RHA, Quarry Dust, Compressive Strength

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: COMPARATIVE STUDY AND COST ANALYSIS ON CURING AGENTS FOR SELF CURING CONCRETE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02132

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02132

  Register Paper ID - 259923

  Title: COMPARATIVE STUDY AND COST ANALYSIS ON CURING AGENTS FOR SELF CURING CONCRETE

  Author Name(s): Tanu Shree, Narayanswamy KA

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 872-879

 Year: May 2024

 Downloads: 180

 Abstract

Curing of concrete is the process of maintaining satisfactory moisture content in concrete during its early stages to develop the desired properties. However good curing is not always practical in many cases the present study deals with the effect of polyethylene glycol (PEG)and poly-vinyl alcohol (PVA) on concrete and their contribution to strength which are carried out. The effect of admixtures in mechanical characteristic of concrete i.e., compressive strength, split tensile strength by varying the percentage of PVA and PEG-400 from 0% to 2.5% by weight of cement is studied for M30 grade of concrete and the optimum percentage of PEG and PVA in self-curing concrete with conventional concrete with water curing is compared. The optimum percentage with PEG is coated with PVA and strength analysis is done. Curing is one of the most important factors for achieving maximum desirable strength in concrete, concrete should be cured properly so that it is fully hydrated and loss of moisture inside the concrete should be reduced. Poly vinyl alcohol and polyethylene glycol-400 is locally available chemical which can be used as a self-curing agent in concrete so that moisture in the concrete can be maintained and concrete can be fully hydrated


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Self-curing concrete, polyethylene glycol, poly-vinyl alcohol, M30 grade

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: PERFORMANCE COMPARISION OF TBC's & EBC's

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02131

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02131

  Register Paper ID - 259921

  Title: PERFORMANCE COMPARISION OF TBC'S & EBC'S

  Author Name(s): Sreenivas S, Bharath L, Kishor N, Vinay Kumar G V, Srinivasa M, Madhu B R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 860-871

 Year: May 2024

 Downloads: 158

 Abstract

This study presents a comprehensive comparison of thermal barrier coatings (TBCs) utilizing zirconia and environmental barrier coatings (EBCs) incorporating silicon carbide and aluminum oxide. Through rigorous experimental testing and computational analysis, key performance metrics including thermal insulation, erosion resistance, and durability are evaluated. The findings elucidate the distinctive strengths and weaknesses of each coating type, facilitating informed decision-making for optimal material selection in high-temperature applications


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

PERFORMANCE COMPARISION OF TBC's & EBC's

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: "POWER GENERATION THROUGH SPEED BREAKERS"

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02130

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02130

  Register Paper ID - 259919

  Title: "POWER GENERATION THROUGH SPEED BREAKERS"

  Author Name(s): Dr Bharath L, Dr Suneelkumar N Kulkarni, Akshay SM, Gagan kumar singh VS, Praveen V Awale, Mell Jepson.

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 853-859

 Year: May 2024

 Downloads: 187

 Abstract

A significant amount of energy is wasted by vehicles when they pass over speed breakers due to friction. However, this energy can be used to generate electricity. In this project, we propose a smart speed breaker system that captures energy from vehicles and converts it into electrical power.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CONVERTING BICYCLE TO e-BIKE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02129

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02129

  Register Paper ID - 259918

  Title: CONVERTING BICYCLE TO E-BIKE

  Author Name(s): Dr Bharath L, Prof Anand Kulkarni, Aakash G Manohar, Likith V, Vivek Gowda, Vinay Kumar G

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 847-852

 Year: May 2024

 Downloads: 132

 Abstract

Transforming non-motorized vehicles into motorized alternatives presents a compelling avenue for modernizing traditional transportation modes while upholding sustainability. This study investigates the integration of electric propulsion systems into non-motorized vehicles to enhance their efficiency, range, and ease of use. By bridging the gap between conventional and modern transport systems, this study aims to offer eco-conscious solutions aligned with contemporary needs. Our primary objective is to demonstrate the feasibility and potential benefits of this conversion process, thereby unlocking new possibilities for personal and commercial transportation. This report details the methodology, technical aspects, challenges, and outcomes of the conversion process, aiming to contribute to the discourse on sustainable transportation solutions and inspire future developments in this transformative field.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Non-motorized, Technical aspects, e-Bike.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Fabrication of Enhancing Vehicle Safety with Power Window Mechanism

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02128

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02128

  Register Paper ID - 259916

  Title: FABRICATION OF ENHANCING VEHICLE SAFETY WITH POWER WINDOW MECHANISM

  Author Name(s): Suhas U, Dr. Bharath L, Sajeed Hussain, K S MD Kaif, S R Vineeth

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 842-846

 Year: May 2024

 Downloads: 149

 Abstract

This paper discusses a new safety system for vehicles that integrates power window mechanisms with various sensors to enhance passenger safety in emergencies. The goal is to deploy the existing power window infrastructure to automate window operation in dangerous situations, facilitating a rapid and safe exit from the vehicle. The proposed system includes a control unit connected to multiple sensors, including tilt, water, air quality, fire, and gas sensors. These sensors monitor the vehicle's environment for signs of danger. The tilt sensor detects if the vehicle has rolled over or is at a severe angle, while the water sensor identifies submersion in water. The quality of the air sensor checks for harmful gases, and the fire and gas sensors alert to fire or high gas levels. If an emergency is detected, the control unit activates the electric window mechanism to open the windows, allowing passengers to exit safely. This system provides a cost-effective solution by utilizing existing power window technology, making it easier to implement in current vehicle designs. It adds an additional layer of safety, enabling quicker evacuation in emergencies. The integration of this system into vehicles can dramatically decreases the likelihood of accidents or other hazardous situations. In summary, this safety system utilizing power window mechanisms and various sensors shows great potential approach for improving vehicle safety. By leveraging existing technology, it offers a practical and efficient solution to enhance passenger safety in emergency scenarios.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Power Window Mechanism, Vehicle Safety, Emergency Sensors, Passenger Safety

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EVALUATION OF MICROSTRUCTURE AND HARDNESS OF Al-Mg-Si ALLOY REINFORCED WITH SiCp

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02127

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02127

  Register Paper ID - 259913

  Title: EVALUATION OF MICROSTRUCTURE AND HARDNESS OF AL-MG-SI ALLOY REINFORCED WITH SICP

  Author Name(s): Dr Bharath L, ProfManjuthan TV, Abel M, Hamid Raja Khan, Monica Fernandes D

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 835-841

 Year: May 2024

 Downloads: 163

 Abstract

In this paper, Al-Mg-Si alloy has been used as the matrix material to develop metal matrix composites with silicon carbide particle particulates as reinforcement material. The different mesh size of SiC particles was chosen by varying wt.% (1%, 3% and 5%) and preparation was done through the stir casting method. Microstructure evaluation has been done for the formed composite material. Taguchi's technique was used to find the optimization, Analysis of Variance (ANOVA) and mathematical model were generated through regression method to validate the experimental results obtained for hardness.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ANOVA, Hardness, Matrix, Composite

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: 3D PRINTING USING IOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02126

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02126

  Register Paper ID - 259910

  Title: 3D PRINTING USING IOT

  Author Name(s): Dr.Balaji K, Likith S, Ashis Kumar Sahoo, Kumar SG, Karthik N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 830-834

 Year: May 2024

 Downloads: 147

 Abstract

An abstract of 3D printing could highlight its transformative impact on various industries and disciplines. It would likely mention its ability to fabricate intricate objects layer by layer from digital designs, offering unprecedented flexibility and customization. Additionally, the abstract might discuss the diverse range of materials used in 3D printing, from plastics and metals to biomaterials, enabling applications in fields such as aerospace, healthcare, automotive, and consumer goods. Furthermore, it might touch upon emerging trends such as large-scale construction and the integration of artificial intelligence to optimize printing processes. Overall, the abstract would emphasize 3D printing's potential to revolutionize manufacturing, design, and innovation across numerous sectors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

3D PRINTING USING IOT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02125

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02125

  Register Paper ID - 259907

  Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT

  Author Name(s): Dr. Balaji K, Biswajit Nayak, Kavita Soren, Arpita Kumari, Madhushree R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 824-829

 Year: May 2024

 Downloads: 130

 Abstract

We examine the revolutionary effects of artificial intelligence (AI) on education in this thorough investigation, paying particular attention to the critical ideas of personalized learning and adaptive assessment. The research explains how education has changed historically. AI's integration into educational paradigms emphasizes how crucial it is to provide learners with learning experiences that are specifically personalized to them. It also explores the field of AI-powered adaptive assessment, explaining how it differs from traditional testing methods. The paper provides a comprehensive overview of this educational revolution by synthesizing case studies, existing literature, and developing trends.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02124

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02124

  Register Paper ID - 259906

  Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY

  Author Name(s): Dr. Balaji k, Mohammed Tauqir Ali T.M, Satyajit Mohanty, N.V. Rakesh, Viswa .M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 820-823

 Year: May 2024

 Downloads: 161

 Abstract

In today's corporate world, network and data security is a major concern. Many different types of businesses, such as financial institutions, law firms, schools, healthcare, telecommunications, mining, and government organizations, have a strong demand for strategic data management techniques. Businesses lose sensitive data, such as biometric and financial information, to competitors and other parties as a result of hackers' activity. Businesses are losing millions of dollars as a result of malicious people gaining access to unprotected data. Businesses now place a great value on data security. Protection is required to guarantee information security. Using encryption algorithms to protect communications in these kinds of threads is one of the most important and practical solutions available. Performance and security are two factors that the developer must take into account while creating an extremely secure Android application. Android-based applications must perform better because Android smartphones have constrained resources. The most widely used secure encryption algorithms Rijndael, Serpent, and Two fish will be evaluated in this study to see which works best in order to overcome the issues.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

telecommunications, android, encryption algorithms

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BIOMETRICS USING PYTHON

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02123

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02123

  Register Paper ID - 259903

  Title: BIOMETRICS USING PYTHON

  Author Name(s): Dr. K Balaji, AnushreeGD, BhavanaShreeS, BhuvanaShreeBS, KavyaBN

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 815-819

 Year: May 2024

 Downloads: 154

 Abstract

Biometric authentication systems have gained significant attention due to their ability to provide secure and convenient access control. This project proposes a novel approach to biometric authentication using Python, leveraging machine learning techniques and computer vision algorithms. The system integrates facial recognition, fingerprint recognition, and voice recognition modalities to enhance authentication accuracy and robustness. The system begins by capturing biometric data from users through respective sensors(camera, fingerprint scanner, microphone). Preprocessing techniques are applied to clean and normalize the data, followed by feature extraction to extract unique biometric features. Machine learning models, such as Convolution Neural Networks (CNNs) and Support Vector Machines (SVMs), are trained on the extracted features to learn the patterns specific to each user. During the authentication phase, the system compares the input biometric data with the stored templates using appropriate similarity metrics. Fusion techniques are employed to combine the results from multiple modalities, enhancing the overall authentication accuracy and reliability. Keywords-recognition, authentication, security.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BIOMETRICS USING PYTHON

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02122

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02122

  Register Paper ID - 259901

  Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY

  Author Name(s): Dr. Balaji K, Ashwini P, Likhitha P, Jagadevi, Gnanapriya

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 809-814

 Year: May 2024

 Downloads: 128

 Abstract

Setting up an email account involves confirming ownership through a link sent to the provided email address. Personal questions, like favorite colors or pets' names, may also be asked for added security. Email services monitor login locations and usage patterns to detect suspicious activity. Two-factor authentication adds an extra layer of security by sending a code to the user's phone. Account recovery processes often include sending a reset link to an alternate email or mobile number. During email sessions, encryption and session management techniques are used to protect user data. Automatic logout may occur after a period of inactivity to prevent unauthorized access. These measures collectively ensure email account security and user verification.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

EMAIL AUTHENTICATION USING CRYPTOGRAPHY

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BRAIN COMPUTER INTERFACE UNDER AI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02121

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02121

  Register Paper ID - 259900

  Title: BRAIN COMPUTER INTERFACE UNDER AI

  Author Name(s): DR. Balaji K, P Srikanth, Tharun Reddy J, Mahesh Naik, R Bali Bai ,Nithin Kumar S M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 804-808

 Year: May 2024

 Downloads: 156

 Abstract

A brain-machine interface, also referred to as BCIs, is a type of technology that enables people to interact with technology through their brain. It allows them to bypass the need for physical controls by connecting their brain activity to external devices. These systems are able to interpret brain signals and translate them into commands for various devices, such as computers and robotic arms.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BRAIN COMPUTER INTERFACE UNDER AI

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BIG DATA

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02120

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02120

  Register Paper ID - 259899

  Title: BIG DATA

  Author Name(s): DR. Balaji, Pallavi K G, Meghana U, Shwetha S, Manasa N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 801-803

 Year: May 2024

 Downloads: 147

 Abstract

Big Data is a term used to describe large and complex datasets that require powerful computing tools and analytics methods to extract meaningful insights. The rapid growth of data in the modern era has led to an explosion of Big Data sources including social media, sensor data, email logs, and more. This report provides a comprehensive over view of Big Data, including its definition, its characteristics, its sources, and its applications. We need big data when the user has large amount of data, it has noisy and inconsistency. Traditional data storage cannot able of handling large volume of data hence we need a big data analytic. In big data the data can be Structured type, Unstructured type and semi structured type. Big data has characteristics and it is also called as 5V's. We discuss the challenges posed by Big Data, including storage, retrieval, and analysis, and we describe several tools and technologies used to address these challenges.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DISEASE PREDICTION USING DATA MINING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02119

