ISSN Approved Journal No: 2320-2882 | Impact factor: 7.97 | ESTD Year: 2013
Scholarly open access journals, Peer-reviewed, and Refereed Journals, Impact factor 7.97 (Calculate by google scholar and Semantic Scholar | AI-Powered Research Tool) , Multidisciplinary, Monthly, Indexing in all major database & Metadata, Citation Generator, Digital Object Identifier(DOI)
Paper Title: LANDMINE DETECTION AND INTIMATION ROBOT USING GSM AND GPS TECHNOLOGY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02181
Register Paper ID - 260024
Title: LANDMINE DETECTION AND INTIMATION ROBOT USING GSM AND GPS TECHNOLOGY
Author Name(s): Prof.Hariprasad T L, Anusha T Belamkar, Farheen Fathima A, Manoj G S, Mahesh L
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1187-1191
Year: May 2024
Downloads: 156
The integration of GSM and GPS innovations permits for effective communication and exact area following, guaranteeing fast and precise reaction to recognized landmines. The real-time transmission of information empowers the base station to make educated choices and send assets successfully. Furthermore, the robot's capacity to check and cripple landmines remotely minimizes the hazard to human life included in manual demining operations. Furthermore, the Landmine Discovery and Insinuation Framework Robot's flexibility makes it appropriate for arrangement in different landscapes and situations. Its tough plan and all-terrain capabilities empower it to work in challenging conditions, counting unpleasant territory and unfavourable climate. This flexibility upgrades its viability in recognizing and neutralizing landmines in different geological areas, making it a profitable device for mine clearance operations around the world.
Licence: creative commons attribution 4.0
Intimation system, Metal detectors, Base station, Versatility, All-terrain capabilities.
Paper Title: MULTIPURPOSE NIGHT PATROL AND RESCUE ROBOT USING IoT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02180
Register Paper ID - 260023
Title: MULTIPURPOSE NIGHT PATROL AND RESCUE ROBOT USING IOT
Author Name(s): Prof Ravi Kumar M, Preethi T, Harshitha M, Harshitha R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1181-1186
Year: May 2024
Downloads: 131
This paper aims to develop a multi-purpose surveillance robot to perform surveillance activities in industrial areas, militarized war zones or radioactive field areas with the objective of analyzing, governing and protecting the areas from unwanted threats. The use of robots and their role in our day-to-day life has been rapidly increasing since the day they were introduced to the world, further reducing the errors and life risk to humans. The objective is to design and develop an Internet of Things (IoT) based autonomous multi-purpose surveillance robot at a low cost that will roam around freely and give live updates about their surroundings by broadcasting video and information through the sensors installed. The sensors collect the data from the surroundings and send it to the Arduino microcontroller which can be seen by the user any time. This technology is controlled by the user remotely through any device such as mobile phone, tablet or laptop with the help of IoT based services. The entire project is built and monitored by wireless platform to minimalize the use of wire and help it work smoothly in remote places. Further improvements and advancements in this project can help in reducing life risk of valuable soldiers or identification of any hostage in unknown places.
Licence: creative commons attribution 4.0
Arduino,IoT,multipurpose,Blynk
Paper Title: ANIMAL DETECTION IN TRAFFIC USING YOLO ALGORITHM ON RASPBERRY PI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02179
Register Paper ID - 260022
Title: ANIMAL DETECTION IN TRAFFIC USING YOLO ALGORITHM ON RASPBERRY PI
Author Name(s): Dr.Shobha S, Prathamesh More, Saniya R, Prajwal, Rakshitha S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1174-1180
Year: May 2024
Downloads: 166
This project aims to develop an animal detection system for traffic monitoring using the YOLO (You Only Look Once) algorithm deployed on a Raspberry Pi. The system utilizes a pre-trained YOLO model to detect animals in real-time video streams captured by a camera module or USB webcam connected to the Raspberry Pi. Through a series of steps including setting up the Raspberry Pi, installing dependencies, configuring YOLO, writing detection code, optimizing for the Raspberry Pi's limited computational resources, and testing in controlled and real-world environments, the project aims to create an efficient and accurate solution for detecting animals in traffic scenarios. The system's implementation considers ethical implications, robustness against varying conditions, and documentation for future reference and dissemination.
Licence: creative commons attribution 4.0
Raspberry PI, YOLO, Animal Detection, Deep Learning
Paper Title: A COMPREHENSIVE REVIEW ON SOLAR WEATHER AND POLLUTION TRANSMITTER USING BUOY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02178
Register Paper ID - 260020
Title: A COMPREHENSIVE REVIEW ON SOLAR WEATHER AND POLLUTION TRANSMITTER USING BUOY
Author Name(s): Sneh Rachna, Prem Kumar M, Aruna S, Nanditha S, Mohan S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1167-1173
Year: May 2024
Downloads: 151
In this project, we propose to design and build a buoy-based environmental monitoring system that runs on solar power and can measure aquatic environments' water quality indicators as well as meteorological conditions. A microcontroller, a wireless transmitter, weather sensors, water quality sensors, and solar panels are all integrated into the system on a buoy platform. The system is continuously powered by solar panels, which guarantees independent functioning and reduces the need for regular battery changes. While water quality sensors keep an eye on things like pH, dissolved oxygen, turbidity, and certain impurities in the water, weather sensors measure things like temperature, humidity, air pressure, wind speed, and wind direction. A microcontroller organizes data transmission via a wireless transmitter, interprets sensor data, and manages power. For real-time processing, the gathered data is sent to a distant station or server.
Licence: creative commons attribution 4.0
Microcontroller, Water Quality Sensors, Solar Panel Integration, Enclosure Aesthetics
Paper Title: SMART TEXTILES FOR HEALTHCARE MONITORING SYSTEM USING ARDUINO
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02177
Register Paper ID - 260019
Title: SMART TEXTILES FOR HEALTHCARE MONITORING SYSTEM USING ARDUINO
Author Name(s): Jayaprakash.S, Rashmitha Reddy R, Rachana N S, Priya S, Lekha P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1161-1166
Year: May 2024
Downloads: 139
A form-fitting textile contains an electrocardiography SoC, flexible electrodes, battery, and antenna. The clinical standard ECG, a 3-lead, is recorded by this "smart shirt". The data is safely sent wirelessly, using less than lmW and a flexible antenna and on-chip ISM band radio to provide secure, continuous cardiac monitoring on a smartphone. A practical and non-invasive method of tracking vital signs and identifying different health markers is provided by smart textiles, which have emerged as a viable solution for continuous healthcare monitoring. The latest developments in smart textile technology for heath monitoring are examined in this paper. It talks about how textiles can be equipped with sensors and actuators to monitor physiological data like respiration rate in real time. The study also looks at the difficulties in designing smart textiles, such as washability, comfort, and durability, and it presents creative solutions to these problems. Since the 3-lead ECG sensor measures heart rate by varying our muscle movements without interfering with the user's daily activities, this project creates a painless way for the body to sense the heart rate through the three contacts points that sense high muscle movements. The t-shirt's embedded connections produce a heart rate, display the current electrocardiogram (ECG) condition, and sound a buzzer to alert the wearer to various situations.
Licence: creative commons attribution 4.0
Electrocardiography (ECG), System-on-Chip (SoC), Flexible electrodes, 12-lead ECG, ISM band radio.
Paper Title: Analysis of Power Performance of Class E Amplifier for High Frequency Radio Applications
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02176
Register Paper ID - 260017
Title: ANALYSIS OF POWER PERFORMANCE OF CLASS E AMPLIFIER FOR HIGH FREQUENCY RADIO APPLICATIONS
Author Name(s): Chaithra S, Nithya Priya, Pragna Vedi, Spoorthy M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1154-1160
Year: May 2024
Downloads: 156
We present a fully integrated single-stage power amplifier operating. Among all non-linear power amplifier classes, the class-E power amplifier stands out for its simplicity and high efficiency. In order to create the suggested power amplifier at 1.8V, this class was selected. Using the same transistors at the same frequency and output power, class-E amplifiers often operate with power losses that are around 2.3 lower than those of traditional class-B or class-C amplifiers. Because of the input waveform's strong driving, the common source transistor functions as a basic switch when in use. As long as the cascode bias voltage Vb is high enough to place transistor M2 in the triode region, the voltage can rise to a point where the common gate transistor is also switched. This configuration improves the amplifier's dependability by allowing for less swing in the drain-gate voltage. Our solution improves gain, bandwidth stability, and linearity over the operational spectrum by utilizing an inductively degraded common-source CMOS power amplifier in conjunction with a cascode topology. While noise figure typically holds less relevance in power amplifier design, we optimize the matching network to minimize noise figure and maximize power gain The suggested circuit has been successfully designed and implemented using Cadence Virtuoso tools at 45nm, 90nm & 180nm technology. This paper depicts a comparison of power of the RF Amplifier of Class E with respect to 180nm technology with the referenced paper[1] where the power consumption is observed as 10.69mWatts for 180nm where in our paper power consumption is reduced to 3.669uWatts.
Licence: creative commons attribution 4.0
CMOS (Complementary Metal Oxide Semiconductor), RF Amplifier (Radio Frequency Amplifier), SNR (Signal to noise ratio), comparison, performance evaluation
Paper Title: AQUATIC WASTE REMOVAL ROBOT USING NIR SENSOR AND RASPBERRY PI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02175
Register Paper ID - 260016
Title: AQUATIC WASTE REMOVAL ROBOT USING NIR SENSOR AND RASPBERRY PI
Author Name(s): Prof Srinivasalu G, Gangothri M, Poojashree M, Manoj M Sangam, Shrujan M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1149-1153
Year: May 2024
Downloads: 157
This work presents an Aquatic Waste Cleaning Robot (AWRR) powered by a Raspberry Pi microprocessor and equipped with a near infrared (NIR) sensor. AWRR addresses the problem of water pollution with a system designed to identify and eliminate waste in water bodies. The Raspberry Pi allows real-time data processing and control, while near-infrared sensors detect waste based on spectral signatures. AWRR uses mechanical equipment to clear and locate debris and navigate waterways. Today's technology offers effective methods for wastewater management and can be used in many areas.
Licence: creative commons attribution 4.0
Trash management, intelligent trash, robotic lake cleaning, Raspberry Pi, and smart cities
Paper Title: IOT BASED TRANSMISSION LINE FAULT DETECTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02174
Register Paper ID - 260015
Title: IOT BASED TRANSMISSION LINE FAULT DETECTION
Author Name(s): Shakila D, Kusuma N, Komala M C, Meena A,, Monica R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1143-1148
Year: May 2024
Downloads: 148
This paper presents a comprehensive solution for fault detection in three-phase transmission lines utilizing ESP8266, a microcontroller-based platform, in conjunction with a GSM module for remote communication. Transmission line faults pose significant challenges to power system reliability and require swift detection and response mechanisms to minimize downtime and ensure uninterrupted power supply. Upon fault detection, the ESP8266 triggers the GSM module to transmit fault information to a central monitoring station or the person who is controlling the system, enabling remote monitoring and swift response to faults. Experimental results demonstrate the effectiveness and reliability of the proposed ESP8266 and GSM module-based fault detection system, highlighting its potential for deployment in real-world power distribution networks to enhance fault management and system resilience
Licence: creative commons attribution 4.0
Transmission network, Three phase fault location, ESP8266, GSM
Paper Title: VEHICLE SECURITY SYSTEM FOR ACCIDENT DETECTION, THEFT PREVENTION AND ENGINE LOCKING MECHANISM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02173
Register Paper ID - 260014
Title: VEHICLE SECURITY SYSTEM FOR ACCIDENT DETECTION, THEFT PREVENTION AND ENGINE LOCKING MECHANISM
Author Name(s): Dr. Shivananda, Darshan D M, Harish G, Vinay Kumar M, Madhu kumar N
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1136-1142
Year: May 2024
Downloads: 156
In today's fast-paced world, the safety and security of cars is critical. These issues are intended to be fully addressed by the Vehicle Security System for Accident Detection, Theft Prevention, and Engine Locking Mechanism project. This ground-breaking solution makes use of cutting-edge technology to lock the engine, stop theft, and identify accidents, giving car owners peace of mind and improving road safety in general. Modern sensors and clever algorithms are incorporated into the system to detect accidents in real-time, allowing for prompt aid and response. Strong anti-theft features, such as GPS tracking and immobilization systems, also protect the car from unwanted access and theft attempts.
Licence: creative commons attribution 4.0
Vehicle Security System, Accident Detection, Theft Prevention, Engine Locking Mechanism, Automotive Safety, Anti-Theft Technology, Vehicle Alarm System, GPS Tracking, Remote Locking, Collision Sensing
Paper Title: THE DESIGN AND VERIFICATION OF A 32-BIT RISC V PROCESSOR USING VEDIC MATHEMATICS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02172
Register Paper ID - 260013
Title: THE DESIGN AND VERIFICATION OF A 32-BIT RISC V PROCESSOR USING VEDIC MATHEMATICS
Author Name(s): Girish H, Vajjala Sai Sree Hari, Ponde Lakshmi Narasimha, P N Shreya, Dadigala Bhargavi
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1130-1135
Year: May 2024
Downloads: 170
Vedic multiplier architecture is used in the construction of a 32-bit RISC V processor to improve speed and decrease computational complexity. Its Vedic Sutra-based ALU and MAC units, which are implemented in Verilog HDL and simulated using the Xilinx design suite, lower power consumption and latency as compared to traditional architectures. Comprising of conventional components such as Control Unit, Register Bank, Programme Counter and Memory. The processor can carry out up to 16 instructions. It is an effective option for a variety of computer jobs since it provides increased speed, decreased power consumption, and reduced area utilisation.
Licence: creative commons attribution 4.0
Reduced Instruction Set Computer, Von Neumann architecture, Verilog HDL, Vedic Mathematics, Urdhva-Tiryagbhyam Sutra.
Paper Title: AUTOMATIC MONITORING GADGET FOR BLOOD PRESSURE IN EXPECTING MOMS USING SUPINE PRESSOR EXAMINATIONS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02171
Register Paper ID - 260012
Title: AUTOMATIC MONITORING GADGET FOR BLOOD PRESSURE IN EXPECTING MOMS USING SUPINE PRESSOR EXAMINATIONS
Author Name(s): Dr.G.Indumathi, Dr. Cyril Prasanna Raj. P, Dr. A. Chrispin Jiji, Shirisha GP, Sharada P, Spandana KJ, Usha SM
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1125-1129
Year: May 2024
Downloads: 140
Although prior research has frequently disregarded the effects of the pregnant uterus's mechanical constriction of the left renal vein, preeclampsia poses major health hazards to both mothers and infants. This work used two different approaches: first, it investigated the relationship between elevated blood pressure and renal damage and constriction of the left renal vein in mice. Secondly, it developed an automated version of the supine pressor test (SPT) to help pregnant women determine their preeclampsia risk. The results of the study conducted on mice suggested that acute renal failure and a considerable rise in blood pressure could be brought on by persistent renal vein stenosis. From a human perspective, the research noted that when non-pregnant women switched from sleeping on their left side to resting on their back, proving that expectant mothers were capable of doing the SPT on their own. In conclusion, this study provides a promising technique for the early diagnosis of preeclampsia in pregnant women and illuminates possible underpinnings of the condition.
Licence: creative commons attribution 4.0
Supine Pressor test, Mechanical compression, Renal necrosis, Blood pressure increase, Renal vein constriction, Preeclampsia, Early diagnosis
Paper Title: ASIC IMPLEMENTATION OF RV32IMAC RISC- V SOC
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02170
Register Paper ID - 260011
Title: ASIC IMPLEMENTATION OF RV32IMAC RISC- V SOC
Author Name(s): Dr.Cyril Prasanna Raj P, Divya R, Geetha V, Aishwarya K R, Mahalakshmi H
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1120-1124
Year: May 2024
Downloads: 155
This paper delves into the ASIC implementation of an RV32IMAC RISC-V System-on-Chip (SoC), focusing on its adaptation for diverse surveillance applications. By harnessing the capabilities of RISC-V architecture, the SoC is designed to offer a flexible and efficient platform for surveillance tasks in varied environments, including industrial sectors, war zones, and radioactive fields. Through meticulous architectural design and optimization strategies, the SoC achieves a balance between performance, power efficiency, and cost-effectiveness. Notably, it integrates specialized instructions tailored for surveillance operations, alongside robust support for sensor integration and real-time data processing. Furthermore, the SoC's implementation leverages advanced techniques to ensure reliability, scalability, and compatibility with emerging surveillance systems. With its ability to handle complex tasks autonomously and facilitate seamless communication via IoT-based services, the ASIC implementation of the RV32IMAC RISC-V SoC represents a significant advancement in the realm of surveillance technology, promising enhanced situational awareness and threat mitigation capabilities.
Licence: creative commons attribution 4.0
RV32IMAC RISC-V System-on-Chip (SoC ), cost-effectiveness
Paper Title: FPGA BASED HOME AUTOMATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02169
Register Paper ID - 260010
Title: FPGA BASED HOME AUTOMATION
Author Name(s): Praveen Kumar KC, Mansi Sharma, Krithi R, U Rajendra, D Bharadwaj
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1115-1119
Year: May 2024
Downloads: 141
Focusing on FPGA-based home automation with the Basys 3 board, this project integrates sensors for temperature monitoring, door status detection, and remote-controlled operation of an LCD projector. Verilog programming facilitates real-time temperature monitoring, activating fans as necessary. Reed sensors detect door openings, automatically triggering light activation for enhanced convenience and security. Through FPGA control, users can remotely operate the LCD projector, enhancing home entertainment system flexibility and accessibility.
Licence: creative commons attribution 4.0
Home automation, FPGA board, Verilog, security
Paper Title: Hardware Accelerator for Ground Penetrating Radar
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02168
Register Paper ID - 260009
Title: HARDWARE ACCELERATOR FOR GROUND PENETRATING RADAR
Author Name(s): Dr. Cyril Prasannaraj P, Prof. Ravikumar M, Raghavendra P, Sachin C, Sachin P V, Sagar H P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1106-1114
Year: May 2024
Downloads: 158
Ground penetrating radar (GPR) image recognition accuracy and efficiency have been greatly enhanced by deep learning. A significant number of weight parameters must be specified, which requires lots of labeled GPR images. However, obtaining the ground-truth subsurface distress labels is challenging as they are invisible. The traditional data augmentation techniques, like rotating, scaling, cropping, and flipping, would change the GPR signals' real features and cause the model's poor generalization ability. When the annotated training GPR pictures are not enough, the datasets can be expanded using the suggested data augmentation techniques. When there are not enough annotated training GPR pictures, the datasets can be expanded using the suggested data augmentation techniques.
Licence: creative commons attribution 4.0
GPR (Ground penetrating radar),GPR signal, GPR picture
Paper Title: IMPLEMENTATION OF DYNAMIC CAR CHARGING USING IOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02167
Register Paper ID - 260008
Title: IMPLEMENTATION OF DYNAMIC CAR CHARGING USING IOT
Author Name(s): Dr. Sudha M S, Gagan Reddy H L, Goutham M, Naveen K, Ajay N
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1099-1105
Year: May 2024
Downloads: 137
This article integrates a subscription-based strategy with a revolutionary technique to wireless dynamic car charging (WDCC). The system's seamless charging capabilities while vehicles are in motion are intended to meet the growing demand for effective electric vehicle (EV) charging infrastructure. The suggested approach does away with the requirement for conventional plug-in charging stations by wirelessly transferring electricity to EVs via inductive charging technology embedded in highways. Users can use the WDCC service through a subscription-based approach, which eliminates the burden of human intervention and enables convenient and ongoing payment. In addition to guaranteeing income creation for service providers, the subscription model gives EV owners freedom and cost. The suggested WDCC system's technical features, advantages, difficulties, and possible implementation methods are all covered in this study.
Licence: creative commons attribution 4.0
Wireless dynamic car charging (WDCC), Subscription-based model, Electric vehicles, Inductive charging technology
Paper Title: SECURITY SYSTEM USING IRIS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02166
Register Paper ID - 260007
Title: SECURITY SYSTEM USING IRIS
Author Name(s): Dr. C Usha, Chandan B K, Bharath Kumar M, Dhanush B M, Sunil M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1092-1098
Year: May 2024
Downloads: 167
Graphical password authentication methods have garnered attention as an alternative to traditional text-based passwords, aiming to improve both security and usability. Nonetheless, numerous existing graphical password systems encounter usability challenges, such as poor memorability and susceptibility to various attacks. In this study, we introduce an innovative graphical password authentication approach intended to mitigate these usability issues while upholding security standards. Our approach incorporates both image recognition and user-generated patterns to establish a multi-layered authentication framework. Initially, users select a memorable image from a predefined array of categories and subsequently overlay a personalized pattern onto the chosen image. We integrate advanced image processing techniques to bolster resistance against shoulder surfing and other potential attacks. Furthermore, we conducted a usability assessment involving a diverse participant pool to evaluate the efficacy of our proposed approach. The findings indicate noteworthy enhancements in memorability and user satisfaction when compared to existing graphical password systems. In summary, our approach presents a promising avenue for enhancing the usability of graphical passwords while maintaining robust security measures
Licence: creative commons attribution 4.0
SECURITY SYSTEM USING IRIS
Paper Title: SELF-NAVIGATION ROBOTICS:MASTERING AUTONOMOUS PATH
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02165
Register Paper ID - 260003
Title: SELF-NAVIGATION ROBOTICS:MASTERING AUTONOMOUS PATH
Author Name(s): Shyam Sundar V, Gangadasu Swetha, Darshan M R, Chandan K Singh, Chandana H C
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1085-1091
Year: May 2024
Downloads: 163
The goal of the project "Self-Navigation Robotics: Mastering Autonomous Path" is to create an intelligent robot car that can drive itself from a starting point to a user-specified destination while dynamically changing its course to avoid obstacles in real time. In order to accomplish flawless autonomous navigation in challenging surroundings, the project blends a powerful combination of sensor technologies, innovative algorithms, and hardware components. This study presents a unique camera module, LiDAR, ROS2, Gazebo, and Raspberry Pi self-navigating vehicle system. LiDAR enables accurate 3D mapping and obstacle recognition, while ROS2 provides seamless system integration and communication. Gazebo provides a reliable simulation environment for verifying system functionality prior to a system being physically deployed. The Raspberry Pi functions as the main processing unit, managing decision-making algorithms and combining sensor data. The camera module improves versatility in a range of circumstances by enhancing perception with visual signals in addition to LiDAR. More advancements are possible when the system architecture prioritizes scalability and real-time responsiveness. Experimental validation the system's autonomous navigation competency highlights its potential for robotics research and industrial automation applications.
Licence: creative commons attribution 4.0
Self-navigating automotive system, Camera module, LiDAR, ROS2, Gazebo, Raspberry Pi, 3D mapping, Obstacle identification, Simulation, Central computing unit, Sensor data fusion, Real-time responsiveness
Paper Title: SMART SERICULTURE USING IMAGE PROCESSING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02164
Register Paper ID - 260002
Title: SMART SERICULTURE USING IMAGE PROCESSING
Author Name(s): Nandini Kumari B, Raju, M Shivateja Goud, R Varun Reddy, Chandrashekar CH
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1080-1084
Year: May 2024
Downloads: 232
In this paper, Sericulture involves raising silkworms to produce silk and is crucial for India's development. Temperature and humidity are vital for healthy silkworm growth. We used a MEGA controller to monitor silkworms in real-time. Image processing helps identify infections of silkworms. The MEGA controller automates tasks like temperature control, reducing manual work for farmers. It also monitors the environment in the silkworm rearing room. Image processing detects color changes in silkworms, indicating the infections.
Licence: creative commons attribution 4.0
SMART SERICULTURE USING IMAGE PROCESSING
Paper Title: CAMOUFLAGE ROBOT FOR ADVANCED MILITARY APPLICATIONS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02163
Register Paper ID - 260001
Title: CAMOUFLAGE ROBOT FOR ADVANCED MILITARY APPLICATIONS
Author Name(s): Dr. Shivapanchakshari T G, Prajwal C, Shashank M, Harshavardhan M, D Lava Kumar
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1075-1079
Year: May 2024
Downloads: 175
In contemporary times, significant resources are allocated towards implementing antiquated security measures to deter border trespassers. In high-risk areas where conventional military tactics may falter, various military entities employ robotic assistance. These military-grade robots are clandestinely deployed and outfitted with a suite of technologies including cameras, sensors, metal detectors, and camouflage. The primary objective of our system is to seamlessly blend into the surrounding environment, while also boasting additional functionalities such as an infrared sensor for intruder tracking and Wi-Fi connectivity for real-time data processing. Consequently, the proposed Wi-Fi system minimizes errors in defense operations, thereby bolstering national security against potential intruders.
Licence: creative commons attribution 4.0
Blending into environment, Military-grade Robots, IR (Infrared), WI-FI (wireless fidelity)
Paper Title: 3-DIMENSIONAL SCANNER USING ARDUINO
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02162
Register Paper ID - 260000
Title: 3-DIMENSIONAL SCANNER USING ARDUINO
Author Name(s): Dr. C. Usha, Karanam Vengal Naidu, Harsha Gowda S N, Surendra Reddy B, Goutham B H
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1069-1074
Year: May 2024
Downloads: 231
This project outlines a cost-effective 3D scanning solution utilizing Arduino Nano technology. It utilizes structured light to capture the geometry of objects. The hardware setup comprises an Arduino Nano microcontroller, a camera module, and a laser module for structured light projection. Software-wise, it employs an open-source computer vision library for image processing and depth map generation. The workflow involves system calibration to ensure optimal performance and accuracy. Once calibrated, the structured light pattern is projected onto the object, and images are captured by the camera. These images are then processed to extract depth information, enabling the reconstruction of the object's 3D model. The resulting point cloud data can be refined further for improved accuracy. To evaluate the scanner's performance, experiments are conducted with objects of various shapes and sizes. Metrics such as accuracy, resolution, and scanning speed are analysed to gauge its practical usability. Overall, the developed 3D scanner demonstrates its ability to generate detailed and accurate 3D models, making it suitable for applications like rapid prototyping, reverse engineering, and educational purposes.
Licence: creative commons attribution 4.0
Low-cost 3D scanner, Arduino Nano microcontroller, Rapid prototyping, Calibration for optimal performance.
Paper Title: A Review on Design of Low Power and High Speed ALU using FinFET and CMOS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02161
Register Paper ID - 259999
Title: A REVIEW ON DESIGN OF LOW POWER AND HIGH SPEED ALU USING FINFET AND CMOS
Author Name(s): Veerappa Chikkagoudar, K N Harishankar, Parikshith K, Pavan Sharma V, Sam A I
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1065-1068
Year: May 2024
Downloads: 151
This paper shows a comparison of power requirement and delay consumed between the 4 - bit ALU that is designed using a fin-shaped field-effect transistor [FinFET] and the traditional CMOS to demonstrate a better and efficient 4 - bit ALU in terms of delay and power consumption. The aim of this work is provide a Comparative Analysis of Arithmetic Logic Unit (ALU) Performance using CMOS and FinFET Technologies. ALU is a fundamental component in digital circuits, performing arithmetic and logic operations. The transition from CMOS to FinFET technology has brought significant advancements in terms of power efficiency, speed, and scalability.
Licence: creative commons attribution 4.0
ALU (Arithmetic Logic Unit), CMOS (Complementary Metal Oxide Semiconductor), FinFET (Fin Field Effect Transistor), technology, comparison, performance evaluation
Paper Title: WEATHER WIZARDS USING MACHINE LEARNING AND RASPBERRY Pi
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02160
Register Paper ID - 259997
Title: WEATHER WIZARDS USING MACHINE LEARNING AND RASPBERRY PI
Author Name(s): Ravikumar M, Mouna S J, Modak Vignesh R, Likitha C K, K Deepa
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1060-1064
Year: May 2024
Downloads: 159
By combining cutting-edge sensors and machine learning on Raspberry Pi, the "Weather Wizards using Machine Learning and Raspberry Pi" initiative transforms weather forecasting. By implementing Random Forest algorithm we record temperature, humidity, precipitation, wind speed using four sensors namely (wind, temperature, humidity, rain) . We deliver real-time forecasts for sunny, cloudy, windy, and rainy days .This ground-breaking system represents a huge advancement in weather prediction, serving applications and businesses that depend on accurate and fast weather data
Licence: creative commons attribution 4.0
Weather Forecasting, Machine Learning, Raspberry Pi, Real-Time data, Sensors.
Paper Title: LINEAR MICROSTRIP ANTENNA ARRAY FOR 5G COMMUNICATION APPLICATIONS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02159
Register Paper ID - 259996
Title: LINEAR MICROSTRIP ANTENNA ARRAY FOR 5G COMMUNICATION APPLICATIONS
Author Name(s): Tharun Tej D, Dr. Shivapanchakshari T G, Virupaksha G R, Shivakeerthi B T, Suhas S B
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1053-1059
Year: May 2024
Downloads: 122
In the world of wireless communication, there is an increasing demand for high-performance MIMO (Multiple Input Multiple Output) antenna systems tailored for smartphone applications. MIMO technology increases data rates, coverage, and reliability by using multiple antennas for transmission and reception. However, integrating MIMO antennas within the constraints of compact smartphone designs is fraught with difficulties, particularly in terms of guaranteeing adequate isolation between antenna parts to minimize interference. This work investigates the design and implementation of a MIMO antenna system specifically designed for smartphone applications in order to establish and maintain excellent isolation between antenna sections. Many design strategies are investigated, including better materials, decoupling techniques, and antenna element placement. In addition, recent advances in the fields of metamaterials, smartphone form factor integration, and micro antenna designs are discussed. Furthermore, the study addresses performance metrics including data throughput, power economy, and dependability, providing an understanding of the practical uses of these advancements. This paper's main objective is to promote MIMO antenna systems for smartphones by offering a comprehensive grasp of the challenges, solutions, and most recent developments in achieving high isolation within small form factors.
Licence: creative commons attribution 4.0
Smartphone applications, High isolation.
Paper Title: HUMAN FOLLOWING ROBO USING RASPBERRY PI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02158
Register Paper ID - 259995
Title: HUMAN FOLLOWING ROBO USING RASPBERRY PI
Author Name(s): Prof Roopa M, Ganadheeraj R, Jaywanth G, Padmashree R, Gayatri V K
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1047-1052
Year: May 2024
Downloads: 148
This paper presents and focuses on the design and development of a A Human Following Robo (HFR) is a technology that can follow a human operator in an autonomous manner. Maintaining a constant distance and orientation in relation to the human operator is the major goal of the HFR. while navigating through indoor and outdoor environments. Key components of the system include computer vision for people recognition and tracking, obstacle avoidance mechanisms, and motion control strategies. The effectiveness of the proposed HFR system is evaluated through extensive simulations and real world experiments, demonstrating Its capacity to accurately track and follow a human operator in various scenarios. The results highlight the potential of HFRs as versatile and intelligent robotic assistants capable of enhancing human-machine interaction and productivity in diverse applications. The development of Human Following Robots (HFRs) represents a significant advancement in robotics technology, offering the potential to revolutionize various industries such as surveillance, healthcare, and entertainment. These robots are designed to autonomously track and follow human operators, facilitating seamless human-robot interaction and enhancing productivity in dynamic environments. This paper aims to explore the design, development, and evaluation of an HFR system capable of intelligently tracking and following a human operator. By leveraging a combination of sensors, actuators, and control algorithms, the HFR system enables intuitive and efficient navigation while maintaining a safe and consistent distance from the human operator.
Licence: creative commons attribution 4.0
Human Following Robo (HFR), Obstacle Avoidance, Object detection, Burning source code to processor
Paper Title: IMPLEMENTATION OF CONTROLLABLE NETMOVER ARM FOR LIFTING AND PLACING THE OBJECTS USING WIRELESS MODE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02157
Register Paper ID - 259994
Title: IMPLEMENTATION OF CONTROLLABLE NETMOVER ARM FOR LIFTING AND PLACING THE OBJECTS USING WIRELESS MODE
Author Name(s): Lokesha A M, Akshay Kashyap S, Arun Kumar, Chethan Gowda V N, Dileep Kumar N
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1042-1046
Year: May 2024
Downloads: 158
This paper focuses on the development of a versatile robotic arm with advanced functionalities, aiming to enhance automation in diverse industries. Integrating precision engineering and smart control systems, the robotic arm demonstrates agility and adaptability for various tasks, such as assembly, pick-and-place operations, and intricate manipulations. Employing state-of-the-art sensors and machine learning algorithms, the system ensures optimal performance and safety. This project contributes to the evolution of robotic technology, addressing real-world challenges and fostering efficiency in industrial processes. Developing a cutting-edge robotic arm is the primary objective of this project, aimed at revolutionizing automation across industries. Leveraging advanced materials and sophisticated control algorithms, the robotic arm exhibits unparalleled precision and adaptability. Integrating innovative sensing technologies and machine learning, it excels in complex tasks, offering a transformative solution for assembly lines, manufacturing, and research applications. This project underscores the pivotal role of robotics in shaping the future of automation, showcasing a versatile and intelligent robotic arm that pushes the boundaries of technological innovation.
Licence: creative commons attribution 4.0
Robotic arm, Automation, Precision engineering, Machine learning algorithms, Industrial processes
Paper Title: WILDLIFE OBSERVATION ROBOT USING IOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02156
Register Paper ID - 259992
Title: WILDLIFE OBSERVATION ROBOT USING IOT
Author Name(s): Hariprasad T L, M Likitha, Vani S, Ganavi C S, Apoorva B M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1033-1041
Year: May 2024
Downloads: 158
Wild animals become more aggressive when wounded because they're scared and confused and may think you're trying to capitalize on their vulnerable state. They're more likely to lash out and bite or scratch you than to accept your help. To address this, our project proposes an alerting system using YOLOv3, a real- time object detection algorithm based on deep convolutional neural networks, to classify and monitor animals that are hurt in Zoo or forests. This algorithm enables efficient identification and tracking of animals, aiding safeguarding wildlife observers and ensuring the preservation of wildlife in their natural habitats.By this wildlife monitoring robotic car using IOT, wildlife observers may get up and personal with wild creatures. An ESP32 is used in this system. The system receives these orders using a Wi-Fi module. We can capture the images of the wildlife continuously. And able to detect the wildlife.We are using the MLX9061an infrared thermometer designed for non-contact temperature sensing to measure the temperature of the animals and an ultrasonic non-contact type of sensor used to measure a wildlife's distance.
Licence: creative commons attribution 4.0
Image Processing, YOLO Algorithm, Convolutional Neural Network, COCO, ESP,UNO,IDE.
Paper Title: RASPBERRY PI VIDEO SURVEILLANCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02155
Register Paper ID - 259991
Title: RASPBERRY PI VIDEO SURVEILLANCE
Author Name(s): Shakila D, Rohanth A R, Punith Kumar M S, Somesh N, Pramod Ramesh Hegde
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1027-1032
Year: May 2024
Downloads: 141
A Camera-Based Surveillance System utilizing Raspberry Pi proves highly advantageous for crime detection, monitoring various environments, and swiftly gathering evidence of illicit activities such as theft. This system is tailored for both residential and commercial spaces, ensuring prompt detection of any unauthorized actions.Operating on Raspberry Pi, equipped with a camera-based circuit, the system continuously scans its surroundings for motion. Upon detecting any motion, it promptly triggers an alert mode. This mode activates an alarm and captures images of the motion for future reference. Consequently, the system functions as an effective security measure, providing real-time monitoring and evidence collection. To further enhance its capabilities, integrating a GSM modem for alert SMS notifications or connecting to IoT for remote alarm activation can be considered. This augmentation ensures seamless communication of alerts to relevant parties, amplifying the system's effectiveness in safeguarding the monitored premises.
Licence: creative commons attribution 4.0
Raspberry Pi, GSM module, Stepper motor, webcam, PIR sensors, GPIO, Ethernet and USB
Paper Title: A COMPREHENSIVE REVIEW ON SMART AQUAPONICS SETUP WITH IoT-BASED FISH FEEDDING AND SURVEILLANCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02154
Register Paper ID - 259990
Title: A COMPREHENSIVE REVIEW ON SMART AQUAPONICS SETUP WITH IOT-BASED FISH FEEDDING AND SURVEILLANCE
Author Name(s): Dr. Lakshmi C R, Raghavendra D C, Arun Kumar D S, Madhan H R, Mahesha S M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1021-1026
Year: May 2024
Downloads: 155
This paper introduces the Aquaponics Monitoring and Fish Feeding Automation System (AMFFAS) is an innovative solution leveraging the principles of Internet of Things (IoT) technology. AMFFAS aims to improve the efficiency and sustainability of aquaponics systems by automating fish-feeding processes and providing Inspection and coordination. The system comprises interconnected components, including IoT sensors, actuators, microcontrollers, and a central control unit. FFAAMS integrates an intelligent feeding system that dynamically adjusts feeding schedules and portion sizes based on factors like fish biomass, growth rates, and environmental conditions. This approach optimizes feed utilization, minimizing the risk of overfeeding and promoting healthy fish environments. Furthermore, AMFFAS offers Inspection and coordination through a user-friendly interface accessible via web or mobile applications. Aquaponics practitioners can remotely monitor system parameters, receive alerts for abnormal conditions, and adjust settings as needed. This feature enables proactive management of aquaponics systems, ultimately contributing to heightened productivity and sustainability.
Licence: creative commons attribution 4.0
Wireless dynamic-: Aquaponics, Fish Feeding Automation, IoT, Aquaponics system efficiency, Remote Monitoring
Paper Title: IMPLEMENTATION OF UNDERGROUND CABLE FAULT DETECTION BASED ON IOT WITH GPRS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02153
Register Paper ID - 259989
Title: IMPLEMENTATION OF UNDERGROUND CABLE FAULT DETECTION BASED ON IOT WITH GPRS
Author Name(s): Abhishek M K, Dr. Sudha M S, Pavan V, Adithya R S, Akash Puzar
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1014-1020
Year: May 2024
Downloads: 161
This paper's primary goal is to use an Arduino Mega microcontroller kit and Internet of Things devices to pinpoint the precise position of a fault in an underground wire. Instead of using overhead electrical lines, the metropolitan area uses an underground electrical cable wire. However, pinpointing the exact position of a break in an underground wire can be challenging, making repairs more challenging. Because of deterioration, subterranean conditions, vermin, etc., underground wires are vulnerable to malfunctions. Since we are unsure of the precise position of the problem, the entire cable needs to be dug out for inspection and fault repair. Our suggestion is to precisely locate the problem so that it can be rectified, making the repair process easier. A fault occurs when two lines are too close together; the network combination of the resistors determines the voltage that is produced at that location. After detecting the voltage change, the microcontroller alerted the user. The user receives information regarding the precise location where that voltage coincides. With the aid of a microcontroller, the fault's information is displayed on the LCD.
Licence: creative commons attribution 4.0
Microcontroller, Internet of things, Electrical cables, Cable fault, Aurdino mega, GSM module.
Paper Title: FPGA BASED HOME AUTOMATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02152
Register Paper ID - 259988
Title: FPGA BASED HOME AUTOMATION
Author Name(s): Praveen Kumar KC, Mansi Sharma, Krithi R, U Rajendra, D Bharadwaj
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1009-1013
Year: May 2024
Downloads: 163
Centered on FPGA-based home automation utilizing the Basys 3 board, this project seamlessly integrates a suite of sensors tailored for temperature monitoring, door status detection, and remote-controlled operation of an LCD projector. Leveraging Verilog programming, the system ensures real-time temperature surveillance, with the capability to activate fans for optimal environmental control. Reed sensors are strategically deployed to detect door openings, triggering automated light activation, thus enhancing both convenience and security within the household. Empowered by FPGA control, users can remotely manipulate the lights, fans, and LCD projector, thereby augmenting the flexibility and accessibility of the home entertainment system
Licence: creative commons attribution 4.0
Home automation, FPGA board, Verilog, security
Paper Title: RC UNDER WATER EXPLORATION DRONE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02151
Register Paper ID - 259987
Title: RC UNDER WATER EXPLORATION DRONE
Author Name(s): Dr.Shivananda, Sanjay reddy NS, Aravind reddy K, Gagan G, Faraz ahmed
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 1000-1008
Year: May 2024
Downloads: 166
The project aims to develop an underwater inspection drone that can navigate easily underwater and allow us to vide live video footage underwater. The drone provides following advantages including: Easy to Navigate Underwater, 360 Degree Direction Control, Live Footage Viewing, Dual Motor Propulsion system, Lightweight and anti-rust design for long term usage. The RC drone uses 2 x motors for propulsion and a separate motor for depth/direction control. Both motors are attached with propellers to achieve this task. This mechanism makes use of a unique rudderless mechanism using motor drives to control 360 degree movement of the drone. This mechanism does not make use of ballast tanks to control buoyancy. The drone consists uses the 2 motors to provide front drive as well as for left right direction control. The 3rd motor is used to control the vertical alignment of the drone. This motor in combination with other 2 motors is used to dive in or bring up the drone. All motors and controller unit is enclosed in a water proof chamber. The drone now uses a camera to capture footages underwater. These footages are transmitted to the floating buoy unit from there user can connect via wifi to check the footages. The system makes use of a raspberry pi controller for footage transfer as well as wifi transmission. Also the buoy unit is used to pullout the drone in case it gets stuck or runs out of battery under water
Licence: creative commons attribution 4.0
ballast tanks, RC,under water, buoy unit.
Paper Title: AN EVOLUTION OF UNDERWATER VEHICLE FOR UNDERWATER COMMUNICATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02150
Register Paper ID - 259986
Title: AN EVOLUTION OF UNDERWATER VEHICLE FOR UNDERWATER COMMUNICATION
Author Name(s): Chetan Naik J, Santhosh Kumar N, Vishnu G C, Chandana K N, Vinodh R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 992-999
Year: May 2024
Downloads: 150
The literature survey on underwater unmanned vehicles (UUVs) reveals a diverse array of applications stretching across underwater exploration, defense, and various commercial implementations. The technological landscape encompasses sonar-based navigation systems, acoustic communications, and adaptive control algorithms, which propel UUVs to undertake complex missions such as seabed mapping, oceanographic research, mine countermeasures, and offshore infrastructure inspection. Defense applications include mine warfare, autonomous surveillance, and reconnaissance missions. Moreover, commercial applications comprise underwater inspection, maintenance of subsea installations, and environmental monitoring. Advanced technologies are employed in UUVs, such as autonomous underwater vehicle (AUV) designs, sensor fusion, underwater acoustic communication systems, and high-precision navigation algorithms, reflecting the interdisciplinary nature and extensive potential of UUVs in addressing a wide spectrum of underwater challenges and opportunities. This paper compares the evolution of underwater vehicle with technology and advancement for the purpose of underwater communication.
Licence: creative commons attribution 4.0
Underwater unmanned vehicle, Autonomous underwater vehicle, Underwater communication.