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02119

  Register Paper ID - 259897

  Title: DISEASE PREDICTION USING DATA MINING

  Author Name(s): DR.BALAJI.K, MONISHA P, MADHUSHREE S G, MOHAN KUMAR, SAMRAT RAJ

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 796-800

 Year: May 2024

 Downloads: 132

 Abstract

Data mining is described as sifting via very huge amount of records for beneficial information. Some of the vital and famous records mining techniques are classification, clustering, prediction. Data mining methods are used for range of applications. In health care industry, data mining plays an necessary position for predicting diseases. For detecting a sickness number of exams should be required from the patient. But the use of data mining method the wide variety of check be reduced. This reduced check plays an important position in time and performance. This method has an benefits and disadvantages. This paper analyzes how data mining techniques are used for predicting one of kind sorts of diseases. This paper reviewed the research papers which mainly targeted on predicting heart disease, Diabetes, breast cancer.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DISEASE PREDICTION USING DATA MINING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02118

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02118

  Register Paper ID - 259896

  Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES

  Author Name(s): Dr Balaji K, Kruthi P.J, Lekha V.S, Harshitha V, Keerthana E

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 792-795

 Year: May 2024

 Downloads: 291

 Abstract

In today's digital age, the concept of a connected world has transformed the way we interact, communicate, and conduct business. This paper explores the intricate web of connectivity that defines our modern society. From social media platforms to the Internet of Things, this presentation delves into the impact of interconnected technologies on individuals, businesses, and societies globally. Through an in-depth analysis of the benefits, challenges, and future implications of this connected world, we aim to shed light on the opportunities and risks associated with our increasingly interconnected digital landscape. Join us as we navigate through the complexities of the connected world and uncover the potential it holds for shaping our future. The advent of the connected world has ushered in a new era of technological innovation and societal transformation. This paper delves into the myriad opportunities and challenges presented by the interconnectedness facilitated by the digital landscape. It explores the implications of connectivity across various domains including communication, commerce, healthcare, education, and governance. From the proliferation of IoT devices to the rise of artificial intelligence, the paper examines how these advancements are reshaping industries, redefining human interactions, and influencing global dynamics. Additionally, it addresses the ethical, privacy, and security concerns arising from the unprecedented level of connectivity. Through a comprehensive analysis, this paper aims to provide insights into navigating the complexities of the connected world and harnessing its potential for the betterment of society.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DIGITAL FORENSIC

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02117

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02117

  Register Paper ID - 259894

  Title: DIGITAL FORENSIC

  Author Name(s): Dr Balaji K, Rahul P, Naveen Kumar, Sharath U, Nandeep

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 788-791

 Year: May 2024

 Downloads: 176

 Abstract

Crimes committed in electronic or digital spaces, particularly within cyberspace, have become widespread. Criminals utilize technology to carry out their unlawful activities, presenting novel challenges for law enforcement agents, legal practitioners, military personnel, and security specialists. Digital forensics has assumed a critical role in detecting and resolving crimes involving computers and digital assistance. This paper presents a brief overview of digital forensics, offering an introduction to its importance in tackling modern criminal activities.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DIGITAL FORENSIC

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ECTOLIFE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02116

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02116

  Register Paper ID - 259891

  Title: ECTOLIFE

  Author Name(s): Dr Balaji K, Lavanya V, Chandana M, Chethan kumar H V, Arpitha J K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 783-787

 Year: May 2024

 Downloads: 213

 Abstract

EctoLife the world's first artificial womb facility. This concept was designed by biotechnologist Hashem AI-Ghaili, the artificial womb facility is powered by renewable energy.EctoLife is designed to help countries that are suffering from low populations. Ectolife introduces a dynamic fusion of virtual reality (VR), augmented reality (AR), and mixed reality (MR) technologies into our everyday existence. This abstract concept aims to seamlessly integrate digital elements into our physical world, revolutionizing how we interact, learn, work, and entertain. Through ectolife, individuals immerse themselves in virtual environments, interact with digital objects, and engage with virtual entities as if they were part of their physical surroundings. This integration of virtual and real experiences redefines traditional boundaries, offering new avenues for communication, collaboration, and creativity. Beyond personal experiences, ectolife extends its impact across various sectors, including healthcare, gaming, education, and architecture. VR-assisted therapies improve patient rehabilitation, AR gaming enhances interactive entertainment, and MR facilitates real-time design prototyping in architecture.However, as ectolife evolves, it brings forth ethical, social, and existential considerations. Privacy concerns, data security issues, and the potential for over-reliance on virtual experiences raise important questions. Furthermore, the blurring of virtual and physical realities prompts reflection on identity, agency, and the nature of existence. Inconclusion, ectolife signifies a transformative shift, offering exciting possibilities while posing challenges. Embracing ectolife requires a balanced approach that harnesses its potential while addressing associated risks. As ectolife continues to unfold, it promises to reshape human experiences and advance society in unprecedented ways.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Website Blocker Using Python

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02115

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02115

  Register Paper ID - 259888

  Title: WEBSITE BLOCKER USING PYTHON

  Author Name(s): DR.BALAJI K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 778-782

 Year: May 2024

 Downloads: 172

 Abstract

According to the Google Search Statistics, Google processes more than 3.7 billion searches every day, with an average of 40000 searches per second. This illustrates our extreme dependency on the internet for all our daily tasks ranging from complex projects on space science to simplest queries like what is the right way to greet a person in the evening. Our searches are answered through interlinked web pages, known as websites. As of September 2022, there are over 1.98 billion websites available online. Apart from the benefits of having access to huge content and numerous resources on our fingertips, it can also be a great source of distraction and mismanagement of time. Constant online presence of an individual may affect an individual's ability of achieving professional and personal goals. Hence, website blocker is one effective tool that helps an individual take a conscious call on blocking a website. There may be many reasons for blocking a website, which will be discussed in the following sections of the paper. A website blocker, if effectively utilized, can enhance focus, productivity and value of time of an individual and the organization as well. Here, we propose a simple website blocker implementation in Python.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Website Blocker Using Python

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: An Introduction to Artificial Intelligence Tools in Various Domains

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02114

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02114

  Register Paper ID - 259887

  Title: AN INTRODUCTION TO ARTIFICIAL INTELLIGENCE TOOLS IN VARIOUS DOMAINS

  Author Name(s): Dr Balaji K, Naveena kumara K S, Naveen H S, Yashavanth achar, Raghunandan P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 770-777

 Year: May 2024

 Downloads: 154

 Abstract

This research paper introduces Artificial Intelligence tools and uses of the same in various domains. The importance of Artificial Intelligence in enhancing the efficiency and automation to solve complex problems is discussed, along with the various types of artificial intelligence tools available. The paper also covers the use of artificial intelligence in AI in Cyber security, AI in Education, AI in Agriculture, AI in Education, AI Smart cities, AI in Environmental conservation, AI in Sport Analytics. The paper concludes with a summary of the key takeaways and the potential impact of artificial intelligence tools in various domains. The paper aims to provide a comprehensive overview of artificial intelligence tools and to highlight their importance in various fields to develop new approaches in solving complex problems.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

An Introduction to Artificial Intelligence Tools in Various Domains

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Cybersecurity using Python

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02113

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02113

  Register Paper ID - 259885

  Title: CYBERSECURITY USING PYTHON

  Author Name(s): Dr.Balaji K, M Shireesha, Aishwarya S, Kavya Shree K V, Gagana Shree M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 765-769

 Year: May 2024

 Downloads: 143

 Abstract

Cybersecurity is known for defending computers, servers, mobile device, electronic system, networks and data from malicious (misusing the insured computer systems). Python has emerged as a versatile and powerful tool in the field of cybersecurity, python is known for versatility offering a wide range of libraries and frameworks for various security task.This abstract involves into the application of python in cybersecurity, focusing on its role in penetration testing, network security, and malware analysis. Python effectiveness in network traffic analysis, intrusion(An Intrusion Detection System (IDS) maintains network traffic looks for unusual activity and alerts when it occurs), log analysis (Log analysis is the process of reviewing, interpreting and understanding computer-generated records called logs.) Enabling security professionals to monitor and defend against malicious activities (misuse of system resources) effectively


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Cybersecurity using Python

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Artificial Intelligence in Healthcare

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02112

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02112

  Register Paper ID - 259884

  Title: ARTIFICIAL INTELLIGENCE IN HEALTHCARE

  Author Name(s): Dr.Balaji K, A Ravi Kumar Reddy, Jagan Mohan, Yashwanth Kumar Sai, Nanda

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 759-764

 Year: May 2024

 Downloads: 135

 Abstract

Goal of this systematic search is to offer an description of artificial intelligence's role in healthcare. Artificial intelligence has played a crucial influence in healthcare. A paradigm change in healthcare has take place due to increasing availability of healthcare data and rapid progress of analytics technology. Machine learning technologies such as assist vector machine, deep learning neural networks, and natural language processing manage structured data. Unstructured data is processed using natural language processing.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Artificial Intelligence in Healthcare

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02111

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02111

  Register Paper ID - 259881

  Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE

  Author Name(s): Dr. Balaji K, Mr. Samir Raza, Mr. Ratan J

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 754-758

 Year: May 2024

 Downloads: 165

 Abstract

Natural Language Processing (NLP) is the study of how computers and human languages interact is the focus of the artificial intelligence (AI) field of natural language processing, or NLP. It encompasses a range of techniques and strategies intended to give robots the capacity to understand, interpret, and generate natural language in a way that is beneficial and appropriate for a number of applications. Natural language processing (NLP) has evolved tremendously in recent years thanks to the availability of large datasets, powerful computer power, and sophisticated machine learning models. Natural language, or spoken and written human communication, is extremely difficult because of its complexity, context-dependence, and intrinsic ambiguity. By creating models and algorithms that are capable of analyzing and interpreting natural language data, natural language processing (NLP) aims to close the understanding gap between human language and computers. NLP's main objective is to provide computers the ability to do language-related activities including comprehending text, coming up with logical answers, extracting data, and communicating between languages. To accomplish these goals, NLP incorporates concepts from multiple academic fields, including as statistics, computational science, machine learning, and linguistics.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NEURAL NETWORK

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02110

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02110

  Register Paper ID - 259880

  Title: NEURAL NETWORK

  Author Name(s): Dr.Balaji K, Vinil Monteiro, Tarun G, Tarun Kulakarni, Santosh Maddi, Syed Kaif

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 750-753

 Year: May 2024

 Downloads: 126

 Abstract

Neural networks, also known as artificial neural networks (ANNs) or simply neural networks, are a subset of machine learning that form the foundation of deep learning techniques. Which was inspired by the structure and function of the human brain, mimicking the way real neurons communicate. ANNs are composed of many interconnected basic processors, functioning in parallel. This paper explores artificial neural networks and their basic types, outlining the fundamental neuron and the artificial computer model. It discusses network structures, learning methods, and some of the most commonly used ANNs..


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NEURAL NETWORK

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02109

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02109

  Register Paper ID - 259878

  Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS

  Author Name(s): DR.BALAJI, Madhu suharika, Gouri Rangabhatt Joshi, Jameema Joy.S, Aishwarya S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 743-749

 Year: May 2024

 Downloads: 146

 Abstract

The project aims to implement two popular searching algorithms that is Depth-First-Search (DFS) and the Breadth-First-Search (BFS) in a web-based application using JSP and Spring Tool Suite. The user is presented with a form where they can input the starting and ending nodes, as well as choose between the BFS and DFS algorithms. When the user submits the form, a Java file takes the form data and saves it to another JSP file called register. If the selected algorithm is DFS, the Java code for DFS is executed, and likewise for BFS. While the code is running, the user is shown a progress indicator to let them know that the algorithm is processing. Once the algorithm has finished running, the user is directed to a results page where they can view the nodes explored and the path found. The results are displayed in an easy-to-read format, such as a table or list. The project also handles errors, such as when the user inputs a non-existent node, and alerts the user if no path was found. Overall, this project offers a convenient and user-friendly way for users to explore and search graphs using BFS and DFS algorithms. It showcases the use of JSP, Spring Tool Suite, and Java to create a web-based application that can handle complex data structures and algorithms


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

BFS, JSP, SpringBoot. I.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02108

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02108

  Register Paper ID - 259877

  Title: PLAGIARISM CHECKER AND CLASSIFICATION OF FILES ON CLOUD USING SMART CLOUD

  Author Name(s): Dr.Balaji K, Divya .M, Krupa.B, Gouri.G, Arpita.P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 739-742

 Year: May 2024

 Downloads: 175

 Abstract

This study suggests a method to address the cloud duplication problem. The restricted amount of data storage that these service providers can offer is only partially utilized by the abundance of redundant and useless data on the internet. Inadequate cloud efficiency might result in far greater costs for service providers than anticipated. The fact that the data is kept on a server that may be located kilometres distant from the user presents another problem. This raises the price and efficiency even further. A smart cloud can assist with resolving these problems. By calculating the ratio between the proportions of two vectors, we can assign a categorization rating to the document.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ROBOTIC EVOLUTION IN MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02107