Paper Title: SRAM Cell Design Using FinFET for Low Power and Delay
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02149
Register Paper ID - 259985
Title: SRAM CELL DESIGN USING FINFET FOR LOW POWER AND DELAY
Author Name(s): Veerappa S C, S K Fazle Umar, Sai Dhanush R N, Syed Avaiz, Vishwa Periaswamy
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 984-991
Year: May 2024
Downloads: 164
This paper introduces an approach utilizing a fin-shaped field-effect transistor to illustrate the structure of a 6T SRAM cell. The primary goal is to enhance the presentation's competitive edge while concurrently reducing the power usage and read/write delay inherent in conventional 6T SRAM cell designs. Given the increasing demand for rapid mobile computing, traditional CMOS SRAM cell configurations face performance constraints and significant power demands. This research undertakes a thorough examination of power consumption and read/write delay parameters associated with low-power SRAM cell designs. Furthermore, an exhaustive comparative analysis is performed between 45nm nano-scaled technologies and the emerging FinFET-based 6T SRAM cells, with a particular emphasis on their respective power efficiency and operational speed characteristics.
Licence: creative commons attribution 4.0
SRAM Cell Design Using FinFET for Low Power and Delay
Paper Title: DESIGN AND OPTIMIZATION OF SERDES IN CMOS 45NM TECHNOLOGY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02148
Register Paper ID - 259984
Title: DESIGN AND OPTIMIZATION OF SERDES IN CMOS 45NM TECHNOLOGY
Author Name(s): Ravi Kumar M, Sanjai S, Shilpashree S, Shreyas N Kulal, Tinu M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 977-983
Year: May 2024
Downloads: 172
With the miniaturization of electronic devices, interconnects (the pathways for data flow) are not shrinking as fast as the devices themselves. This inefficiency leads to problems with power consumption, area usage, and signal interference (crosstalk). To address this issue, the paper explores the use of serial links, which transmit data one bit at a time, as a replacement for traditional parallel buses that send multiple bits simultaneously. Serial links offer several advantages, including fewer connection points (pins), lower power use, smaller physical connectors, and better resistance to noise. The proposed architecture is simulated using a standard CMOS technology and industry-recognized simulation tools. The simulations are set up to evaluate factors like power consumption and data processing speed (throughput) under realistic operating conditions. The paper then compares the performance of this new design with previously reported architectures, highlighting improvements in power savings, area usage, and overall functionality. By analyzing the simulation results and comparisons, the paper demonstrates the significant benefits of the proposed architecture in terms of reduced power consumption, efficient chip area utilization, and improved data processing. Finally, the paper concludes by summarizing the key findings and advancements achieved with this design.
Licence: creative commons attribution 4.0
SerDes, CDR, Serializer, De-serializer, TSPC Flip Flop.
Paper Title: SMART TRAFFIC DENSITY MANAGEMENT AND MONITORING SYSTEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02147
Register Paper ID - 259983
Title: SMART TRAFFIC DENSITY MANAGEMENT AND MONITORING SYSTEM
Author Name(s): Prof. Nanditha S R, Anusha N M, Pallavi S H, Aishwarya M, Supriya S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 971-976
Year: May 2024
Downloads: 127
This flexibility upgrades its viability in recognizing and neutralizing landmines in different geological areas, making it a profitable device for mine clearance operations around the world. With the use of cutting-edge sensors and technology, the Smart Traffic Density Management and Monitoring System maximizes urban traffic flow. By adjusting traffic lights dynamically in response to real-time density data, it minimizes traffic and travel time. It offers government and commuter interfaces that are easy to use while smoothly integrating with the current infrastructure. Reliability, scalability, and flexibility to shifting traffic conditions are guaranteed by embedded system architecture. The technology also improves safety by pointing out potential dangers and encouraging other forms of transportation during rush hour. All things considered, it's a creative way to successfully control urban traffic and promote sustainable travel.
Licence: creative commons attribution 4.0
Traffic, congestion, traffic light, vehicles
Paper Title: ANAESTHESIA BASED MACHINE CONTROL USING RASPBERRY PI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02146
Register Paper ID - 259982
Title: ANAESTHESIA BASED MACHINE CONTROL USING RASPBERRY PI
Author Name(s): Prof. Shyam Sundar V, Sumeera Sultana N, Ashwit, Tanzil Ahmed, Chaitra S V
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 966-970
Year: May 2024
Downloads: 145
This study suggests a method for using the Raspberry Pi, an inexpensive, multipurpose microprocessor, to operate anesthetic machines. In order to precisely provide anesthetic gases and vapors to patients during surgical procedures, anesthesia machines are essential medical equipment. Customization and integration with contemporary healthcare systems are frequently restricted by the proprietary hardware and software used by traditional anesthetic machines. Through the utilization of Raspberry Pi's capabilities, we offer an adaptable and economical approach to control anesthetic machines. Our system makes use of sensors to keep an eye on critical factors including oxygen content, pressure, and gas flow rates. It then provides real-time feedback to guarantee precise anesthetic delivery. By analyzing this data and modifying the machine's settings accordingly, the Raspberry Pi maximizes patient comfort and safety .Moreover, our methodology facilitates smooth integration with electronic health records
Licence: creative commons attribution 4.0
Anesthesia, Raspberry Pi, Heartrate, Temperature, SPO2, Body Wetness, infusion.
Paper Title: CRYPTOGRAPHIC HARDWARE FOR EMBEDDED SYSTEMS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02145
Register Paper ID - 259980
Title: CRYPTOGRAPHIC HARDWARE FOR EMBEDDED SYSTEMS
Author Name(s): Dr Girish H, Anusha Dixith G, Aina Saba N, Anusha K V, Chandana M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 958-965
Year: May 2024
Downloads: 142
Developing a cryptography model that can translate legible writing from common language and converse is the aim of this research. For SoC level FPGA, the AES 128-bit symmetric cryptography technique is used to avoid malware in both hardware and software. The ideal AES design with an enhanced security scheme is also described in this study. The suggested model enables pipelined reusing of the same hardware. Furthermore, suggests expanding the use of dynamic key extraction in cryptosystems to increase randomness through the addition of outer layer security. A completely automated process for creating keys framework utilizing digital biometrics is utilized to produce a 256-bit key with enhanced randomness for 32 From the provided digital biometric, pixels are randomly selected, and the values of all the selected pixels are concatenated at random to generate a 256- bit encryption key.
Licence: creative commons attribution 4.0
AES (Advanced Encryption Standard), FPGA (field programmable gate array), LUT (Look up table), Mbps (megabit per second), sub (sub bytes), shift (shift rows), mix (mix column), add (add round key).
Paper Title: SOLAR ENERGISED SOLAR PANEL CLEANING ROBOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02144
Register Paper ID - 259979
Title: SOLAR ENERGISED SOLAR PANEL CLEANING ROBOT
Author Name(s): Prof. Lokesha A. M, Madhu Singh K, R Dharshini, Srushti Sidaraddi, Sweekruthi Shetty R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 953-957
Year: May 2024
Downloads: 166
This design proposes a solar- powered robot for drawing solar panels, exercising solar energy for both power generation and drawing operations. The system integrates rechargeable batteries, a robotic platform with drawing mechanisms, and a mobile app for stoner control. It's ideal is to optimize solar panel performance by maintaining cleanliness without homemade intervention. The robot's cleaning mechanisms are designed for effectiveness and minimum panel damage. Control commands are transmitted via Bluetooth from the mobile app, enabling real- time monitoring and adaptation. The tone- sustaining power system ensures nonstop operation, suitable for remote or out- grid installations. Overall, this innovative result offers a cost-effective and sustainable approach to solar panel conservation
Licence: creative commons attribution 4.0
Arduino, Cleaning, sensors, Brushes, Bluetooth, Automation
Paper Title: GREEN CONCRETE STRENGTH CHARACTERISTICS THAT CONTRIBUTE TO SUSTAINABILITY AND ITS ENVIRONMENTALY BENIGN NATURE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02143
Register Paper ID - 259951
Title: GREEN CONCRETE STRENGTH CHARACTERISTICS THAT CONTRIBUTE TO SUSTAINABILITY AND ITS ENVIRONMENTALY BENIGN NATURE
Author Name(s): Vinay Kumar S, Shakir Ali Malik, Suchithrahas C S, Prajwal, Eshwari H S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 946-952
Year: May 2024
Downloads: 176
To fulfill the demands of globalization in the construction of buildings and infrastructure, India has recently made a significant effort in constructing the infrastructure, including expressways, power projects, and industrial structures, among other things. Concrete and cement are commonly utilized in construction and building techniques across the globe. It is necessary to switch to green concrete from Ordinary Portland Cement (OPC), since OPC uses more energy and harms the environment. In this study fly ash is used as an alternate to OPC, as fly ash has a high silicate and alumina content, it combines with an alkaline solution to form an alumino-silicate gel, which bonds the aggregate and results in high-grade concrete. The concrete mix proportioning used is M30 GRADE and activation of geo polymer concrete is done using alkaline activators such as sodium hydroxide and sodium silicate solutions, finally checking the mechanical strength properties of GPC in comparison with conventional concrete
Licence: creative commons attribution 4.0
Alkaline Activators, Durability, Fly ash, Strength.
Paper Title: MODELLING AND ANALYSIS OF STADIUM FOR A RETRACTABLE ROOF
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02142
Register Paper ID - 259950
Title: MODELLING AND ANALYSIS OF STADIUM FOR A RETRACTABLE ROOF
Author Name(s): Chandrika P, Keerthana R, Rashmi T.M, Hruthik R, Santhosh V
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 939-945
Year: May 2024
Downloads: 212
This study presents a detailed analysis of retractable roofs. The retractable roof is a versatile architectural feature designed to provide flexible shelter and climate control for various structures, such as stadiums, arenas, and outdoor spaces. This innovative technology allows for the seamless transition between open-air and covered environments, offering protection from adverse weather conditions while maintaining an open-air experience when desired. It aims at enhancing the overall spectator experience and ensuring uninterrupted gameplay, regardless of adverse weather conditions. This innovative system involves mechanized panels and sections that can be opened or closed. The length of retractable roofs increases with the demand for more flexible and light construction, and such requirements mark retractable roof structures more sensitive to wind actions. The project outlines the potential impact of this innovative solution on the sports industry and multipurpose events.
Licence: creative commons attribution 4.0
Analysis, design, modeling, roofing material, STAAD PRO, trusses, retractable, Stadium.
Paper Title: AN INNOVATIVE EXPERIMENTAL TECHNIQUE OF ADDITIVE EXTRUSION MEND FOR CRATERS IN PAVEMENT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02141
Register Paper ID - 259949
Title: AN INNOVATIVE EXPERIMENTAL TECHNIQUE OF ADDITIVE EXTRUSION MEND FOR CRATERS IN PAVEMENT
Author Name(s): Nagendra N, Murali Mohan M V, Aaqib Reyaz, K Rupesh Kumar, Betharasi Deepika, Anusha K V
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 933-938
Year: May 2024
Downloads: 175
Using lignin extract to mend craters has shown favorable results in addressing the challenges posed by pavement distresses on roads and highways. Traditional methods for repairing craters involve resource-intensive hot asphalt mixtures, resulting in temporary fixes. This project introduces an innovative approach using additive extrusion technology and lignin extracted from coconut coir for more efficient, cost-effective, and durable pavement repairs. By blending lignin with bitumen and incorporating urea formaldehyde polymer, this method helps in utilizing the full benefits of a pavement and offers a sustainable alternative to traditional materials. This eco-friendly solution not only strengthens road surfaces but also contributes to greener road maintenance practices, ensuring safer and increases the durability of pavements.
Licence: creative commons attribution 4.0
AN INNOVATIVE EXPERIMENTAL TECHNIQUE OF ADDITIVE EXTRUSION MEND FOR CRATERS IN PAVEMENT
Paper Title: DESIGN & MANUFACTURE OF POROUS CONCRETE USING SUGARCANE FIBER FOR URBAN PAVEMENTS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02140
Register Paper ID - 259948
Title: DESIGN & MANUFACTURE OF POROUS CONCRETE USING SUGARCANE FIBER FOR URBAN PAVEMENTS
Author Name(s): Sreevidhya raman, Harshavardhan Karanam, Karthik S, Ranjith Kumar S, Prajwal kumar N
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 928-932
Year: May 2024
Downloads: 146
The focus of present researchers shifted towards utilizing local available alternative materials with binding properties in concrete as a cement replacement. Utilization of agricultural waste with pozzolanic properties in concrete will further aid for sustainability. Thus, the present study is initiated evaluate the mechanical of pervious concrete with sugarcane ash replacing cement. Porous concrete is gap graded concrete mix with minimum or no fine and which allow water to percolate in to the earth beneath the pavement. Porous concrete being used as structural layer in the pavement, the concrete mix shall require minimum structural strength, as well as the permeability properties. M20 concrete mix design process is adopted in the present study, with an assumption that the cement mortar just coats the aggregate and does not completely fill any voids. The dried sugar cane waste is incinerated at 2500 C to get the sugarcane ash, which is further sieved through 150 microns sieve, and the passing fraction is used in mix as a partial replacement for cement. Concrete cubes with sugar cane ash replacing cement in ratios of 0 %, 0.5 %, 1 %, and 1.5% by weight were prepared to evaluate the 7 days, 14 days and 28 days compressive strength. The compressive strength (N/m2) obtained for 0.5% is 112, 191, 120, 1% is 205,210,218. and 1.5% is 280,292,302 for 7, 14 and 28 days respectively.
Licence: creative commons attribution 4.0
Compressive Strength, Porous - Concrete, Sugarcane-Ash
Paper Title: "AN EXPERIMENTAL INVESTIGATION OF SELF CURING CONCRETE INCORPORATED WITH PEG - 400 AND PVA".
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02139
Register Paper ID - 259944
Title: "AN EXPERIMENTAL INVESTIGATION OF SELF CURING CONCRETE INCORPORATED WITH PEG - 400 AND PVA".
Author Name(s): Murali Mohan M V, Anirudh B, Bandlapalli Lohith Kumar, Chethan Kumar G R, Nisarga C S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 923-927
Year: May 2024
Downloads: 138
Curing is said to be the method of maintaining minimum moisture content after construction to develop the desirable properties. In many situation curing is not possible so, to overcome those situation we are using chemicals to attain the process of curing. The chemicals like Poly-vinyl alcohol (PVA)and Poly ethylene glycol (PEG-400) contribute on cement by giving good Strength and hydration rate. This self curing agents gave better compressive strength and split tensile strength.
Licence: creative commons attribution 4.0
"AN EXPERIMENTAL INVESTIGATION OF SELF CURING CONCRETE INCORPORATED WITH PEG - 400 AND PVA".
Paper Title: GROUND DENSIFICATION FOR LIQUEFACTION MITIGATION USING GGBS COLUMNS ENCASED WITH GEOTEXTILE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02138
Register Paper ID - 259943
Title: GROUND DENSIFICATION FOR LIQUEFACTION MITIGATION USING GGBS COLUMNS ENCASED WITH GEOTEXTILE
Author Name(s): Prof.Aruna T, Deeksha Tanu Sri M, Dileep N, Mohammad Shadman, Vamsi Hari P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 917-922
Year: May 2024
Downloads: 153
The process known as liquefaction, which occurs when there is an excess of "pore water pressure" and a drop in the frictional resistance of the soil after an earthquake, is what causes the solid ground to change into a liquid condition. Sands that are loose or somewhat wet and have poor drainage, such clayey or silty sands, are susceptible to liquefaction. The standard penetration test (SPT) and the cone penetration test (CPT), which are favoured to evaluate the liquefaction potential of soil, are examples of in-situ tests that are the foundation of common liquefaction evaluation techniques. Rearranging the soil particles into tighter arrangements increases density and is known as densification. Using the stone column strategy, soil stability is increased as part of the ground-up improvement process. To compress the soil and raise its density, drop a large weight onto the ground several times from a considerable height
Licence: creative commons attribution 4.0
densification, liquefaction, mitigation, stone column, pore water pressure
Paper Title: TO ANALYSE THE COMPRESSION STRENGTH OF CONCRETE BY PARTIAL REPLACEMENT OF CEMENT WITH FLY ASH AND GGBS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02137
Register Paper ID - 259942
Title: TO ANALYSE THE COMPRESSION STRENGTH OF CONCRETE BY PARTIAL REPLACEMENT OF CEMENT WITH FLY ASH AND GGBS
Author Name(s): Bhargava G, Murali Mohan M V, S Naveen, S Pavanesh, Shree Gaurav KU, Sharan G
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 912-916
Year: May 2024
Downloads: 163
This study is to analyze the compressive strength of concrete by partially replacing cement with Fly Ash and Ground Granulated Blast Furnace Slag (GGBS). The use of supplementary cementitious materials, such as Fly Ash and GGBS, in concrete production has gained significant attention due to its potential to enhance the sustainability and durability of concrete structures. This study is to work out the effect of mineral admixture GGBS and Fly ash in concrete of grade M-40 when it is added in & replaced for the fresh state and hardened state i.e. for workability and strength of concrete using OPC (43 grade). As mineral admixture GGBS and Fly ash have been added to OPC which varies from 20% and 40% at interval of 20% &40% by total weight of OPC, various range of addition and replacement of cement by GGBS and Fly Ash in the concrete. All mixes of concrete will examined for workability as slump test of fresh concrete. Hardened concrete is examined for Compressive strength for 7days,14days and 28 days. Slump will be analysed as compared to that of addition of GGBS & Fly ash.The research findings contribute to the understanding of the performance of concrete mixtures containing supplementary cementitious materials and offer practical recommendations for their utilization in construction. By addressing these objectives, this research endeavors to advance the knowledge and practice of sustainable concrete production and promote the responsible use of Fly Ash and GGBS in the construction industry.
Licence: creative commons attribution 4.0
Cement, Coarse aggregates, Fine aggregates, Fly Ash, GGBS(GROUND GRANULATED BLAST- FURNACE SLAG)
Paper Title: DESIGNED TABULATIVE COUPLING OF RC COMPRESSION MEMBERS-A SIMULATIVE APPROACH
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02136
Register Paper ID - 259941
Title: DESIGNED TABULATIVE COUPLING OF RC COMPRESSION MEMBERS-A SIMULATIVE APPROACH
Author Name(s): Narasimha Murthy M R, Vinay Kumar S, Sanjana C, Sushmitha, Thimmaraju G S,Aravind Kumar S V
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 906-911
Year: May 2024
Downloads: 157
In the present era design of any structural element would be a challenging task. Design of compression members being most challenging to decide the section is capable to withstand or bear the force applied on it. Hence design of Structural members are always designed based on number of trails and error method. While undertaking many trails, design calculations with their design checks proves a length and time consuming. Hence, in the present study efforts are put to build the stock of various design combinations of compression members by pre-assuming the sectional date and applying forces, moments on it. And suitable conclusion will be made at the end.
Licence: creative commons attribution 4.0
DESIGNED TABULATIVE COUPLING OF RC COMPRESSION MEMBERS-A SIMULATIVE APPROACH
Paper Title: COMPARATIVE STUDY OF PILED RAFT FOUNDATION ON SAND
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02135
Register Paper ID - 259940
Title: COMPARATIVE STUDY OF PILED RAFT FOUNDATION ON SAND
Author Name(s): ARUNA T, K.V.S.B RAJU
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 895-905
Year: May 2024
Downloads: 141
In civil engineering and construction, a piled raft foundation, also referred to as a raft with piles or a piled mat foundation, is one kind of foundation structure. It is frequently used to poor soil conditions, such as soft clay, loose sand, and extremely compressible soils. To increase load carrying capacity and settlement, the piled raft foundation combines the advantages of deep foundations and shallow raft foundations. It's crucial to keep in mind, nevertheless, that the design and building of PRF need for meticulous engineering study and consideration of site-specific factors, including soil conditions, structural loads, and foundation system behaviour. The study focuses on the PRF system's vertical load carrying capacity and settlement reduction under both eccentric and concentric stress on sand. To find out how different pile alignment and length affected the PRF's ultimate load, small-scale model tests are carried out. The study's findings suggest that the PRF system can minimize differential settlement and boost the raft's load bearing capacity by carefully placing the piles in optimized position. The study specifically aimed at how changing the pile's length to diameter (L/D) ratio affected their ability to support loads. The results of the research work indicate that strategical placing the piles in the PRF system improve the load bearing capacity and reduce the settlement.
Licence: creative commons attribution 4.0
Piled raft foundation, cohesion less soil, Load improvement ratio
Paper Title: RICE HUSK ASH AS A PARTIAL REPLACEMENT FOR CEMENT IN CONCRETE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02134
Register Paper ID - 259939
Title: RICE HUSK ASH AS A PARTIAL REPLACEMENT FOR CEMENT IN CONCRETE
Author Name(s): Barnali Ghosh, Shilpa R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 888-894
Year: May 2024
Downloads: 151
Availability of conventional materials for concrete is cause for concern worldwide. In recent years significant global initiatives to use both local and waste materials in concrete has taken place. One of these materials is rice husk, which when incinerated under regulated conditions and if finely pulverized may be utilized as a substitution for cement in concrete. In order to understand the impact of Rice Husk Ash (RHA) on the mechanical and durability characteristics of concrete when used as a partial cement replacement, a thorough assessment of the relevant literature on Rice Husk Ash (RHA) is conducted. Due to its significant pozzolanic qualities, RHA has the ability to replace cement upto 30% without affecting the structural integrity of concrete. The main objective of this study is to find the optimum percentage of replacement of Rice Husk Ash based on compressive strength and flexural strength of concrete. Thus, the use of RHA as a partial alternative to cement in concrete can offer additional environmental benefits, such resource saving and the management of agricultural waste, while simultaneously encouraging a circular economy in the construction sector.
Licence: creative commons attribution 4.0
Rice Husk Ash, Partial replacement, Optimum Percentage
Paper Title: EXPERIMENTAL INVESTIGATION ON COMPRESSIVE STRENGTH OF CONCRETE BY PARTIALLY REPLACING CEMENT BY GGBS AND RHA AND NATURAL SAND BY QUARRY DUST
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02133
Register Paper ID - 259924
Title: EXPERIMENTAL INVESTIGATION ON COMPRESSIVE STRENGTH OF CONCRETE BY PARTIALLY REPLACING CEMENT BY GGBS AND RHA AND NATURAL SAND BY QUARRY DUST
Author Name(s): Meghana K H, Kashinath B J
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 880-887
Year: May 2024
Downloads: 150
In this paper, concrete of grade M40 is studied by using Ground Granulated Blast furnace Slag (GGBS)(10%, 20%, 30% and 40%) and Rice Husk Ash (RHA) (5%, 7.5% and 10%) as partial replacement of cement and by using Quarry dust(0%, 15%, 30%, 45%, 60%, 75%, 90% and 100%) as partial replacement of sand. Compressive Strength properties are studied. Study is carried out in three phases and the optimum replacement level is found out.
Licence: creative commons attribution 4.0
GGBS, RHA, Quarry Dust, Compressive Strength
Paper Title: COMPARATIVE STUDY AND COST ANALYSIS ON CURING AGENTS FOR SELF CURING CONCRETE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02132
Register Paper ID - 259923
Title: COMPARATIVE STUDY AND COST ANALYSIS ON CURING AGENTS FOR SELF CURING CONCRETE
Author Name(s): Tanu Shree, Narayanswamy KA
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 872-879
Year: May 2024
Downloads: 180
Curing of concrete is the process of maintaining satisfactory moisture content in concrete during its early stages to develop the desired properties. However good curing is not always practical in many cases the present study deals with the effect of polyethylene glycol (PEG)and poly-vinyl alcohol (PVA) on concrete and their contribution to strength which are carried out. The effect of admixtures in mechanical characteristic of concrete i.e., compressive strength, split tensile strength by varying the percentage of PVA and PEG-400 from 0% to 2.5% by weight of cement is studied for M30 grade of concrete and the optimum percentage of PEG and PVA in self-curing concrete with conventional concrete with water curing is compared. The optimum percentage with PEG is coated with PVA and strength analysis is done. Curing is one of the most important factors for achieving maximum desirable strength in concrete, concrete should be cured properly so that it is fully hydrated and loss of moisture inside the concrete should be reduced. Poly vinyl alcohol and polyethylene glycol-400 is locally available chemical which can be used as a self-curing agent in concrete so that moisture in the concrete can be maintained and concrete can be fully hydrated
Licence: creative commons attribution 4.0
Self-curing concrete, polyethylene glycol, poly-vinyl alcohol, M30 grade
Paper Title: PERFORMANCE COMPARISION OF TBC's & EBC's
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02131
Register Paper ID - 259921
Title: PERFORMANCE COMPARISION OF TBC'S & EBC'S
Author Name(s): Sreenivas S, Bharath L, Kishor N, Vinay Kumar G V, Srinivasa M, Madhu B R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 860-871
Year: May 2024
Downloads: 158
This study presents a comprehensive comparison of thermal barrier coatings (TBCs) utilizing zirconia and environmental barrier coatings (EBCs) incorporating silicon carbide and aluminum oxide. Through rigorous experimental testing and computational analysis, key performance metrics including thermal insulation, erosion resistance, and durability are evaluated. The findings elucidate the distinctive strengths and weaknesses of each coating type, facilitating informed decision-making for optimal material selection in high-temperature applications
Licence: creative commons attribution 4.0
PERFORMANCE COMPARISION OF TBC's & EBC's
Paper Title: "POWER GENERATION THROUGH SPEED BREAKERS"
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02130
Register Paper ID - 259919
Title: "POWER GENERATION THROUGH SPEED BREAKERS"
Author Name(s): Dr Bharath L, Dr Suneelkumar N Kulkarni, Akshay SM, Gagan kumar singh VS, Praveen V Awale, Mell Jepson.
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 853-859
Year: May 2024
Downloads: 187
A significant amount of energy is wasted by vehicles when they pass over speed breakers due to friction. However, this energy can be used to generate electricity. In this project, we propose a smart speed breaker system that captures energy from vehicles and converts it into electrical power.
Licence: creative commons attribution 4.0
Paper Title: CONVERTING BICYCLE TO e-BIKE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02129
Register Paper ID - 259918
Title: CONVERTING BICYCLE TO E-BIKE
Author Name(s): Dr Bharath L, Prof Anand Kulkarni, Aakash G Manohar, Likith V, Vivek Gowda, Vinay Kumar G
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 847-852
Year: May 2024
Downloads: 132
Transforming non-motorized vehicles into motorized alternatives presents a compelling avenue for modernizing traditional transportation modes while upholding sustainability. This study investigates the integration of electric propulsion systems into non-motorized vehicles to enhance their efficiency, range, and ease of use. By bridging the gap between conventional and modern transport systems, this study aims to offer eco-conscious solutions aligned with contemporary needs. Our primary objective is to demonstrate the feasibility and potential benefits of this conversion process, thereby unlocking new possibilities for personal and commercial transportation. This report details the methodology, technical aspects, challenges, and outcomes of the conversion process, aiming to contribute to the discourse on sustainable transportation solutions and inspire future developments in this transformative field.
Licence: creative commons attribution 4.0
Non-motorized, Technical aspects, e-Bike.
Paper Title: Fabrication of Enhancing Vehicle Safety with Power Window Mechanism
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02128
Register Paper ID - 259916
Title: FABRICATION OF ENHANCING VEHICLE SAFETY WITH POWER WINDOW MECHANISM
Author Name(s): Suhas U, Dr. Bharath L, Sajeed Hussain, K S MD Kaif, S R Vineeth
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 842-846
Year: May 2024
Downloads: 149
This paper discusses a new safety system for vehicles that integrates power window mechanisms with various sensors to enhance passenger safety in emergencies. The goal is to deploy the existing power window infrastructure to automate window operation in dangerous situations, facilitating a rapid and safe exit from the vehicle. The proposed system includes a control unit connected to multiple sensors, including tilt, water, air quality, fire, and gas sensors. These sensors monitor the vehicle's environment for signs of danger. The tilt sensor detects if the vehicle has rolled over or is at a severe angle, while the water sensor identifies submersion in water. The quality of the air sensor checks for harmful gases, and the fire and gas sensors alert to fire or high gas levels. If an emergency is detected, the control unit activates the electric window mechanism to open the windows, allowing passengers to exit safely. This system provides a cost-effective solution by utilizing existing power window technology, making it easier to implement in current vehicle designs. It adds an additional layer of safety, enabling quicker evacuation in emergencies. The integration of this system into vehicles can dramatically decreases the likelihood of accidents or other hazardous situations. In summary, this safety system utilizing power window mechanisms and various sensors shows great potential approach for improving vehicle safety. By leveraging existing technology, it offers a practical and efficient solution to enhance passenger safety in emergency scenarios.
Licence: creative commons attribution 4.0
Power Window Mechanism, Vehicle Safety, Emergency Sensors, Passenger Safety
Paper Title: EVALUATION OF MICROSTRUCTURE AND HARDNESS OF Al-Mg-Si ALLOY REINFORCED WITH SiCp
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02127
Register Paper ID - 259913
Title: EVALUATION OF MICROSTRUCTURE AND HARDNESS OF AL-MG-SI ALLOY REINFORCED WITH SICP
Author Name(s): Dr Bharath L, ProfManjuthan TV, Abel M, Hamid Raja Khan, Monica Fernandes D
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 835-841
Year: May 2024
Downloads: 163
In this paper, Al-Mg-Si alloy has been used as the matrix material to develop metal matrix composites with silicon carbide particle particulates as reinforcement material. The different mesh size of SiC particles was chosen by varying wt.% (1%, 3% and 5%) and preparation was done through the stir casting method. Microstructure evaluation has been done for the formed composite material. Taguchi's technique was used to find the optimization, Analysis of Variance (ANOVA) and mathematical model were generated through regression method to validate the experimental results obtained for hardness.
Licence: creative commons attribution 4.0
ANOVA, Hardness, Matrix, Composite
Paper Title: 3D PRINTING USING IOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02126
Register Paper ID - 259910
Title: 3D PRINTING USING IOT
Author Name(s): Dr.Balaji K, Likith S, Ashis Kumar Sahoo, Kumar SG, Karthik N
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 830-834
Year: May 2024
Downloads: 147
An abstract of 3D printing could highlight its transformative impact on various industries and disciplines. It would likely mention its ability to fabricate intricate objects layer by layer from digital designs, offering unprecedented flexibility and customization. Additionally, the abstract might discuss the diverse range of materials used in 3D printing, from plastics and metals to biomaterials, enabling applications in fields such as aerospace, healthcare, automotive, and consumer goods. Furthermore, it might touch upon emerging trends such as large-scale construction and the integration of artificial intelligence to optimize printing processes. Overall, the abstract would emphasize 3D printing's potential to revolutionize manufacturing, design, and innovation across numerous sectors.
Licence: creative commons attribution 4.0
Paper Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02125
Register Paper ID - 259907
Title: AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT
Author Name(s): Dr. Balaji K, Biswajit Nayak, Kavita Soren, Arpita Kumari, Madhushree R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 824-829
Year: May 2024
Downloads: 130
We examine the revolutionary effects of artificial intelligence (AI) on education in this thorough investigation, paying particular attention to the critical ideas of personalized learning and adaptive assessment. The research explains how education has changed historically. AI's integration into educational paradigms emphasizes how crucial it is to provide learners with learning experiences that are specifically personalized to them. It also explores the field of AI-powered adaptive assessment, explaining how it differs from traditional testing methods. The paper provides a comprehensive overview of this educational revolution by synthesizing case studies, existing literature, and developing trends.
Licence: creative commons attribution 4.0
AI IN EDUCATION: PERSONALIZED LEARNING AND ADAPTIVE ASSESSMENT
Paper Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02124
Register Paper ID - 259906
Title: IMPLEMENTATION OF THE AES ENCRYPTION ALGORITHM 256 BITS IN CRYPTOGRAPHY
Author Name(s): Dr. Balaji k, Mohammed Tauqir Ali T.M, Satyajit Mohanty, N.V. Rakesh, Viswa .M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 820-823
Year: May 2024
Downloads: 161
In today's corporate world, network and data security is a major concern. Many different types of businesses, such as financial institutions, law firms, schools, healthcare, telecommunications, mining, and government organizations, have a strong demand for strategic data management techniques. Businesses lose sensitive data, such as biometric and financial information, to competitors and other parties as a result of hackers' activity. Businesses are losing millions of dollars as a result of malicious people gaining access to unprotected data. Businesses now place a great value on data security. Protection is required to guarantee information security. Using encryption algorithms to protect communications in these kinds of threads is one of the most important and practical solutions available. Performance and security are two factors that the developer must take into account while creating an extremely secure Android application. Android-based applications must perform better because Android smartphones have constrained resources. The most widely used secure encryption algorithms Rijndael, Serpent, and Two fish will be evaluated in this study to see which works best in order to overcome the issues.
Licence: creative commons attribution 4.0
telecommunications, android, encryption algorithms
Paper Title: BIOMETRICS USING PYTHON
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02123
Register Paper ID - 259903
Title: BIOMETRICS USING PYTHON
Author Name(s): Dr. K Balaji, AnushreeGD, BhavanaShreeS, BhuvanaShreeBS, KavyaBN
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 815-819
Year: May 2024
Downloads: 154
Biometric authentication systems have gained significant attention due to their ability to provide secure and convenient access control. This project proposes a novel approach to biometric authentication using Python, leveraging machine learning techniques and computer vision algorithms. The system integrates facial recognition, fingerprint recognition, and voice recognition modalities to enhance authentication accuracy and robustness. The system begins by capturing biometric data from users through respective sensors(camera, fingerprint scanner, microphone). Preprocessing techniques are applied to clean and normalize the data, followed by feature extraction to extract unique biometric features. Machine learning models, such as Convolution Neural Networks (CNNs) and Support Vector Machines (SVMs), are trained on the extracted features to learn the patterns specific to each user. During the authentication phase, the system compares the input biometric data with the stored templates using appropriate similarity metrics. Fusion techniques are employed to combine the results from multiple modalities, enhancing the overall authentication accuracy and reliability. Keywords-recognition, authentication, security.
Licence: creative commons attribution 4.0
Paper Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02122
Register Paper ID - 259901
Title: EMAIL AUTHENTICATION USING CRYPTOGRAPHY
Author Name(s): Dr. Balaji K, Ashwini P, Likhitha P, Jagadevi, Gnanapriya
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 809-814
Year: May 2024
Downloads: 128
Setting up an email account involves confirming ownership through a link sent to the provided email address. Personal questions, like favorite colors or pets' names, may also be asked for added security. Email services monitor login locations and usage patterns to detect suspicious activity. Two-factor authentication adds an extra layer of security by sending a code to the user's phone. Account recovery processes often include sending a reset link to an alternate email or mobile number. During email sessions, encryption and session management techniques are used to protect user data. Automatic logout may occur after a period of inactivity to prevent unauthorized access. These measures collectively ensure email account security and user verification.
Licence: creative commons attribution 4.0
EMAIL AUTHENTICATION USING CRYPTOGRAPHY
Paper Title: BRAIN COMPUTER INTERFACE UNDER AI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02121
Register Paper ID - 259900
Title: BRAIN COMPUTER INTERFACE UNDER AI
Author Name(s): DR. Balaji K, P Srikanth, Tharun Reddy J, Mahesh Naik, R Bali Bai ,Nithin Kumar S M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 804-808
Year: May 2024
Downloads: 156
A brain-machine interface, also referred to as BCIs, is a type of technology that enables people to interact with technology through their brain. It allows them to bypass the need for physical controls by connecting their brain activity to external devices. These systems are able to interpret brain signals and translate them into commands for various devices, such as computers and robotic arms.
Licence: creative commons attribution 4.0
BRAIN COMPUTER INTERFACE UNDER AI
Published Paper ID: - IJCRTAB02120
Register Paper ID - 259899
Title: BIG DATA
Author Name(s): DR. Balaji, Pallavi K G, Meghana U, Shwetha S, Manasa N
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 801-803
Year: May 2024
Downloads: 147
Big Data is a term used to describe large and complex datasets that require powerful computing tools and analytics methods to extract meaningful insights. The rapid growth of data in the modern era has led to an explosion of Big Data sources including social media, sensor data, email logs, and more. This report provides a comprehensive over view of Big Data, including its definition, its characteristics, its sources, and its applications. We need big data when the user has large amount of data, it has noisy and inconsistency. Traditional data storage cannot able of handling large volume of data hence we need a big data analytic. In big data the data can be Structured type, Unstructured type and semi structured type. Big data has characteristics and it is also called as 5V's. We discuss the challenges posed by Big Data, including storage, retrieval, and analysis, and we describe several tools and technologies used to address these challenges.
Licence: creative commons attribution 4.0
Paper Title: DISEASE PREDICTION USING DATA MINING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02119
Register Paper ID - 259897
Title: DISEASE PREDICTION USING DATA MINING
Author Name(s): DR.BALAJI.K, MONISHA P, MADHUSHREE S G, MOHAN KUMAR, SAMRAT RAJ
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 796-800
Year: May 2024
Downloads: 132
Data mining is described as sifting via very huge amount of records for beneficial information. Some of the vital and famous records mining techniques are classification, clustering, prediction. Data mining methods are used for range of applications. In health care industry, data mining plays an necessary position for predicting diseases. For detecting a sickness number of exams should be required from the patient. But the use of data mining method the wide variety of check be reduced. This reduced check plays an important position in time and performance. This method has an benefits and disadvantages. This paper analyzes how data mining techniques are used for predicting one of kind sorts of diseases. This paper reviewed the research papers which mainly targeted on predicting heart disease, Diabetes, breast cancer.
Licence: creative commons attribution 4.0
DISEASE PREDICTION USING DATA MINING
Paper Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02118
Register Paper ID - 259896
Title: CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES
Author Name(s): Dr Balaji K, Kruthi P.J, Lekha V.S, Harshitha V, Keerthana E
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 792-795
Year: May 2024
Downloads: 291
In today's digital age, the concept of a connected world has transformed the way we interact, communicate, and conduct business. This paper explores the intricate web of connectivity that defines our modern society. From social media platforms to the Internet of Things, this presentation delves into the impact of interconnected technologies on individuals, businesses, and societies globally. Through an in-depth analysis of the benefits, challenges, and future implications of this connected world, we aim to shed light on the opportunities and risks associated with our increasingly interconnected digital landscape. Join us as we navigate through the complexities of the connected world and uncover the potential it holds for shaping our future. The advent of the connected world has ushered in a new era of technological innovation and societal transformation. This paper delves into the myriad opportunities and challenges presented by the interconnectedness facilitated by the digital landscape. It explores the implications of connectivity across various domains including communication, commerce, healthcare, education, and governance. From the proliferation of IoT devices to the rise of artificial intelligence, the paper examines how these advancements are reshaping industries, redefining human interactions, and influencing global dynamics. Additionally, it addresses the ethical, privacy, and security concerns arising from the unprecedented level of connectivity. Through a comprehensive analysis, this paper aims to provide insights into navigating the complexities of the connected world and harnessing its potential for the betterment of society.
Licence: creative commons attribution 4.0
CONNECTED WORLD: THE IMPACT OF IOT ON OUR LIVES
Paper Title: DIGITAL FORENSIC
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02117
Register Paper ID - 259894
Title: DIGITAL FORENSIC
Author Name(s): Dr Balaji K, Rahul P, Naveen Kumar, Sharath U, Nandeep
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 788-791
Year: May 2024
Downloads: 176
Crimes committed in electronic or digital spaces, particularly within cyberspace, have become widespread. Criminals utilize technology to carry out their unlawful activities, presenting novel challenges for law enforcement agents, legal practitioners, military personnel, and security specialists. Digital forensics has assumed a critical role in detecting and resolving crimes involving computers and digital assistance. This paper presents a brief overview of digital forensics, offering an introduction to its importance in tackling modern criminal activities.
Licence: creative commons attribution 4.0
Published Paper ID: - IJCRTAB02116
Register Paper ID - 259891
Title: ECTOLIFE
Author Name(s): Dr Balaji K, Lavanya V, Chandana M, Chethan kumar H V, Arpitha J K
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 783-787
Year: May 2024
Downloads: 213
EctoLife the world's first artificial womb facility. This concept was designed by biotechnologist Hashem AI-Ghaili, the artificial womb facility is powered by renewable energy.EctoLife is designed to help countries that are suffering from low populations. Ectolife introduces a dynamic fusion of virtual reality (VR), augmented reality (AR), and mixed reality (MR) technologies into our everyday existence. This abstract concept aims to seamlessly integrate digital elements into our physical world, revolutionizing how we interact, learn, work, and entertain. Through ectolife, individuals immerse themselves in virtual environments, interact with digital objects, and engage with virtual entities as if they were part of their physical surroundings. This integration of virtual and real experiences redefines traditional boundaries, offering new avenues for communication, collaboration, and creativity. Beyond personal experiences, ectolife extends its impact across various sectors, including healthcare, gaming, education, and architecture. VR-assisted therapies improve patient rehabilitation, AR gaming enhances interactive entertainment, and MR facilitates real-time design prototyping in architecture.However, as ectolife evolves, it brings forth ethical, social, and existential considerations. Privacy concerns, data security issues, and the potential for over-reliance on virtual experiences raise important questions. Furthermore, the blurring of virtual and physical realities prompts reflection on identity, agency, and the nature of existence. Inconclusion, ectolife signifies a transformative shift, offering exciting possibilities while posing challenges. Embracing ectolife requires a balanced approach that harnesses its potential while addressing associated risks. As ectolife continues to unfold, it promises to reshape human experiences and advance society in unprecedented ways.
Licence: creative commons attribution 4.0
Paper Title: Website Blocker Using Python
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02115
Register Paper ID - 259888
Title: WEBSITE BLOCKER USING PYTHON
Author Name(s): DR.BALAJI K
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 778-782
Year: May 2024
Downloads: 172
According to the Google Search Statistics, Google processes more than 3.7 billion searches every day, with an average of 40000 searches per second. This illustrates our extreme dependency on the internet for all our daily tasks ranging from complex projects on space science to simplest queries like what is the right way to greet a person in the evening. Our searches are answered through interlinked web pages, known as websites. As of September 2022, there are over 1.98 billion websites available online. Apart from the benefits of having access to huge content and numerous resources on our fingertips, it can also be a great source of distraction and mismanagement of time. Constant online presence of an individual may affect an individual's ability of achieving professional and personal goals. Hence, website blocker is one effective tool that helps an individual take a conscious call on blocking a website. There may be many reasons for blocking a website, which will be discussed in the following sections of the paper. A website blocker, if effectively utilized, can enhance focus, productivity and value of time of an individual and the organization as well. Here, we propose a simple website blocker implementation in Python.
Licence: creative commons attribution 4.0
Website Blocker Using Python
Paper Title: An Introduction to Artificial Intelligence Tools in Various Domains
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02114
Register Paper ID - 259887
Title: AN INTRODUCTION TO ARTIFICIAL INTELLIGENCE TOOLS IN VARIOUS DOMAINS
Author Name(s): Dr Balaji K, Naveena kumara K S, Naveen H S, Yashavanth achar, Raghunandan P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 770-777
Year: May 2024
Downloads: 154
This research paper introduces Artificial Intelligence tools and uses of the same in various domains. The importance of Artificial Intelligence in enhancing the efficiency and automation to solve complex problems is discussed, along with the various types of artificial intelligence tools available. The paper also covers the use of artificial intelligence in AI in Cyber security, AI in Education, AI in Agriculture, AI in Education, AI Smart cities, AI in Environmental conservation, AI in Sport Analytics. The paper concludes with a summary of the key takeaways and the potential impact of artificial intelligence tools in various domains. The paper aims to provide a comprehensive overview of artificial intelligence tools and to highlight their importance in various fields to develop new approaches in solving complex problems.