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02107

  Register Paper ID - 259875

  Title: ROBOTIC EVOLUTION IN MACHINE LEARNING

  Author Name(s): Dr.Balaji K, Inav Sultan, Subhalaxmi Dora, Harish S J, Harshith S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 734-738

 Year: May 2024

 Downloads: 133

 Abstract

The integration of robotics and machine learning has revolutionized the field of automation, enabling robots to perform complex tasks with unprecedented levels of autonomy and adaptability. This paper provides an in-depth exploration of the evolution of robotics in machine learning, tracing its historical development, current state, and future trends. We begin by examining the early developments in robotics, highlighting the limitations of pre-programmed robots and the need for more adaptive and intelligent systems. We then discuss the emergence of machine learning algorithms and their integration into robotic systems, leading to the development of robots capable of learning from data and improving their performance over time. The paper also explores the current state of robotics in machine learning, focusing on key technologies such as deep learning, reinforcement learning, and computer vision. We discuss how these technologies are being used to enhance robotic capabilities in various domains, including manufacturing, healthcare, and autonomous vehicles. Challenges and opportunities in integrating machine learning with robotics are also addressed. Technical challenges, such as the need for robust and efficient algorithms, as well as ethical and social implications, such as the impact of intelligent robots on the workforce, are discussed.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ROBOTIC EVOLUTION IN MACHINE LEARNING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Prevention of Vulnerable Virtual Machines against DDOS Attacks in the Cloud

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02106

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02106

  Register Paper ID - 259873

  Title: PREVENTION OF VULNERABLE VIRTUAL MACHINES AGAINST DDOS ATTACKS IN THE CLOUD

  Author Name(s): Dr.Balaji K, Tanushree M, Pavan Kalyan, Manik Rahul, Rohit

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 729-733

 Year: May 2024

 Downloads: 160

 Abstract

One of the biggest issues that has drawn a lot of research and development attention in recent years is cloud security. Notably, assailants will investigate exploits in a cloud system and infiltrate virtual machines to release more extensive Distributed Denial-of-Service attacks (DDoS). Early-stage tactics including multi-step exploitation, low-frequency vulnerability scanning, and turning found susceptible virtual machines into zombies are sometimes used in DDoS assaults. Finally, DDoS attacks are launched using the zombies that have been infected. When it comes to cloud systems, especially Infrastructure-as-a-Service (IaaS) clouds, zombie exploration attack detection is truly problematic. This might occur from cloud customers installing susceptible software on their virtual computers.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Attack graph model, NICE, distributed denial of service attack, cloud security, and cloud attacks

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: The Integral Role of Blockchains in Shaping Web 3.0 Navigating the Technological Frontier

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02105

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02105

  Register Paper ID - 259872

  Title: THE INTEGRAL ROLE OF BLOCKCHAINS IN SHAPING WEB 3.0 NAVIGATING THE TECHNOLOGICAL FRONTIER

  Author Name(s): Dr. Balaji K, Priyanka R, Sneha Thomas, Sharun P S, Sai Keerthana G

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 724-728

 Year: May 2024

 Downloads: 140

 Abstract

Web 3.0 has arisen as a disruptive force in the digital world, pushing for a decentralized and user-centered internet. This new age is marked by its peer-to-peer design, which decreases reliance on centralized authority while giving individuals ownership over their data and digital assets. Blockchain technology is essential to Web 3.0 because it provides a safe and trustless environment for transactions and data transfers via cryptography. Web 3.0 aims to address the limits of the present web (Web 2.0) by using new technologies such as blockchain, artificial intelligence (AI), and the Internet of Things (IoT). This study looks at the link between blockchain and Web 3.0, specifically the characteristics that make blockchain an important component of this disruptive paradigm. Moreover, the article outlines the primary challenges and research directions in blockchain intelligence, as compared to other technologies, and is supported by based on research arguments, contributing to the advancement of this field and laying the groundwork for the future of intelligent societies powered by Web 3.0. Blockchain technology is clearly integrated into molding the technological frontier, and so blockchain intelligence is critical to the growth of Web 3.0.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

The Integral Role of Blockchains in Shaping Web 3.0

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Virtual Reality (VR) and its Intersection with Python

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02104

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02104

  Register Paper ID - 259871

  Title: VIRTUAL REALITY (VR) AND ITS INTERSECTION WITH PYTHON

  Author Name(s): Dr. Balaji K, Gopinath C, Goutham G, HN Thejas, Hemanth Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 718-723

 Year: May 2024

 Downloads: 118

 Abstract

Virtual Reality (VR) stands at the forefront of technological innovation, offering immersive experiences across diverse domains such as gaming, education, and healthcare. This paper explores the intersection of VR and Python, shedding light on Python's role as a versatile language in VR development. Beginning with an introduction to VR and its wide-ranging applications, we delve into the suitability of python for VR, elucidating the key libraries and frameworks utilized in VR projects; including pygame, pyglet, and Panda3D. The paper then navigates through the process of crafting immersive VR environments with Python, encompassing techniques for rendering 3D scenes, managing user input, including audio elements. Emphasis is placed on enhancing interactivity and user experience within VR applications, with a focus on user interface design, gesture recognition, and interactive mechanics. Further enriching the discourse are case studies and examples showcasing real-world applications of python in VR, spanning educational simulations, training modules, and entertainment experiences. Additionally, the paper addresses the challenges inherent in VR development with Python, proposing potential solutions and prognosticating emerging trends and future directions in the realm of VR technology its integration with Python. In conclusion, this paper underscores the pivotal role of Python in advancing VR technology and its profound impact across various industries. By elucidating the synergy between Python's versatility and VR's immersive potential, this exploration paves the way for innovative developments and Transformative applications in the burgeoning landscape of virtual reality.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Virtual Reality (VR) and its Intersection with Python

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HONEYPOT IN NETWORK SECURITY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02103

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02103

  Register Paper ID - 259869

  Title: HONEYPOT IN NETWORK SECURITY

  Author Name(s): Dr Balaji k, Yashaswini G T, Rakshita Itagi, Sahana L, Shreya Ravi Shastri

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 713-717

 Year: May 2024

 Downloads: 147

 Abstract

A honeypot in network security is like a digital decoy or trap designed to detect, deflect, or study attempts at unauthorized use of information systems. It's essentially a system or resource set up to be attractive to attackers, mimicking real services and data, but isolated and monitored to gather information about their activities. The concept of honeypots, non-production systems designed to interact with cyber attackers to gather intelligence, has evolved over three decades alongside the increasing speed and reliance on the Internet. The challenge lies in actively monitoring numerous systems and reacting swiftly to diverse events. Before deploying a honeypot, it's crucial to clarify its objectives, understand the operating systems and services it will emulate, assess associated risks, and devise mitigation strategies. Additionally, having a plan in case of compromise is advisable. For production honeypots, a documented security policy addressing potential legal issues is essential. The paper explores the role of honeypots in understanding hacker motives, skills, and techniques, proposing an intrusion detection tool integrating existing methods with honeypot concepts. Certainly, the paper delves into the significance of honeypots in the realm of cyber security. It underscores the evolving landscape of network intrusion detection amidst the accelerating pace of networks and the pervasive reliance on the Internet. Honeypots, as highlighted, serve as invaluable tools for actively engaging with cyber attackers to glean insights into their tactics, techniques, and procedures. Lastly, the paper proposes leveraging the concept of honeypots to inform the design and development of intrusion detection tools. By integrating insights from honeypot interactions with existing detection techniques, it aims to enhance the efficacy of cyber security measures in thwarting malicious activities


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

HONEYPOT IN NETWORK SECURITY

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GENERATIVE AI IN VIRTUAL REALITY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02102

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02102

  Register Paper ID - 259868

  Title: GENERATIVE AI IN VIRTUAL REALITY

  Author Name(s): Dr. Balaji K, Yamuna Bose, Shreenidhi LR, PS Karuna Kumar, Nandish k

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 708-712

 Year: May 2024

 Downloads: 160

 Abstract

This paper initiates by providing a comprehensive study of the utilization of generative AI techniques within virtual reality (VR), encompassing facets like data collection, pre-processing, model training, drawbacks, and evaluation. It further scrutinizes various generative AI models and algorithms tailored for VR, elucidating their strengths and limitations in virtual reality creation and abstraction. The integration of generative AI has significantly enriched virtual reality and training experiences, amplifying the intricacy of product development by facilitating the generation of diverse content such as games, images, audio, and video. Through the analysis and assimilation of historical data, pertinent factors, and real-world inputs, generative AI demonstrates its capacity to fabricate intricate and realistic virtual objects and environments. Additionally, the paper delves into the multifaceted challenges and ethical dilemmas inherent in deploying generative AI in virtual reality, encompassing concerns like data privacy and algorithmic transparency. It also envisages future trajectories for research, advocating for interdisciplinary collaborations, user-centric studies, and the exploration of applications in education and entertainment. By presenting an overview of the fusion between virtual reality and generative AI, the paper contributes insights into enhancing the learning experience within the burgeoning metaverse technology while also offering strategies to augment the efficacy of generative AI in fostering creative content creation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

GENERATIVE AI IN VIRTUAL REALITY

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BATTERY MANAGEMENT SYSTEM FOR ELECTRIC VEHICLES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02101

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02101

  Register Paper ID - 259866

  Title: BATTERY MANAGEMENT SYSTEM FOR ELECTRIC VEHICLES

  Author Name(s): KG Nagaraja, HK Jagadish, Lokesh Rao, Ediga Adarsh, Srinath HN

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 701-707

 Year: May 2024

 Downloads: 150

 Abstract

The main component in an electric vehicle's battery is the Battery Management System (BMS). This system plays a major role in both safety and performance. It keeps an eye on the battery's health by constantly monitoring voltage, current, temperature, and other factors. This data is key to preventing damage from overcharging, over-discharging, or overheating, which can lead to fires or reduced battery life. The BMS acts like a conductor, regulating how the battery is charged and discharged, and can even isolate weak parts of the battery to prevent them from bringing down the whole system. the BMS also helps the battery perform at its best by balancing energy flow across all the cells within the battery pack, maximizing its efficiency and overall lifespan. By keeping a close eye on the battery's health and performance, the BMS ensures a safe and smooth ride for electric vehicles


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduion uno, Battery cells,Lcd display,Dc motor,.Matlab simulator.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOLAR POWERED COLD STORAGE USING PELTIER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02100

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02100

  Register Paper ID - 259865

  Title: SOLAR POWERED COLD STORAGE USING PELTIER

  Author Name(s): Ass.prof.KP Shiva Murthy, Rakshitha S R, Santhosh R, Vinutha S, Pallavi P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 693-700

 Year: May 2024

 Downloads: 176

 Abstract

In this paper the creation of cold storage systems powered by solar energy using peltier module is developed. This project involves an advancement in cold storage technology that combines flexibility and portability with solar energy's efficiency. The need for cold storage solution is growing. In the contemporary world particularly in rural areas and off-grid locations. The solar powered cold storage system might have a significant in an area including agriculture, medications in health centers, emergency supplies etc. Solar powered cold storage system using peltier provides a number of benefits over traditional refrigeration systems due to its light weight, environmental friendliness, silent operation etc.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Refrigeration, Peltier module, Water block

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Wireless charging of electrical vehicle on road

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02099

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02099

  Register Paper ID - 259864

  Title: WIRELESS CHARGING OF ELECTRICAL VEHICLE ON ROAD

  Author Name(s): Madhushree R, Chetan K C, Ganesh V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 685-692

 Year: May 2024

 Downloads: 143

 Abstract

Wireless Electric Vehicle Charging (WEVC) while drive is a ground breaking technologies aiming to enhance the practicality and efficiencies off electric vehicles (EVs). This methods eliminates the need for traditional plugs-in charging, allowing EVs to charge seamlessly while in motions. Through inductive power transfers, the vehicles receives electricity from embedded charging infrastructures on the roads. The system relies on electro-magnetic fields, enabling a continuous powers transfer to the EV's battery. WEVC not only addresses range anxiety by also contributes to a sustainable and conveniently EV ecosystem. Challenge such as efficiency optimizations, standardizations, and infrastructures deployments remain, emphasis the ongoing evolutions off this transformative technologies


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Transformer, Model car, Transducers, Receiver, transmitter

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GSM Based Prepaid Energy Meter With Automatic Billing And Power Theft Alert System

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02098

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02098

  Register Paper ID - 259863

  Title: GSM BASED PREPAID ENERGY METER WITH AUTOMATIC BILLING AND POWER THEFT ALERT SYSTEM

  Author Name(s): Prof Sunil kumar P, Mohan R, Raja Pruthvi Nayaka, J Sai Pawan, Subramani T

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 673-684

 Year: May 2024

 Downloads: 171

 Abstract

GSM Based Prepaid Energy Meter with Automatic Billing and Theft Alert System" is a revolutionary project aimed at enhancing the efficiency and security of energy consumption management. This innovative system integrates GSM technology with traditional energy metering to provide a seamless and reliable solution.The system operates on a prepaid basis, allowing consumers to conveniently manage their energy usage by purchasing credits in advance. Through the integration of GSM technology, consumers can remotely recharge their energy meters using mobile phones, eliminating the need for physical interactions or manual interventions. Furthermore, the system incorporates an automatic billing feature, which generates accurate and timely invoices based on the energy consumed. This ensures transparent billing processes and eliminates disputes between consumers and utility providers. In addition to billing functionalities, the system is equipped with a theft alert mechanism that promptly notifies authorities in case of any tampering or unauthorized access to the energy meter. This enhances security measures and deters potential theft or misuse of electricity.Overall, the "GSM Based Prepaid Energy Meter with Automatic Billing and Theft Alert System" offers a comprehensive solution for efficient energy management, transparent billing, and enhanced security, ultimately contributing to sustainable energy practices and consumer empowerment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino,GSM SIM 800l,lCD Display,Power theft control,Analog Energy Meter.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SOLAR WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02097

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02097

  Register Paper ID - 259862

  Title: SOLAR WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM

  Author Name(s): Prof.Archana K, Raghu P V, M C Sindhu priyanka, Anusha C

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 668-672

 Year: May 2024

 Downloads: 152

 Abstract

Wireless Power Transfer [WPT] using the magnetic induction technology Developed a novel solar wireless electrical vehicle charging system integrating renewable energy and wireless technology. The system efficiently harnesses solar power to wirelessly charge electric vehicles, ensuring sustainability and convenience. Employing advanced electromagnetic resonance, it enables seamless transfer of energy between the charging pad and the vehicle. Through optimization algorithms, it maximizes energy capture and minimizes environmental impact. The system boasts robustness, reliability, and scalability, offering a promising solution for the future of electric vehicle charging infrastructure. Extensive simulations and real-world testing validate its performance and feasibility. This innovative system represents a significant step towards greener transportation and a sustainable energy ecosystem. Because of this more frequent rate, the battery's charging is rapid and great efficient. It will improve the experience of driving an EV. Through the introduction of WPT in an electric-powered vehicle, the obstacles of charging duration, distance, and cost can be conveniently managed. The WPT age is growing swiftly in the last few years.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Solar Electric Vehicle, Renewable energy resources, Photovoltaic cell

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INVOLUNTARY DETECTION AND ALERTING OF POTHOLES AND HUMPS ON ROADS TO AID DRIVERS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02096

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02096

  Register Paper ID - 259860

  Title: INVOLUNTARY DETECTION AND ALERTING OF POTHOLES AND HUMPS ON ROADS TO AID DRIVERS

  Author Name(s): Sana K Abdul Gani, Idrees Ahmad Khan Pathan, Rameez Raja

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 662-667

 Year: May 2024

 Downloads: 127

 Abstract

Spotted potholes and speed bumps are among the main causes of car accidents. One important factor in the economics of the nation is its well-maintained road network. One may draw a comparison between the significance of blood veins for humans and the relevance of road infrastructure in society. The quality of the road surface should be regularly inspected and fixed as needed. This research uses a combination of cutting-edge computer vision algorithms and sensor technologies to create an extensive system for automatic identification and alerting of roadway potholes and humps. The concept entails equipping cars with a variety of sensors, including as GPS units and accelerometers, in order to gather data on road conditions in real time


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

INVOLUNTARY DETECTION AND ALERTING OF POTHOLES AND HUMPS ON ROADS TO AID DRIVERS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DUAL AXIS SOLAR TRACKING WITH IOT-BASED LOAD SHEDDING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02095

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02095

  Register Paper ID - 259802

  Title: DUAL AXIS SOLAR TRACKING WITH IOT-BASED LOAD SHEDDING

  Author Name(s): Sunil Kumar P, Dhanush D, K Abhishek, Patne Shirish Shivaji, Reddy Mallu P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 654-661

 Year: May 2024

 Downloads: 142

 Abstract

This project presents an innovative solution combining IoT technology with a dual-axis solar tracking system to optimize energy management through load shedding. Load shedding is essential for effective power distribution, especially in regions susceptible to energy shortages. The dual-axis solar tracking system enhances solar panel efficiency by dynamically adjusting its orientation to maximize sunlight exposure. Leveraging IoT capabilities, the system enables real-time monitoring and intelligent decision-making for load shedding based on energy demand and availability. This report outlines the design, implementation, and evaluation of the integrated system, showcasing promising results in energy efficiency and load-shedding effectiveness. The fusion of IoT and solar tracking technologies holds significant promise for addressing energy challenges and promoting sustainable energy practices in various settings.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduion uno, Battery cells,Lcd display,Dc motor,.Matlab simulator.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ONLINE MONITORING AND DETECTION OF FAULTS IN UNDERGROUND CABLES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02094

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02094

  Register Paper ID - 259801

  Title: ONLINE MONITORING AND DETECTION OF FAULTS IN UNDERGROUND CABLES

  Author Name(s): Prof. V K Gupta, Chandana NM, Harshitha, Shree Raksha P Hegde, Deeba Altaf

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 645-653

 Year: May 2024

 Downloads: 129

 Abstract

In urban areas, electrical cables run underground instead of running over, because it does not affected by any adverse effect of weather such as heavy rainfall, snow, thunder storm. Whenever a fault occurs within the underground cable, it is difficult to detect the exact location of the fault for the repair process of particular cable. The proposed system found the point of the exact location of fault. This project is intended to detect the location of the fault in underground cable lines from the base station to exact location in kilometres using an Arduino micro controller kit. In the urban areas, the electrical cable runs in undergrounds instead of overhead lines. Whenever the fault occurs in underground cable it is difficult to detect the exact location of the fault for process of repairing that particular cable. The proposed system finds the exact location of the fault. This system uses an Arduino microcontroller kit and a rectified power supply. Here the current sensing circuits made with a combination of resistors are interfaced to Arduino microcontroller kit to help of the internal ADC device for providing digital data to the microcontroller representing the cable length in kilometres . The fault creation is made by the set of switches. The relays are controlled by the relay driver. A 16*2 LCD display connected to the microcontroller to display the information. In case of short circuit the voltage across series resistor changes accordingly, which is then fed to an ADC to develop precise digital data to a programmed Arduino microcontroller kit that further displays exact fault location from the base station in kilometres. In this project we used IOT thing speak for monitoring. We can monitor through our android phone the WIFI IOT.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino microcontroller, LCD, ADC, Cable Fault, Relay, IOT.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DESIGN AND FABRICATION OF SOLAR POWER VACUUM CLEANER

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02093

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02093

  Register Paper ID - 259799

  Title: DESIGN AND FABRICATION OF SOLAR POWER VACUUM CLEANER

  Author Name(s): Aruna YV, Anupama DN, Lavanya G, Ramya C

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 638-644

 Year: May 2024

 Downloads: 136

 Abstract

Since the non-renewable resources we now use are going to run out soon, renewable energy is crucial for the modern world. Saving these non renewable energy sources is one step closer with the solar-powered vacuum cleaner. We are more aware of and affected by the effects of climate change now than ever before. The technology that can support us in both our everyday lives and in preserving the environment. We present the Smart Solar dust collection as one workable option that can perfectly alter our way of life, if only slightly. A solar vacuum cleaner can aid in reducing pollution. To capture solar radiation, offer an improved surface for collecting dust, which benefits the environment


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

DESIGN AND FABRICATION OF SOLAR POWER VACUUM CLEANER

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TRADITIONAL DATABASE AND ITS PAIN POINTS FOR IMAGE AND TEXT PROCESSING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02092

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02092

  Register Paper ID - 259797

  Title: TRADITIONAL DATABASE AND ITS PAIN POINTS FOR IMAGE AND TEXT PROCESSING

  Author Name(s): Priyanka Desai, Ajay T, Amit Ganesh Bhat, Deepak R, Lohith Kumar H M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 630-637

 Year: May 2024

 Downloads: 142

 Abstract

Efficiency is one of major aspect of the software industry ever since its beginning, serving end-users quickly, and benefiting service providers cost-effetely. All parties involve getting an efficient system. A database management system is a essential part of all software systems effectively, so it makes sense to benchmark the performance of different DBMSs to find the most reliable one. This approach systematically synthesizes results and compare DBMS performance, providing suggestions for industry and research. Database management systems are today's most effective mean to organize data and collects that data which can be used for search and update operations. However, many database systems are available on the market each having their advantages and disadvantages in terms of reliability, usability, security, and performance.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

TRADITIONAL DATABASE AND ITS PAIN POINTS FOR IMAGE AND TEXT PROCESSING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ACCIVUE: REAL TIME ROAD ACCIDENT DETECTION AND ALERT SYSTEM USING DEEP LEARNING NEURAL NETWORKS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02091

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02091

  Register Paper ID - 259796

  Title: ACCIVUE: REAL TIME ROAD ACCIDENT DETECTION AND ALERT SYSTEM USING DEEP LEARNING NEURAL NETWORKS

  Author Name(s): Vijayalaxmi R Y, Anshuman Kumar Dwivedi, Anubhav Agnihotri, Himanshu Prasad, Nabin Acharya

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 624-629

 Year: May 2024

 Downloads: 142

 Abstract

Accidents in India have emerged as a leading cause of fatalities, predominantly attributable to delayed assistance reaching victims rather than the accidents themselves. Particularly in areas with sparse and high-speed traffic like highways, victims often endure prolonged unattended periods, amplifying the risk of fatal outcomes due to delayed medical intervention. This paper introduces AcciVue, a proactive system designed to bolster road safety by employing a real-time accident detection mechanism. AcciVue integrates deep learning neural networks, including Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) networks[1], to analyze CCTV video feeds for timely accident detection. By promptly alerting nearby hospitals and police stations upon detection, AcciVue optimizes emergency response, mitigating accident repercussions and ultimately enhancing road user safety. This innovative approach showcases the transformative potential of deep learning technology in addressing the multifaceted challenges of road safety.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Accidents, Road Safety, Deep Learning, CNN, LSTM

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REVOLUTIONIZING TALENT ACQUISITION: ADVANCING RESUME CLASSIFICATION WITH ITERATIVE LEARNING TECHNIQUE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02090

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02090

  Register Paper ID - 259795

  Title: REVOLUTIONIZING TALENT ACQUISITION: ADVANCING RESUME CLASSIFICATION WITH ITERATIVE LEARNING TECHNIQUE

  Author Name(s): Asma Taj HA, Amith KB, Abdur Rehman

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 618-623

 Year: May 2024

 Downloads: 139

 Abstract

With the increasing volume of digital resumes, efficient and accurate classification is essential for effective talent acquisition.This research delves into the innovative application of gradient boosting algorithms, a subset of machine learning techniques, for the intricate task of resume classification in the domain of talent acquisition. Gradient boosting methodologies, renowned for their adeptness in iteratively refining predictive models by combining weak learners, present a compelling avenue for bolstering the precision and efficiency of resume categorization systems.Moreover, the research endeavors to unravel the interpretability of gradient boosting models, shedding light on their role in fostering transparency and equity in the recruitment ecosystem. Through this multifaceted inquiry, this study not only advances the frontier of machine learning applications in talent acquisition but also underscores the transformative potential of gradient boosting in revolutionizing resume classification practices, thereby empowering organizations to make data-driven and equitable hiring decisions.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Resume, Classification, Machine Learning.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A SOCIAL DISTANCE MONITORING SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02089

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02089

  Register Paper ID - 259793

  Title: A SOCIAL DISTANCE MONITORING SYSTEM

  Author Name(s): Sudarsanan D, Prasun Kumar, Monish Krishna K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 612-617

 Year: May 2024

 Downloads: 160

 Abstract

Social distancing strategies are crucial for halting the development of various air born disease and maintain the distance for various causes. To disrupt the cycle of dissemination, social Distancing is often adhered to carefully. This study presents a technique that may be used to detect instances of social distance breaches in public spaces such as ATMs, malls, and hospitals. By using the suggested approach, it would be easy to keep an eye on people to make sure they are keeping their social distance in the monitored area and to notify them when someone does not adhere to the established boundaries. Installing the suggested deep learning technology-based system will allow coverage up to a predetermined, restricted distance. To complete the task, the algorithm uses real-time IP camera footage. The simulated model employs a YOLO model trained on the COCO dataset to detect individuals in the frame, then deep learning methods with the OpenCV library to estimate the distance between them.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Deep learning, OpenCV YOLO model, COCO dataset, Image processing,

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: TRAFFIC PREDICTION FOR INTELLIGENT TRANSPORTATION SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02088

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02088

  Register Paper ID - 259791

  Title: TRAFFIC PREDICTION FOR INTELLIGENT TRANSPORTATION SYSTEM

  Author Name(s): Karangula Navya, Dhanush M, G Chaithanya Reddy, Harshith K, Dhanush M N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 606-611

 Year: May 2024

 Downloads: 133

 Abstract

Machine learning and feature extraction play a very importance in the Internet and health department. The traffic environment consists of everything that can affect traffic on the road, be it traffic lights, accidents, rallies, even road repairs that can cause a large amount of congestion. If we somewhat have imprecise prior information on all of the above and many other everyday situations that can affect traffic, then the driver or rider can make somewhat of an informative decision. Needless to say, it also helps in contributing to the future of autonomous vehicles! In the current decades, traffic data is significantly generated exponentially and we slightly have moved towards embracing big data concepts for transportation. This interesting fact really inspired us to somewhat work on the issue of traffic flow prediction, sort of based on traffic data and models.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic prediction, Intelligent Transportation Systems, Random Forest and KNN

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: BREAST CANCER PREDICTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02087

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02087

  Register Paper ID - 259790

  Title: BREAST CANCER PREDICTION

  Author Name(s): Prof.Shivakumar.M, Kokila R, Likitha B S, Tharun N, Adishesha.R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 600-605