Licence: creative commons attribution 4.0
An Introduction to Artificial Intelligence Tools in Various Domains
Paper Title: Cybersecurity using Python
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02113
Register Paper ID - 259885
Title: CYBERSECURITY USING PYTHON
Author Name(s): Dr.Balaji K, M Shireesha, Aishwarya S, Kavya Shree K V, Gagana Shree M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 765-769
Year: May 2024
Downloads: 143
Cybersecurity is known for defending computers, servers, mobile device, electronic system, networks and data from malicious (misusing the insured computer systems). Python has emerged as a versatile and powerful tool in the field of cybersecurity, python is known for versatility offering a wide range of libraries and frameworks for various security task.This abstract involves into the application of python in cybersecurity, focusing on its role in penetration testing, network security, and malware analysis. Python effectiveness in network traffic analysis, intrusion(An Intrusion Detection System (IDS) maintains network traffic looks for unusual activity and alerts when it occurs), log analysis (Log analysis is the process of reviewing, interpreting and understanding computer-generated records called logs.) Enabling security professionals to monitor and defend against malicious activities (misuse of system resources) effectively
Licence: creative commons attribution 4.0
Cybersecurity using Python
Paper Title: Artificial Intelligence in Healthcare
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02112
Register Paper ID - 259884
Title: ARTIFICIAL INTELLIGENCE IN HEALTHCARE
Author Name(s): Dr.Balaji K, A Ravi Kumar Reddy, Jagan Mohan, Yashwanth Kumar Sai, Nanda
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 759-764
Year: May 2024
Downloads: 135
Goal of this systematic search is to offer an description of artificial intelligence's role in healthcare. Artificial intelligence has played a crucial influence in healthcare. A paradigm change in healthcare has take place due to increasing availability of healthcare data and rapid progress of analytics technology. Machine learning technologies such as assist vector machine, deep learning neural networks, and natural language processing manage structured data. Unstructured data is processed using natural language processing.
Licence: creative commons attribution 4.0
Artificial Intelligence in Healthcare
Paper Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02111
Register Paper ID - 259881
Title: NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE
Author Name(s): Dr. Balaji K, Mr. Samir Raza, Mr. Ratan J
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 754-758
Year: May 2024
Downloads: 165
Natural Language Processing (NLP) is the study of how computers and human languages interact is the focus of the artificial intelligence (AI) field of natural language processing, or NLP. It encompasses a range of techniques and strategies intended to give robots the capacity to understand, interpret, and generate natural language in a way that is beneficial and appropriate for a number of applications. Natural language processing (NLP) has evolved tremendously in recent years thanks to the availability of large datasets, powerful computer power, and sophisticated machine learning models. Natural language, or spoken and written human communication, is extremely difficult because of its complexity, context-dependence, and intrinsic ambiguity. By creating models and algorithms that are capable of analyzing and interpreting natural language data, natural language processing (NLP) aims to close the understanding gap between human language and computers. NLP's main objective is to provide computers the ability to do language-related activities including comprehending text, coming up with logical answers, extracting data, and communicating between languages. To accomplish these goals, NLP incorporates concepts from multiple academic fields, including as statistics, computational science, machine learning, and linguistics.
Licence: creative commons attribution 4.0
NATURAL LANGUAGE PROCESSING IN ARTIFICIAL INTELLIGENCE
Paper Title: NEURAL NETWORK
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02110
Register Paper ID - 259880
Title: NEURAL NETWORK
Author Name(s): Dr.Balaji K, Vinil Monteiro, Tarun G, Tarun Kulakarni, Santosh Maddi, Syed Kaif
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 750-753
Year: May 2024
Downloads: 126
Neural networks, also known as artificial neural networks (ANNs) or simply neural networks, are a subset of machine learning that form the foundation of deep learning techniques. Which was inspired by the structure and function of the human brain, mimicking the way real neurons communicate. ANNs are composed of many interconnected basic processors, functioning in parallel. This paper explores artificial neural networks and their basic types, outlining the fundamental neuron and the artificial computer model. It discusses network structures, learning methods, and some of the most commonly used ANNs..
Licence: creative commons attribution 4.0
Paper Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02109
Register Paper ID - 259878
Title: NAVIGATING THE WORLD OF GRAPHS: NOVEL APPLICATIONS OF BFS AND DFS ALGORTHIMS
Author Name(s): DR.BALAJI, Madhu suharika, Gouri Rangabhatt Joshi, Jameema Joy.S, Aishwarya S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 743-749
Year: May 2024
Downloads: 146
The project aims to implement two popular searching algorithms that is Depth-First-Search (DFS) and the Breadth-First-Search (BFS) in a web-based application using JSP and Spring Tool Suite. The user is presented with a form where they can input the starting and ending nodes, as well as choose between the BFS and DFS algorithms. When the user submits the form, a Java file takes the form data and saves it to another JSP file called register. If the selected algorithm is DFS, the Java code for DFS is executed, and likewise for BFS. While the code is running, the user is shown a progress indicator to let them know that the algorithm is processing. Once the algorithm has finished running, the user is directed to a results page where they can view the nodes explored and the path found. The results are displayed in an easy-to-read format, such as a table or list. The project also handles errors, such as when the user inputs a non-existent node, and alerts the user if no path was found. Overall, this project offers a convenient and user-friendly way for users to explore and search graphs using BFS and DFS algorithms. It showcases the use of JSP, Spring Tool Suite, and Java to create a web-based application that can handle complex data structures and algorithms
Licence: creative commons attribution 4.0
Paper Title: Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02108
Register Paper ID - 259877
Title: PLAGIARISM CHECKER AND CLASSIFICATION OF FILES ON CLOUD USING SMART CLOUD
Author Name(s): Dr.Balaji K, Divya .M, Krupa.B, Gouri.G, Arpita.P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 739-742
Year: May 2024
Downloads: 175
This study suggests a method to address the cloud duplication problem. The restricted amount of data storage that these service providers can offer is only partially utilized by the abundance of redundant and useless data on the internet. Inadequate cloud efficiency might result in far greater costs for service providers than anticipated. The fact that the data is kept on a server that may be located kilometres distant from the user presents another problem. This raises the price and efficiency even further. A smart cloud can assist with resolving these problems. By calculating the ratio between the proportions of two vectors, we can assign a categorization rating to the document.
Licence: creative commons attribution 4.0
Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Paper Title: ROBOTIC EVOLUTION IN MACHINE LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02107
Register Paper ID - 259875
Title: ROBOTIC EVOLUTION IN MACHINE LEARNING
Author Name(s): Dr.Balaji K, Inav Sultan, Subhalaxmi Dora, Harish S J, Harshith S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 734-738
Year: May 2024
Downloads: 133
The integration of robotics and machine learning has revolutionized the field of automation, enabling robots to perform complex tasks with unprecedented levels of autonomy and adaptability. This paper provides an in-depth exploration of the evolution of robotics in machine learning, tracing its historical development, current state, and future trends. We begin by examining the early developments in robotics, highlighting the limitations of pre-programmed robots and the need for more adaptive and intelligent systems. We then discuss the emergence of machine learning algorithms and their integration into robotic systems, leading to the development of robots capable of learning from data and improving their performance over time. The paper also explores the current state of robotics in machine learning, focusing on key technologies such as deep learning, reinforcement learning, and computer vision. We discuss how these technologies are being used to enhance robotic capabilities in various domains, including manufacturing, healthcare, and autonomous vehicles. Challenges and opportunities in integrating machine learning with robotics are also addressed. Technical challenges, such as the need for robust and efficient algorithms, as well as ethical and social implications, such as the impact of intelligent robots on the workforce, are discussed.
Licence: creative commons attribution 4.0
ROBOTIC EVOLUTION IN MACHINE LEARNING
Paper Title: Prevention of Vulnerable Virtual Machines against DDOS Attacks in the Cloud
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02106
Register Paper ID - 259873
Title: PREVENTION OF VULNERABLE VIRTUAL MACHINES AGAINST DDOS ATTACKS IN THE CLOUD
Author Name(s): Dr.Balaji K, Tanushree M, Pavan Kalyan, Manik Rahul, Rohit
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 729-733
Year: May 2024
Downloads: 160
One of the biggest issues that has drawn a lot of research and development attention in recent years is cloud security. Notably, assailants will investigate exploits in a cloud system and infiltrate virtual machines to release more extensive Distributed Denial-of-Service attacks (DDoS). Early-stage tactics including multi-step exploitation, low-frequency vulnerability scanning, and turning found susceptible virtual machines into zombies are sometimes used in DDoS assaults. Finally, DDoS attacks are launched using the zombies that have been infected. When it comes to cloud systems, especially Infrastructure-as-a-Service (IaaS) clouds, zombie exploration attack detection is truly problematic. This might occur from cloud customers installing susceptible software on their virtual computers.
Licence: creative commons attribution 4.0
Attack graph model, NICE, distributed denial of service attack, cloud security, and cloud attacks
Paper Title: The Integral Role of Blockchains in Shaping Web 3.0 Navigating the Technological Frontier
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02105
Register Paper ID - 259872
Title: THE INTEGRAL ROLE OF BLOCKCHAINS IN SHAPING WEB 3.0 NAVIGATING THE TECHNOLOGICAL FRONTIER
Author Name(s): Dr. Balaji K, Priyanka R, Sneha Thomas, Sharun P S, Sai Keerthana G
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 724-728
Year: May 2024
Downloads: 140
Web 3.0 has arisen as a disruptive force in the digital world, pushing for a decentralized and user-centered internet. This new age is marked by its peer-to-peer design, which decreases reliance on centralized authority while giving individuals ownership over their data and digital assets. Blockchain technology is essential to Web 3.0 because it provides a safe and trustless environment for transactions and data transfers via cryptography. Web 3.0 aims to address the limits of the present web (Web 2.0) by using new technologies such as blockchain, artificial intelligence (AI), and the Internet of Things (IoT). This study looks at the link between blockchain and Web 3.0, specifically the characteristics that make blockchain an important component of this disruptive paradigm. Moreover, the article outlines the primary challenges and research directions in blockchain intelligence, as compared to other technologies, and is supported by based on research arguments, contributing to the advancement of this field and laying the groundwork for the future of intelligent societies powered by Web 3.0. Blockchain technology is clearly integrated into molding the technological frontier, and so blockchain intelligence is critical to the growth of Web 3.0.
Licence: creative commons attribution 4.0
The Integral Role of Blockchains in Shaping Web 3.0
Paper Title: Virtual Reality (VR) and its Intersection with Python
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02104
Register Paper ID - 259871
Title: VIRTUAL REALITY (VR) AND ITS INTERSECTION WITH PYTHON
Author Name(s): Dr. Balaji K, Gopinath C, Goutham G, HN Thejas, Hemanth Kumar
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 718-723
Year: May 2024
Downloads: 118
Virtual Reality (VR) stands at the forefront of technological innovation, offering immersive experiences across diverse domains such as gaming, education, and healthcare. This paper explores the intersection of VR and Python, shedding light on Python's role as a versatile language in VR development. Beginning with an introduction to VR and its wide-ranging applications, we delve into the suitability of python for VR, elucidating the key libraries and frameworks utilized in VR projects; including pygame, pyglet, and Panda3D. The paper then navigates through the process of crafting immersive VR environments with Python, encompassing techniques for rendering 3D scenes, managing user input, including audio elements. Emphasis is placed on enhancing interactivity and user experience within VR applications, with a focus on user interface design, gesture recognition, and interactive mechanics. Further enriching the discourse are case studies and examples showcasing real-world applications of python in VR, spanning educational simulations, training modules, and entertainment experiences. Additionally, the paper addresses the challenges inherent in VR development with Python, proposing potential solutions and prognosticating emerging trends and future directions in the realm of VR technology its integration with Python. In conclusion, this paper underscores the pivotal role of Python in advancing VR technology and its profound impact across various industries. By elucidating the synergy between Python's versatility and VR's immersive potential, this exploration paves the way for innovative developments and Transformative applications in the burgeoning landscape of virtual reality.
Licence: creative commons attribution 4.0
Virtual Reality (VR) and its Intersection with Python
Paper Title: HONEYPOT IN NETWORK SECURITY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02103
Register Paper ID - 259869
Title: HONEYPOT IN NETWORK SECURITY
Author Name(s): Dr Balaji k, Yashaswini G T, Rakshita Itagi, Sahana L, Shreya Ravi Shastri
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 713-717
Year: May 2024
Downloads: 147
A honeypot in network security is like a digital decoy or trap designed to detect, deflect, or study attempts at unauthorized use of information systems. It's essentially a system or resource set up to be attractive to attackers, mimicking real services and data, but isolated and monitored to gather information about their activities. The concept of honeypots, non-production systems designed to interact with cyber attackers to gather intelligence, has evolved over three decades alongside the increasing speed and reliance on the Internet. The challenge lies in actively monitoring numerous systems and reacting swiftly to diverse events. Before deploying a honeypot, it's crucial to clarify its objectives, understand the operating systems and services it will emulate, assess associated risks, and devise mitigation strategies. Additionally, having a plan in case of compromise is advisable. For production honeypots, a documented security policy addressing potential legal issues is essential. The paper explores the role of honeypots in understanding hacker motives, skills, and techniques, proposing an intrusion detection tool integrating existing methods with honeypot concepts. Certainly, the paper delves into the significance of honeypots in the realm of cyber security. It underscores the evolving landscape of network intrusion detection amidst the accelerating pace of networks and the pervasive reliance on the Internet. Honeypots, as highlighted, serve as invaluable tools for actively engaging with cyber attackers to glean insights into their tactics, techniques, and procedures. Lastly, the paper proposes leveraging the concept of honeypots to inform the design and development of intrusion detection tools. By integrating insights from honeypot interactions with existing detection techniques, it aims to enhance the efficacy of cyber security measures in thwarting malicious activities
Licence: creative commons attribution 4.0
HONEYPOT IN NETWORK SECURITY
Paper Title: GENERATIVE AI IN VIRTUAL REALITY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02102
Register Paper ID - 259868
Title: GENERATIVE AI IN VIRTUAL REALITY
Author Name(s): Dr. Balaji K, Yamuna Bose, Shreenidhi LR, PS Karuna Kumar, Nandish k
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 708-712
Year: May 2024
Downloads: 160
This paper initiates by providing a comprehensive study of the utilization of generative AI techniques within virtual reality (VR), encompassing facets like data collection, pre-processing, model training, drawbacks, and evaluation. It further scrutinizes various generative AI models and algorithms tailored for VR, elucidating their strengths and limitations in virtual reality creation and abstraction. The integration of generative AI has significantly enriched virtual reality and training experiences, amplifying the intricacy of product development by facilitating the generation of diverse content such as games, images, audio, and video. Through the analysis and assimilation of historical data, pertinent factors, and real-world inputs, generative AI demonstrates its capacity to fabricate intricate and realistic virtual objects and environments. Additionally, the paper delves into the multifaceted challenges and ethical dilemmas inherent in deploying generative AI in virtual reality, encompassing concerns like data privacy and algorithmic transparency. It also envisages future trajectories for research, advocating for interdisciplinary collaborations, user-centric studies, and the exploration of applications in education and entertainment. By presenting an overview of the fusion between virtual reality and generative AI, the paper contributes insights into enhancing the learning experience within the burgeoning metaverse technology while also offering strategies to augment the efficacy of generative AI in fostering creative content creation.
Licence: creative commons attribution 4.0
GENERATIVE AI IN VIRTUAL REALITY
Paper Title: BATTERY MANAGEMENT SYSTEM FOR ELECTRIC VEHICLES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02101
Register Paper ID - 259866
Title: BATTERY MANAGEMENT SYSTEM FOR ELECTRIC VEHICLES
Author Name(s): KG Nagaraja, HK Jagadish, Lokesh Rao, Ediga Adarsh, Srinath HN
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 701-707
Year: May 2024
Downloads: 150
The main component in an electric vehicle's battery is the Battery Management System (BMS). This system plays a major role in both safety and performance. It keeps an eye on the battery's health by constantly monitoring voltage, current, temperature, and other factors. This data is key to preventing damage from overcharging, over-discharging, or overheating, which can lead to fires or reduced battery life. The BMS acts like a conductor, regulating how the battery is charged and discharged, and can even isolate weak parts of the battery to prevent them from bringing down the whole system. the BMS also helps the battery perform at its best by balancing energy flow across all the cells within the battery pack, maximizing its efficiency and overall lifespan. By keeping a close eye on the battery's health and performance, the BMS ensures a safe and smooth ride for electric vehicles
Licence: creative commons attribution 4.0
Arduion uno, Battery cells,Lcd display,Dc motor,.Matlab simulator.
Paper Title: SOLAR POWERED COLD STORAGE USING PELTIER
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02100
Register Paper ID - 259865
Title: SOLAR POWERED COLD STORAGE USING PELTIER
Author Name(s): Ass.prof.KP Shiva Murthy, Rakshitha S R, Santhosh R, Vinutha S, Pallavi P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 693-700
Year: May 2024
Downloads: 176
In this paper the creation of cold storage systems powered by solar energy using peltier module is developed. This project involves an advancement in cold storage technology that combines flexibility and portability with solar energy's efficiency. The need for cold storage solution is growing. In the contemporary world particularly in rural areas and off-grid locations. The solar powered cold storage system might have a significant in an area including agriculture, medications in health centers, emergency supplies etc. Solar powered cold storage system using peltier provides a number of benefits over traditional refrigeration systems due to its light weight, environmental friendliness, silent operation etc.
Licence: creative commons attribution 4.0
Refrigeration, Peltier module, Water block
Paper Title: Wireless charging of electrical vehicle on road
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02099
Register Paper ID - 259864
Title: WIRELESS CHARGING OF ELECTRICAL VEHICLE ON ROAD
Author Name(s): Madhushree R, Chetan K C, Ganesh V
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 685-692
Year: May 2024
Downloads: 143
Wireless Electric Vehicle Charging (WEVC) while drive is a ground breaking technologies aiming to enhance the practicality and efficiencies off electric vehicles (EVs). This methods eliminates the need for traditional plugs-in charging, allowing EVs to charge seamlessly while in motions. Through inductive power transfers, the vehicles receives electricity from embedded charging infrastructures on the roads. The system relies on electro-magnetic fields, enabling a continuous powers transfer to the EV's battery. WEVC not only addresses range anxiety by also contributes to a sustainable and conveniently EV ecosystem. Challenge such as efficiency optimizations, standardizations, and infrastructures deployments remain, emphasis the ongoing evolutions off this transformative technologies
Licence: creative commons attribution 4.0
Transformer, Model car, Transducers, Receiver, transmitter
Paper Title: GSM Based Prepaid Energy Meter With Automatic Billing And Power Theft Alert System
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02098
Register Paper ID - 259863
Title: GSM BASED PREPAID ENERGY METER WITH AUTOMATIC BILLING AND POWER THEFT ALERT SYSTEM
Author Name(s): Prof Sunil kumar P, Mohan R, Raja Pruthvi Nayaka, J Sai Pawan, Subramani T
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 673-684
Year: May 2024
Downloads: 171
GSM Based Prepaid Energy Meter with Automatic Billing and Theft Alert System" is a revolutionary project aimed at enhancing the efficiency and security of energy consumption management. This innovative system integrates GSM technology with traditional energy metering to provide a seamless and reliable solution.The system operates on a prepaid basis, allowing consumers to conveniently manage their energy usage by purchasing credits in advance. Through the integration of GSM technology, consumers can remotely recharge their energy meters using mobile phones, eliminating the need for physical interactions or manual interventions. Furthermore, the system incorporates an automatic billing feature, which generates accurate and timely invoices based on the energy consumed. This ensures transparent billing processes and eliminates disputes between consumers and utility providers. In addition to billing functionalities, the system is equipped with a theft alert mechanism that promptly notifies authorities in case of any tampering or unauthorized access to the energy meter. This enhances security measures and deters potential theft or misuse of electricity.Overall, the "GSM Based Prepaid Energy Meter with Automatic Billing and Theft Alert System" offers a comprehensive solution for efficient energy management, transparent billing, and enhanced security, ultimately contributing to sustainable energy practices and consumer empowerment.
Licence: creative commons attribution 4.0
Arduino,GSM SIM 800l,lCD Display,Power theft control,Analog Energy Meter.
Paper Title: SOLAR WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02097
Register Paper ID - 259862
Title: SOLAR WIRELESS ELECTRIC VEHICLE CHARGING SYSTEM
Author Name(s): Prof.Archana K, Raghu P V, M C Sindhu priyanka, Anusha C
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 668-672
Year: May 2024
Downloads: 152
Wireless Power Transfer [WPT] using the magnetic induction technology Developed a novel solar wireless electrical vehicle charging system integrating renewable energy and wireless technology. The system efficiently harnesses solar power to wirelessly charge electric vehicles, ensuring sustainability and convenience. Employing advanced electromagnetic resonance, it enables seamless transfer of energy between the charging pad and the vehicle. Through optimization algorithms, it maximizes energy capture and minimizes environmental impact. The system boasts robustness, reliability, and scalability, offering a promising solution for the future of electric vehicle charging infrastructure. Extensive simulations and real-world testing validate its performance and feasibility. This innovative system represents a significant step towards greener transportation and a sustainable energy ecosystem. Because of this more frequent rate, the battery's charging is rapid and great efficient. It will improve the experience of driving an EV. Through the introduction of WPT in an electric-powered vehicle, the obstacles of charging duration, distance, and cost can be conveniently managed. The WPT age is growing swiftly in the last few years.