 Year: May 2024

 Downloads: 138

 Abstract

This final-year project aims to analyse and detect Breast Cancer . Womens are highly suffered from breast cancer,with huge medical problems caused by a treatment(Morbidity) and destined to die(Mortality). Due to lack of prediction models the accuracy of prediction or detection of breast cancer if difficulty. Because of this the prediction time and the patient duration for sustaing time need to be prolonged. Hence to predict early the technique or model is designed to give prediction accuracy exactly. In this SVM, DT, GaussianNB and KNN are the four algorithms used to predict breast cancer results compared with large and different datasets. The proposed model is selected to predict the result of many techniques and correct technique is used depending upon the treatment. This model is based on getting and future studies can be done to predict other methods it can be categorised on basisi of other methods.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Breast Cancer, Machine learning, Support Vector Machine, Decision Tree, KNN and GaussianNB.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INTEGRATING COMPUTER VISION IN GAME DESIGN: A MULTI-GAME MENU SYSTEM POWERED BY OPENCV

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02086

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02086

  Register Paper ID - 259788

  Title: INTEGRATING COMPUTER VISION IN GAME DESIGN: A MULTI-GAME MENU SYSTEM POWERED BY OPENCV

  Author Name(s): Megha Sharma, Sahil Raju Jadhav, M Shivashankar, Vinyas M S, Sharath M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 593-599

 Year: May 2024

 Downloads: 158

 Abstract

The rapid developments in machine learning and computer vision have revolutionized many industries, most notably the gaming business. This project makes use of OpenCV in conjunction with Tkinter, a popular Python GUI toolkit, to create an aesthetically pleasing and user-friendly menu system that enables simple and quick game selection. This project includes a menu that enhances interactivity inside four bespoke games (Quiz, Eat the Fruit, Rock-Paper-Scissors, and Number Guessing) by combining OpenCV's image recognition and gesture detection. These games strive to surpass user expectations and showcase the potential of computer vision in gaming by utilizing OpenCV's real-time responsiveness and dynamic interaction features. This invention raises the bar for interactive, user-centered game.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Computer Vision, OpenCV, Tkinter, Interactive Gaming, Game Selection Menu, Real-Time Interaction, Gesture Detection, Image Recognition, Gaming Innovation.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GENCHAT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02085

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02085

  Register Paper ID - 259786

  Title: GENCHAT

  Author Name(s): Priyanaka Desai, Sankarapu Jagati, Varshini C, Shrilakshmi D, SP Harshini Sheasha Sayee

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 587-592

 Year: May 2024

 Downloads: 142

 Abstract

Visually impaired people are not comfortable reading and writing. Hence, an application is being developed to enable blind individuals to read printed text with a camera by simply tapping on the screen using a speech engine. Additionally, a talking calculator has been designed so that visually impaired people can utilize it via voice commands. Alongside these features, several applications have been incorporated to assist blind individuals in their everyday lives. The application also displays the user's current location and provides weather information for any city or location. With the help of an object detection system, blind individuals can easily identify objects through the camera and listen to their names[1]. Furthermore, they can transfer money using a phone number or account number through a voice-based payment system implemented in the project. The application requires minimal effort from the user to be used effectively during daily activities. With the rapid growth of wireless communications, there is an increasing need for voice recognition techniques. Voice applications based on voice interfaces, recognition, and dialogue management can help users focus on their current tasks without requiring extra effort from their hands or eyes. The application listens to commands and responds with voice prompts.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

OCR recognition, Calculator, location detector, Weather detector, text-to speech, Object detection, android

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: REAL-TIME MONITORING OF MACHINE HEALTH IN MANUFACTURING INDUSTRY -AN INDUSTRIAL IOT APPLICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02084

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02084

  Register Paper ID - 259785

  Title: REAL-TIME MONITORING OF MACHINE HEALTH IN MANUFACTURING INDUSTRY -AN INDUSTRIAL IOT APPLICATION

  Author Name(s): Jayashree N, Meghana D, Rakshitha A, Rohitha K N, Sharanya V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 579-586

 Year: May 2024

 Downloads: 133

 Abstract

This proposal advocates for the integration of Industrial Internet of Things (IoT) technologies in the industry to enhance production efficiency and sustainability. Leveraging smart monitoring through IoT-based equipment, the initiative focuses on optimizing energy usage, detecting early machine failures, and ensuring precise temperature control. Implementation involves energy meters for daily voltage regulation, thermal sensors for cost-effective failure detection, and temperature sensors for climate control. By reducing downtime, operational costs are minimized, environmental impact is lowered, and pharmaceutical production becomes more sustainable and economically viable. This innovative approach aligns with the industry's high demand, promoting enhanced product quality, safety, and overall efficiency. In simpler terms, our strategy utilizes smart monitoring to keep machines running smoothly, save costs, and maintain pharmaceutical production quality and safety


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Predictive Maintenance, Early detection, Reduce Downtime, Energy Optimization

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ENCRYPTION USING AES AND VISUAL CRYPTOGRAPHY THROUGH LSB

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02083

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02083

  Register Paper ID - 259784

  Title: ENCRYPTION USING AES AND VISUAL CRYPTOGRAPHY THROUGH LSB

  Author Name(s): Kavya V R, Nisarga S Gowda, Aishwarya P, Nafza A

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 573-578

 Year: May 2024

 Downloads: 133

 Abstract

A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever-increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need automatically translates to the requirement of increased network security and better and fast encryption algorithms. This paper addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half of the message is encrypted using AES and the second share of the message is embedded in the image using LSB.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

ENCRYPTION USING AES AND VISUAL CRYPTOGRAPHY THROUGH LSB

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DISTANCE BASED TOLL WAY AUTOMATION: "USING RFID and ANPR FOR CONTACTLESS & QUEUELESS TOLLS"

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02082

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02082

  Register Paper ID - 259783

  Title: DISTANCE BASED TOLL WAY AUTOMATION: "USING RFID AND ANPR FOR CONTACTLESS & QUEUELESS TOLLS"

  Author Name(s): Shoma R S, Naveen Kumar C, Sangram Singh Thakur, Sharath N, Sridhar R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 567-572

 Year: May 2024

 Downloads: 176

 Abstract

"Distance-Based Toll Way Automation: Using RFID & ANPR for Contactless & Queue-less Tolls" presents a model aimed at showcasing an innovative approach to modernizing highway toll collection. Through the integration of Radio Frequency Identification (RFID) and Automatic Number Plate Recognition (ANPR) technologies, our model eliminates the need for physical toll gates, offering a contactless and queue-less tolling experience. Dynamic pricing mechanisms are introduced to ensure fairness in toll charges, promoting efficient resource allocation and optimizing revenue generation. By prioritizing data privacy and security, our model provides a user-friendly interface for commuters, enhancing overall satisfaction and promoting trust in the tolling system. While implemented at a demonstration scale, this model serves as a proof of concept for the feasibility and effectiveness of distance-based toll way automation. It represents a significant step towards realizing a more accessible, efficient, and equitable tolling infrastructure for highways, contributing to improved traffic management and urban mobility.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Toll way automation, RFID, ANPR ,Contactless toll collection, Queue-less tolls, Dynamic pricing, Highway infrastructure, Traffic management, Transportation technology, Tolling efficiency, Road safety, Urban mobility, Toll collection optimization

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTION OF DIABETIC EYE DISEASE FROM RETINAL IMAGES USING A DEEP LEARNING BASED ON CENTERNET AND DENSENET MODEL

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02081

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02081

  Register Paper ID - 259781

  Title: DETECTION OF DIABETIC EYE DISEASE FROM RETINAL IMAGES USING A DEEP LEARNING BASED ON CENTERNET AND DENSENET MODEL

  Author Name(s): Sapna, Jaipriya M, Pavithra Sri S, Kausalya V, Abhinaya K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 560-566

 Year: May 2024

 Downloads: 137

 Abstract

Diabetic patients are prone to eye disease called Diabetic Retinopathy that affects blood vessels of the retina of diabetic patients. Diabetic retinopathy stands as a foremost cause of vision impairment globally. The earliest diabetes-related changes in the retina are often imperceptible and have minimum impact in the vision and thus approximately one third of the diabetic patients have DR but show no symptoms, leading to the progression of the disease untreated. The complexity of screening methodologies for diabetic eye diseases and the shortage of adequately trained personnel render the development of effective screening-oriented treatments a financially burdensome endeavor. Our proposed framework demonstrates proficiency in accurately localizing and categorizing disease lesions within retinal images thus facilitating automated detection and recognition of diabetic retinopathy, thus enabling early detection for efficient treatment with low cost and high accuracy


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Diabetic Eye Disease, Diabetic Retinopathy, Deep Learning, Retinal Disease.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SIGNATURE FORGERY DETECTION USING ONE-SHOT LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02080

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02080

  Register Paper ID - 259779

  Title: SIGNATURE FORGERY DETECTION USING ONE-SHOT LEARNING

  Author Name(s): Bharani B R, Suman Singh, Nikhil Parag, Keerthana

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 554-559

 Year: May 2024

 Downloads: 127

 Abstract

Recently, the problem of signature forgery detection attracted significant attention due to various applications: banking, legal, and security . Existing methods require extensive volumes of data for training, making signature detection less accurate and convenient. This paper designs a novel methodology for signature forgery detection that requires one-shot learning.Furthermore, we introduce a novel similarity metric tailored for signature forgery detection, which captures the subtle differences between genuine and forged signatures. This metric facilitates the identification of forged signatures even in cases where the forgeries closely resemble genuine signatures.By training the siamese network on the genuine signature samples, we produced the synthetic forgery samples using sufficiently powerful data augmentation techniques which can allow the network to learn and easily differentiate between the genuine and the forgery signature samples. Our proposed method outperforms existing approaches and demonstrates a high potential for implementation in practice across various realms where the signature authentication needs for security and authenticity verfication.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Signature forgery detection, One-shot learning, Siamese neural networks, Data augmentation, Similarity metric

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Elevate the Online Shopping Experience using Augmented Reality (AR) and Artificial Intelligence (AI) for Enhanced Apparel Recommendations

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02079

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02079

  Register Paper ID - 259777

  Title: ELEVATE THE ONLINE SHOPPING EXPERIENCE USING AUGMENTED REALITY (AR) AND ARTIFICIAL INTELLIGENCE (AI) FOR ENHANCED APPAREL RECOMMENDATIONS

  Author Name(s): Loganathan D, Aman Kumar Mishra, Aniket Kumar, Janardhan M, Manikant Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 547-553

 Year: May 2024

 Downloads: 170

 Abstract

Utilizing cutting-edge technology solutions, the integration of Artificial Intelligence and Augmented Reality has significantly enhanced the traditional clothing shopping experience. Customers can virtually try on clothing and accessories, all from the comfort of their own homes. With specialized software and 3D modelling, customers can upload their images or avatars and virtually "try on" various outfits in real-time, achieving a higher degree of accuracy in sizing and fit predictions. This cutting-edge concept offers an immersive and highly interactive shopping experience, empowering customers to not only see how different clothing items fit and look on them but also providing accurate size recommendations through AI technology. Additionally, the integration of AR in virtual trial rooms enhances the virtual shopping experience by allowing customers to explore products in a more realistic and engaging way, ultimately enhancing their confidence in making online fashion purchases while reducing the need for physical store visits.(Abstract) Keywords-- Artificial Intelligence, 3D, machine learning, Augmented Reality


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Elevate the Online Shopping Experience using Augmented Reality (AR) and Artificial Intelligence (AI) for Enhanced Apparel Recommendations

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ATTENDANCE SYSTEM USING FACIAL RECOGNITION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02078

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02078

  Register Paper ID - 259776

  Title: ATTENDANCE SYSTEM USING FACIAL RECOGNITION

  Author Name(s): Megha Sharma, Gayathri M S, Gayathri Madhumitha G S, Kahkashan

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 542-546

 Year: May 2024

 Downloads: 180

 Abstract

The face is an important part of the human body, it recognizes people in huge gatherings. The recognition of face has gained the attention of many researchers and has subsequently become the standard benchmark in the human recognition space. An attendance system using facial recognition is a type of biometric technology. It identifies and verifies the identity of a person from a digital image. Accurate attendance records are critical to class evaluation. However, manual attendance tracking can lead to errors, missed students, or duplicate records. A class image is taken and the RECOGNIZER python file is run. Attendance is done by cropping the faces in the image and it is comapared with the database faces.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Python; OpenCV and Google API; Student attendance; Face recognition

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DETECTION OF FAKE CURRENCY USING MACHINE LEARNING TECHNIQUES

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02077

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02077

  Register Paper ID - 259774

  Title: DETECTION OF FAKE CURRENCY USING MACHINE LEARNING TECHNIQUES

  Author Name(s): Karangula Navya, Baksam Chiranjeevi, Danush M, Hariharan M S, Lalith Kumar S

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 536-541

 Year: May 2024

 Downloads: 175

 Abstract

The proliferation of fake currency presents a significant and multifaceted challenge, posing a genuine threat to both the welfare of individuals and the stability of our national economy. While counterfeit detection systems are prevalent in banks and corporate environments, their accessibility to the general public and small enterprises remains limited, leaving them susceptible to counterfeit currency. advanced image processing techniques. This currency verification system has been fully developed using the Python language within the Jupyter Notebook environment.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Fake currency, counterfeit detection, image processing, feature extraction, Bruteforce matcher

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: FIRE FIGHTING ROBOT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02076