Licence: creative commons attribution 4.0
Solar Electric Vehicle, Renewable energy resources, Photovoltaic cell
Paper Title: INVOLUNTARY DETECTION AND ALERTING OF POTHOLES AND HUMPS ON ROADS TO AID DRIVERS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02096
Register Paper ID - 259860
Title: INVOLUNTARY DETECTION AND ALERTING OF POTHOLES AND HUMPS ON ROADS TO AID DRIVERS
Author Name(s): Sana K Abdul Gani, Idrees Ahmad Khan Pathan, Rameez Raja
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 662-667
Year: May 2024
Downloads: 127
Spotted potholes and speed bumps are among the main causes of car accidents. One important factor in the economics of the nation is its well-maintained road network. One may draw a comparison between the significance of blood veins for humans and the relevance of road infrastructure in society. The quality of the road surface should be regularly inspected and fixed as needed. This research uses a combination of cutting-edge computer vision algorithms and sensor technologies to create an extensive system for automatic identification and alerting of roadway potholes and humps. The concept entails equipping cars with a variety of sensors, including as GPS units and accelerometers, in order to gather data on road conditions in real time
Licence: creative commons attribution 4.0
INVOLUNTARY DETECTION AND ALERTING OF POTHOLES AND HUMPS ON ROADS TO AID DRIVERS
Paper Title: DUAL AXIS SOLAR TRACKING WITH IOT-BASED LOAD SHEDDING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02095
Register Paper ID - 259802
Title: DUAL AXIS SOLAR TRACKING WITH IOT-BASED LOAD SHEDDING
Author Name(s): Sunil Kumar P, Dhanush D, K Abhishek, Patne Shirish Shivaji, Reddy Mallu P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 654-661
Year: May 2024
Downloads: 142
This project presents an innovative solution combining IoT technology with a dual-axis solar tracking system to optimize energy management through load shedding. Load shedding is essential for effective power distribution, especially in regions susceptible to energy shortages. The dual-axis solar tracking system enhances solar panel efficiency by dynamically adjusting its orientation to maximize sunlight exposure. Leveraging IoT capabilities, the system enables real-time monitoring and intelligent decision-making for load shedding based on energy demand and availability. This report outlines the design, implementation, and evaluation of the integrated system, showcasing promising results in energy efficiency and load-shedding effectiveness. The fusion of IoT and solar tracking technologies holds significant promise for addressing energy challenges and promoting sustainable energy practices in various settings.
Licence: creative commons attribution 4.0
Arduion uno, Battery cells,Lcd display,Dc motor,.Matlab simulator.
Paper Title: ONLINE MONITORING AND DETECTION OF FAULTS IN UNDERGROUND CABLES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02094
Register Paper ID - 259801
Title: ONLINE MONITORING AND DETECTION OF FAULTS IN UNDERGROUND CABLES
Author Name(s): Prof. V K Gupta, Chandana NM, Harshitha, Shree Raksha P Hegde, Deeba Altaf
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 645-653
Year: May 2024
Downloads: 129
In urban areas, electrical cables run underground instead of running over, because it does not affected by any adverse effect of weather such as heavy rainfall, snow, thunder storm. Whenever a fault occurs within the underground cable, it is difficult to detect the exact location of the fault for the repair process of particular cable. The proposed system found the point of the exact location of fault. This project is intended to detect the location of the fault in underground cable lines from the base station to exact location in kilometres using an Arduino micro controller kit. In the urban areas, the electrical cable runs in undergrounds instead of overhead lines. Whenever the fault occurs in underground cable it is difficult to detect the exact location of the fault for process of repairing that particular cable. The proposed system finds the exact location of the fault. This system uses an Arduino microcontroller kit and a rectified power supply. Here the current sensing circuits made with a combination of resistors are interfaced to Arduino microcontroller kit to help of the internal ADC device for providing digital data to the microcontroller representing the cable length in kilometres . The fault creation is made by the set of switches. The relays are controlled by the relay driver. A 16*2 LCD display connected to the microcontroller to display the information. In case of short circuit the voltage across series resistor changes accordingly, which is then fed to an ADC to develop precise digital data to a programmed Arduino microcontroller kit that further displays exact fault location from the base station in kilometres. In this project we used IOT thing speak for monitoring. We can monitor through our android phone the WIFI IOT.
Licence: creative commons attribution 4.0
Arduino microcontroller, LCD, ADC, Cable Fault, Relay, IOT.
Paper Title: DESIGN AND FABRICATION OF SOLAR POWER VACUUM CLEANER
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02093
Register Paper ID - 259799
Title: DESIGN AND FABRICATION OF SOLAR POWER VACUUM CLEANER
Author Name(s): Aruna YV, Anupama DN, Lavanya G, Ramya C
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 638-644
Year: May 2024
Downloads: 136
Since the non-renewable resources we now use are going to run out soon, renewable energy is crucial for the modern world. Saving these non renewable energy sources is one step closer with the solar-powered vacuum cleaner. We are more aware of and affected by the effects of climate change now than ever before. The technology that can support us in both our everyday lives and in preserving the environment. We present the Smart Solar dust collection as one workable option that can perfectly alter our way of life, if only slightly. A solar vacuum cleaner can aid in reducing pollution. To capture solar radiation, offer an improved surface for collecting dust, which benefits the environment
Licence: creative commons attribution 4.0
DESIGN AND FABRICATION OF SOLAR POWER VACUUM CLEANER
Paper Title: TRADITIONAL DATABASE AND ITS PAIN POINTS FOR IMAGE AND TEXT PROCESSING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02092
Register Paper ID - 259797
Title: TRADITIONAL DATABASE AND ITS PAIN POINTS FOR IMAGE AND TEXT PROCESSING
Author Name(s): Priyanka Desai, Ajay T, Amit Ganesh Bhat, Deepak R, Lohith Kumar H M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 630-637
Year: May 2024
Downloads: 142
Efficiency is one of major aspect of the software industry ever since its beginning, serving end-users quickly, and benefiting service providers cost-effetely. All parties involve getting an efficient system. A database management system is a essential part of all software systems effectively, so it makes sense to benchmark the performance of different DBMSs to find the most reliable one. This approach systematically synthesizes results and compare DBMS performance, providing suggestions for industry and research. Database management systems are today's most effective mean to organize data and collects that data which can be used for search and update operations. However, many database systems are available on the market each having their advantages and disadvantages in terms of reliability, usability, security, and performance.
Licence: creative commons attribution 4.0
TRADITIONAL DATABASE AND ITS PAIN POINTS FOR IMAGE AND TEXT PROCESSING
Paper Title: ACCIVUE: REAL TIME ROAD ACCIDENT DETECTION AND ALERT SYSTEM USING DEEP LEARNING NEURAL NETWORKS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02091
Register Paper ID - 259796
Title: ACCIVUE: REAL TIME ROAD ACCIDENT DETECTION AND ALERT SYSTEM USING DEEP LEARNING NEURAL NETWORKS
Author Name(s): Vijayalaxmi R Y, Anshuman Kumar Dwivedi, Anubhav Agnihotri, Himanshu Prasad, Nabin Acharya
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 624-629
Year: May 2024
Downloads: 142
Accidents in India have emerged as a leading cause of fatalities, predominantly attributable to delayed assistance reaching victims rather than the accidents themselves. Particularly in areas with sparse and high-speed traffic like highways, victims often endure prolonged unattended periods, amplifying the risk of fatal outcomes due to delayed medical intervention. This paper introduces AcciVue, a proactive system designed to bolster road safety by employing a real-time accident detection mechanism. AcciVue integrates deep learning neural networks, including Convolutional Neural Networks (CNNs) and Long Short-Term Memory (LSTM) networks[1], to analyze CCTV video feeds for timely accident detection. By promptly alerting nearby hospitals and police stations upon detection, AcciVue optimizes emergency response, mitigating accident repercussions and ultimately enhancing road user safety. This innovative approach showcases the transformative potential of deep learning technology in addressing the multifaceted challenges of road safety.
Licence: creative commons attribution 4.0
Accidents, Road Safety, Deep Learning, CNN, LSTM
Paper Title: REVOLUTIONIZING TALENT ACQUISITION: ADVANCING RESUME CLASSIFICATION WITH ITERATIVE LEARNING TECHNIQUE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02090
Register Paper ID - 259795
Title: REVOLUTIONIZING TALENT ACQUISITION: ADVANCING RESUME CLASSIFICATION WITH ITERATIVE LEARNING TECHNIQUE
Author Name(s): Asma Taj HA, Amith KB, Abdur Rehman
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 618-623
Year: May 2024
Downloads: 139
With the increasing volume of digital resumes, efficient and accurate classification is essential for effective talent acquisition.This research delves into the innovative application of gradient boosting algorithms, a subset of machine learning techniques, for the intricate task of resume classification in the domain of talent acquisition. Gradient boosting methodologies, renowned for their adeptness in iteratively refining predictive models by combining weak learners, present a compelling avenue for bolstering the precision and efficiency of resume categorization systems.Moreover, the research endeavors to unravel the interpretability of gradient boosting models, shedding light on their role in fostering transparency and equity in the recruitment ecosystem. Through this multifaceted inquiry, this study not only advances the frontier of machine learning applications in talent acquisition but also underscores the transformative potential of gradient boosting in revolutionizing resume classification practices, thereby empowering organizations to make data-driven and equitable hiring decisions.
Licence: creative commons attribution 4.0
Resume, Classification, Machine Learning.
Paper Title: A SOCIAL DISTANCE MONITORING SYSTEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02089
Register Paper ID - 259793
Title: A SOCIAL DISTANCE MONITORING SYSTEM
Author Name(s): Sudarsanan D, Prasun Kumar, Monish Krishna K
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 612-617
Year: May 2024
Downloads: 160
Social distancing strategies are crucial for halting the development of various air born disease and maintain the distance for various causes. To disrupt the cycle of dissemination, social Distancing is often adhered to carefully. This study presents a technique that may be used to detect instances of social distance breaches in public spaces such as ATMs, malls, and hospitals. By using the suggested approach, it would be easy to keep an eye on people to make sure they are keeping their social distance in the monitored area and to notify them when someone does not adhere to the established boundaries. Installing the suggested deep learning technology-based system will allow coverage up to a predetermined, restricted distance. To complete the task, the algorithm uses real-time IP camera footage. The simulated model employs a YOLO model trained on the COCO dataset to detect individuals in the frame, then deep learning methods with the OpenCV library to estimate the distance between them.
Licence: creative commons attribution 4.0
Deep learning, OpenCV YOLO model, COCO dataset, Image processing,
Paper Title: TRAFFIC PREDICTION FOR INTELLIGENT TRANSPORTATION SYSTEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02088
Register Paper ID - 259791
Title: TRAFFIC PREDICTION FOR INTELLIGENT TRANSPORTATION SYSTEM
Author Name(s): Karangula Navya, Dhanush M, G Chaithanya Reddy, Harshith K, Dhanush M N
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 606-611
Year: May 2024
Downloads: 133
Machine learning and feature extraction play a very importance in the Internet and health department. The traffic environment consists of everything that can affect traffic on the road, be it traffic lights, accidents, rallies, even road repairs that can cause a large amount of congestion. If we somewhat have imprecise prior information on all of the above and many other everyday situations that can affect traffic, then the driver or rider can make somewhat of an informative decision. Needless to say, it also helps in contributing to the future of autonomous vehicles! In the current decades, traffic data is significantly generated exponentially and we slightly have moved towards embracing big data concepts for transportation. This interesting fact really inspired us to somewhat work on the issue of traffic flow prediction, sort of based on traffic data and models.
Licence: creative commons attribution 4.0
Traffic prediction, Intelligent Transportation Systems, Random Forest and KNN
Paper Title: BREAST CANCER PREDICTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02087
Register Paper ID - 259790
Title: BREAST CANCER PREDICTION
Author Name(s): Prof.Shivakumar.M, Kokila R, Likitha B S, Tharun N, Adishesha.R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 600-605
Year: May 2024
Downloads: 138
This final-year project aims to analyse and detect Breast Cancer . Womens are highly suffered from breast cancer,with huge medical problems caused by a treatment(Morbidity) and destined to die(Mortality). Due to lack of prediction models the accuracy of prediction or detection of breast cancer if difficulty. Because of this the prediction time and the patient duration for sustaing time need to be prolonged. Hence to predict early the technique or model is designed to give prediction accuracy exactly. In this SVM, DT, GaussianNB and KNN are the four algorithms used to predict breast cancer results compared with large and different datasets. The proposed model is selected to predict the result of many techniques and correct technique is used depending upon the treatment. This model is based on getting and future studies can be done to predict other methods it can be categorised on basisi of other methods.
Licence: creative commons attribution 4.0
Breast Cancer, Machine learning, Support Vector Machine, Decision Tree, KNN and GaussianNB.
Paper Title: INTEGRATING COMPUTER VISION IN GAME DESIGN: A MULTI-GAME MENU SYSTEM POWERED BY OPENCV
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02086
Register Paper ID - 259788
Title: INTEGRATING COMPUTER VISION IN GAME DESIGN: A MULTI-GAME MENU SYSTEM POWERED BY OPENCV
Author Name(s): Megha Sharma, Sahil Raju Jadhav, M Shivashankar, Vinyas M S, Sharath M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 593-599
Year: May 2024
Downloads: 158
The rapid developments in machine learning and computer vision have revolutionized many industries, most notably the gaming business. This project makes use of OpenCV in conjunction with Tkinter, a popular Python GUI toolkit, to create an aesthetically pleasing and user-friendly menu system that enables simple and quick game selection. This project includes a menu that enhances interactivity inside four bespoke games (Quiz, Eat the Fruit, Rock-Paper-Scissors, and Number Guessing) by combining OpenCV's image recognition and gesture detection. These games strive to surpass user expectations and showcase the potential of computer vision in gaming by utilizing OpenCV's real-time responsiveness and dynamic interaction features. This invention raises the bar for interactive, user-centered game.
Licence: creative commons attribution 4.0
Computer Vision, OpenCV, Tkinter, Interactive Gaming, Game Selection Menu, Real-Time Interaction, Gesture Detection, Image Recognition, Gaming Innovation.
Published Paper ID: - IJCRTAB02085
Register Paper ID - 259786
Title: GENCHAT
Author Name(s): Priyanaka Desai, Sankarapu Jagati, Varshini C, Shrilakshmi D, SP Harshini Sheasha Sayee
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 587-592
Year: May 2024
Downloads: 142
Visually impaired people are not comfortable reading and writing. Hence, an application is being developed to enable blind individuals to read printed text with a camera by simply tapping on the screen using a speech engine. Additionally, a talking calculator has been designed so that visually impaired people can utilize it via voice commands. Alongside these features, several applications have been incorporated to assist blind individuals in their everyday lives. The application also displays the user's current location and provides weather information for any city or location. With the help of an object detection system, blind individuals can easily identify objects through the camera and listen to their names[1]. Furthermore, they can transfer money using a phone number or account number through a voice-based payment system implemented in the project. The application requires minimal effort from the user to be used effectively during daily activities. With the rapid growth of wireless communications, there is an increasing need for voice recognition techniques. Voice applications based on voice interfaces, recognition, and dialogue management can help users focus on their current tasks without requiring extra effort from their hands or eyes. The application listens to commands and responds with voice prompts.
Licence: creative commons attribution 4.0
OCR recognition, Calculator, location detector, Weather detector, text-to speech, Object detection, android
Paper Title: REAL-TIME MONITORING OF MACHINE HEALTH IN MANUFACTURING INDUSTRY -AN INDUSTRIAL IOT APPLICATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02084
Register Paper ID - 259785
Title: REAL-TIME MONITORING OF MACHINE HEALTH IN MANUFACTURING INDUSTRY -AN INDUSTRIAL IOT APPLICATION
Author Name(s): Jayashree N, Meghana D, Rakshitha A, Rohitha K N, Sharanya V
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 579-586
Year: May 2024
Downloads: 133
This proposal advocates for the integration of Industrial Internet of Things (IoT) technologies in the industry to enhance production efficiency and sustainability. Leveraging smart monitoring through IoT-based equipment, the initiative focuses on optimizing energy usage, detecting early machine failures, and ensuring precise temperature control. Implementation involves energy meters for daily voltage regulation, thermal sensors for cost-effective failure detection, and temperature sensors for climate control. By reducing downtime, operational costs are minimized, environmental impact is lowered, and pharmaceutical production becomes more sustainable and economically viable. This innovative approach aligns with the industry's high demand, promoting enhanced product quality, safety, and overall efficiency. In simpler terms, our strategy utilizes smart monitoring to keep machines running smoothly, save costs, and maintain pharmaceutical production quality and safety
Licence: creative commons attribution 4.0
Predictive Maintenance, Early detection, Reduce Downtime, Energy Optimization
Paper Title: ENCRYPTION USING AES AND VISUAL CRYPTOGRAPHY THROUGH LSB
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02083
Register Paper ID - 259784
Title: ENCRYPTION USING AES AND VISUAL CRYPTOGRAPHY THROUGH LSB
Author Name(s): Kavya V R, Nisarga S Gowda, Aishwarya P, Nafza A
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 573-578
Year: May 2024
Downloads: 133
A novel and highly secure encryption methodology using a combination of AES and visual crypto. With the ever-increasing human dependency on The Internet for performing various activities such as banking, shopping or transferring money, there equally exists a need for safe and secure transactions. This need automatically translates to the requirement of increased network security and better and fast encryption algorithms. This paper addresses the above issue by introducing a novel methodology by utilizing the AES method of encryption and also further enhances the same with the help of visual cryptography. In this method the secret message is divided into two parts after which the message the first half of the message is encrypted using AES and the second share of the message is embedded in the image using LSB.
Licence: creative commons attribution 4.0
ENCRYPTION USING AES AND VISUAL CRYPTOGRAPHY THROUGH LSB
Paper Title: DISTANCE BASED TOLL WAY AUTOMATION: "USING RFID and ANPR FOR CONTACTLESS & QUEUELESS TOLLS"
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02082
Register Paper ID - 259783
Title: DISTANCE BASED TOLL WAY AUTOMATION: "USING RFID AND ANPR FOR CONTACTLESS & QUEUELESS TOLLS"
Author Name(s): Shoma R S, Naveen Kumar C, Sangram Singh Thakur, Sharath N, Sridhar R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 567-572
Year: May 2024
Downloads: 176
"Distance-Based Toll Way Automation: Using RFID & ANPR for Contactless & Queue-less Tolls" presents a model aimed at showcasing an innovative approach to modernizing highway toll collection. Through the integration of Radio Frequency Identification (RFID) and Automatic Number Plate Recognition (ANPR) technologies, our model eliminates the need for physical toll gates, offering a contactless and queue-less tolling experience. Dynamic pricing mechanisms are introduced to ensure fairness in toll charges, promoting efficient resource allocation and optimizing revenue generation. By prioritizing data privacy and security, our model provides a user-friendly interface for commuters, enhancing overall satisfaction and promoting trust in the tolling system. While implemented at a demonstration scale, this model serves as a proof of concept for the feasibility and effectiveness of distance-based toll way automation. It represents a significant step towards realizing a more accessible, efficient, and equitable tolling infrastructure for highways, contributing to improved traffic management and urban mobility.
Licence: creative commons attribution 4.0
Toll way automation, RFID, ANPR ,Contactless toll collection, Queue-less tolls, Dynamic pricing, Highway infrastructure, Traffic management, Transportation technology, Tolling efficiency, Road safety, Urban mobility, Toll collection optimization
Paper Title: DETECTION OF DIABETIC EYE DISEASE FROM RETINAL IMAGES USING A DEEP LEARNING BASED ON CENTERNET AND DENSENET MODEL
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02081
Register Paper ID - 259781
Title: DETECTION OF DIABETIC EYE DISEASE FROM RETINAL IMAGES USING A DEEP LEARNING BASED ON CENTERNET AND DENSENET MODEL
Author Name(s): Sapna, Jaipriya M, Pavithra Sri S, Kausalya V, Abhinaya K
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 560-566
Year: May 2024
Downloads: 137
Diabetic patients are prone to eye disease called Diabetic Retinopathy that affects blood vessels of the retina of diabetic patients. Diabetic retinopathy stands as a foremost cause of vision impairment globally. The earliest diabetes-related changes in the retina are often imperceptible and have minimum impact in the vision and thus approximately one third of the diabetic patients have DR but show no symptoms, leading to the progression of the disease untreated. The complexity of screening methodologies for diabetic eye diseases and the shortage of adequately trained personnel render the development of effective screening-oriented treatments a financially burdensome endeavor. Our proposed framework demonstrates proficiency in accurately localizing and categorizing disease lesions within retinal images thus facilitating automated detection and recognition of diabetic retinopathy, thus enabling early detection for efficient treatment with low cost and high accuracy
Licence: creative commons attribution 4.0
Diabetic Eye Disease, Diabetic Retinopathy, Deep Learning, Retinal Disease.
Paper Title: SIGNATURE FORGERY DETECTION USING ONE-SHOT LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02080
Register Paper ID - 259779
Title: SIGNATURE FORGERY DETECTION USING ONE-SHOT LEARNING
Author Name(s): Bharani B R, Suman Singh, Nikhil Parag, Keerthana
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 554-559
Year: May 2024
Downloads: 127
Recently, the problem of signature forgery detection attracted significant attention due to various applications: banking, legal, and security . Existing methods require extensive volumes of data for training, making signature detection less accurate and convenient. This paper designs a novel methodology for signature forgery detection that requires one-shot learning.Furthermore, we introduce a novel similarity metric tailored for signature forgery detection, which captures the subtle differences between genuine and forged signatures. This metric facilitates the identification of forged signatures even in cases where the forgeries closely resemble genuine signatures.By training the siamese network on the genuine signature samples, we produced the synthetic forgery samples using sufficiently powerful data augmentation techniques which can allow the network to learn and easily differentiate between the genuine and the forgery signature samples. Our proposed method outperforms existing approaches and demonstrates a high potential for implementation in practice across various realms where the signature authentication needs for security and authenticity verfication.
Licence: creative commons attribution 4.0
Signature forgery detection, One-shot learning, Siamese neural networks, Data augmentation, Similarity metric
Paper Title: Elevate the Online Shopping Experience using Augmented Reality (AR) and Artificial Intelligence (AI) for Enhanced Apparel Recommendations
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02079
Register Paper ID - 259777
Title: ELEVATE THE ONLINE SHOPPING EXPERIENCE USING AUGMENTED REALITY (AR) AND ARTIFICIAL INTELLIGENCE (AI) FOR ENHANCED APPAREL RECOMMENDATIONS
Author Name(s): Loganathan D, Aman Kumar Mishra, Aniket Kumar, Janardhan M, Manikant Kumar
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 547-553
Year: May 2024
Downloads: 170
Utilizing cutting-edge technology solutions, the integration of Artificial Intelligence and Augmented Reality has significantly enhanced the traditional clothing shopping experience. Customers can virtually try on clothing and accessories, all from the comfort of their own homes. With specialized software and 3D modelling, customers can upload their images or avatars and virtually "try on" various outfits in real-time, achieving a higher degree of accuracy in sizing and fit predictions. This cutting-edge concept offers an immersive and highly interactive shopping experience, empowering customers to not only see how different clothing items fit and look on them but also providing accurate size recommendations through AI technology. Additionally, the integration of AR in virtual trial rooms enhances the virtual shopping experience by allowing customers to explore products in a more realistic and engaging way, ultimately enhancing their confidence in making online fashion purchases while reducing the need for physical store visits.(Abstract) Keywords-- Artificial Intelligence, 3D, machine learning, Augmented Reality
Licence: creative commons attribution 4.0
Elevate the Online Shopping Experience using Augmented Reality (AR) and Artificial Intelligence (AI) for Enhanced Apparel Recommendations
Paper Title: ATTENDANCE SYSTEM USING FACIAL RECOGNITION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02078
Register Paper ID - 259776
Title: ATTENDANCE SYSTEM USING FACIAL RECOGNITION
Author Name(s): Megha Sharma, Gayathri M S, Gayathri Madhumitha G S, Kahkashan
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 542-546
Year: May 2024
Downloads: 180
The face is an important part of the human body, it recognizes people in huge gatherings. The recognition of face has gained the attention of many researchers and has subsequently become the standard benchmark in the human recognition space. An attendance system using facial recognition is a type of biometric technology. It identifies and verifies the identity of a person from a digital image. Accurate attendance records are critical to class evaluation. However, manual attendance tracking can lead to errors, missed students, or duplicate records. A class image is taken and the RECOGNIZER python file is run. Attendance is done by cropping the faces in the image and it is comapared with the database faces.
Licence: creative commons attribution 4.0
Python; OpenCV and Google API; Student attendance; Face recognition
Paper Title: DETECTION OF FAKE CURRENCY USING MACHINE LEARNING TECHNIQUES
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02077
Register Paper ID - 259774
Title: DETECTION OF FAKE CURRENCY USING MACHINE LEARNING TECHNIQUES
Author Name(s): Karangula Navya, Baksam Chiranjeevi, Danush M, Hariharan M S, Lalith Kumar S
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 536-541
Year: May 2024
Downloads: 175
The proliferation of fake currency presents a significant and multifaceted challenge, posing a genuine threat to both the welfare of individuals and the stability of our national economy. While counterfeit detection systems are prevalent in banks and corporate environments, their accessibility to the general public and small enterprises remains limited, leaving them susceptible to counterfeit currency. advanced image processing techniques. This currency verification system has been fully developed using the Python language within the Jupyter Notebook environment.
Licence: creative commons attribution 4.0
Fake currency, counterfeit detection, image processing, feature extraction, Bruteforce matcher
Paper Title: FIRE FIGHTING ROBOT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02076
Register Paper ID - 259773
Title: FIRE FIGHTING ROBOT
Author Name(s): Bharani B R, Vinay N, Vasu S, Yashas V
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 531-535
Year: May 2024
Downloads: 155
This abstract presents a cutting-edge autonomous firefighting robot system designed to tackle the escalating challenges posed by fires worldwide. Integrating robotics, artificial intelligence, and advanced firefighting equipment, the system offers a versatile and effective solution for extinguishing fires while prioritizing the safety of both responders and civilians. Equipped with sensors for heat, smoke, and obstacle detection, the robot navigates complex environments with precision, swiftly locating and suppressing fires using high-pressure water cannons or foam dispensers. Powered by sophisticated algorithms for autonomous operation, the robot demonstrates remarkable adaptability and efficiency in dynamic firefighting scenarios. With built-in safety features and validated effectiveness through rigorous simulations and real-world experiments, this system represents a significant leap forward in firefighting technology, promising to enhance response capabilities and minimize risks in the face of escalating fire emergencies.
Licence: creative commons attribution 4.0
Firefighting robot, prototype, sensors, navigation, fire suppression
Paper Title: T20 CRICKET WORLD CUP 2024 PREDICTION USING MACHINE LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02075
Register Paper ID - 259771
Title: T20 CRICKET WORLD CUP 2024 PREDICTION USING MACHINE LEARNING
Author Name(s): Sudarsanan D, Mohammed Mafaaz Chandwale, Ryan Ahmed, Harsh Nath Mishra
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 526-530
Year: May 2024
Downloads: 175
This study applies machine learning (ML) techniques to predict Cricket World Cup winners, using historical data, team performances, and player stats. Comprehensive datasets from past tournaments are analyzed with algorithms like Random Forests and Logistic Regression, enhanced through cross-validation. Models are trained on diverse match scenarios and team performance data, aiming to forecast the champion accurately
Licence: creative commons attribution 4.0
Component, formatting, style, styling, insert.
Paper Title: ENHANCING LIBRARY CHATBOT USING MACHINE LEARNING WITH READ ALOUD TECHNOLOGY
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02074
Register Paper ID - 259770
Title: ENHANCING LIBRARY CHATBOT USING MACHINE LEARNING WITH READ ALOUD TECHNOLOGY
Author Name(s): Loganathan D, Navya Shree A, Saatwik Naik, Sagar C, Usha V A
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 518-525
Year: May 2024
Downloads: 169
Enhancing Library Chatbot Using Machine Learning with Read-Aloud Technology project aims to enhance user experiences and Uses streamline Framework as it's Front end and leveraging conversational AI technology. This Chatbot will serve as a virtual assistant, providing users with quick and convenient access to information about library resources, such as books, opening hours, and events. Additionally, it will assist in answering common library-related questions, guiding users through the library's physical layout, and recommending books based on their preferences. The Chatbot will offer 24/7 support. It will incorporate natural language processing capabilities to understand and respond to user queries effectively and has Read-aloud technology.
Licence: creative commons attribution 4.0
Library Chatbot, Read aloud Technology, machine learning
Paper Title: NETWORK BREACH PREDICTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02073
Register Paper ID - 259768
Title: NETWORK BREACH PREDICTION
Author Name(s): Kavya V R, Bhagya Ravi Kumar, Divya G R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 514-517
Year: May 2024
Downloads: 115
Establishing data for an Intrusion Detection System (IDS) typically entails configuring the actual working environment to explore potential attacks, a process that can be prohibitively costly. However, such software is crucial for safeguarding computer networks against unauthorized access, including from potential insiders. The task of training an intrusion detector involves developing a predictive model, often a classifier, capable of distinguishing between "bad" connections (intrusions or attacks) and "good" regular connections.To address the expense and complexity associated with real-world testing, this study focuses on predicting whether connections are under attack using the KDDCup99 dataset and various machine learning methods. The objective is to enhance packet connection predictions for better accuracy, particularly in identifying DOS, R2L, U2R, Probe, and overall attacks. This involves evaluating and comparing supervised classification algorithms to identify the most accurate predictive results. Additionally, the study assesses algorithm performance through classification reports, confusion matrices, and data prioritization.
Licence: creative commons attribution 4.0
Paper Title: CANEGUIDEX: SMART OBSTACLE RECOGNITION AND VOICE ASSISTANT FOR THE BLIND
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02072
Register Paper ID - 259767
Title: CANEGUIDEX: SMART OBSTACLE RECOGNITION AND VOICE ASSISTANT FOR THE BLIND
Author Name(s): Sunil Kumar K N, Mahalakshmi K, Gayathri T, Amulya A
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 506-513
Year: May 2024
Downloads: 155
"CaneGuideX" incorporates sophisticated equipment to assist the blind. It enhances safety and liberty for individuals exploring new situations by using smart obstacle detection algorithms to detect and evaluate their surrounds in real-time. It offers clear direction and thorough descriptions of barriers through voice aid, making navigation simple and effective. By providing thoughtful, proactive assistance, this ground-breaking technology transforms the way blind people use canes, allows them to move with assurance and independence. With its ability to extend the gap between those with blind people and the surroundings around them and promote greater diversity and autonomy in daily activities, CaneGuideX is a significant leap in accessibility technology.
Licence: creative commons attribution 4.0
Obstacle Detection, YOLO, Deep Learning, Raspberry pi, Text-to-Speech(tts).
Paper Title: SMART VEHICLE PARKING SYSTEM ON FOG COMPUTING FOR EFFECTIVE RESOURCE MANAGEMENT
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02071
Register Paper ID - 259766
Title: SMART VEHICLE PARKING SYSTEM ON FOG COMPUTING FOR EFFECTIVE RESOURCE MANAGEMENT
Author Name(s): Shoma R S, Mubarak Pasha M, Rakesh M, Rakshith Kumara R, R Dhanush Kumar
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 501-505
Year: May 2024
Downloads: 173
The rising number of vehicles on roads has led to like increased demand for parking spaces, necessitating more efficient and super responsive parking systems. This abstract proposes a super cool smart car parking system utilizing fog computing technology to address so many latency issues inherent in those conventional systems! By employing a combination of many sensors, cameras, and edge devices, the proposed system gathers and processes parking-related data in really real-time, generating like really significant data volumes that require so efficient management! Fog computing extends cloud services to that network edge, reducing latency and congestion by processing data closer to its source. However, resource management remains a such as challenge in fog computing implementation, requiring effective allocation of computing resources across edge devices to really optimize throughput and reduce latency. This research contributes to the development of intelligent parking systems by proposing a fog computing-based approach that optimizes resource utilization and enables real-time processing for efficient parking management.
Licence: creative commons attribution 4.0
SMART VEHICLE PARKING SYSTEM ON FOG COMPUTING FOR EFFECTIVE RESOURCE MANAGEMENT
Paper Title: Voice Controlled Autonomous Vehicle For Physically Challenges Civilians
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02070
Register Paper ID - 259765
Title: VOICE CONTROLLED AUTONOMOUS VEHICLE FOR PHYSICALLY CHALLENGES CIVILIANS
Author Name(s): Jayashree N, Mohammed Moin Ulla Khan, Nafisa Banu G, Poornima B, Sneha V
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 495-500
Year: May 2024
Downloads: 197
They are used to doing work that humans cannot perform. Hand gestures and voice are two of the most powerful communication techniques. Robotics can be used in many of these scenarios to minimize human error and to make work safer and easier. Defense, industrial robotics, vehicle part assembling industries in the civil side and medical field for surgery are the major fields that prefer hand gesture/voice recognition robots. Robot devices are tougher to control with the help of buttons and switches. It will get difficult and tedious to operate buttons and remote controls.Our project deals with the interface of robots through voice and gesture control. The purpose of this gesture recognition and voice recognition method is to capture human hand gestures, voice and perform applications and move in an individual path that meets the user's demands. This project aims to use these two methods to control a robotic car from a long distance without using any physical contact.
Licence: creative commons attribution 4.0
Voice Controlled Autonomous Vehicle For Physically Challenges Civilians
Paper Title: AUTOMATION ENGINE LOCKING THROUGH ALCOHOL DETECTION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02069
Register Paper ID - 259764
Title: AUTOMATION ENGINE LOCKING THROUGH ALCOHOL DETECTION
Author Name(s): Preethi S, Kaushik P, Kavya N, Kuruba Suresh, Madhuri R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 490-494
Year: May 2024
Downloads: 134
The current situation indicates that drunk driving is the primary cause of traffic accidents. Every manual effort aimed at curbing alcohol-related driving is undermined by law enforcement officials limited capabilities. Thus the requirements for an alcohol detection device that is not limited by time or space exists .This project describes the layout and focus of an Arduino UNO and ultrasonic sensor-based engine locking alcohol detector for automobiles. When the amount of alcohol in the alcohol detection sensor rises above a certain threshold, the equipment will continuously measure the alcohol content and cut off the vehicle's engine. The concept offers a practical way to reduce drink driving-related accidents.
Licence: creative commons attribution 4.0
Arduino UNO, MQ3 Sensor, Buzzer, LED, DC Motor , Relay Switch
Paper Title: SEARCH JOB ROLES WITH RIGHT SET OF SKILLS USING DATA ANALYSIS AND VISUALIZATION SYSTEM-SKILLSYNC.
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02068
Register Paper ID - 259763
Title: SEARCH JOB ROLES WITH RIGHT SET OF SKILLS USING DATA ANALYSIS AND VISUALIZATION SYSTEM-SKILLSYNC.
Author Name(s): Asma Taj H A, Shekh Md moinuddin, Syed shariq kamran, Selim jhangir, Murari kumar
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 483-489
Year: May 2024
Downloads: 168
SkillSync is the bridge that connects talent to opportunity, offering an open-source platform where skills are showcased, discovered, and perfectly matched with the ideal job roles. This project seeks to revolutionize the way we approach the workforce, providing a plethora of benefits, including enhanced efficiency, reduced costs, and an expansive network of skills that now have the chance to shine
Licence: creative commons attribution 4.0
Component, formatting, style, styling, insert.
Paper Title: NETWORK INTRUSION DETECTION SYSTEM USING ML
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02067
Register Paper ID - 259762
Title: NETWORK INTRUSION DETECTION SYSTEM USING ML
Author Name(s): Anusha B, L S Sai Harika, Nikhil Kumar, Diksha Manu
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 477-482
Year: May 2024
Downloads: 113
In the face of increasingly complex cyber threats, the necessity for robust Network Intrusion Detection Systems (NIDS) has never been greater. Conventional rule-based systems often struggle to keep pace with evolving attack methodologies, necessitating the integration of machine learning (ML) techniques to bolster detection capabilities. This paper puts forward an innovative NIDS approach that leverages ML algorithms to effectively detect and mitigate network intrusions. Our proposed system utilizes supervised learning algorithms trained on labelled network traffic data to differentiate incoming traffic as normal or malicious. By harnessing extensive labelled data, our system can discern intricate patterns and anomalies indicative of malicious activities, thereby enhancing detection accuracy and reducing false positives. Additionally, the system incorporates detection methods for anomalies in network traffic to uncover previously unseen threats by detecting deviations from established baseline behaviour. Key features of our NIDS include real-time monitoring, scalability to accommodate large network infrastructures, and adaptability to dynamic environments. Through Ongoing adaptation through the incorporation of fresh data and refinement of detection algorithms, our system offers proactive defence against a wide spectrum of cyber threats, including known and zero-day attacks. In our evaluation, we demonstrate the effectiveness of our ML-based NIDS through comprehensive experimentation on diverse datasets, demonstrating its enhanced effectiveness in comparison to traditional rule-based approaches. Our results underscore significant enhancements in both detection rates and false positive mitigation, underscoring the potential of ML in bolstering network security defences against evolving cyber threats.
Licence: creative commons attribution 4.0
NETWORK INTRUSION DETECTION SYSTEM USING ML
Paper Title: STOCK MARKET PRICE PREDICTION USING DECISION TREE AND MACHINE LEARNING ALGORITHMS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02066
Register Paper ID - 259761
Title: STOCK MARKET PRICE PREDICTION USING DECISION TREE AND MACHINE LEARNING ALGORITHMS
Author Name(s): Shivakumar M, Syed Siddiq Pasha, Vikas, Chethan Reddy HR, Rahul SV
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 471-476
Year: May 2024
Downloads: 139
The main cause of this article is to find the great version to predict market charges. while we recollect the many strategies and adjustments to recall, we discover that strategies which includes random forests and support vector machines are ineffective. In this newsletter, we are able to recommend and examine a extra powerful technique to more appropriately are expecting the movement of items. First, we don't forget enterprise rate information from the previous year. The data set is pre-processed and adjusted for accurate evaluation. because of this, our article also specializes in preliminary information of the authentic facts. Secondly, after finishing the initial information, we are able to look at using random forests and assist vector machines on statistics units and the effects they produce. similarly, this study examines using these estimates within the real global and the problems associated with the accuracy of these values. the object additionally introduces gadget mastering fashions to expect the lifespan of competitive products. The successful supplying of merchandise will become a superb fee for companies and provide real answers to the issues faced by means of investors.
Licence: creative commons attribution 4.0
STOCK MARKET PRICE PREDICTION USING DECISION TREE AND MACHINE LEARNING ALGORITHMS
Paper Title: STUDENT CAREER GUIDANCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02065
Register Paper ID - 259760
Title: STUDENT CAREER GUIDANCE
Author Name(s): Santosh M, Vidya, Sushma, Yogananda
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 466-470
Year: May 2024
Downloads: 131
Upon completing higher secondary education, students around the globe often find themselves at a crossroads, unsure of which career path to pursue. This pivotal moment demands a level of maturity and self-awareness that many students may not yet possess. As individuals progress through these stages, they inevitably confront the question of what to pursue post-graduation. Our proposed solution tackles this challenge with a computerized career guidance system. By objectively assessing individual skills, this system aims to predict the most suitable career path for each student. Through this process, we aim to provide clarity and direction as students navigate their academic and professional journey.
Licence: creative commons attribution 4.0
Counsell Career, Learning Algorithms for machines, Classification(key words)
Paper Title: SMART SAFETY MONITORING SYSTEM FOR SEWAGE WORKERS WITH TWO WAY COMMUNICATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02064
Register Paper ID - 259759
Title: SMART SAFETY MONITORING SYSTEM FOR SEWAGE WORKERS WITH TWO WAY COMMUNICATION
Author Name(s): Anusha.B, Shreyas M, Trishya V, Ventakesh Raju G, Y Shireesha
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 458-465
Year: May 2024
Downloads: 140
A large number of sanitation workers die every year due to erratic and lack of facilities available, and harmful toxic gases released while cleaning the sewage. This can include monitoring the environment for air quality, temperature, humidity, and sound levels, as well as tracking employee activity and movement. This project aims to develop an innovative Smart Safety Monitoring System (SSMS) for sewage workers, leveraging the capabilities of the Internet of Things (IoT) technology. Real time health monitoring systems for such workers will prove helpful. Sewage workers face numerous risks while performing their duties in confined and hazardous environments. The SSMS is designed to enhance their safety and improve communication. This real time health monitoring device will work in a sewage as a safety equipment. In this project, the device presented will monitor the pulse rate of a person using a pulse oximetry sensor, the methane concentration and the atmospheric oxygen concentration and provide alert to worker and exterior unit. when parameters deviate from the safe range. This parameters in real time will promptly alert the workers to stay safe and detect toxic gases before any harm.
Licence: creative commons attribution 4.0
SMART SAFETY MONITORING SYSTEM FOR SEWAGE WORKERS WITH TWO WAY COMMUNICATION
Paper Title: INTELLIGENT FLOOD FORECASTING SYSTEM EMPOWERED BY MACHINE LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02063
Register Paper ID - 259758
Title: INTELLIGENT FLOOD FORECASTING SYSTEM EMPOWERED BY MACHINE LEARNING
Author Name(s): Dr Preethi S, Kausthub K S, Hemanth M U, Harshavardhan R, Likith A N
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 453-457
Year: May 2024
Downloads: 97
A groundbreaking flood prediction system emerges, blending meteorological, hydrological, and geospatial data with crowd-sourced inputs, all harmonized within a dynamic machine learning structure. Rigorous assessments affirm its prowess, particularly noting the efficacy of a multi-layer perceptron artificial neural network (MLP ANN) setup in delivering precise forecasts. This pioneering methodology harbors promise in bolstering flood mitigation tactics, streamlining preemptive actions, and fortifying rescue endeavors. This cutting-edge approach marks a pivotal advancement in flood management, poised to revolutionize how communities respond to and mitigate the impacts of inundation events.
Licence: creative commons attribution 4.0
INTELLIGENT FLOOD FORECASTING SYSTEM EMPOWERED BY MACHINE LEARNING
Paper Title: HEART DISEASE PREDICTION SYSTEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02062
Register Paper ID - 259757
Title: HEART DISEASE PREDICTION SYSTEM
Author Name(s): Santosh M, Bindu K V, Bhagyalakshmi N, Arolene cynthia, Kausalya R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 446-452
Year: May 2024
Downloads: 144
Cardiovascular diseases, particularly heart disease, remain a leading cause of mortality worldwide, necessitating advanced diagnostic systems that leverage clinical data for early and accurate prediction. Machine Learning integration techniques, particularly ensemble methods, is a way that enhances the precision and reliability of predictive models for heart disease diagnosis. The complex nature of heart diseases demands a comprehensive analysis of clinical data to derive actionable insights. While traditional diagnostic approaches have relied on individual risk factors, the combination of diverse clinical parameters offers a more broad perspective, enabling a more understanding and prediction of cardiovascular outcomes.