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02076

  Register Paper ID - 259773

  Title: FIRE FIGHTING ROBOT

  Author Name(s): Bharani B R, Vinay N, Vasu S, Yashas V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 531-535

 Year: May 2024

 Downloads: 155

 Abstract

This abstract presents a cutting-edge autonomous firefighting robot system designed to tackle the escalating challenges posed by fires worldwide. Integrating robotics, artificial intelligence, and advanced firefighting equipment, the system offers a versatile and effective solution for extinguishing fires while prioritizing the safety of both responders and civilians. Equipped with sensors for heat, smoke, and obstacle detection, the robot navigates complex environments with precision, swiftly locating and suppressing fires using high-pressure water cannons or foam dispensers. Powered by sophisticated algorithms for autonomous operation, the robot demonstrates remarkable adaptability and efficiency in dynamic firefighting scenarios. With built-in safety features and validated effectiveness through rigorous simulations and real-world experiments, this system represents a significant leap forward in firefighting technology, promising to enhance response capabilities and minimize risks in the face of escalating fire emergencies.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Firefighting robot, prototype, sensors, navigation, fire suppression

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: T20 CRICKET WORLD CUP 2024 PREDICTION USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02075

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02075

  Register Paper ID - 259771

  Title: T20 CRICKET WORLD CUP 2024 PREDICTION USING MACHINE LEARNING

  Author Name(s): Sudarsanan D, Mohammed Mafaaz Chandwale, Ryan Ahmed, Harsh Nath Mishra

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 526-530

 Year: May 2024

 Downloads: 175

 Abstract

This study applies machine learning (ML) techniques to predict Cricket World Cup winners, using historical data, team performances, and player stats. Comprehensive datasets from past tournaments are analyzed with algorithms like Random Forests and Logistic Regression, enhanced through cross-validation. Models are trained on diverse match scenarios and team performance data, aiming to forecast the champion accurately


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Component, formatting, style, styling, insert.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: ENHANCING LIBRARY CHATBOT USING MACHINE LEARNING WITH READ ALOUD TECHNOLOGY

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02074

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02074

  Register Paper ID - 259770

  Title: ENHANCING LIBRARY CHATBOT USING MACHINE LEARNING WITH READ ALOUD TECHNOLOGY

  Author Name(s): Loganathan D, Navya Shree A, Saatwik Naik, Sagar C, Usha V A

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 518-525

 Year: May 2024

 Downloads: 169

 Abstract

Enhancing Library Chatbot Using Machine Learning with Read-Aloud Technology project aims to enhance user experiences and Uses streamline Framework as it's Front end and leveraging conversational AI technology. This Chatbot will serve as a virtual assistant, providing users with quick and convenient access to information about library resources, such as books, opening hours, and events. Additionally, it will assist in answering common library-related questions, guiding users through the library's physical layout, and recommending books based on their preferences. The Chatbot will offer 24/7 support. It will incorporate natural language processing capabilities to understand and respond to user queries effectively and has Read-aloud technology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Library Chatbot, Read aloud Technology, machine learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NETWORK BREACH PREDICTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02073

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02073

  Register Paper ID - 259768

  Title: NETWORK BREACH PREDICTION

  Author Name(s): Kavya V R, Bhagya Ravi Kumar, Divya G R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 514-517

 Year: May 2024

 Downloads: 115

 Abstract

Establishing data for an Intrusion Detection System (IDS) typically entails configuring the actual working environment to explore potential attacks, a process that can be prohibitively costly. However, such software is crucial for safeguarding computer networks against unauthorized access, including from potential insiders. The task of training an intrusion detector involves developing a predictive model, often a classifier, capable of distinguishing between "bad" connections (intrusions or attacks) and "good" regular connections.To address the expense and complexity associated with real-world testing, this study focuses on predicting whether connections are under attack using the KDDCup99 dataset and various machine learning methods. The objective is to enhance packet connection predictions for better accuracy, particularly in identifying DOS, R2L, U2R, Probe, and overall attacks. This involves evaluating and comparing supervised classification algorithms to identify the most accurate predictive results. Additionally, the study assesses algorithm performance through classification reports, confusion matrices, and data prioritization.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NETWORK BREACH PREDICTION

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CANEGUIDEX: SMART OBSTACLE RECOGNITION AND VOICE ASSISTANT FOR THE BLIND

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02072

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02072

  Register Paper ID - 259767

  Title: CANEGUIDEX: SMART OBSTACLE RECOGNITION AND VOICE ASSISTANT FOR THE BLIND

  Author Name(s): Sunil Kumar K N, Mahalakshmi K, Gayathri T, Amulya A

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 506-513

 Year: May 2024

 Downloads: 155

 Abstract

"CaneGuideX" incorporates sophisticated equipment to assist the blind. It enhances safety and liberty for individuals exploring new situations by using smart obstacle detection algorithms to detect and evaluate their surrounds in real-time. It offers clear direction and thorough descriptions of barriers through voice aid, making navigation simple and effective. By providing thoughtful, proactive assistance, this ground-breaking technology transforms the way blind people use canes, allows them to move with assurance and independence. With its ability to extend the gap between those with blind people and the surroundings around them and promote greater diversity and autonomy in daily activities, CaneGuideX is a significant leap in accessibility technology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Obstacle Detection, YOLO, Deep Learning, Raspberry pi, Text-to-Speech(tts).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART VEHICLE PARKING SYSTEM ON FOG COMPUTING FOR EFFECTIVE RESOURCE MANAGEMENT

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02071

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02071

  Register Paper ID - 259766

  Title: SMART VEHICLE PARKING SYSTEM ON FOG COMPUTING FOR EFFECTIVE RESOURCE MANAGEMENT

  Author Name(s): Shoma R S, Mubarak Pasha M, Rakesh M, Rakshith Kumara R, R Dhanush Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 501-505

 Year: May 2024

 Downloads: 173

 Abstract

The rising number of vehicles on roads has led to like increased demand for parking spaces, necessitating more efficient and super responsive parking systems. This abstract proposes a super cool smart car parking system utilizing fog computing technology to address so many latency issues inherent in those conventional systems! By employing a combination of many sensors, cameras, and edge devices, the proposed system gathers and processes parking-related data in really real-time, generating like really significant data volumes that require so efficient management! Fog computing extends cloud services to that network edge, reducing latency and congestion by processing data closer to its source. However, resource management remains a such as challenge in fog computing implementation, requiring effective allocation of computing resources across edge devices to really optimize throughput and reduce latency. This research contributes to the development of intelligent parking systems by proposing a fog computing-based approach that optimizes resource utilization and enables real-time processing for efficient parking management.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SMART VEHICLE PARKING SYSTEM ON FOG COMPUTING FOR EFFECTIVE RESOURCE MANAGEMENT

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Voice Controlled Autonomous Vehicle For Physically Challenges Civilians

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02070

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02070

  Register Paper ID - 259765

  Title: VOICE CONTROLLED AUTONOMOUS VEHICLE FOR PHYSICALLY CHALLENGES CIVILIANS

  Author Name(s): Jayashree N, Mohammed Moin Ulla Khan, Nafisa Banu G, Poornima B, Sneha V

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 495-500

 Year: May 2024

 Downloads: 197

 Abstract

They are used to doing work that humans cannot perform. Hand gestures and voice are two of the most powerful communication techniques. Robotics can be used in many of these scenarios to minimize human error and to make work safer and easier. Defense, industrial robotics, vehicle part assembling industries in the civil side and medical field for surgery are the major fields that prefer hand gesture/voice recognition robots. Robot devices are tougher to control with the help of buttons and switches. It will get difficult and tedious to operate buttons and remote controls.Our project deals with the interface of robots through voice and gesture control. The purpose of this gesture recognition and voice recognition method is to capture human hand gestures, voice and perform applications and move in an individual path that meets the user's demands. This project aims to use these two methods to control a robotic car from a long distance without using any physical contact.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Voice Controlled Autonomous Vehicle For Physically Challenges Civilians

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: AUTOMATION ENGINE LOCKING THROUGH ALCOHOL DETECTION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02069

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02069

  Register Paper ID - 259764

  Title: AUTOMATION ENGINE LOCKING THROUGH ALCOHOL DETECTION

  Author Name(s): Preethi S, Kaushik P, Kavya N, Kuruba Suresh, Madhuri R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 490-494

 Year: May 2024

 Downloads: 134

 Abstract

The current situation indicates that drunk driving is the primary cause of traffic accidents. Every manual effort aimed at curbing alcohol-related driving is undermined by law enforcement officials limited capabilities. Thus the requirements for an alcohol detection device that is not limited by time or space exists .This project describes the layout and focus of an Arduino UNO and ultrasonic sensor-based engine locking alcohol detector for automobiles. When the amount of alcohol in the alcohol detection sensor rises above a certain threshold, the equipment will continuously measure the alcohol content and cut off the vehicle's engine. The concept offers a practical way to reduce drink driving-related accidents.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Arduino UNO, MQ3 Sensor, Buzzer, LED, DC Motor , Relay Switch

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SEARCH JOB ROLES WITH RIGHT SET OF SKILLS USING DATA ANALYSIS AND VISUALIZATION SYSTEM-SKILLSYNC.

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02068

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02068

  Register Paper ID - 259763

  Title: SEARCH JOB ROLES WITH RIGHT SET OF SKILLS USING DATA ANALYSIS AND VISUALIZATION SYSTEM-SKILLSYNC.

  Author Name(s): Asma Taj H A, Shekh Md moinuddin, Syed shariq kamran, Selim jhangir, Murari kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 483-489

 Year: May 2024

 Downloads: 168

 Abstract

SkillSync is the bridge that connects talent to opportunity, offering an open-source platform where skills are showcased, discovered, and perfectly matched with the ideal job roles. This project seeks to revolutionize the way we approach the workforce, providing a plethora of benefits, including enhanced efficiency, reduced costs, and an expansive network of skills that now have the chance to shine


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Component, formatting, style, styling, insert.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: NETWORK INTRUSION DETECTION SYSTEM USING ML

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02067

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02067

  Register Paper ID - 259762

  Title: NETWORK INTRUSION DETECTION SYSTEM USING ML

  Author Name(s): Anusha B, L S Sai Harika, Nikhil Kumar, Diksha Manu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 477-482

 Year: May 2024

 Downloads: 113

 Abstract

In the face of increasingly complex cyber threats, the necessity for robust Network Intrusion Detection Systems (NIDS) has never been greater. Conventional rule-based systems often struggle to keep pace with evolving attack methodologies, necessitating the integration of machine learning (ML) techniques to bolster detection capabilities. This paper puts forward an innovative NIDS approach that leverages ML algorithms to effectively detect and mitigate network intrusions. Our proposed system utilizes supervised learning algorithms trained on labelled network traffic data to differentiate incoming traffic as normal or malicious. By harnessing extensive labelled data, our system can discern intricate patterns and anomalies indicative of malicious activities, thereby enhancing detection accuracy and reducing false positives. Additionally, the system incorporates detection methods for anomalies in network traffic to uncover previously unseen threats by detecting deviations from established baseline behaviour. Key features of our NIDS include real-time monitoring, scalability to accommodate large network infrastructures, and adaptability to dynamic environments. Through Ongoing adaptation through the incorporation of fresh data and refinement of detection algorithms, our system offers proactive defence against a wide spectrum of cyber threats, including known and zero-day attacks. In our evaluation, we demonstrate the effectiveness of our ML-based NIDS through comprehensive experimentation on diverse datasets, demonstrating its enhanced effectiveness in comparison to traditional rule-based approaches. Our results underscore significant enhancements in both detection rates and false positive mitigation, underscoring the potential of ML in bolstering network security defences against evolving cyber threats.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

NETWORK INTRUSION DETECTION SYSTEM USING ML

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STOCK MARKET PRICE PREDICTION USING DECISION TREE AND MACHINE LEARNING ALGORITHMS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02066

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02066

  Register Paper ID - 259761

  Title: STOCK MARKET PRICE PREDICTION USING DECISION TREE AND MACHINE LEARNING ALGORITHMS

  Author Name(s): Shivakumar M, Syed Siddiq Pasha, Vikas, Chethan Reddy HR, Rahul SV

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 471-476

 Year: May 2024

 Downloads: 139

 Abstract

The main cause of this article is to find the great version to predict market charges. while we recollect the many strategies and adjustments to recall, we discover that strategies which includes random forests and support vector machines are ineffective. In this newsletter, we are able to recommend and examine a extra powerful technique to more appropriately are expecting the movement of items. First, we don't forget enterprise rate information from the previous year. The data set is pre-processed and adjusted for accurate evaluation. because of this, our article also specializes in preliminary information of the authentic facts. Secondly, after finishing the initial information, we are able to look at using random forests and assist vector machines on statistics units and the effects they produce. similarly, this study examines using these estimates within the real global and the problems associated with the accuracy of these values. the object additionally introduces gadget mastering fashions to expect the lifespan of competitive products. The successful supplying of merchandise will become a superb fee for companies and provide real answers to the issues faced by means of investors.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

STOCK MARKET PRICE PREDICTION USING DECISION TREE AND MACHINE LEARNING ALGORITHMS

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: STUDENT CAREER GUIDANCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02065

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02065

  Register Paper ID - 259760

  Title: STUDENT CAREER GUIDANCE

  Author Name(s): Santosh M, Vidya, Sushma, Yogananda

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 466-470

 Year: May 2024

 Downloads: 131

 Abstract

Upon completing higher secondary education, students around the globe often find themselves at a crossroads, unsure of which career path to pursue. This pivotal moment demands a level of maturity and self-awareness that many students may not yet possess. As individuals progress through these stages, they inevitably confront the question of what to pursue post-graduation. Our proposed solution tackles this challenge with a computerized career guidance system. By objectively assessing individual skills, this system aims to predict the most suitable career path for each student. Through this process, we aim to provide clarity and direction as students navigate their academic and professional journey.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Counsell Career, Learning Algorithms for machines, Classification(key words)

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SMART SAFETY MONITORING SYSTEM FOR SEWAGE WORKERS WITH TWO WAY COMMUNICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02064

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02064

  Register Paper ID - 259759

  Title: SMART SAFETY MONITORING SYSTEM FOR SEWAGE WORKERS WITH TWO WAY COMMUNICATION

  Author Name(s): Anusha.B, Shreyas M, Trishya V, Ventakesh Raju G, Y Shireesha

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 458-465

 Year: May 2024

 Downloads: 140

 Abstract

A large number of sanitation workers die every year due to erratic and lack of facilities available, and harmful toxic gases released while cleaning the sewage. This can include monitoring the environment for air quality, temperature, humidity, and sound levels, as well as tracking employee activity and movement. This project aims to develop an innovative Smart Safety Monitoring System (SSMS) for sewage workers, leveraging the capabilities of the Internet of Things (IoT) technology. Real time health monitoring systems for such workers will prove helpful. Sewage workers face numerous risks while performing their duties in confined and hazardous environments. The SSMS is designed to enhance their safety and improve communication. This real time health monitoring device will work in a sewage as a safety equipment. In this project, the device presented will monitor the pulse rate of a person using a pulse oximetry sensor, the methane concentration and the atmospheric oxygen concentration and provide alert to worker and exterior unit. when parameters deviate from the safe range. This parameters in real time will promptly alert the workers to stay safe and detect toxic gases before any harm.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

SMART SAFETY MONITORING SYSTEM FOR SEWAGE WORKERS WITH TWO WAY COMMUNICATION

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: INTELLIGENT FLOOD FORECASTING SYSTEM EMPOWERED BY MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02063

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02063

  Register Paper ID - 259758

  Title: INTELLIGENT FLOOD FORECASTING SYSTEM EMPOWERED BY MACHINE LEARNING

  Author Name(s): Dr Preethi S, Kausthub K S, Hemanth M U, Harshavardhan R, Likith A N

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 453-457

 Year: May 2024

 Downloads: 97

 Abstract

A groundbreaking flood prediction system emerges, blending meteorological, hydrological, and geospatial data with crowd-sourced inputs, all harmonized within a dynamic machine learning structure. Rigorous assessments affirm its prowess, particularly noting the efficacy of a multi-layer perceptron artificial neural network (MLP ANN) setup in delivering precise forecasts. This pioneering methodology harbors promise in bolstering flood mitigation tactics, streamlining preemptive actions, and fortifying rescue endeavors. This cutting-edge approach marks a pivotal advancement in flood management, poised to revolutionize how communities respond to and mitigate the impacts of inundation events.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

INTELLIGENT FLOOD FORECASTING SYSTEM EMPOWERED BY MACHINE LEARNING

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: HEART DISEASE PREDICTION SYSTEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02062

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02062

  Register Paper ID - 259757

  Title: HEART DISEASE PREDICTION SYSTEM

  Author Name(s): Santosh M, Bindu K V, Bhagyalakshmi N, Arolene cynthia, Kausalya R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 446-452

 Year: May 2024

 Downloads: 144

 Abstract

Cardiovascular diseases, particularly heart disease, remain a leading cause of mortality worldwide, necessitating advanced diagnostic systems that leverage clinical data for early and accurate prediction. Machine Learning integration techniques, particularly ensemble methods, is a way that enhances the precision and reliability of predictive models for heart disease diagnosis. The complex nature of heart diseases demands a comprehensive analysis of clinical data to derive actionable insights. While traditional diagnostic approaches have relied on individual risk factors, the combination of diverse clinical parameters offers a more broad perspective, enabling a more understanding and prediction of cardiovascular outcomes.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Data Classification, Learning Algorithms for machines, Data Analysis

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CONVOLUTIONAL YOGA POSE ESTIMATOR

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02061

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02061

  Register Paper ID - 259756

  Title: CONVOLUTIONAL YOGA POSE ESTIMATOR

  Author Name(s): Vijayalaxmi Yalavagi, Impana S, Chethan M, Chandan L, Geetha Tadasad B

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 438-445

 Year: May 2024

 Downloads: 153

 Abstract

Yoga pose estimation is a computer vision technique used to predict the position/ pose of a part of the human body. This paper presents the framework to analyse and assess yoga postures by designing, developing, and implementing a Yoga Posture Detection System using computer vision and deep learning (DL) models such as CNN and VGG16. The study employs advanced image processing algorithms to extract information from images or videos of individuals performing yoga poses. We employed several postures which includes camel, downdog, goddess, plank, tree, and warrior2. With the use of a deep learning model that has been built, the system is able to precisely recognise and categorise different positions while providing instantaneous feedback on proper alignment, balance, and posture.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CONVOLUTIONAL YOGA POSE ESTIMATOR

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: SPEECH BASED EMOTION RECOGNITION USING 1D AND 2D CNN LSTM NETWORKS

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02060

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02060

  Register Paper ID - 259750

  Title: SPEECH BASED EMOTION RECOGNITION USING 1D AND 2D CNN LSTM NETWORKS

  Author Name(s): Dr Buddesab, Ajith Kumar SM, Akshay B, Hemanth SR, NJS Vallabh

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 431-437

 Year: May 2024

 Downloads: 150

 Abstract

To label this, a paper has been initiated to create a machine learning model for Speech emotion recognition (SER) involves the identification of emotions conveyed in spoken language through analysis of speech signals. With the growing popularity of voice assistants and smart speakers, SER has gained significant attention in recent years. One approach to SER is to use deep learning models such as "Convolutional Neural Networks " (CNNs) and Long Short-Term Memory (LSTM) networks. In this particular paper, we suggest a novel approach for SER using a 2D CNN- LSTM architecture. The proposed model first uses a 2D CNN to extract the relevant characterstics from the speech signal, followed by a LSTM network for sequence modeling. We evaluated our proposed model on the Berlin Emotional Speech Database (EMO-DB), achieving state-of-the-art results. We also balance our model's performance with other existing SER models and found that our suggested model outperformed them. Our speculative results shows that the proposed 2D CNN-LSTM architecture is an effective method for SER and can be used in real-world applications such as recognition of emotion from voice assistants, call centers, and customer service applications.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CNN, LSTM, 2D CNN LSTM.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: COMPARATIVE ANALYSIS OF REINFORCEMENT LEARNING ALGORITHMS USING A PONG GAME

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02059

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02059

  Register Paper ID - 259749

  Title: COMPARATIVE ANALYSIS OF REINFORCEMENT LEARNING ALGORITHMS USING A PONG GAME

  Author Name(s): Dr.Varalatchoumy M, Dr. Buddesab, Manu R, B Madiha Hafsa, GV Sai Koushik, Kajal Singh

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 424-430

 Year: May 2024

 Downloads: 133

 Abstract

This paper conducts a comparative analysis of four reinforcement learning (RL) algorithms--Q-learning, Deep Q-Networks (DQN), SARSA, and Proximal Policy Optimization (PPO)--using the Pong game as a benchmark. Each algorithm's performance, convergence rate, and computational efficiency are evaluated. Results indicate that while Q-learning and SARSA exhibit simplicity, they struggle with discrete action spaces. DQN, with its capability to handle continuous action spaces, shows improved performance but requires longer training times. PPO demonstrates a balance between sample efficiency and computational complexity, achieving faster convergence and superior performance. This Examination sheds light on selecting appropriate RL algorithms for real-world applications.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Reinforcement Learning, Pong Game, Q-learning, DQN, SARSA, PPO, Comparative Analysis, Performance Evaluation, Convergence Rate, Computational Efficiency.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: A COMPARATIVE ANALYSIS OF VISION TRANSFORMERS AND BEiT MODELS FOR IMAGE CLASSIFICATION

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02058

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02058

  Register Paper ID - 259747

  Title: A COMPARATIVE ANALYSIS OF VISION TRANSFORMERS AND BEIT MODELS FOR IMAGE CLASSIFICATION

  Author Name(s): R Geetha, Dr Buddesab, Deepa Shree L, Lisha M, P Aaditya,T Shivani

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 417-423

 Year: May 2024

 Downloads: 133

 Abstract

In recent years, transformer-based models have reshaped the landscape of computer visions, particularly in image classification tasks Vision Transformers (ViT) and BEiT (BERT Pre-Training of Image Transformers) stand out as notable examples, employing self-attention mechanisms. This paper presents a detailed comparative analysis of ViT and BEiT, aiming to elucidate their performance, strengths, weaknesses, and interpretability in image classification Through extensive experimentation across diverse benchmark datasets like CIFAR-10, CIFAR-100, and ImageNet[1], we evaluate the models based on classification accuracy, training efficiency, generalization capability, and robustness to adversarial perturbations Our findings offer insights at nuanced differences between ViT and BEiT, revealing ViT's efficiency and small-scale datasets, while highlighting BEiT's enhanced robustness to adversarial attacks and domain shifts Furthermore, we research the interpretability of learned representations and visualize attention patterns generated. The ability to capture meaningful image features and the comparative analysis not merely informs practitioners and researchers in computer visions but also paves the way for further advancements in transformer-based architectures for visual understanding.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Transformer-based Models, Vision Transformers, BEiT, Image Classification, Self-Attention Mechanisms, Comparative Analysis, Interpretability, Robustness, Adversarial Attacks, Computer Vision.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: GENERATIVE AI (GEN AI) BASED VIDEO GENERATION FOR CLASSICAL DANCE

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02057

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02057

  Register Paper ID - 259745

  Title: GENERATIVE AI (GEN AI) BASED VIDEO GENERATION FOR CLASSICAL DANCE

  Author Name(s): Dr. D. Antony Louis Piriyakumar, Dr Buddesab, Girish Chandra Saxena, Mohammed Adnan, Vidya Bharti, Abhisekh Kumar

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 411-416

 Year: May 2024

 Downloads: 145

 Abstract

This paper introduces an innovative fusion of classical dance and artificial intelligence, focusing on the esteemed art form of Bharatanatyam. Our pioneering framework harnesses the power of Generative AI techniques to revolutionize both the creation and experience of Bharatanatyam performances. Through advanced machine learning models, textual descriptions are seamlessly translated into visually captivating dance sequences, effectively capturing the essence and intricacies of this ancient art form. The system not only facilitates the creation of choreography but also offers a user-friendly interface tailored for artists, enthusiasts, and learners alike, thereby fostering unprecedented engagement with Bharatanatyam. By meticulously preserving the grammatical structure and predefined steps inherent in Bharatanatyam, our approach ensures an authentic representation of this rich cultural heritage. Moreover, this project serves as a catalyst for revitalizing classical dance by infusing it with cutting-edge technology, while simultaneously encouraging creative exploration and interpretation. We firmly believe that this harmonious convergence of tradition and technology will not only redefine the boundaries of artistic expression but also significantly impact the future trajectory of cultural preservation and appreciation.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Bharatanatyam, Generative AI, Dance Creation, Cultural Heritage, Artistic Expression.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DEEPFAKE VIDEO AND TEXT DETECTION USIG LSTM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02056

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02056

  Register Paper ID - 259744

  Title: DEEPFAKE VIDEO AND TEXT DETECTION USIG LSTM

  Author Name(s): Sumarani H, Dr. Buddesab, Darshil Shukla, Manish Kumar, Anand M Nambiar, Nitesh Kumar Sahu

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 403-410

 Year: May 2024

 Downloads: 138

 Abstract

This paper presents a comprehensive framework for combating fake news by integrating deepfake video detection and text analysis techniques. With the proliferation of misinformation, especially through deepfake technology, there is an urgent need for robust detection methods. Our approach involves extracting text from social media posts, generating interrogative sentences, querying a web server for relevant information, and summarizing the authenticity of news, videos, or posts. By combining advanced AI algorithms for deepfake detection and text analysis, our framework offers a powerful solution to enhance the credibility of news sources and combat the spread of misinformation in digital media. Keywords-- Deepfake video detection, Text analysis, Fake news detection, Misinformation, Artificial intelligence (AI), Generative AI, Deep learning (DL), Natural language processing (NLP), social media, Web server querying, Factchecking, Digital media ecology.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Deepfake video and Text Detection, LSTM, Artificial intelligence (AI), Generative AI, Deep learning (DL), Natural language processing (NLP).