Licence: creative commons attribution 4.0
Data Classification, Learning Algorithms for machines, Data Analysis
Paper Title: CONVOLUTIONAL YOGA POSE ESTIMATOR
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02061
Register Paper ID - 259756
Title: CONVOLUTIONAL YOGA POSE ESTIMATOR
Author Name(s): Vijayalaxmi Yalavagi, Impana S, Chethan M, Chandan L, Geetha Tadasad B
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 438-445
Year: May 2024
Downloads: 153
Yoga pose estimation is a computer vision technique used to predict the position/ pose of a part of the human body. This paper presents the framework to analyse and assess yoga postures by designing, developing, and implementing a Yoga Posture Detection System using computer vision and deep learning (DL) models such as CNN and VGG16. The study employs advanced image processing algorithms to extract information from images or videos of individuals performing yoga poses. We employed several postures which includes camel, downdog, goddess, plank, tree, and warrior2. With the use of a deep learning model that has been built, the system is able to precisely recognise and categorise different positions while providing instantaneous feedback on proper alignment, balance, and posture.
Licence: creative commons attribution 4.0
CONVOLUTIONAL YOGA POSE ESTIMATOR
Paper Title: SPEECH BASED EMOTION RECOGNITION USING 1D AND 2D CNN LSTM NETWORKS
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02060
Register Paper ID - 259750
Title: SPEECH BASED EMOTION RECOGNITION USING 1D AND 2D CNN LSTM NETWORKS
Author Name(s): Dr Buddesab, Ajith Kumar SM, Akshay B, Hemanth SR, NJS Vallabh
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 431-437
Year: May 2024
Downloads: 150
To label this, a paper has been initiated to create a machine learning model for Speech emotion recognition (SER) involves the identification of emotions conveyed in spoken language through analysis of speech signals. With the growing popularity of voice assistants and smart speakers, SER has gained significant attention in recent years. One approach to SER is to use deep learning models such as "Convolutional Neural Networks " (CNNs) and Long Short-Term Memory (LSTM) networks. In this particular paper, we suggest a novel approach for SER using a 2D CNN- LSTM architecture. The proposed model first uses a 2D CNN to extract the relevant characterstics from the speech signal, followed by a LSTM network for sequence modeling. We evaluated our proposed model on the Berlin Emotional Speech Database (EMO-DB), achieving state-of-the-art results. We also balance our model's performance with other existing SER models and found that our suggested model outperformed them. Our speculative results shows that the proposed 2D CNN-LSTM architecture is an effective method for SER and can be used in real-world applications such as recognition of emotion from voice assistants, call centers, and customer service applications.
Licence: creative commons attribution 4.0
Paper Title: COMPARATIVE ANALYSIS OF REINFORCEMENT LEARNING ALGORITHMS USING A PONG GAME
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02059
Register Paper ID - 259749
Title: COMPARATIVE ANALYSIS OF REINFORCEMENT LEARNING ALGORITHMS USING A PONG GAME
Author Name(s): Dr.Varalatchoumy M, Dr. Buddesab, Manu R, B Madiha Hafsa, GV Sai Koushik, Kajal Singh
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 424-430
Year: May 2024
Downloads: 133
This paper conducts a comparative analysis of four reinforcement learning (RL) algorithms--Q-learning, Deep Q-Networks (DQN), SARSA, and Proximal Policy Optimization (PPO)--using the Pong game as a benchmark. Each algorithm's performance, convergence rate, and computational efficiency are evaluated. Results indicate that while Q-learning and SARSA exhibit simplicity, they struggle with discrete action spaces. DQN, with its capability to handle continuous action spaces, shows improved performance but requires longer training times. PPO demonstrates a balance between sample efficiency and computational complexity, achieving faster convergence and superior performance. This Examination sheds light on selecting appropriate RL algorithms for real-world applications.
Licence: creative commons attribution 4.0
Reinforcement Learning, Pong Game, Q-learning, DQN, SARSA, PPO, Comparative Analysis, Performance Evaluation, Convergence Rate, Computational Efficiency.
Paper Title: A COMPARATIVE ANALYSIS OF VISION TRANSFORMERS AND BEiT MODELS FOR IMAGE CLASSIFICATION
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02058
Register Paper ID - 259747
Title: A COMPARATIVE ANALYSIS OF VISION TRANSFORMERS AND BEIT MODELS FOR IMAGE CLASSIFICATION
Author Name(s): R Geetha, Dr Buddesab, Deepa Shree L, Lisha M, P Aaditya,T Shivani
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 417-423
Year: May 2024
Downloads: 133
In recent years, transformer-based models have reshaped the landscape of computer visions, particularly in image classification tasks Vision Transformers (ViT) and BEiT (BERT Pre-Training of Image Transformers) stand out as notable examples, employing self-attention mechanisms. This paper presents a detailed comparative analysis of ViT and BEiT, aiming to elucidate their performance, strengths, weaknesses, and interpretability in image classification Through extensive experimentation across diverse benchmark datasets like CIFAR-10, CIFAR-100, and ImageNet[1], we evaluate the models based on classification accuracy, training efficiency, generalization capability, and robustness to adversarial perturbations Our findings offer insights at nuanced differences between ViT and BEiT, revealing ViT's efficiency and small-scale datasets, while highlighting BEiT's enhanced robustness to adversarial attacks and domain shifts Furthermore, we research the interpretability of learned representations and visualize attention patterns generated. The ability to capture meaningful image features and the comparative analysis not merely informs practitioners and researchers in computer visions but also paves the way for further advancements in transformer-based architectures for visual understanding.
Licence: creative commons attribution 4.0
Transformer-based Models, Vision Transformers, BEiT, Image Classification, Self-Attention Mechanisms, Comparative Analysis, Interpretability, Robustness, Adversarial Attacks, Computer Vision.
Paper Title: GENERATIVE AI (GEN AI) BASED VIDEO GENERATION FOR CLASSICAL DANCE
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02057
Register Paper ID - 259745
Title: GENERATIVE AI (GEN AI) BASED VIDEO GENERATION FOR CLASSICAL DANCE
Author Name(s): Dr. D. Antony Louis Piriyakumar, Dr Buddesab, Girish Chandra Saxena, Mohammed Adnan, Vidya Bharti, Abhisekh Kumar
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 411-416
Year: May 2024
Downloads: 145
This paper introduces an innovative fusion of classical dance and artificial intelligence, focusing on the esteemed art form of Bharatanatyam. Our pioneering framework harnesses the power of Generative AI techniques to revolutionize both the creation and experience of Bharatanatyam performances. Through advanced machine learning models, textual descriptions are seamlessly translated into visually captivating dance sequences, effectively capturing the essence and intricacies of this ancient art form. The system not only facilitates the creation of choreography but also offers a user-friendly interface tailored for artists, enthusiasts, and learners alike, thereby fostering unprecedented engagement with Bharatanatyam. By meticulously preserving the grammatical structure and predefined steps inherent in Bharatanatyam, our approach ensures an authentic representation of this rich cultural heritage. Moreover, this project serves as a catalyst for revitalizing classical dance by infusing it with cutting-edge technology, while simultaneously encouraging creative exploration and interpretation. We firmly believe that this harmonious convergence of tradition and technology will not only redefine the boundaries of artistic expression but also significantly impact the future trajectory of cultural preservation and appreciation.
Licence: creative commons attribution 4.0
Bharatanatyam, Generative AI, Dance Creation, Cultural Heritage, Artistic Expression.
Paper Title: DEEPFAKE VIDEO AND TEXT DETECTION USIG LSTM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02056
Register Paper ID - 259744
Title: DEEPFAKE VIDEO AND TEXT DETECTION USIG LSTM
Author Name(s): Sumarani H, Dr. Buddesab, Darshil Shukla, Manish Kumar, Anand M Nambiar, Nitesh Kumar Sahu
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 403-410
Year: May 2024
Downloads: 138
This paper presents a comprehensive framework for combating fake news by integrating deepfake video detection and text analysis techniques. With the proliferation of misinformation, especially through deepfake technology, there is an urgent need for robust detection methods. Our approach involves extracting text from social media posts, generating interrogative sentences, querying a web server for relevant information, and summarizing the authenticity of news, videos, or posts. By combining advanced AI algorithms for deepfake detection and text analysis, our framework offers a powerful solution to enhance the credibility of news sources and combat the spread of misinformation in digital media. Keywords-- Deepfake video detection, Text analysis, Fake news detection, Misinformation, Artificial intelligence (AI), Generative AI, Deep learning (DL), Natural language processing (NLP), social media, Web server querying, Factchecking, Digital media ecology.
Licence: creative commons attribution 4.0
Deepfake video and Text Detection, LSTM, Artificial intelligence (AI), Generative AI, Deep learning (DL), Natural language processing (NLP).
Paper Title: Driver Drowsiness Detection Using Deep Learning
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02055
Register Paper ID - 259743
Title: DRIVER DROWSINESS DETECTION USING DEEP LEARNING
Author Name(s): Meghana M, P Anupama, Sandhya A, V Sadhana, Mrs. Ashalatha C R
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 397-402
Year: May 2024
Downloads: 130
This paper presents a novel approach to driver sleep detection using deep learning techniques to enhance road safety. With the increasing number of accidents caused by drowsy driving, an effective detection system is needed. Our framework uses convolutional neural networks (CNNs) to analyze facial expressions, eye movements and head positions captured by an in-vehicle camera While extracting meaningful features from these inputs , the proposed model differentiates driver warning and sleep states accurately in real time. RNNs) are employed to further improve detection performance Extensive tests on various datasets demonstrate the efficiency and robustness of the proposed method under various lighting conditions and driver characteristics enable integration in onboard systems a it already exists without it. Overall, the proposed deep learning-based method provides a practical and reliable solution to enhance road safety by better detecting driver sleep in world conditions in the self-contained.Cambridge Institute of technology Bangalore, India
Licence: creative commons attribution 4.0
Driver Drowsiness Detection Using Deep Learning
Paper Title: Detection of Myocardial Infarction Using ECG Images
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02054
Register Paper ID - 259742
Title: DETECTION OF MYOCARDIAL INFARCTION USING ECG IMAGES
Author Name(s): Dr.Buddesab, Bhavya Shree C S, Bhuvana C Basavanand, D V Veena, Varsha P
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 390-396
Year: May 2024
Downloads: 132
This paper presents an innovative approach for myocardial infarction (MI) detection through an ensemble of three distinct models: Support Vector Machine (SVM), Random Forest, and Convolutional Neural Network (CNN). Trained on labeled electrocardiogram (ECG) image datasets, each model is individually optimized for effective discrimination between MI and non-MI cases. The models' unique strengths, encompassing SVM's handling of high-dimensional feature spaces, Random Forest's ensemble learning, and CNN's proficiency in hierarchical feature extraction, are strategically combined through the AdaBoost ensemble method. The resulting ensemble model is rigorously evaluated on a separate set of ECG images, demonstrating its enhanced diagnostic accuracy. Key performance metrics, including accuracy, precision, recall, and F1 score, are presented to assess the ensemble model's robustness in real-world clinical applications. This research contributes to the advancement of medical image classification by showcasing the potential of ensemble methods in improving myocardial infarction detection accuracy.
Licence: creative commons attribution 4.0
Myocardial infarction detection, Ensemble learning, Support Vector Machine (SVM), Random Forest, Convolutional Neural Network (CNN), AdaBoost, Electrocardiogram (ECG) images, Diagnostic accuracy, Feature extraction
Paper Title: DIABETES PREDICTION USING MACHINE LEARNING
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02053
Register Paper ID - 259741
Title: DIABETES PREDICTION USING MACHINE LEARNING
Author Name(s): Gaanavi H N, Madanika G, Prof. SumaRani H, Dr. Buddesab
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 384-389
Year: May 2024
Downloads: 153
In this paper we aim to develop an prediction system using machine learning to detect and classify the presence of diabetes in e-healthcare environment using Ensemble Decision Tree Algorithms for high feature selection. A significant attention has been made to the accurate detection of diabetes which is a big challenge for the research community to develop a diagnosis system to detect diabetes in a successful way in the e-healthcare environment. In this paper we aim to develop an prediction system using machine learning to detect and classify the presence of diabetes in e-healthcare environment using Ensemble Decision Tree Algorithms for high feature selection. A significant attention has been made to the accurate detection of diabetes which is a big challenge for the research community to develop a diagnosis system to detect diabetes in a successful way in the e-healthcare environment. The existing diagnosis systems have some drawbacks, such as high computation time, and low prediction accuracy. To handle these issues, we have proposed diagnosis system using machine learning methods, such as preprocessing of data, feature selection, and classification for the detection of diabetes disease in e- healthcare environment. Model validation and performance evaluation metrics have been used to check the validity of the proposed system. We have proposed a filter method based on the Decision Tree algorithm for highly important feature selection. Two ensemble learning Decision Tree algorithms, such as Ada Boost and Random Forest are also used for feature selection and compared the classifier performance with wrapper based feature selection algorithms also. Machine learning classifier Decision Tree has been used for the classification of healthy and diabetic subjects. The experimental results show that the Decision Tree algorithm based on selected features improves the classification performance of the predictive model and achieved optimal accuracy. Additionally, the proposed system performance is high as compared to the previous state-of-the-art methods. High performance of the proposed method is due to the different combinations of selected features set. Furthermore, the experimental results statistical analysis demonstrated that the proposed method would be effectively detected diabetes disease.
Licence: creative commons attribution 4.0
Ensemble learning Decision Tree algorithms, such as Ada Boost and Random Forest
Paper Title: Real-Time Traffic Sign Recognition and Classification with Deep Learning
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02052
Register Paper ID - 259739
Title: REAL-TIME TRAFFIC SIGN RECOGNITION AND CLASSIFICATION WITH DEEP LEARNING
Author Name(s): Anusha K V, Dr Buddesab, Ananya V, Malavika G, Mehak Fathima
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 375-383
Year: May 2024
Downloads: 183
The assignment "class of site visitors signs and signs and symptoms using deep studying" represents a tremendous expand inside the situation of laptop imaginative and prescient with a completely unique cognizance on the recognition and kind of site visitors signs and symptoms. We used the energy of Python to resolve a complex visitors signal class trouble the usage of prominent models: the MobileNet and YOLOv5 architectures. The MobileNet structure done vast tiers of typical overall performance with a schooling accuracy of 97.00% and a validation accuracy of 98.00%. The quit end result is a set of four,100 seventy carefully curated snap shots overlaying fifty eight education of numerous road symptoms, which incorporates speed limits, site visitors signs and symptoms, prohibition symptoms and signs, threat warnings, and additional. the ones hours cover the overall range of site visitors rules and offer complete coverage of what is going to be stated. The YOLOv5 implementation introduced real-time road sign reputation using actual-time pictures and webcam statistics. The version changed into professional on a dataset containing 39 specific website online visitors sign instructions. those instructions encompass a enormous style of signs and signs and symptoms at the side of pedestrians, pace limits, warning and regulatory signs, and help you observe your mission to actual-international
Licence: creative commons attribution 4.0
Traffic Sign Recognition, Neural Network Architecture, Object Detection
Paper Title: Parkinson's Disease Prognosis: Advancements in Early Detection Methods for Parkinson's Disease Enhancing Accuracy for Patient Outcomes
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02051
Register Paper ID - 259738
Title: PARKINSON'S DISEASE PROGNOSIS: ADVANCEMENTS IN EARLY DETECTION METHODS FOR PARKINSON'S DISEASE ENHANCING ACCURACY FOR PATIENT OUTCOMES
Author Name(s): R Geetha, Rakshitha C, Surbhi Kumari, Meghana M Nayak
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 368-374
Year: May 2024
Downloads: 142
This paper proposes a novel approach utilizing machine-gaining knowledge of strategies and Xception architecture for PD detection, focusing on spiral and wave drawings, common diagnostic tools in clinical practice. Through a dataset collection process, including individuals with and without PD, preprocessed data were employed to train machine learning models. Results indicate promising performance, demonstrating the potential of machine learning and Xception architecture in early PD detection. This approach offers advanced accuracy and efficiency in diagnosis, ultimately leading to better patient outcomes and enhanced quality of life.
Licence: creative commons attribution 4.0
Parkinson's disease, Neurodegenerative disorder, Machine learning, Xception architecture, Early detection, Diagnosis, Spiral and wave drawings, Clinical practice, Image classification, Convolutional neural networks, Depthwise separable convolutions, Inception modules, Model performance
Paper Title: Brain Stroke Prediction: A Comparative Analysis of XGBoost, LightGBM, CNN and CNN-LSTM Algorithms
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02050
Register Paper ID - 259737
Title: BRAIN STROKE PREDICTION: A COMPARATIVE ANALYSIS OF XGBOOST, LIGHTGBM, CNN AND CNN-LSTM ALGORITHMS
Author Name(s): Dr.Varalatchoumy M, Dr. Buddesab, G Deepak, Avanish S Velidi, Chaitanya D,Suhas M
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 360-367
Year: May 2024
Downloads: 158
This study provides an in-depth examination of sophisticated machine learning techniques for predicting brain strokes using the Healthcare Dataset Stroke Data. Brain stroke prediction is a critical task in healthcare, having the capacity to greatly enhance patient outcomes via early identification and intervention. In this study, We evaluate the effectiveness of four cutting-edge algorithms: Convolution-Based Neural network(CNN), CNN with Long Short-Term Memory (CNN-LSTM) architecture, XGBoost, and LightGBM. We evaluate these algorithms based on their predictive accuracy, sensitivity, specificity, and computational efficiency. Our research clarifies the advantages and disadvantages of each algorithm in the context of brain stroke prediction, providing valuable insights for healthcare practitioners and researchers seeking to leverage machine learning for early stroke detection. This dataset is used to predict whether a patient is likely to get stroke based on the input parameters like gender, age, and various diseases and smoking status. A subset of the original train data is taken using the filtering method for ML and Data Visualization purposes.
Licence: creative commons attribution 4.0
Brain stroke prediction, XGBoost, LightGBM, Convolution neural networks (CNN), CNN-LSTM, Early stroke detection, Data visualization, healthcare stroke dataset.
Paper Title: Battery Thermal Management in EV Using AI
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02049
Register Paper ID - 259736
Title: BATTERY THERMAL MANAGEMENT IN EV USING AI
Author Name(s): Prof. Syed hayath, Harsha Vardhan J, Himesh Badiger, Hitesh S, Lavaneeth A Ganji
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 353-359
Year: May 2024
Downloads: 172
The increasing popularity of the electric vehicles(EVs) has spurred the need for best battery thermal management systems to ensure optimal performance, longevity, and safety of energy storage systems. It focuses on leveraging Artificial Intelligence (AI) technologies, specifically the Multilayer Perceptron (MLP) algorithm, to enhance the efficiency of battery thermal management in EVs. I algorithms, such as MLP,offers the potential to model and predict the thermal behavior of batteries more accurately, allowing for real- time adjustments and improved control strategies. With the large-scale commercialization and growing market share of electric vehicles (EVs). Their focus has been on higher energy efficiency, an improved thermal performance, and optimized multi- material battery enclosure designs. The combination of simulation-based design optimize the battery pack and Battery Management-System (BMS) is evolving and has expanded to include novelties such as artificialintelligence/machine learning (AI/ML) to improveefficiencies in design, manufacturing, and operations for their application in EVs and energy storage systems. Specific to BMS, these advanced concepts enable a more accurate prediction of battery performance such as its State of Health(SOH), State of Charge(SOC), and State of Power(SOP). This study presents a comprehensive evaluation of the latest developments and technologies in battery design, thermal management, and the applicationof AI in Battery Management Systems(BMS) for electric vehicles (EVs).
Licence: creative commons attribution 4.0
Battery Thermal Management in EV Using AI
Paper Title: Fingerprint Spoof Detection using Convolutional Neural Networks
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02048
Register Paper ID - 259732
Title: FINGERPRINT SPOOF DETECTION USING CONVOLUTIONAL NEURAL NETWORKS
Author Name(s): Shivaram A M, Sharath Gowda P, Shivakumar V, K Prajwal, Susheel Kumar S K
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 348-352
Year: May 2024
Downloads: 149
With the growing use of authentication systems in the recent years, fingerprint spoof detection has become increasingly important. In this model, we use Convolutional Neural Networks (CNN) for fingerprint spoof detection. Our system is trained on the datasets used in The Liveness Detection Competition of years 2009, 2011 and 2013, which comprise almost 50,000 real and fake fingerprints images. The CNN is pre-trained on natural images and fine-tuned with the fingerprint images, CCN with random weights, and a classical Local Binary Pattern approach. The project shows that pretrained CNNs can yield state-of-the-art results with no need for architecture or hyperparameter selection. Dataset Augmentation is used to increase the classifiers performance, not only for deep architectures but also for shallow ones. We also report good accuracy on very small training sets (400 samples) using these large pre-trained networks. The model achieves an overall rate of 97.1% of correctly classified samples - a relative improvement of 16% in test error when compared with the best previously published results
Licence: creative commons attribution 4.0
Fingerprint recognition, Feature extraction, Convolutional neural network
Paper Title: CONVERTING PODCAST EPISODES INTO TEXT FORMAT AND SUMMARIZING THEM
Publisher Journal Name: IJCRT
Published Paper ID: - IJCRTAB02047
Register Paper ID - 259730
Title: CONVERTING PODCAST EPISODES INTO TEXT FORMAT AND SUMMARIZING THEM
Author Name(s): Dr. Sandeep Kumar, Mr. Arun S Adiga, Mr. R N Ravi, Mr. M Hitesh, Mr. Suhas B T
Publisher Journal name: IJCRT
Volume: 12
Issue: 5
Pages: 342-347
Year: May 2024
Downloads: 136
The "Converting podcast episodes into text format and summarizing them" project aims to automate the process of summarizing podcasts, making it convenient for users to quickly grasp the key points of lengthy audio content. The process begins with data collection, where podcast episodes are gathered either as transcripts or audio files. For transcripts, preprocessing techniques are applied to clean the text data, removing unnecessary characters and tags. For audio files, speech recognition tools are employed to convert spoken words into text. The summarization techniques primarily include both extractive and abstractive methods.
Licence: creative commons attribution 4.0
CONVERTING PODCAST EPISODES INTO TEXT FORMAT AND SUMMARIZING THEM