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Driver Drowsiness Detection Using Deep Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02055

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02055

  Register Paper ID - 259743

  Title: DRIVER DROWSINESS DETECTION USING DEEP LEARNING

  Author Name(s): Meghana M, P Anupama, Sandhya A, V Sadhana, Mrs. Ashalatha C R

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 397-402

 Year: May 2024

 Downloads: 130

 Abstract

This paper presents a novel approach to driver sleep detection using deep learning techniques to enhance road safety. With the increasing number of accidents caused by drowsy driving, an effective detection system is needed. Our framework uses convolutional neural networks (CNNs) to analyze facial expressions, eye movements and head positions captured by an in-vehicle camera While extracting meaningful features from these inputs , the proposed model differentiates driver warning and sleep states accurately in real time. RNNs) are employed to further improve detection performance Extensive tests on various datasets demonstrate the efficiency and robustness of the proposed method under various lighting conditions and driver characteristics enable integration in onboard systems a it already exists without it. Overall, the proposed deep learning-based method provides a practical and reliable solution to enhance road safety by better detecting driver sleep in world conditions in the self-contained.Cambridge Institute of technology Bangalore, India


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Driver Drowsiness Detection Using Deep Learning

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Detection of Myocardial Infarction Using ECG Images

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02054

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02054

  Register Paper ID - 259742

  Title: DETECTION OF MYOCARDIAL INFARCTION USING ECG IMAGES

  Author Name(s): Dr.Buddesab, Bhavya Shree C S, Bhuvana C Basavanand, D V Veena, Varsha P

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 390-396

 Year: May 2024

 Downloads: 132

 Abstract

This paper presents an innovative approach for myocardial infarction (MI) detection through an ensemble of three distinct models: Support Vector Machine (SVM), Random Forest, and Convolutional Neural Network (CNN). Trained on labeled electrocardiogram (ECG) image datasets, each model is individually optimized for effective discrimination between MI and non-MI cases. The models' unique strengths, encompassing SVM's handling of high-dimensional feature spaces, Random Forest's ensemble learning, and CNN's proficiency in hierarchical feature extraction, are strategically combined through the AdaBoost ensemble method. The resulting ensemble model is rigorously evaluated on a separate set of ECG images, demonstrating its enhanced diagnostic accuracy. Key performance metrics, including accuracy, precision, recall, and F1 score, are presented to assess the ensemble model's robustness in real-world clinical applications. This research contributes to the advancement of medical image classification by showcasing the potential of ensemble methods in improving myocardial infarction detection accuracy.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Myocardial infarction detection, Ensemble learning, Support Vector Machine (SVM), Random Forest, Convolutional Neural Network (CNN), AdaBoost, Electrocardiogram (ECG) images, Diagnostic accuracy, Feature extraction

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: DIABETES PREDICTION USING MACHINE LEARNING

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02053

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02053

  Register Paper ID - 259741

  Title: DIABETES PREDICTION USING MACHINE LEARNING

  Author Name(s): Gaanavi H N, Madanika G, Prof. SumaRani H, Dr. Buddesab

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 384-389

 Year: May 2024

 Downloads: 153

 Abstract

In this paper we aim to develop an prediction system using machine learning to detect and classify the presence of diabetes in e-healthcare environment using Ensemble Decision Tree Algorithms for high feature selection. A significant attention has been made to the accurate detection of diabetes which is a big challenge for the research community to develop a diagnosis system to detect diabetes in a successful way in the e-healthcare environment. In this paper we aim to develop an prediction system using machine learning to detect and classify the presence of diabetes in e-healthcare environment using Ensemble Decision Tree Algorithms for high feature selection. A significant attention has been made to the accurate detection of diabetes which is a big challenge for the research community to develop a diagnosis system to detect diabetes in a successful way in the e-healthcare environment. The existing diagnosis systems have some drawbacks, such as high computation time, and low prediction accuracy. To handle these issues, we have proposed diagnosis system using machine learning methods, such as preprocessing of data, feature selection, and classification for the detection of diabetes disease in e- healthcare environment. Model validation and performance evaluation metrics have been used to check the validity of the proposed system. We have proposed a filter method based on the Decision Tree algorithm for highly important feature selection. Two ensemble learning Decision Tree algorithms, such as Ada Boost and Random Forest are also used for feature selection and compared the classifier performance with wrapper based feature selection algorithms also. Machine learning classifier Decision Tree has been used for the classification of healthy and diabetic subjects. The experimental results show that the Decision Tree algorithm based on selected features improves the classification performance of the predictive model and achieved optimal accuracy. Additionally, the proposed system performance is high as compared to the previous state-of-the-art methods. High performance of the proposed method is due to the different combinations of selected features set. Furthermore, the experimental results statistical analysis demonstrated that the proposed method would be effectively detected diabetes disease.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Ensemble learning Decision Tree algorithms, such as Ada Boost and Random Forest

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Real-Time Traffic Sign Recognition and Classification with Deep Learning

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02052

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02052

  Register Paper ID - 259739

  Title: REAL-TIME TRAFFIC SIGN RECOGNITION AND CLASSIFICATION WITH DEEP LEARNING

  Author Name(s): Anusha K V, Dr Buddesab, Ananya V, Malavika G, Mehak Fathima

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 375-383

 Year: May 2024

 Downloads: 183

 Abstract

The assignment "class of site visitors signs and signs and symptoms using deep studying" represents a tremendous expand inside the situation of laptop imaginative and prescient with a completely unique cognizance on the recognition and kind of site visitors signs and symptoms. We used the energy of Python to resolve a complex visitors signal class trouble the usage of prominent models: the MobileNet and YOLOv5 architectures. The MobileNet structure done vast tiers of typical overall performance with a schooling accuracy of 97.00% and a validation accuracy of 98.00%. The quit end result is a set of four,100 seventy carefully curated snap shots overlaying fifty eight education of numerous road symptoms, which incorporates speed limits, site visitors signs and symptoms, prohibition symptoms and signs, threat warnings, and additional. the ones hours cover the overall range of site visitors rules and offer complete coverage of what is going to be stated. The YOLOv5 implementation introduced real-time road sign reputation using actual-time pictures and webcam statistics. The version changed into professional on a dataset containing 39 specific website online visitors sign instructions. those instructions encompass a enormous style of signs and signs and symptoms at the side of pedestrians, pace limits, warning and regulatory signs, and help you observe your mission to actual-international


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Traffic Sign Recognition, Neural Network Architecture, Object Detection

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Parkinson's Disease Prognosis: Advancements in Early Detection Methods for Parkinson's Disease Enhancing Accuracy for Patient Outcomes

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02051

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02051

  Register Paper ID - 259738

  Title: PARKINSON'S DISEASE PROGNOSIS: ADVANCEMENTS IN EARLY DETECTION METHODS FOR PARKINSON'S DISEASE ENHANCING ACCURACY FOR PATIENT OUTCOMES

  Author Name(s): R Geetha, Rakshitha C, Surbhi Kumari, Meghana M Nayak

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 368-374

 Year: May 2024

 Downloads: 142

 Abstract

This paper proposes a novel approach utilizing machine-gaining knowledge of strategies and Xception architecture for PD detection, focusing on spiral and wave drawings, common diagnostic tools in clinical practice. Through a dataset collection process, including individuals with and without PD, preprocessed data were employed to train machine learning models. Results indicate promising performance, demonstrating the potential of machine learning and Xception architecture in early PD detection. This approach offers advanced accuracy and efficiency in diagnosis, ultimately leading to better patient outcomes and enhanced quality of life.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Parkinson's disease, Neurodegenerative disorder, Machine learning, Xception architecture, Early detection, Diagnosis, Spiral and wave drawings, Clinical practice, Image classification, Convolutional neural networks, Depthwise separable convolutions, Inception modules, Model performance

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Brain Stroke Prediction: A Comparative Analysis of XGBoost, LightGBM, CNN and CNN-LSTM Algorithms

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02050

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02050

  Register Paper ID - 259737

  Title: BRAIN STROKE PREDICTION: A COMPARATIVE ANALYSIS OF XGBOOST, LIGHTGBM, CNN AND CNN-LSTM ALGORITHMS

  Author Name(s): Dr.Varalatchoumy M, Dr. Buddesab, G Deepak, Avanish S Velidi, Chaitanya D,Suhas M

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 360-367

 Year: May 2024

 Downloads: 158

 Abstract

This study provides an in-depth examination of sophisticated machine learning techniques for predicting brain strokes using the Healthcare Dataset Stroke Data. Brain stroke prediction is a critical task in healthcare, having the capacity to greatly enhance patient outcomes via early identification and intervention. In this study, We evaluate the effectiveness of four cutting-edge algorithms: Convolution-Based Neural network(CNN), CNN with Long Short-Term Memory (CNN-LSTM) architecture, XGBoost, and LightGBM. We evaluate these algorithms based on their predictive accuracy, sensitivity, specificity, and computational efficiency. Our research clarifies the advantages and disadvantages of each algorithm in the context of brain stroke prediction, providing valuable insights for healthcare practitioners and researchers seeking to leverage machine learning for early stroke detection. This dataset is used to predict whether a patient is likely to get stroke based on the input parameters like gender, age, and various diseases and smoking status. A subset of the original train data is taken using the filtering method for ML and Data Visualization purposes.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Brain stroke prediction, XGBoost, LightGBM, Convolution neural networks (CNN), CNN-LSTM, Early stroke detection, Data visualization, healthcare stroke dataset.

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Battery Thermal Management in EV Using AI

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02049

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02049

  Register Paper ID - 259736

  Title: BATTERY THERMAL MANAGEMENT IN EV USING AI

  Author Name(s): Prof. Syed hayath, Harsha Vardhan J, Himesh Badiger, Hitesh S, Lavaneeth A Ganji

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 353-359

 Year: May 2024

 Downloads: 172

 Abstract

The increasing popularity of the electric vehicles(EVs) has spurred the need for best battery thermal management systems to ensure optimal performance, longevity, and safety of energy storage systems. It focuses on leveraging Artificial Intelligence (AI) technologies, specifically the Multilayer Perceptron (MLP) algorithm, to enhance the efficiency of battery thermal management in EVs. I algorithms, such as MLP,offers the potential to model and predict the thermal behavior of batteries more accurately, allowing for real- time adjustments and improved control strategies. With the large-scale commercialization and growing market share of electric vehicles (EVs). Their focus has been on higher energy efficiency, an improved thermal performance, and optimized multi- material battery enclosure designs. The combination of simulation-based design optimize the battery pack and Battery Management-System (BMS) is evolving and has expanded to include novelties such as artificialintelligence/machine learning (AI/ML) to improveefficiencies in design, manufacturing, and operations for their application in EVs and energy storage systems. Specific to BMS, these advanced concepts enable a more accurate prediction of battery performance such as its State of Health(SOH), State of Charge(SOC), and State of Power(SOP). This study presents a comprehensive evaluation of the latest developments and technologies in battery design, thermal management, and the applicationof AI in Battery Management Systems(BMS) for electric vehicles (EVs).


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Battery Thermal Management in EV Using AI

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: Fingerprint Spoof Detection using Convolutional Neural Networks

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02048

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02048

  Register Paper ID - 259732

  Title: FINGERPRINT SPOOF DETECTION USING CONVOLUTIONAL NEURAL NETWORKS

  Author Name(s): Shivaram A M, Sharath Gowda P, Shivakumar V, K Prajwal, Susheel Kumar S K

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 348-352

 Year: May 2024

 Downloads: 149

 Abstract

With the growing use of authentication systems in the recent years, fingerprint spoof detection has become increasingly important. In this model, we use Convolutional Neural Networks (CNN) for fingerprint spoof detection. Our system is trained on the datasets used in The Liveness Detection Competition of years 2009, 2011 and 2013, which comprise almost 50,000 real and fake fingerprints images. The CNN is pre-trained on natural images and fine-tuned with the fingerprint images, CCN with random weights, and a classical Local Binary Pattern approach. The project shows that pretrained CNNs can yield state-of-the-art results with no need for architecture or hyperparameter selection. Dataset Augmentation is used to increase the classifiers performance, not only for deep architectures but also for shallow ones. We also report good accuracy on very small training sets (400 samples) using these large pre-trained networks. The model achieves an overall rate of 97.1% of correctly classified samples - a relative improvement of 16% in test error when compared with the best previously published results


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

Fingerprint recognition, Feature extraction, Convolutional neural network

  License

Creative Commons Attribution 4.0 and The Open Definition

  Paper Title: CONVERTING PODCAST EPISODES INTO TEXT FORMAT AND SUMMARIZING THEM

  Publisher Journal Name: IJCRT

  DOI Member: 10.6084/m9.doi.one.IJCRTAB02047

  Your Paper Publication Details:

  Published Paper ID: - IJCRTAB02047

  Register Paper ID - 259730

  Title: CONVERTING PODCAST EPISODES INTO TEXT FORMAT AND SUMMARIZING THEM

  Author Name(s): Dr. Sandeep Kumar, Mr. Arun S Adiga, Mr. R N Ravi, Mr. M Hitesh, Mr. Suhas B T

 Publisher Journal name: IJCRT

 Volume: 12

 Issue: 5

 Pages: 342-347

 Year: May 2024

 Downloads: 136

 Abstract

The "Converting podcast episodes into text format and summarizing them" project aims to automate the process of summarizing podcasts, making it convenient for users to quickly grasp the key points of lengthy audio content. The process begins with data collection, where podcast episodes are gathered either as transcripts or audio files. For transcripts, preprocessing techniques are applied to clean the text data, removing unnecessary characters and tags. For audio files, speech recognition tools are employed to convert spoken words into text. The summarization techniques primarily include both extractive and abstractive methods.


Licence: creative commons attribution 4.0

  License

Creative Commons Attribution 4.0 and The Open Definition

 Keywords

CONVERTING PODCAST EPISODES INTO TEXT FORMAT AND SUMMARIZING THEM

  License

Creative Commons Attribution 4.0 and